0% found this document useful (0 votes)
6 views21 pages

ABM Technical Round Q&A

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 21

ABM Technical Que :

Q. We can't do Email Release, Quarantined. ESC to L2.

Q. Important : Networking - DHCP, TCP/IP, DNS

Q. Tell me about Wi-Fi Range WPA1 and WPA2, Wi-Fi setup.

Ans : 1. Wi-Fi Range

The range of a Wi-Fi network is determined by several factors, including the frequency band,
the environment, and the router's power output.

Mesh Networks: For larger areas or multi-story buildings, mesh networks can be used to
extend Wi-Fi range by placing multiple nodes throughout the space.

2. WPA1 (Wi-Fi Protected Access)

● WPA1, introduced in 2003, was a security protocol designed to address vulnerabilities in


WEP (Wired Equivalent Privacy), the earlier Wi-Fi security standard.
● It uses TKIP (Temporal Key Integrity Protocol) for encryption, which was an
improvement over WEP but still had vulnerabilities.
● WPA1 is now considered outdated and insecure, and most modern networks have
moved to WPA2 or WPA3 for better security.

3. WPA2 (Wi-Fi Protected Access II)

● WPA2, introduced in 2004, is the standard for Wi-Fi security today. It uses AES
(Advanced Encryption Standard), which is much more secure than WPA1's TKIP.
● WPA2-PSK (Pre-Shared Key) is commonly used in home networks, where a shared
password is used to secure the connection.
● WPA2-Enterprise offers more advanced security, often used in business environments,
where authentication is done through a RADIUS server.
● WPA2 significantly enhances security, offering better protection against hacking attempts
like brute-force attacks and unauthorized access.

4. Wi-Fi Setup

Setting up Wi-Fi involves configuring your router and devices for network access. Here's a basic
overview of how to set up a Wi-Fi network:

1. Connect to the Router:


○ Plug the router into a power source and connect it to the modem via an Ethernet
cable.
○ Access the router’s web interface using a browser by entering the router’s IP
address (commonly 192.168.1.1 or 192.168.0.1).
2. Configure the SSID:
○ The SSID (Service Set Identifier) is the network name that will be broadcast for
devices to connect to.
○ Choose a unique and recognizable name for your network.
3. Set Up Security (WPA2):
○ Enable WPA2-PSK for the best balance of security and ease of use.
○ Choose a strong, complex password to prevent unauthorized access.
4. Select the Frequency Band:
○ You can choose between the 2.4 GHz and 5 GHz bands, or enable both if your
router supports dual-band operation.
○ 2.4 GHz is better for range, while 5 GHz offers faster speeds over shorter
distances.
5. Configure Additional Settings (Optional):
○ Guest Network: Set up a guest network to allow visitors access to the internet
without giving them access to your main network.
○ Parental Controls: Set limits on internet access for certain devices or block
specific websites.
○ Firewall/Port Forwarding: For advanced users, set up firewall rules or port
forwarding for devices that need to be accessible from the internet.
6. Test the Connection:
○ Connect your devices (laptops, smartphones, etc.) to the Wi-Fi network using the
SSID and password.
○ Test the network performance and adjust settings like router placement for
optimal signal strength.

Q. On-Boarding process :
Ans : Here are the steps below to on-board the user :

- Important : Don't copy the existing user to create a new user. Create and add Manually.
- Add basic information like Title, Department, Email, Set Expiration date of Account.
- Add any DL, security groups if necessary in members of the tab.
- Set the SMTP Proxy address for email in the attribute editor in AD.
- From the Admin center, assign the licenses if necessary.

Q. Off-Boarding : Do it only after 5 PM/End of work day.


Ans : Here are the steps below to off-board the user :
- Go to AD and find the user, and then disable the user account.
- Open the user profile and then, remove all the DL and Groups from members of the tab.
- Hide the user from the email address list.
- Move the user to the inactive users OU.
- Remove the licenses from the admin center.
- Convert the user mailbox to the shared mailbox.
Q. MS License E1 is for the Web apps only and E3 is for
web/Desktop/downloadable apps.

Ans : Enterprise Plans (E1, E3, E5)

The E stands for Enterprise, and these plans are aimed at larger organizations or businesses
that need robust tools and security features. These plans include advanced productivity tools,
security, and compliance features.

Frontline Worker Plans (F1, F3)

The F stands for Frontline, and these plans are designed for frontline workers who typically
don’t need a full desktop Office experience but need to stay connected and access basic
productivity tools.
Q. Add user/PC to the company domain.

