Sys Admin Questions

Ace your homework & exams now with Quizwiz!

What Is Ldap?

A GLDAP (Light-Weight Directory Access Protocol) determines how an object in an Active Directory should be named. LDAP is the industry standard directory access protocol, making Active Directory widely accessible to management and query applications. Active Directory supports LDAPv2 and LDAPv3.

After Restarting Your Windows Xp (professional) Computer, Your Monitor Shows A Blank, Blue Screen. You Remember That A New Video Driver Was Just Installed. What Would Be The Best Way To Fix This Problem?

Restart the Computer, Keep tapping on the F8 Key to go to the Windows Advanced Options Menu and select the option "Last Known Good Configuration" and hit the key.

What Is The Command To Convert A Fat32 File System To Ntfs? Would There Be Any Loss Of Data?

The command is: CONVERT : /fs:NTFS. There will be no effect on the data. (Data will be safe).But remember this: if you want to convert NTFS partition back to FAT32, you will have to re-format that partition and select the FAT32 file system.

What Is The Sysvol Folder?

he SYSVOL folder stores the server copy of the domain's public files that must be shared for common access and replication throughout a domain. All AD databases are stored in a SYSVOL folder and it's only created in an NTFS partition. The Active Directory Database is stored in the %SYSTEM ROOT%NDTS folder.

What Is Wsus?

indows Server Update Services (WSUS) is developed by Microsoft to manage the distribution of updates in Windows environment.

Mention What Is Active Directory?

An active directory is a directory structure used on Micro-soft Windows based servers and computers to store data and information about networks and domains.

What Steps Do You Take When Troubleshooting A Networking Issue?

As a support technician, your job is to solve problems. This question provides the interviewer with insight into your troubleshooting skills. Of course, the most important part of troubleshooting any problem is to divide the tasks of problem resolution into a systematic process of elimination, like this: Define the problem. Gather detailed information. Consider probable cause for the failure. Devise a plan to solve the problem. Implement the plan. 6. Observe the results of the implementation. Repeat the process if the plan does not resolve the problem. Document the changes made to solve the problem.

You Performed A Parallel Installation Of Windows Xp (home Edition) To Resolve Certain Problems On A Customer's Computer. After Installation, The Customer Says She Can See The Previous Profile Folders In Documents & Settings But When She Tries To Open Then, She Gets An "access Denied" Error. What Can You Do To Remove The "access Denied" Problem?

Boot into Safe Mode, Right-Click on the Old Profile Folder, Go to Security - Advanced and give Ownership to the new user.

A Customer Running Windows Xp (home Edition) With An Antivirus Application Installed Reports That He Has Downloaded A Program From The Internet And Installed It In His Computer. After Installing The Program, He Started Receiving Emails From People He Never Knew. The Customer Removed The Program From His Computer But He Is Still Getting Those Emails. How Would You Help This Customer?

Download the most recent virus signature files and scan this computer for viruses.

If, Upon Booting Up A Computer, You See The Error Message "keyboard Error" What Do You Think Could Be The Problem?

It could be that The keyboard is not attached to the PC or The keyboard has failed

What Is Loop Back?

Loopback address is 127.0.0.1, An address that sends outgoing signals back to the same computer for testing.

Which Utility Is Used To Do A Software Clean Boot?

Msconfig

Which Power Condition Occurs When The Voltage Level Drops Below 120 Volts And Stays Below For An Extended Period Of Time?

Questions about power conditions don't rank very high, though they are important. Network support technicians will be faced with many different scenarios. Be familiar with these types of conditions just in case.

A Customer Calls And Says He Is Unable To Get Online. He Uses A Cable Connection To Connect To The Internet On A Windows Xp Computer. You Ping 127.0.0.1 On His Computer And Get The Results That All The Packets Are Lost. What Should You Do Next?

Rebuild the TCP/IP Stack in the users computer

What Is Schema?

Schema is a master database which contains all the information about the object in Active Directory.

What Is Apipa?

Stands for Automatic Private IP Addressing APIPA is a DHCP fail over mechanism for local networks. With APIPA, DHCP clients can obtain IP addresses when DHCP servers are non-functional. APIPA exists in all modern versions of Windows except Windows NT. When a DHCP server fails, APIPA allocates IP addresses in the private range 169.254.0.1 to 169.254.255.254.

Where Is The Ad Database Stored?

