ABM Technical Round Q&A
ABM Technical Round Q&A
ABM Technical Round Q&A
The range of a Wi-Fi network is determined by several factors, including the frequency band,
the environment, and the router's power output.
Mesh Networks: For larger areas or multi-story buildings, mesh networks can be used to
extend Wi-Fi range by placing multiple nodes throughout the space.
● WPA2, introduced in 2004, is the standard for Wi-Fi security today. It uses AES
(Advanced Encryption Standard), which is much more secure than WPA1's TKIP.
● WPA2-PSK (Pre-Shared Key) is commonly used in home networks, where a shared
password is used to secure the connection.
● WPA2-Enterprise offers more advanced security, often used in business environments,
where authentication is done through a RADIUS server.
● WPA2 significantly enhances security, offering better protection against hacking attempts
like brute-force attacks and unauthorized access.
4. Wi-Fi Setup
Setting up Wi-Fi involves configuring your router and devices for network access. Here's a basic
overview of how to set up a Wi-Fi network:
Q. On-Boarding process :
Ans : Here are the steps below to on-board the user :
- Important : Don't copy the existing user to create a new user. Create and add Manually.
- Add basic information like Title, Department, Email, Set Expiration date of Account.
- Add any DL, security groups if necessary in members of the tab.
- Set the SMTP Proxy address for email in the attribute editor in AD.
- From the Admin center, assign the licenses if necessary.
The E stands for Enterprise, and these plans are aimed at larger organizations or businesses
that need robust tools and security features. These plans include advanced productivity tools,
security, and compliance features.
The F stands for Frontline, and these plans are designed for frontline workers who typically
don’t need a full desktop Office experience but need to stay connected and access basic
productivity tools.
Q. Add user/PC to the company domain.
Ans : Adding a user or PC to the company domain is a common task in IT management, and it
involves joining a computer to the domain so it can access network resources like file servers,
printers, and email, and apply group policies. Here’s a step-by-step guide for adding a computer
to the company domain on a Windows system:
Prerequisites:
1. Domain Controller: Ensure the company has an Active Directory (AD) domain set up,
and you have access to the domain controller.
2. Admin Credentials: You will need domain administrator or domain join privileges to add
the PC to the domain.
3. Network Connection: The computer must be connected to the company network, either
directly (LAN) or through a VPN.
● To verify the computer has successfully joined the domain, you can:
1. Open System Properties and check the Computer Name section to see the
domain listed.
2. Run the command whoami in the Command Prompt to confirm the domain
username.
3. Check Active Directory Users and Computers on the Domain Controller to see
if the PC is listed under Computers.
Troubleshooting:
● Network Connectivity Issues: Ensure the computer can communicate with the Domain
Controller (ping the domain controller's IP or hostname).
● DNS Configuration: The computer should be configured to use the company’s DNS
server, which can resolve the domain name.
● Insufficient Privileges: Make sure the user credentials have the proper permissions to
add a computer to the domain.
Ans : A switch and a router are both critical networking devices, but they serve different
purposes in a network. Basically, a switch is used to connect devices within a single network,
while a router connects different networks and manages traffic between them.
Switch :
- A switch connects multiple devices (computers, printers, servers, etc.) within the same
network (typically a Local Area Network, or LAN) and allows them to communicate by
forwarding data only to the device that needs it.
- Uses MAC addresses (Media Access Control) to forward data between devices and it
works within a single network or LAN.
- Primarily used for creating and managing a single network segment, connecting
devices within the same network (LAN). Switches do not handle routing between
networks.
- Connecting computers, printers, and servers within the same office network so they can
share data.
- Connecting devices in a classroom or small business where all devices are part of the
same local network.
- Usually has multiple Ethernet ports (e.g., 24, 48, etc.) to connect a large number of
devices in a local network.
Router :
- A router connects multiple networks together, such as your home or office network (LAN)
to the internet (WAN).
- Uses IP addresses to forward data between different networks.
- Used for connecting different network segments (LAN to WAN, or LAN to LAN) and
routes traffic between those networks, allowing devices in one network to communicate
with devices in another.
