0% found this document useful (0 votes)
287 views14 pages

Desktop Support Q &A

Uploaded by

msdarshan.bhp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
287 views14 pages

Desktop Support Q &A

Uploaded by

msdarshan.bhp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

1) What is active directory?

Active Directory (AD): Active Directory is a directory service developed by Microsoft.


It is used to manage and organize information about network resources (such as users,
computers, and printers) in a distributed network environment.
AD provides authentication and authorization services, allowing administrators to
control access to resources and enforce security policies.

2) What is DHCP and what it is used for?


DHCP (Dynamic Host Configuration Protocol): DHCP is a network protocol used to
automatically assign IP addresses and other network configuration
information to devices on a network.
DHCP is a network protocol used to automatically assign IP addresses and other network
configuration information to devices on a network.
It eliminates the need for manual IP address configuration, making it easier to manage
and scale large networks.

3) What is the scope and super scope?


A scope is a range of IP addresses that can be assigned to DHCP clients. A super scope
allows scopes to be grouped to provide IP addresses from multiple logical
subnets to clients on a single physical network.

4) What is DNS?
DNS (Domain Name System): DNS is a system that translates human-readable domain
names (like www.example.com) into IP addresses that computers use
to identify each other on a network.
It serves as a distributed database that maintains a mapping between domain names and
corresponding IP addresses.

5) What is forward and reverse lookup in DNS?


Forward lookup zones resolve names to IP addresses and Reverse lookup zones resolve
IP addresses to names.
Forwarders can be used on your DNS server to forward requests for which your DNS
server does not have an authoritative answer.

6) How can you start a system in Safe Mode?


Hold the Shift key while clicking Restart from the Shut down or sign out menu. Select
Troubleshoot > Advanced options > Startup Settings >Restart. After the PC restarts, there is
a list of options. Select 4 or F4 or Fn+F4 (following the on-screen instructions) to start
the PC in Safe Mode.
By clicking the "windows icon" in the taskbar, you can access the Start menu.
In the lower-right corner, click the "power icon."
Hold down the Shift key on your keyboard and hit the "Restart" option.

7) What is the IPCONFIG command?


The ipconfig command is used to display information about your network configuration
and refresh DHCP and DNS Settings.
By default, the ipconfig command displays your IP Address, Subnet Mask, and default
gateway.
8) What would you use to connect two computers without using switches?
An Ethernet crossover cable is a network cable used to connect two Ethernet network
devices directly, such as two computers without a switch or router in between.

9) What is a domain?
A domain, in the context of networking, refers to any group of users, workstations, devices,
printers, computers and database servers that share different types of data via network
resources.

10) Tell me if your system is infected by a virus how you will recover the data?
Step 1: Download and install a virus scanner. ...
Step 2: Disconnect from internet. ...
Step 3: Reboot your computer into safe mode. ...
Step 4: Delete any temporary files. ...
Step 5: Run a virus scan. ...
Step 6: Delete or quarantine the virus. ...
Step 7: Reboot your computer. ...
Step 8: Change all your passwords.

11) What is the operating system?


Operating system acts as an interpreter between computer application and hardware. It
works as a user interface.

12) What are the types of the operating system or O.S?


The two types of operating systems are:

NOS: Network Operating System. Examples of NOS- Windows NT, 2000,2003


SOS: Simple Operating System. Examples of SOS – Windows 95,98, ME

13) Explain about RAS server?


RAS means Remote Access Server. It allows operating the tool or information that
typically resides on a network or IT devices through a combination of hardware and
software, for example connecting to a printer or file. It is usually used for mobile users
who are in the network. It uses a telephone line to provide connectivity to its users. It can
also connect two or more than two offices in the network

14) Explain about VPN server?


VPN means Virtual Private Network. It is a private communications network often used
by companies or organizations to communicate confidentially over a public
network. This is used by the mobile users in the network.

15) Configuration of outlook?


Open Outlook.
Enter your Microsoft 365 email address, and then select Connect.
Enter any additional email addresses that you want to use and then select Next.
If prompted, enter a password, and then select Sign in.
16) What is IAS server?
IAS is a component of Windows Server operating systems that provides centralized user
authentication, authorization, and accounting. RADIUS. An Industry-standard
network access protocol for remote authentication.