The AD database is stored in C:WindowsNTDSNTDS.DIT.

What Is The Different Version Of Windows Server?The following are

The following are are the different version of windows servers: Windows Server 2003 (2003) Windows Server 2003 R2 (2005) Windows Server 2008 (2008) Windows Server 2008 R2 (2009) Windows Server 2012 (2012) Windows Server 2012 R2 (2013) Windows Server 2016 (upcoming - 2016)

If, Upon Booting Up A Pc, You See A Message Which Says "invalid Drive Configuration" What Do You Think Is Causing This?

This problem could be due to any of the following situations: The Hard-Disk cable within the System Unit is not attached to the Controller The Hard Disk Drive has failed The Hard Disk Drive has not been partitioned.

What Is Trust Relationship?

Trust relationship allows access between different domains or forest.

Which Windows Nt Utility Do You Use To Manage The Major Windows Nt Log Files?

Typically, the interviewer or someone more technical than the IT manager will ask you detailed operating system-specific questions to assess your knowledge of the various products. Alternately, you may be asked to take an assessment exam like Brainbench.

What Does The Term Uac Stand For?

UAC stands for User Access Control. For more information read this article.

A Customer Has Recently Upgraded From Windows 98 To Windows Xp Professional. After The Upgrade, It Takes Longer For Windows, Menus, Sub-menus And Other Use Interface Features To Open. She Wants Them To Open Faster. How Can You Help This

Use System in Control Panel and select the option "Adjust for Best Performance" in the Performance Options dialogue box.

What Is Voip?

VOIP :Short for Voice Over Internet Protocol, a category of hardware and software that enables people to use the Internet as the transmission medium for telephone calls by sending voice data in packets using IP rather than by traditional circuit transmissions.

Why Should You Not Restore A Dc That Was Backed Up 6 Months Ago?

When restoring a backup file, Active Directory generally requires that the backup file be no more than 180 days old. If you attempt to restore a backup that is expired, you may face problems due to lingering objects.

What Is Wds?

Windows Deployment Services helps for installing Windows operating system(OS) remotely over the network

When Do We Use Wds?

Windows Deployment Services is a server role used to deploy Windows operating systems remotely. WDS is mainly used for network-based OS installations to set up new computers.

What Is Wins Server?

Windows Internet Name Service (WINS) servers dynamically map IP addresses to computer names (NetBIOS names). This allows users to access resources by computer name instead of by IP address. If you want this computer to keep track of the names and IP addresses of other computers in your network, configure this computer as a WINS server. If you do not use WINS in such a network, you cannot connect to a remote network resource by using its NetBIOS name.

What Is Replication?

Replication is a process in active directory which keeps domain controller syncs with other DC over the network.

What Is Garbage Collection?

garbage collection is the online defragmentation of the Active Directory which happens every 12 hours.

What Are Gpos (group Policy Objects)?

A Group Policy Object (GPO) is a collection of settings that control the working environment of user accounts and computer accounts. GPOs define registry-based policies, security options, software installation and maintenance options, script options, and folder redirection options. There are two kinds of Group Policy objects: Local Group Policy objects are stored on individual computers. Nonlocal Group Policy objects, which are stored on a domain controller, are available only in an Active Directory environment.

Can Wireless Mouse Carry A Virus?

A big NO. Wireless mouse is nothing but a junk of hardware.It cannot be hacked or anything.If you suspect that pointer on the screen is not working properly or moving on its own its probably due to virus on your harddisk whose source is not WIRELESS MOUSE.

What Is Domain Controller?

A domain controller (DC) or network domain controller is a Windows-based computer system that is used for storing user account data in a central database. It is the centrepiece of the Windows Active Directory service that authenticates users, stores user account information and enforces security policy for a Windows domain. A domain controller allows system administrators to grant or deny users access to system resources, such as printers, documents, folders, network locations, etc., via a single username and password.

What Is A Domain?

A domain is defined as a logical group of network objects (computers, users, devices) that share the same Active Directory database. A tree can have multiple domains.

What Are Lingering Objects?

A lingering object is a deleted AD object that still remains on the restored domain controller in its local copy of Active Directory. They can occur when changes are made to directories after system backups are created. When restoring a backup file, Active Directory generally requires that the backup file be no more than 180 days old. This can happen if, after the backup was made, the object was deleted on another DC more than 180 days ago.