- Works with IP addresses, which are assigned to devices for communication across
networks and operate at Layer 3.
- Connecting a home or office network to the internet (WAN).
- Often has fewer Ethernet ports but includes at least one WAN interface to connect to the
internet or another external network.
Q. What would you prefer: Wi-Fi connection or Ethernet while you add a device to
a domain?
Ans : When adding a device to a domain, Ethernet is generally preferred over Wi-Fi for several
reasons such as reliability, speed, and security.
Why Ethernet is Preferred:
If Ethernet is not available, or if the device is a laptop that primarily relies on Wi-Fi, it’s still
possible to join the domain over Wi-Fi, but the process may be slower or more prone to issues.
Ensure that the Wi-Fi connection is strong, secure, and stable if you opt for it.
In summary, Ethernet is the preferred option for its reliability, speed, and security when
adding a device to a domain.
Ans : The preferred answer is DC2/AD2, because DC2 will sync immediately. DC1/AD1 will take
a few minutes to sync. Because in a multi-domain controller environment, changes made on
one domain controller (such as a password reset) will sync across the others.
Domain controllers communicate and synchronize changes with each other through a process
called Active Directory replication. While DC2 will have the new password immediately,
DC1/AD1 may take a few minutes to replicate the change. This delay happens because
replication occurs periodically based on the configuration of the domain.
Ans : VoIP (Voice over IP) primarily uses the following ports for communication:
1. SIP (Session Initiation Protocol):
○ Port 5060 (UDP/TCP): Used for unencrypted SIP signaling, which is responsible
for establishing, managing, and terminating VoIP calls.
○ Port 5061 (UDP/TCP): Used for encrypted SIP signaling over TLS (Transport
Layer Security).
2. RTP (Real-Time Protocol):
○ Port Range 1024-65535 (UDP): Used for transmitting the actual voice or media
data once the call is established. RTP uses dynamic ports, typically negotiated
during the call setup.
3. H.323 (Alternative VoIP Protocol):
○ Port 1720 (TCP): Used for call setup and management in the H.323 protocol,
which is another standard for VoIP communication.
While SIP and RTP are the most common for VoIP traffic, certain systems may use other
protocols and ports based on the specific implementation and configuration.
Ans : Here’s a brief explanation of SaaS, PaaS, and IaaS, which are three primary models of
cloud computing services:
● Definition: SaaS provides software applications over the internet, eliminating the need
to install and manage software on individual devices.
● Key Features:
○ Users access applications through a web browser or app.
○ Software is hosted and managed by a third-party provider.
○ Automatic updates and maintenance are handled by the provider.
● Examples: Gmail, Microsoft 365, Salesforce, Dropbox.
● Use Case: Businesses that need ready-to-use software without worrying about
infrastructure or platform management.
● Definition: PaaS provides a platform that allows developers to build, test, and deploy
applications without managing the underlying infrastructure (servers, storage, etc.).
● Key Features:
○ Includes tools for application development, such as databases, frameworks, and
development environments.
○ Developers focus on writing code, while the platform manages the infrastructure.
○ Ideal for custom application development and deployment.
● Examples: Microsoft Azure, Google App Engine, Heroku.
● Use Case: Developers building and deploying applications without worrying about
hardware or OS maintenance.
3. IaaS (Infrastructure as a Service)
● Definition: IaaS provides virtualized computing resources over the internet, such as
virtual machines, storage, and networks. It offers the most control over the infrastructure.
● Key Features:
○ Users manage and control the operating system, storage, and applications.
○ The provider handles hardware maintenance, virtualization, and networking.
○ Highly scalable and flexible infrastructure on demand.
● Examples: Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform.
● Use Case: Businesses that need to manage their own infrastructure but want to avoid
the cost and complexity of maintaining physical hardware.
Summary:
Each model provides different levels of control and responsibility, from fully managed software
(SaaS) to customizable infrastructure (IaaS).
Q. How to give access to only the Shared calendar but not the whole mailbox.
To give access to only a shared calendar without granting access to the entire mailbox in
Microsoft Outlook or Exchange, you can follow these steps. This ensures that the user has
access to view or manage the calendar but cannot access other parts of the mailbox like emails.