17) What is the process for adding a system to a domain?


In the System window, click on the "Change settings" link next to the computer name. In
the System Properties window, go to the "Computer Name" tab. Click on the "Change"
button. Select the "Domain" option and enter the name of the domain you want to join.

18) What is a Ping command?


Between two or more devices, to check the physical IP connectivity Ping command is
used.

19) Installation of operation system?


Attach the USB flash drive or insert the DVD on the PC where you want to install
Windows 10.
Restart your PC. ...
On the Install Windows page, select your language, time, and keyboard preferences, and
then select Next.
Select Install Windows.

20) What is a group?


A Group is a collection of user accounts. It provides a simplified administration in the
network.

21) What is the child domain?


A child domain is the member domain of Windows 2000 Active Directory.

22) What are the benefits of a child domain?


Benefits of the child domain are:
Low network traffic
Low administrative overhead
Security boundary

23) What is OU?


OU means for Organizational Unit. It is a container within Active Directory which can hold
users, groups, and computers.
It is the smallest unit on which an administrator can assign group policy settings.

24) What is group policy?


Group policy provides streamlined access to all the users in the network. It can be used to
define a user’s security and networking policies. By group policy, you can keep control
over certain function like not allowing the users to shut down the system or using the
control panel or running the command. Group policy is applicable to active directory
containers like OU, site, and Domain
25) What is the difference between permission, rights, and policy?
“Policy” is assigned on active directories, like the site, domain, and OU. The “Rights” are
assigned to users and groups, whereas, the “Permission” is assigned for network
resources like file, folders, and printers.

26) What do DC and ADC stand for?


Domain administrator: Within a computer network domain, a domain controller (DC)
is a server computer that responds to security authentication requests. It's a network
server in charge of granting hosts access to domain resources.

The Active Directory Connector (ADC) accepts changes to AD users and replicates
them in your GoTo account. All users in specified AD groups comprising GoToAssist
users, as well as all users in any subgroups, are accessible to the ADC.

27) What is the difference between DC (Domain controller) and ADC (Additional
Domain Controller)?
DC stands for the Domain Controller, and ADC stands for Additional Domain Controller.
ADC is a backup of the domain controller. The domain controller is a server that checks
the security measures like user id, password

28) Printer configuration?


Select the Start button, then select Settings > Devices > Printers & scanners > Add a
printer or scanner. ...
Wait for it to find nearby printers, then choose the one you want to use, and select Add
device.

29) What is a “Default Gateway”?


The default gateway is the IP address of the router in the network. In any case, if the user
wants to switch on to another network, or if they cannot locate their particular
network than their query will be forwarded to the default gateway.

30) How can you take a backup of emails in MS Outlook?


To take a back-up in the Ms outlook, you have to go in the control panel. In the control
panel, you have to go under mail option and then open the data file, select personal
folder and click on open folder. After that, you have to copy .pst and have to paste it
wherever you want the backup.

31) What is the trusting domain and trusted domain?


In trusting domain resources are available, while in trusted domain user’s account is
available.

32) What is the BUS speed?


The rate of communication speed between microprocessor and RAM is known as BUS
speed.
33) Name the Active Directory Partitions?
There are three types of active directory partitions
-Schema partition
-Configuration partition
-Domain partition

34) What is Fix boot?


Fix boot writes a new partition boot sector on to the system partition.

35) How many logical drives is it possible to fit on to a physical disk?


The maximum number of the logical drive that can fit on a physical disk is 24, while the
extended partition can only have 23 logical drives.

36) What is B Router?


B Router means Bridge router. To provide communication between two or more different
network like a computer to computer or computer to the internet, B Router is used

37) What is the major difference you can mention about Gateway and Router?
Gateway works on different network architecture and router works on the same network
architecture.

38) What is the packet?


A packet is a logical grouping of information that comprises a header which contains user
data and location information.

39) Which is the latest O.S?