If You Turn On A Pc And The Boot-up Process Halts And You Get The Error Message "non-system Disk Or Disk Error Replace And Press Any Key When Ready" What Do You Think Could Be The Problem?

A non-bootable Floppy Disk is in the Floppy-disk drive and it should be removed.

What Is Proxy Server?

A proxy server is a computer that acts as a gateway between a local network (e.g., all the computers at one company or in one building) and a larger-scale network such as the Internet. Proxy servers provide increased performance and security. In some cases, they monitor employees' use of outside resources.

What Is Active Directory?

Active Directory is Microsoft directory services used on Windows servers. Active directory is a centralized database for users, computers, networks, printers, files etc.

What Is Active Directory?

Active Directory provides a centralised control for network administration and security. Server computers configured with Active Directory are known as domain controllers. Active Directory stores all information and settings for a deployment in a central database, and allows administrators to assign policies and deploy and update software.

Is Team-work Part Of A System Administrator's Typical Day?

Administrators are typically called in to offer technical support for teams working on a project. Support might mean technical troubleshooting or the development and explanation of technological strategy with regards to the project goals and means.

What Role Do Characteristics Such As Assertiveness And Problem Solving Play In The Career Of A System Administrator?

Analytical thinking and problem solving is crucial to be able to analyze software or hardware malfunction. They are also necessary to be able to improve or upgrade systems so that they suit company needs. Assertiveness also plays a role because administrators have to make decisions. They decide on solutions, security measures, and things like system upgrades.

Differentiate Between Firewall/antivirus?

Antivirus: The prime job of an anivirus is protect your system from computer viruses. Your computer may be standalone or part of network or connected to Internet you need an antivirus program. It actively monitors when you are using your system for any virus threat from different sources. if it found one it tries to clean or quarantine the virus ultimately keeping your system and data safe. Firewall: Firewall is in other hand a program which protects your system from outsider/intruder/hacker attacks. These attacks may not be virus type. In some cases hackers can take control of your system remotely and steal your data or important information from system. If your system is directly connected to internet or a large network than you can install a software firewall in your PC to protect your self from unauthorized access. Firewall is available either in software or in hardware form. For a single PC you may need a software firewall while a large corporate implements hardware firewall to protect all of their systems from such attacks.

A Customer Reports That His Windows Xp Professional Portable Computer Is Not Able To Connect To Any Network Resource And Is Also Not Able To Authenticate On The Network's Active Directory Domain. The Computer Was Fine Yesterday. No Other Person In The Organization Is Facing This Problem. What Is The First Thing You Would Do To Fix This Problem?

Ask the user to Right-Click on the Network Connection icon and select "Repair" from the Menu.

What Tools Do You Have Available To You For Troubleshooting?

At this point, the interviewer is testing your resourcefulness. This is a pretty generic question, so make sure that your answer is consistent with the overall theme of the interview. The tools available may include server log files, network analyzers, error messages, README files, telephone support, or vendor technical support web sites or CD-ROMs. Don't forget to mention vendor-specific resources that you may use, like TechNet Online, or any other subscriptions that you may have in your bag of tricks. The final resource is of course your colleagues who may have run into this situation in the past.

A Customer Complains That He Keeps Getting The Error Message "hal.dll Missing Or Corrupt". Which File Needs To Be Repaired/rebuilt To Rectify The Issue?

BOOT.INI

How Do You Backup Ad?

Backing up Active Directory is essential to maintain the proper health of the AD database. Windows Server 2003: You can backup Active Directory by using the NTBACKUP tool that comes built-in with Windows Server 2003 or use any 3rd-party tool that supports this feature. Windows Server 2008: In Server 2008, there isn't an option to backup the System State data through the normal backup utility. We need to use the command line to backup Active Directory. 1. Open up your command prompt by clicking Start, typing "cmd" and then hit Enter.2. In your command prompt, type "wbadmin start systemstatebackup -backuptarget:e:" and press Enter.3. Input "y" and press Enter to start the backup process. When the backup process has finished you should get a message that the backup completed successfully. If it did not complete properly you will need to troubleshoot.

Which File Must Be Located In The Root Folder Of The Active Partition For Dual Booting Of Windows Xp And Windows Me To Boot?

Boot.ini

Very Frequently, Users In Your Office Put Floppy Disks In The Drives And Forget To Take Them Out. This Results In Boot-up Problems And Results In Support Requests. How Would You Stop This Computer From Looking In The A: Drive For Boot Files First?