Ans : Adding a user or PC to the company domain is a common task in IT management, and it
involves joining a computer to the domain so it can access network resources like file servers,
printers, and email, and apply group policies. Here’s a step-by-step guide for adding a computer
to the company domain on a Windows system:

Prerequisites:

1. Domain Controller: Ensure the company has an Active Directory (AD) domain set up,
and you have access to the domain controller.
2. Admin Credentials: You will need domain administrator or domain join privileges to add
the PC to the domain.
3. Network Connection: The computer must be connected to the company network, either
directly (LAN) or through a VPN.

Steps to Add a PC to the Domain:

1. Open System Settings:


○ Search and click Advanced system settings on the left-hand side.
2. Navigate to the Domain Settings:
○ In the System Properties window, click on the Computer Name tab, then click
the Change button.
3. Enter Domain Information:
○ In the Computer Name/Domain Changes dialog, under the Member of section,
select Domain.
○ Enter the company’s domain name (e.g., companydomain.com).
4. Authenticate with Domain Credentials:
○ After entering the domain name, you will be prompted to enter credentials.
○ Enter the domain administrator credentials (or any account with sufficient
privileges to join a PC to the domain).
5. Reboot the Computer:
○ Once the system successfully joins the domain, you will receive a welcome
message.
○ Restart the computer to apply the changes.
6. Log in Using a Domain Account:
○ After the reboot, the login screen will change, and you will now have the option to
log in with a domain account.
○ Select Other User and enter the domain username (e.g., domain\username)
and password.
7. Apply Group Policies:
○ Once logged in, the computer will download and apply any Group Policies
assigned to users or computers within the domain.
Verification:

● To verify the computer has successfully joined the domain, you can:
1. Open System Properties and check the Computer Name section to see the
domain listed.
2. Run the command whoami in the Command Prompt to confirm the domain
username.
3. Check Active Directory Users and Computers on the Domain Controller to see
if the PC is listed under Computers.

Troubleshooting:

● Network Connectivity Issues: Ensure the computer can communicate with the Domain
Controller (ping the domain controller's IP or hostname).
● DNS Configuration: The computer should be configured to use the company’s DNS
server, which can resolve the domain name.
● Insufficient Privileges: Make sure the user credentials have the proper permissions to
add a computer to the domain.

Q. Difference between Switch and Router. Explain.

Ans : A switch and a router are both critical networking devices, but they serve different
purposes in a network. Basically, a switch is used to connect devices within a single network,
while a router connects different networks and manages traffic between them.

Switch :

- A switch connects multiple devices (computers, printers, servers, etc.) within the same
network (typically a Local Area Network, or LAN) and allows them to communicate by
forwarding data only to the device that needs it.
- Uses MAC addresses (Media Access Control) to forward data between devices and it
works within a single network or LAN.
- Primarily used for creating and managing a single network segment, connecting
devices within the same network (LAN). Switches do not handle routing between
networks.
- Connecting computers, printers, and servers within the same office network so they can
share data.
- Connecting devices in a classroom or small business where all devices are part of the
same local network.
- Usually has multiple Ethernet ports (e.g., 24, 48, etc.) to connect a large number of
devices in a local network.
Router :

- A router connects multiple networks together, such as your home or office network (LAN)
to the internet (WAN).
- Uses IP addresses to forward data between different networks.
- Used for connecting different network segments (LAN to WAN, or LAN to LAN) and
routes traffic between those networks, allowing devices in one network to communicate
with devices in another.
- Works with IP addresses, which are assigned to devices for communication across
networks and operate at Layer 3.
- Connecting a home or office network to the internet (WAN).
- Often has fewer Ethernet ports but includes at least one WAN interface to connect to the
internet or another external network.

Summary of Key Differences:

Q. What would you prefer: Wi-Fi connection or Ethernet while you add a device to
a domain?

Ans : When adding a device to a domain, Ethernet is generally preferred over Wi-Fi for several
reasons such as reliability, speed, and security.
Why Ethernet is Preferred:

1. Stability and Reliability:


○ Ethernet offers a more stable connection compared to Wi-Fi, which is less prone
to interference or disconnection. This is especially important when adding a
device to a domain, as the process can require downloading group policies,
security updates, or installing software that could be interrupted by an unstable
connection.
2. Faster Data Transfer:
○ Ethernet typically provides faster data transfer speeds than Wi-Fi, which is useful
when the computer needs to communicate with the domain controller to complete
the domain join and apply configurations like group policies and security settings.
3. Less Latency:
○ Ethernet has lower latency than Wi-Fi, meaning communication with the domain
controller happens more quickly and smoothly, making the domain-joining
process faster and more efficient.
4. Security:
○ While Wi-Fi can be secured with encryption, Ethernet provides an added layer of
physical security because it requires a direct connection, making it less
vulnerable to wireless attacks during the domain join process.