Windows 12

40) How many classes are there for “IP addresses” and what are the ranges?
They are segregated into five classes
Class A === 0 -126 (127 is reserved for loop back)
Class B ===128- 191
Class C ===192-223
Class D ===224-239
Class E ===240-255

41) Explain the term FIXMBR?


FIXMBR it is a repair tool. It repairs the Master boot record of the Partition Boot Sector.

42) Explain the term SID?


SID stands for Security Identifier. Every computer object has a unique ID which is known
as SID.

43) What is the difference between incremental backup and differential backup?
Differential backups will select only files that are changed since the last backup.
Incremental backups will select only the data that has changed since the last backup.

Example, On Sunday you do a backup of a 5-text file each of 40 MB. The total backup size
will be 200MB On Monday you change 2 lines in just ONE of the text files.
44) What is the difference between server OS and desktop OS?
Server OS gives centralized administration for users, shared resources and security while
desktop OS offers access to only local administration.

45) What is the difference between the MSI file and .EXE file?
MSI (Microsoft Installer) allows install, uninstall and repair the program with a
single file, while .EXE file needs two files to install and uninstall the software. Also, .EXE
file is able to detect the existing version of the software and give an option to user to
uninstall the program while MSI will instruct the users to use the add and remove
program in the control panel to remove the existing product first and then you can install
the new program.

46) What is BSOD (Blue screen of death)? How do you troubleshoot it?
BSOD (Blue Screen of Death) is an error screen presented by the Windows operating
system upon encountering a critical system error that hinders normal functioning. The
screen turns blue and displays an error message and a stop code.
BSODs often indicate hardware or software issues, such as faulty drivers, incompatible
hardware, or system file corruption.
Resolving the underlying cause of the BSOD requires troubleshooting to restore system
stability.

47)How do you back up your Microsoft Outlook Emails?


To back up Microsoft Outlook Emails, utilize the built-in export feature:

*Open Microsoft Outlook and access the “File” menu.


*Select “Open & Export” and choose “Import/Export.”
*In the Import and Export Wizard, opt for “Export to a file” and proceed.
*Choose the file type “Outlook Data File (.pst)” and select the desired mailbox or
folders for backup.
*Specify the backup location and file name for the exported PST file, and complete
the export process by clicking “Finish.”

48) what is Ip address? /Types of IP


IP addresses are unique identifiers used to communicate with devices connected to a
network. Different types of IP addresses have their own unique characteristics and
uses. Read the article to learn more about types of IP addresses, including IPv4, IPv6,
public, private, dynamic, and static IP addresses.

49) What is the SMTP server or POP server?


POP stands for post office protocol. It is used for mail receiving purpose in the network.
SMTP stands for simple mail transfer protocol. It is basically used for sending and
receiving the mail.
50) what is the .ost and .pst file?
PST (Personal Storage Table) OST (Offline Storage Table) files are associated with
Microsoft Outlook:

*PST (Personal Storage Table) PST files store email messages, contacts, calendars, and
other mailbox data within Microsoft Outlook. They are used for POP and IMAP email
accounts and local folder storage and archiving. Typically, PST files are stored locally on
the user’s computer or at a network location.
*OST (Offline Storage Table) files are offline copies of a user’s mailbox data
synchronized with an Exchange Server. These files allow users to access their mailbox data
even when not connected to the server. OST files are automatically created when
Outlook is used in Cached Exchange Mode.

51) What is “Bootloader”?


Bootloader facilitates the loading of the operating system on the system. It enables the
booting process and gives the OS option to the users while starting the system.
---------------------------------------------------------------------------------------------------------------------
-------------------------------

01). What is VPN? what are VPN troubleshooting steps for VPN not connecting?
VPN stands for "Virtual Private Network" and describes the opportunity to establish a
protected network connection when using public networks. VPNs encrypt your
internet traffic and disguise your online identity.
This makes it more difficult for third parties to track your activities online and steal data
The encryption takes place in real time.