Change the Boot Order in BIOS.

What Is Dns?

Domain Naming System(DNS) resolves IP address to the hostname(domain) and hostname(domain name) to IP address.

Question 8. What Do Forests, Trees, And Domains Mean?

Domain, tree and forest are a logical structure in Active Directory. Domain: A domain is a collection of computers, users, and objects which share common AD and has trust relationships. Tree: A tree collection of one or more domain. Forest: The forest is the top of the Active Directory structure. It is consists of multiple trees which share a common global catalog.

A User Cannot Access The Local Intranet. What Would You Try First In Helping To Determine How To Narrow The Problem Down To The Intranet?

Don't make this question harder than it really is. Sometimes the interviewer will try to trip you up to test your common sense. Go for the obvious, rather than complicating the situation. In this case, simply trying to access the intranet from another workstation would help isolate the problem to the machine.

What Is Dhcp?

Dynamic Host Configuration Protocol (DHCP) helps in automatically allocation IP address over the network with defined scope.

Why Do We Use Dhcp?

Dynamic Host Configuration Protocol assigns dynamic IP addresses to network devices allowing them to have a different IP address each time they are connected to the network.

What Are Main Email Servers And Which Are Their Ports?

Email servers can be of two types: ncoming Mail Server (POP3, IMAP, HTTP): The incoming mail server is the server associated with an email address account. There cannot be more than one incoming mail server for an email account. In order to download your emails, you must have the correct settings configured in your email client program. Outgoing Mail Server (SMTP): Most outgoing mail servers use SMTP (Simple Mail Transfer Protocol) for sending emails. The outgoing mail server can belong to your ISP or to the server where you setup your email account. The main email ports are:POP3 - port 110IMAP - port 143SMTP - port 25HTTP - port 80Secure SMTP (SSMTP) - port 465Secure IMAP (IMAP4-SSL) - port 585IMAP4 over SSL (IMAPS) - port 993Secure POP3 (SSL-POP) - port 995

Mark Uses Windows Xp Professional And Is Connected To The Internet Directly Through A Dsl Line. He Wants To Know How He Would Enable The Filtering Of Packets And Get Rid Of The Harmful Incoming Data. What Would You Tell Him?

Enable the Firewall

You Need To Dual-boot A Computer With Windows Xp And Windows Me. You Need All The Partitions To Be Accessible From Both The Operating Systems. Which File System Would You Use In This Scenario?

FAT32

What Do Forests, Trees, And Domains Mean?

Forests, trees, and domains are the logical divisions in an Active Directory network. A domain is defined as a logical group of network objects (computers, users, devices) that share the same active directory database. A tree is a collection of one or more domains and domain trees in a contiguous namespace linked in a transitive trust hierarchy. At the top of the structure is the forest. A forest is a collection of trees that share a common global catalog, directory schema, logical structure, and directory configuration. The forest represents the security boundary within which users, computers, groups, and other objects are accessible.

A User Calls And Says That Whenever He Starts His Computer, It Boots Up Only In Safe Mode. There Is No Other Error Message. What Would You Do To Fix This Problem?

Go to Msconfig and select Normal Mode and Restart the Computer.

What Is Group Policy?

Group Policy allows you to implement specific configurations for users and computers. Group Policy settings are contained in Group Policy objects (GPOs), which are linked to the following Active Directory service containers: sites, domains, or organizational units (OUs).

Which Hardware Troubleshooting Tool(s) Could You Use To Find Out Where A Cable Is Routed?

Here's another question regarding troubleshooting tools. In this case you might want to use a tone generator and tone locator to find out where cables are routed. These tools are alternately known as fox and hound devices. These are more advanced tools that represent a higher skill level. Whenever possible, provide an example of a sticky situation where you've had to rely on tools such as these for troubleshooting.

Explain About Hyper-v?

Hyper-V is Microsoft's virtualization tool for creating multiple virtual machines on a single physical server, thus reducing the cost of hardware and improving efficiency.

What Experience Do You Have With Hardware Components?

Installation and replacement are some of the most frequently performed operations with hardware. Sometimes a system administrator might need to rebuild a hardware component.

How Would You Prioritize Support Issues?