1. Open Outlook:
○ Start Outlook on your desktop.
2. Navigate to the Calendar:
○ Go to the bottom-left corner of the screen and click the Calendar icon to open
your calendar view.
3. Share Your Calendar:
○ In the Home tab, click on the Share Calendar button.
○ Choose the calendar you want to share (usually the primary calendar).
4. Set Permissions:
○ In the Calendar Properties window, click on the Add button to specify the
person you want to give access to.
○ Select the user from your address book and click Add and then OK.
5. Assign Specific Permissions:
○ Once the user is added, set the appropriate permission level from the
Permission Level drop-down menu:
■ Can view when I'm busy: Can only see availability, not event details.
■ Can view titles and locations: Can see event titles and locations.
■ Can view all details: Can see full event details.
■ Can edit: Can view and modify calendar events.
■ Delegate: Can manage calendar events on your behalf, including sending
meeting requests.
○ Click OK to save the changes.
If you are using an Exchange Server or Office 365, and you want to control access to the
calendar more precisely, you can also configure this through the Exchange Admin Center
(EAC) or PowerShell.
Assign Calendar Permissions via PowerShell (optional): You can use the following
PowerShell command to provide calendar access:
Conclusion:
By using the steps above, you can grant access to only the shared calendar while ensuring that
the rest of the mailbox (emails, contacts, tasks) remains private.
- Connect printer to the ethernet cable and power it on, Go to printer screen and find
configuration report option and print it, it will contain hardware address (MAC)
● Go to DHCP Server :
- Go to DHCP Server -> Select IPV4 -> Select Scope -> Right Click on
Reservations and click New Reservation
- Give it a name(i.e printer1atHR), enter Static IP and MAC address of Printer from
printer report, write a description and select Both in supported types.
- Select the company domain, Right click and select New Host (A or AAAA)..
- Once you click it, Now enter the name of the printer that you gave it in the DHCP
server. (i.e printer1atHR)
- Now enter the IP address that you gave from the DHCP server and hit Add Host.
- It will give you the prompt that says the host record printer1atHR.domian.com
was successfully created.
● Go to the Print Management :
- In Print Servers, select the Printers and right click it and select Add Printer.
- Now select the 2nd option that says Ad an Ipp, TCP/IP, or web services printer by
IP addresses or hostname.
- Hit Next.
- Once you hit Next it will auto detect the printer and will ask you if you want to use
an existing printer driver on the PC.
- You can just follow the prompt on PC and hit Finish.
- Now you will see that Printer in the list.
Q. How to give any application access through Azure Enterprise Application?
To control who can access the application, you assign users or groups within Azure AD.
● In the Enterprise Applications page, select the application (e.g., Salesforce) you just
added.
● In the left-hand menu, click on Users and groups.
● Click on + Add user/group.
● Select Users or Groups that should have access to the application.
● Click Assign.
Example: You can assign the Sales team group to Salesforce so that only users in the sales
department have access to it.
● Outlook Web (Office 365): Navigate to Settings (⚙) → "View all Outlook settings" →
"General" → "Storage." This will show how much space is used.
● Outlook Desktop App: The storage limit depends on the email server. For Office 365
accounts, it's generally 50GB to 100GB. IMAP and POP accounts have different limits
depending on server configuration.
● Deleted Items: Right-click the "Deleted Items" folder and choose "Empty folder."
● Junk Email: Right-click the "Junk Email" folder and choose "Empty folder."
● Archive: In Outlook Desktop, go to "File" → "Tools" → "Clean Up Old Items." This will
move older emails to an archive folder stored locally.
● Export Emails: You can export old emails to a PST file by going to "File" → "Open &
Export" → "Import/Export" → "Export to a file." This will free up space by moving emails
off the server.
● Search for emails with large attachments using the "Has Attachments" filter. You can
then delete or save these attachments locally and remove them from Outlook.
● If you're using a business account (Office 365), check with the administrator to see if
they can increase the mailbox storage quota.
Ans : Reimaging or resetting a laptop for a new hire using a bootable USB drive is a common
practice in IT departments to ensure that the laptop is configured with a fresh installation of the
operating system and company-specific software. Here’s a step-by-step guide to help you
through the process.