Trouble shooting steps are:


1. Check your internet connection
2. Check your credentials
3. Check your VPN server status
4. Check your VPN protocol and ports
5. Look for VPN software issues
6. Check the firewall blocking
7. Restart your VPN app
8. Reinstall the latest version of your VPN app

02). About Office 365 and licences


Microsoft 365 is our subscription-based cloud productivity platform
E1: A basic license that includes:
• Online Office apps like Word, Excel, PowerPoint, and OneNote
• Email and calendar access
• 50 GB mailbox
• 1 TB of OneDrive for Business storage
• Real-time collaboration with SharePoint
• Communication with Yammer
• Instant messaging and online meetings with Teams
E3: An advanced license that includes all the features of E1, plus:
• Desktop versions of Office apps
• 100 GB mailbox
• Additional compliance features
• Automatic updates to the latest Office version
• Services for Power Apps, Power Automate, Power BI, Stream, and
ToDo
E5: A premium license that includes all the features of E1 and E3, plus:
• Analytics
• Advanced security and compliance features
• Audio conferencing tools
• High security with increased privacy and transparency

03). Printer Configuration and issue related Printer?


* Click the Start Button in the bottom left corner of the desktop, then click the Settings gear
above the Power button.
* From the Settings panel, click Devices. Then, choose Printers & Scanners on the left
navigation pane.
* Click Add a printer or scanner.

Printer related issues.


1.unable to connect printer.
* Unplug and restart your printer: Sometimes power cycling your printer can
resolve the issue. ...
* Check cables or wireless connection: ...
* Uninstall and reinstall your printer: ...
* Install the latest driver for your printer: ...
* Clear and reset the print spooler. ...
* Change a printer's status to "online"

2.Printer driver issue.


* From Start, search for device manager and select Device Manager from the
results.
* Right-click the device in the list.
* Select Uninstall from the menu that appears.
* After the device is uninstalled, choose Action on the menu bar.
* Select Scan for hardware changes to reinstall the driver.

3.Unable to print
* Check Your Printer's Error Lights.
* Clear the Printer Queue.
* Restart the Print Spooler.
* Solidify the Connection.
* Ensure You Have the Right Printer.
* Check That the Paper Tray Is Full (Not Jammed).
* Install the Drivers and Software.
* Add Printer.
04). Shareholder, SharePoint
A shareholder is an individual who seeks financial gains and profitability for a company,
while SharePoint is a Microsoft product that enables users to store, share, and organize
information

05). MS outlook, shared mail box, MS Exchange

*Microsoft Outlook is a Microsoft application that helps you manage your email, calendar,
contacts, tasks, and to-do lists:
• Email: Send and receive emails, and organize them to focus on the most important
messages
• Calendar: Manage your calendar, and schedule meetings
• Contacts: Store contact names and numbers
• Tasks: Track your tasks
• To-do lists: Organize your to-do lists
• Cloud file sharing: Share files from the cloud so recipients always have the latest
version

*A shared mailbox is a mailbox that multiple users can access to send and receive emails
Company information
A company can use a shared mailbox for a company information or support email
address.
Customer inquiries
A company can use a shared mailbox to provide a generic email address for
customers to inquire about the company.
Centralized services
Departments that provide centralized services to employees, like help desk, human
resources, or printing services, can use a shared mailbox to respond to employee
questions.
Team collaboration
Teams or groups can use a shared mailbox to collaborate on projects or communicate
with customers.

*MS Exchange
Microsoft Exchange is a business email and calendaring service that helps users
collaborate on documents and prioritize messages. It's part of Microsoft's productivity and
collaboration suite, Microsoft Office 365.
Here are some features of Microsoft Exchange:

• Focused inbox: Prioritizes important messages and adapts to your work style
• Personalized inbox: Includes search enhancements and add-ins for customization
and extensibility
• Calendaring: Automatically captures events from email and suggests meeting
locations
• Shared mailboxes, calendars, and global address lists: Allows users to
collaborate on email and other tasks
• In-place archive: Keeps all important data in one place
06). Distribution list.
A distribution list is an application of email client programs that allows a user to
maintain a list of email addresses and send messages to all of them at once.

07). Windows and MAC OS Experience


Windows and MacOS are the parts of the operating system. It is necessary for the
computer system. While Both provide features and functionalities there is a difference
between the design process, user interface, software and hardware compatibility, and many
more.