It is unlikely that as a network administrator or technician you will receive problem calls one at a time. Typically, when you receive one call, you already have three people waiting for service. For this reason, you must learn to prioritize. Your answer to this question will provide the interviewer with insight into how effectively you prioritize. It's not a trick question, though sometimes it can feel that way. You probably have a process that you use instinctually. Talk about it. It probably includes many of the following components: Total network failure (affects everyone) Partial network failure (affects small groups of users) Small network failure (affects a small, single group of users) Total workstation failure (single user can't work at all) Partial workstation failure (single user can't do most tasks) Minor issue (single user has problems that crop up now and again)

What Is Server Manager?

It is utility tool in Windows Servers for the administrator for managing servers roles(like adding or removing server roles.

Please Describe The Importance You Place On Customer Service Versus Technical Skills?

Most interviewers like to start with big picture questions and then work their way into more technical areas. IT is a service organization and customer service is at its core. In particular, customer service skills are just as important as technical skills, particularly in panic situations when systems are down or the user has just deleted their board presentation that's due in 30 minutes. We've all had these situations. You should be prepared to talk about a specific situation where you've excelled and received accolades from an end-user. If they put it in writing, mention that as well.

Differentiate Between Ntfs & Fat?

NTFS is the current file system used by Windows. It offers features like security permissions (to limit other users' access to folders), quotas (so one user can't fill up the disk), shadowing (backing up) and many other features that help Windows. FAT32 is the older Microsoft filesystem, primarily used by the Windows 9X line and Window could be installed on a FAT32 parition up to XP. In comparision, FAT32 offers none of what was mentioned above, and also has a maximum FILE (not folder) size of 4GB, which is kind of small these days, especially in regards to HD video.

You Are Connecting A Cubicle Farm To Your Network. You Install Nics In All The Workstations And Run Cables To A Workgroup Hub. You Then Connect The Mdi Port On The Workgroup Hub To The Main Hub With A Standard Patch Cable. Upon Powering Up The Cubicle Farm Computers, None Of Them Can See The Servers On The Network. What Could You Replace To Solve This Problem?

Networking devices like hubs, switches, and routers will also be part of the technical interview. It is expected that you can speak fluently on both software and hardware issues.

You Suspect That Your Computer Is Failing Because Of A Corrupt Master Boot Record. Which Utility Is The Best To Fix This

Recovery Console (By Using the fixmbr command)

You Are A Desktop Support Technician. A User Calls And Complains That Till Yesterday He Was Able To View His Cd Drive In His Computer. But Today When He Turned On His Computer, He Is Not Able To View The Cd-rom Drive In "my Computer". What Can Be Done To Fix This Problem?

Open the Windows Registry Editor and Delete the Upper and Lower Filter Keys.

Which Software Troubleshooting Tool Could You Use To Determine Which Protocol Is Configured With The Wrong Address?

Questions like these assess your knowledge of troubleshooting tools that can help you resolve problems faster. In this case, a typical tool used to determine incorrectly configured addresses is a protocol analyzer. It can be used to examine the details of packets as they travel across the wire. This is a sophisticated tool that requires a deeper understanding of network protocols. Any interviewer will be impressed if you've used such a tool in troubleshooting.

You Have Norton 360. When The Firewall Is Turned On, You Are Unable To Browse The Internet. But If You Turn Off The Firewall, You Are Able To Browse. What Is The First Thing You Would Do To Fix This Problem?

Reconfigure Norton Firewall to allow Internet Explorer to access the internet.

How Can You Manage A Network Using A Router?

Routers have built in console that lets you configure different settings, like security and data logging. You can assign restrictions to computers, such as what resources it is allowed access, or what particular time of the day they can browse the internet. You can even put restrictions on what websites are not viewable across the entire network.

What Are The Personal Characteristics Of A System Administrator?

System administrators are experts at handling hardware and software. They are quick with both their hands and their head. They can work alone, but they know when and how to communicate with others, whether to report problems, learn information needed to fix problems, or instruct employees regarding technical issues.

Which Tcp/ip Utility Is Most Often Used To Test Whether An Ip Host Is Up And Functional?

TCP/IP is at the core of just about every network today. You must be familiar with the most often used commands for managing this network environment. This includes Ping, ipconfig, FTP, and tracert. You should also be ready to apply these commands and utilities to various situations, as the next question demonstrates. Some sample additional questions include: Which utility can you use to find the MAC and TCP/IP address of your Windows NT or 2000 workstation? Which program can you use to upload and download files to a Unix server? Which utility can you use to verify a packet's path?