When Wi-Fi Might Be Used:

If Ethernet is not available, or if the device is a laptop that primarily relies on Wi-Fi, it’s still
possible to join the domain over Wi-Fi, but the process may be slower or more prone to issues.
Ensure that the Wi-Fi connection is strong, secure, and stable if you opt for it.

In summary, Ethernet is the preferred option for its reliability, speed, and security when
adding a device to a domain.

Q. Would you perform Password reset on DC1 or 2?

Ans : The preferred answer is DC2/AD2, because DC2 will sync immediately. DC1/AD1 will take
a few minutes to sync. Because in a multi-domain controller environment, changes made on
one domain controller (such as a password reset) will sync across the others.

Domain controllers communicate and synchronize changes with each other through a process
called Active Directory replication. While DC2 will have the new password immediately,
DC1/AD1 may take a few minutes to replicate the change. This delay happens because
replication occurs periodically based on the configuration of the domain.

Q. What port is used for VoIP?

Ans : VoIP (Voice over IP) primarily uses the following ports for communication:
1. SIP (Session Initiation Protocol):
○ Port 5060 (UDP/TCP): Used for unencrypted SIP signaling, which is responsible
for establishing, managing, and terminating VoIP calls.
○ Port 5061 (UDP/TCP): Used for encrypted SIP signaling over TLS (Transport
Layer Security).
2. RTP (Real-Time Protocol):
○ Port Range 1024-65535 (UDP): Used for transmitting the actual voice or media
data once the call is established. RTP uses dynamic ports, typically negotiated
during the call setup.
3. H.323 (Alternative VoIP Protocol):
○ Port 1720 (TCP): Used for call setup and management in the H.323 protocol,
which is another standard for VoIP communication.

While SIP and RTP are the most common for VoIP traffic, certain systems may use other
protocols and ports based on the specific implementation and configuration.

Q. SaaS, PaaS, IaaS explain in brief.

Ans : Here’s a brief explanation of SaaS, PaaS, and IaaS, which are three primary models of
cloud computing services:

1. SaaS (Software as a Service)

● Definition: SaaS provides software applications over the internet, eliminating the need
to install and manage software on individual devices.
● Key Features:
○ Users access applications through a web browser or app.
○ Software is hosted and managed by a third-party provider.
○ Automatic updates and maintenance are handled by the provider.
● Examples: Gmail, Microsoft 365, Salesforce, Dropbox.
● Use Case: Businesses that need ready-to-use software without worrying about
infrastructure or platform management.

2. PaaS (Platform as a Service)

● Definition: PaaS provides a platform that allows developers to build, test, and deploy
applications without managing the underlying infrastructure (servers, storage, etc.).
● Key Features:
○ Includes tools for application development, such as databases, frameworks, and
development environments.
○ Developers focus on writing code, while the platform manages the infrastructure.
○ Ideal for custom application development and deployment.
● Examples: Microsoft Azure, Google App Engine, Heroku.
● Use Case: Developers building and deploying applications without worrying about
hardware or OS maintenance.
3. IaaS (Infrastructure as a Service)

● Definition: IaaS provides virtualized computing resources over the internet, such as
virtual machines, storage, and networks. It offers the most control over the infrastructure.
● Key Features:
○ Users manage and control the operating system, storage, and applications.
○ The provider handles hardware maintenance, virtualization, and networking.
○ Highly scalable and flexible infrastructure on demand.
● Examples: Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform.
● Use Case: Businesses that need to manage their own infrastructure but want to avoid
the cost and complexity of maintaining physical hardware.

Summary:

● SaaS: Ready-to-use applications (e.g., Gmail, Office 365).


● PaaS: Platform for app development (e.g., Azure App Services, Heroku).
● IaaS: Virtualized infrastructure (e.g., AWS EC2, Google Cloud).

Each model provides different levels of control and responsibility, from fully managed software
(SaaS) to customizable infrastructure (IaaS).