08). Outlook Configuration

To configure Outlook, you can:


1. Open Outlook
2. Enter your Microsoft 365 email address and select Connect
3. Enter any additional email addresses and select Next
4. Enter your password and select Sign in
5. Choose if you want to set up Outlook mobile or wait until later
6. Select Done
You can also configure Outlook by:
• Clicking File, then Add account
• Setting the root folder path
• Configuring the incoming and outgoing mail servers

09). Can you explain about the NTLDR Error?


"NT Loader"
The most common reason for the “NTLDR is missing” error is a malfunction in the
hardware of the computer - a problem with the hard drive or the motherboard controller.
Another reason for this error is the connection of another hard drive (or changes/reset in
boot priority in BIOS Boot Order).

10). Is there a way to fix NTLDR error?


NTLDR error, you can usually boot from your Windows installation disc and use the
"Startup Repair" option within the recovery console to repair the missing or corrupted
NTLDR file
1. Unplug All Removable Media.
2. Change BIOS Boot Order.
3. Replace Corrupted NTLDR or NTDETECT.COM File.
4. Reset Active Partition.
5. Update Outdated BIOS.
6. Use Windows Startup Repair.
7. Check SATA Cable.
8. Turn to Professionals or Technicians for Help.

11). Explain the term Reservation.


What is CRS and its function? Computer reservation system software allows small,
independent hotels to easily manage reservations across all booking channels, from OTAs to
direct bookings, through a single, simple dashboard, usually displayed in the form of a
calendar.
12). How will you backup your data if your system is infected with malware?
1. Shut down the target PC that has a virus.
2. Open the computer case, remove its hard drive, and connect it as an external drive
to a safe PC.
3. Run antivirus software to perform a full scan of the entire hard drive and make
sure it doesn't have any viruses or other threats.
4. Start the backup process.

13). Speaker is not working troubleshooting steps?


Step 1. Check your speaker output
Step 2. Run the audio troubleshooter
Step 3. Verify that all Windows Updates are installed
Step 4. Check your cables, plugs, jacks, volume, speaker, and headphone connections
Step 5. Check sound settings
Step 6. Fix your audio drivers
Step 7. Set your audio device as the default device
Step 8. Turn off audio enhancements
Step 9. Restart Audio Services
Step 10. Try different audio formats
Step 11. Restart to apply installed updates
Step 12. Check for IDT High-Definition Audio CODEC in Device Manager
Step 13. If you have microphone issues, make sure your privacy settings are
configured properly

14). System slowness issue and troubleshooting steps to resolve.

1. Make sure you have the latest updates for Windows and device drivers
2. Restart your PC and open only the apps you need
3. Use ReadyBoost to help improve performance
4. Make sure the system is managing the page file size
5. Check for low disk space and free up space
6. Adjust the appearance and performance of Windows
7. Pause OneDrive syncing
8. Disable unnecessary startup programs
9. Check for and remove viruses and malware
10. Restore your PC from a system restore point

15). What is IMAP and SMTP?


*IMAP
Stands for Internet Message Access Protocol, and is used to retrieve and manage emails
from a receiving server. IMAP allows users to access their emails on multiple devices, and
can synchronize changes across devices. IMAP can also be faster than other protocols
because it only downloads the headers of a message by default, and users can choose to
download the rest of the message later.
*SMTP
Stands for Simple Mail Transfer Protocol, and is used to send emails from a mail client to a
receiving server. SMTP is the standard protocol for sending emails.
16). Are you familiar with the Sysvol folder?
The SYSVOL folder is a collection of files and folders that are stored on each domain
controller (DC) in a domain. It contains important components for Microsoft Active
Directory to work, including: Group Policy objects (GPOs), Startup and shutdown scripts,
and Logon and logoff scripts.

The SYSVOL folder is replicated across domain controllers using the File Replication Service
(FRS) or Distributed File System Replication (DFSR). This ensures that all domain
controllers have a consistent copy of the SYSVOL folder's contents.