Before you can start reimaging, you need a bootable USB with the appropriate operating system
(e.g., Windows, macOS, Linux). Below are the steps to create one.
For Windows:
● Download the Windows 10/11 ISO from the Microsoft website or use the Windows
Media Creation Tool.
● Insert a USB flash drive (minimum 8GB capacity).
● Use the Media Creation Tool to create a bootable USB:
1. Download and open the Windows Media Creation Tool.
2. Select Create installation media for another PC.
3. Choose the Language, Edition, and Architecture.
4. Select USB flash drive as the media to use, then choose your USB device.
5. The tool will download the necessary files and create the bootable USB.
If the laptop contains any important files, backup data before proceeding, as the reimage
process will erase all existing data on the machine.
Steps:
For Windows:
● Install any required company software (e.g., Microsoft Office, antivirus, VPN clients).
● Configure network settings (e.g., connect to the company’s Wi-Fi or Ethernet).
● Install any drivers that may be required (for network, display, etc.).
● Join the laptop to the company’s domain or Azure Active Directory if applicable.
● Apply group policies or configure user profiles as needed.
If the laptop will be used in an organization with a Windows Server Active Directory, you may
need to join the laptop to the domain:
For Windows:
● After completing the setup, test the laptop to ensure all company applications, network
settings, and user accounts are working properly.
● Check for Windows updates or macOS/Linux updates to ensure the system is up to
date.
● Once everything is set up and tested, provide the laptop to the new hire.
● Make sure to include any necessary login credentials, VPN setup instructions, or help
desk contact information in case they need assistance.
Summary of Steps:
Q. LAN vs WAN
Q. What is a safe mode and how do you get to it? What is it used for?
Ans : In order to reach the safe mode, the computer must be restarted and by pressing F8 key
before the OS loads you will arrive at the selection screen at which you will find the safe mode.
Safe mode is used to troubleshoot driver issues, hardware issues and remove viruses or
unwanted software. In Windows 10 the combination key is “Shift + Restart”.
Q. What is a Domain?
Ans : Domain is a group of computers and users created for a network in order to control access
with a domain you have a group of systems that are bound by the rules of centralized
authentication server in a domain each system has to connect through the domain server using
provided credentials a computer user will have the main login access once their credentials are
created or added to that specific domain within active directory for example your jobs pc login
will most likely be a domain login.
Q. You receive a trouble ticket that states the printer is not printing correctly, it
prints out weird patterns on paper.
Ans : This issue is caused by a bad or wrong printer driver. Solution is to acquire and install a
correct printer driver, to expand I have noticed that it specifically points out a weird pattern on
paper and not necessarily a faded so in this case it's very clear that ink is not an issue that there
is plenty of ink.So, this is a very clear case of a bad or wrong printer driver after which you have
to simply reinstall it.
Q. What is DHCP?
Ans : DHCP stands for dynamic host configuration protocol and it deals with handling IP
addresses for all computers connected to a network. Each computer is allowed to have
connection to the network or Internet resources after Dhcp Server assigns an ip address
dynamically. Dynamic type of ip address can change at any point.
Q. What is DNS?
Ans : DNS stands for domain name system, and it reroutes known host names to the ip address
that hosts its service. For example, dns for Microsoft.com is located at (IP) . but it can change
randomly. You could say that it serves as an address book for the host names, which are then
translated into numbers in order for computers to understand it. In this example, it assigns and
routes web address names to web hosting services.
Q. What is VPN?
Ans : A virtual private network is commonly used as a secure way to connect from remote
location to network resources in your business/company. For example, you can take your laptop
to a coffee shop, start a vpn, and through it, securely connect to a pc at work or access
company's emails and files.
POP3 : Post office protocol 3 - Usually downloads the emails to your device and removes them
from the server so you can read them offline. So, it limits access from the other devices.
IMAP : Internet Message Access Protocol - It keeps your emails to the server and also across
the devices so you can access your messages from anywhere.
SMTP : It is used to send and receive emails to the servers. Where POP3 and IMAP used to
retrieve the emails from the server.
Notes :