You Are Configuring Power Management On Your Windows Xp Computer. With Acpi, Power Management Should Be Under The Exclusive Control Of:

The Operating System

If You Turn On A Pc And The Boot Process Halts And You Get The Error Message " C:system32config File Missing Or Corrupt" What Is This Due To?

The Registry Hives are corrupted. They need to be repaired.

A User Complains That Whenever He Connects Any Usb 2.0 Device To His Computer, He Gets The Error Message "usb Device Not Recognized" What Could Be The Possible Reason For This?

The USB Port could be faulty.

A User Complains That He Is No Longer Able To Hear Any Sound From His Computer - After He Downloaded Some Updates From The Microsoft Website. What Could Be The Possible Reason For This?

The Windows Audio Service is Disabled. Enable it.

What Is The Windows Registry?

The Windows Registry, usually referred to as "the registry," is a collection of databases of configuration settings in Microsoft Windows operating systems.

You Are The Network Administrator. A User Calls You Complaining That The Performance Of The Intranet Web Server Is Sluggish. When You Try To Ping The Server, It Takes Several Seconds For The Server To Respond. You Suspect The Problem Is Related To A Router That Is Seriously Overloaded. Which Workstation Utility Could You Use To Find Out Which Router Is Causing This Problem?

The answer here is the tracer out utility, which will tell you which router is having the performance problem and how long it would take to travel between each host. You should be knowledgeable on the application of the most common IP commands for the various operating systems you support. Other questions along this line that you may run into include: Which ipconfig switch will display the most complete listing of IP configuration information for that station? Which Windows TCP/IP utility could you use to find out whether a server is responding on TCP port 21?

What Are The Types Fsmo Roles?

The are five FSMO roles: Primary Domain Controller (PDC) Infrastructure master Relative ID (RID) master Schema master Domain naming master

You Are A Desktop Support Technician At Eqs. One Of The Customers Has Just Installed A Brand New Printer For Himself. This Customer Calls You After Some Time And Says That Every Time He Tries To Print Something, All He Gets Is Some Garbled Text. However, The Printer Prints The Test Page Fine. What Do You Think Is The Problem Here?

The customer has installed an Incorrect Device Driver for the Printer. I would uninstall the driver, from the WIndows Device Manager and install the correct Device Driver for the Printer from the Disk that came with the Printer. (If the Disk is not available, I can still download the correct device driver from the manufacturer's website)

What Does A "?" Sign In Device Manager Signify?

The device is not installed. ( You can refer to this article for more details). For more information on Device Manager check this article from Microsoft.

What Are The Features Of The Disk Defragmenter Tool In Windows Xp And Windows 2000? Does The Windows Xp Version Have Any More Features Than The Windows 2000 Version?

The features of the Disk Defragmenter Tool are the same in both Windows XP and Windows 2000. They are: Enhanced Analysis Functionality A Compression option Increased Defragmentation Option and an Automatic Defrag-Scheduling Option.

What Are The Different Roles In Windows Server?

The following are the different roles in Windows server: Active Directory Certificate Services (ADCS) Active Directory Domain Services (ADDS) Active Directory Federation Services (ADFS) Active Directory Lightweight Directory Services (ADLDS) Active Directory Rights Management Services (ADRMS) Application Server DHCP Server DNS Server FAX Server File and Storage Services Hyper-V Print and Document Services Network Policy and Access Services Remote Access Remote Desktop Services Volume Activation Services Web Server (IIS) Windows Deployment Services (WDS) Windows Server Update Services (WSUS)

A User Calls You, Complaining That He Can't Access The Corporate Intranet Web Server. You Try The Same Address, And You Receive A Host Not Found Error. Several Minutes Later, Another User Reports The Same Problem. You Can Still Send E-mail And Transfer Files To Another Server. What Is The Most Likely Cause Of The Problem?

The interviewer will assess your skills as they relate to all aspects of networking, not just servers. This means you should be prepared to answer questions on web servers as well as local networks. In this case, because other people are experiencing the problem, the problem is most likely either network- or server-related. And because you can transfer files to and from another server, it can't be the network. Thus, the problem is related to the web server.

Users Can Send E-mail Locally, But Cannot Send E-mail To External Recipients. How Would You Troubleshoot This Situation?