Network clients access the SYSVOL folder through the shared folders Sysvol and Net
logon. The default location for SYSVOL is C:\Windows\SYSVOL, but it can be moved to a
different location if a domain controller is promoted.
It's important to have reliable, offsite backups of the SYSVOL folder in case your AD Forest
is attacked. Rebuilding an attacked AD Forest can be a difficult and time-consuming task.

17). What is the difference between OST and PST files? Can you convert OST to PST?
OST (Offline Storage Table)
Used for offline access to Outlook data, such as when you're traveling or don't have an
internet connection. OST files are created automatically when you configure Outlook to
work with an Exchange server in Cached Exchange Mode.
PST (Personal Storage Table)
Used for archiving, backing up, and transferring Outlook data. PST files are user-created
folders where you can store Outlook data locally on your computer or an external drive.

Run the OST to PST Converter software in Windows. Browse and add an OST File to
Preview your Emails. Select Export to PST from the Export Type Option. Choose a Local
Target Path to Save Converted PST

18). What is archiving the mail?


Document archiving is securely storing information (both digital and paper format) that
you no longer use regularly. It's important because it: stops you losing data. ensures only
the right people can access the right documents. keeps documents organised and easy to
access.

19). What is FSMO role in active directory?


Flexible Single Master Operation (FSMO) roles are a set of roles in Active Directory (AD)
that prevent conflicts by ensuring that only one domain controller (DC) processes a specific
type of update at a time:
• Schema master: Manages updates to the directory schema
• Domain naming master: Manages changes to the forest-wide domain name space
• Relative ID (RID) master: Processes RID pool requests from all DCs in a domain
• PDC emulator: Synchronizes time in an enterprise and acts as the primary domain
controller (PDC) to earlier versions of Windows
• Infrastructure master: Updates object references and ensures they are up to date in
other domains
20). What is Incident/ service Request?
*Incident
An unplanned event that disrupts or degrades a service. Incidents are urgent and require
immediate attention to restore services and keep operations running smoothly. For
example, a laptop not working or weak internet connectivity in a workspace are incidents.

*Service request
A user-initiated request for a specific service or resource. Service requests are less urgent
and can be handled through defined workflows. For example, asking for more information
on a procedure or policy, requesting permission to access a service, or ordering a service
are service requests

21). Explain what is LDAP?


Lightweight Directory Access Protocol (LDAP) is a software protocol that helps users find
and access information and devices on a network. LDAP is used for a variety of purposes,
including:
* Centralizing authentication
LDAP can be used to build central authentication servers, which allow users to sign in
once to access multiple files on a server.
*Managing data
LDAP can be used to store, manage, and secure information about an organization, its
users, and assets.
*Simplifying access
LDAP can be used to simplify access to internal servers and printers.
*Sharing information
LDAP can be used to share information about users, services, systems, networks, and
applications.

22). Explain what is RAID in Windows Server?


RAID (redundant array of independent disks) is a way of storing the same data in
different places on multiple hard disks or solid-state drives (SSDs) to protect data in the
case of a drive failure.

RAID, which stands for Redundant Array of Independent Disks, is a storage system that
uses multiple drives in one system to store data. There are various levels of RAID, each
offering different advantages such as improved performance, greater fault tolerance, or
both, depending on how data is written and distributed.

23). Explain where is the AD database is held?


The Active Directory (AD) database is stored in the NTDS.DIT file in the system root folder,
which is usually located at C:\Windows\NTDS.
The AD database contains information about network resources and their attributes. It's
used to authenticate users and authorize access to network resources.
The AD database uses multimaster replication to ensure that all domain controllers have
the latest copies of changes made to AD.
Here are some other files related to the AD database:
• edb: A temporary file that tracks transactions
• res1.log and res2.log: Used in older versions of Windows Server
• SYSVOL: A shared folder that contains files common for the domain
24). Explain what is the primary function of the domain controller?
The primary function of domain controllers is to authenticate and validate users on a
network, including group policies, user credentials, and computer names to determine and
validate user access

The PDC holds significance in network setup as the central authority for user
authentication and access control. It manages user login requests, ensuring secure access to
resources. By maintaining a centralized user database and enforcing security policies, the
PDC streamlines network administration.

You might also like