The interviewer will run you through a series of questions like this one to see how you would use your troubleshooting skills in a common, real-life situation. He not only gets to see how your mind works, but also begins to get an insight into your technical capabilities. In your answer, be methodical in your approach, identifying the most likely possibility and testing it. Be sure to let the interviewer know that if your first attempt doesn't work, you know how to move on to the next possibility.

What Are The Roles Of System Administrator?

The role of System Administrator differs in the organization. The three main task of a System Admin is Installing, Supporting and maintaining servers & computers. Install patches & OS Updates Review system logs access administration Access administration for users Disaster recovery planning Creating and Restoring system backups Comply with password requirements Access control System audit logging

Several Users Can't Log In To The Server. What Would You Do To Narrow The Problem Down To The Workstations, Network, Or Server?

The situation gets a little more interesting. Again, keep it simple, such as checking the server console for user connections to see if other users are able to log into the server. If they can, the problem is most likely related to those users' workstations. If they can't, the problem is either the server or network connection.

Give An Example Of Systems You Have Been Working With As An Administrator?

These typically are: Windows and Linux, which support either Asset Management or GIS. Typical duties include engineering, support and maintenance, and research for the purpose of innovation and upgrading.

What Are The First Things You Check When A User Is Experiencing Problems Accessing The Network?

This question assesses your basic network troubleshooting skills. You can't miss this one! You should be able to answer it in your sleep. You can liven up the interview by providing a funny story about user errors that you've encountered.

A User Complains That When She Prints A Document In Any Application, The Printer Prints Garbage. What Is The Most Likely Cause Of The Problem?

This question starts the behavioral interviewing questions based on real-life situations that assess your problem-solving skills and your technical skills. They will range from the general (like this question) to very specific technical questions that determine your knowledge level and skill set. Don't worry if you don't have all the answers. The interviewer is mostly interested in how you would resolve the situation and what resources you would use to do so.

A User Has Left The Company And You Need To Create A New User With The Same Rights And Permissions. Please Describe Some Of The Ways To Create The New User?

This question tests your ability to get the job done in the most efficient way possible. For example, you can create new accounts from scratch and assign the original rights to the accounts or you can simply rename the old account for the new user, which saves you a lot of time and effort.

A User's Roaming Profile Is Not Accessible. Describe How You Would Solve This Problem?

This question tests your troubleshooting skills. In this situation you may want to talk about which tests you would perform in order to resolve the issue. These may include: Ensuring that the path to the profile directory is correct on the user's account properties. Ensuring that the server where the profile resides is accessible. Ensuring that the user has Full Control permissions to the Profile directory.

You Are Installing A Windows Xp-based Tcp/ip Network. You Accidentally Set Workstation B To The Same Ip Address As Workstation A. Which Workstation(s) Will Receive An Error Message?

This type of question assesses your TCP/IP configuration knowledge. It's a common problem, but a little tricky based on the configuration mentioned above. The correct answer here is that through broadcasts, both workstations will detect if there is a duplicate IP address on the network and will display error messages to that effect.

What Is Powershell?

Windows PowerShell is Command-Line Shell developed by Microsoft. The main purpose of the PowerShell is to automate administrative tasks which work both local and remote windows machines. PowerShell is built on .NET Framework.

How Can We Remove Lingering Objects?

Windows Server 2003 and 2008 have the ability to manually remove lingering objects using the console utility command REPADMIN.EXE.

Depending On The Windows Client Operating System Version, Which Commands Can You Use To Find Out What Is Installed On A System?

You may run into operating system-specific questions like this one as you are being interviewed by prospective peers. You should be familiar with the most common commands. Don't worry about memorizing command syntax. That's what the /? is for.

A User From The Marketing Department Calls Complaining That She Can't Log In Or See Any Servers On The Network. Her Computer Operates Fine Otherwise. No Other Users From The Marketing Department Are Reporting Any Problems. What Is The First Thing You Could Check?

You should also expect to be assessed on your knowledge of the physical layer of the OSI model.

What Is The Command To Start Windows System Restore From The Command Line?

rstrui.exe


Related study sets

Chapter 14 SB: Eating Disorders and Disordered Eating

View Set

PHYS 207 FINAL iClicker & Concept Questions (ch.10,16,17,12,13)

View Set

Plate tectonics - Tsunami - Japan

View Set

Potential and kinetic energy (PE and KE)

View Set

Unit 2.01 Understanding Information Management

View Set

Chapter 16 Documenting, Reporting, Conferring

View Set

Chapter 26: Growth and Development of the Toddler

View Set