Q. How to give access to only the Shared calendar but not the whole mailbox.

To give access to only a shared calendar without granting access to the entire mailbox in
Microsoft Outlook or Exchange, you can follow these steps. This ensures that the user has
access to view or manage the calendar but cannot access other parts of the mailbox like emails.

Steps for Outlook:

1. Open Outlook:
○ Start Outlook on your desktop.
2. Navigate to the Calendar:
○ Go to the bottom-left corner of the screen and click the Calendar icon to open
your calendar view.
3. Share Your Calendar:
○ In the Home tab, click on the Share Calendar button.
○ Choose the calendar you want to share (usually the primary calendar).
4. Set Permissions:
○ In the Calendar Properties window, click on the Add button to specify the
person you want to give access to.
○ Select the user from your address book and click Add and then OK.
5. Assign Specific Permissions:
○ Once the user is added, set the appropriate permission level from the
Permission Level drop-down menu:
■ Can view when I'm busy: Can only see availability, not event details.
■ Can view titles and locations: Can see event titles and locations.
■ Can view all details: Can see full event details.
■ Can edit: Can view and modify calendar events.
■ Delegate: Can manage calendar events on your behalf, including sending
meeting requests.
○ Click OK to save the changes.

Steps for Exchange Admin Center (if needed):

If you are using an Exchange Server or Office 365, and you want to control access to the
calendar more precisely, you can also configure this through the Exchange Admin Center
(EAC) or PowerShell.

1. Open Exchange Admin Center:


○ Navigate to the Exchange Admin Center or Office 365 Admin Center.
2. Find the Mailbox:
○ Go to Recipients > Mailboxes, and find the user whose calendar you want to
share.

Assign Calendar Permissions via PowerShell (optional): You can use the following
PowerShell command to provide calendar access:

Add-MailboxFolderPermission -Identity "user@domain.com:\Calendar"


-User "recipient@domain.com" -AccessRights Editor

3. Replace user@domain.com with the mailbox owner’s email address and


recipient@domain.com with the user who needs calendar access.
Available -AccessRights options:
○ Reviewer: Read-only access (can view events).
○ Editor: Can view and modify calendar items.
○ PublishingEditor: Can edit and create subfolders.

Conclusion:

By using the steps above, you can grant access to only the shared calendar while ensuring that
the rest of the mailbox (emails, contacts, tasks) remains private.

Q. Setup Network printer. [Check ip search on google, then download drivers,


run setup file and configure.]

* Simple and straightforward steps from Cobuman :

- Connect printer to the ethernet cable and power it on, Go to printer screen and find
configuration report option and print it, it will contain hardware address (MAC)
● Go to DHCP Server :

- Go to DHCP Server -> Select IPV4 -> Select Scope -> Right Click on
Reservations and click New Reservation

- Give it a name(i.e printer1atHR), enter Static IP and MAC address of Printer from
printer report, write a description and select Both in supported types.

- Hit Add and you have given a static IP to the network.


● Go to DNS Server :

- Select the company domain, Right click and select New Host (A or AAAA)..

- Once you click it, Now enter the name of the printer that you gave it in the DHCP
server. (i.e printer1atHR)

- Now enter the IP address that you gave from the DHCP server and hit Add Host.
- It will give you the prompt that says the host record printer1atHR.domian.com
was successfully created.
● Go to the Print Management :

- In Print Servers, select the Printers and right click it and select Add Printer.

- Now select the 2nd option that says Ad an Ipp, TCP/IP, or web services printer by
IP addresses or hostname.

- Now Select Type of Device : TCP/IP Device and Write Hostname(Preferred) or IP


address.

- Hit Next.
- Once you hit Next it will auto detect the printer and will ask you if you want to use
an existing printer driver on the PC.
- You can just follow the prompt on PC and hit Finish.
- Now you will see that Printer in the list.
Q. How to give any application access through Azure Enterprise Application?

Ans : Assign Users or Groups to the Application

To control who can access the application, you assign users or groups within Azure AD.

● In the Enterprise Applications page, select the application (e.g., Salesforce) you just
added.
● In the left-hand menu, click on Users and groups.
● Click on + Add user/group.
● Select Users or Groups that should have access to the application.
● Click Assign.

Example: You can assign the Sales team group to Salesforce so that only users in the sales
department have access to it.

Q. What will you do if a user says his/her outlook storage is full?

1. Check the Storage Quota:

● Outlook Web (Office 365): Navigate to Settings (⚙) → "View all Outlook settings" →
"General" → "Storage." This will show how much space is used.
● Outlook Desktop App: The storage limit depends on the email server. For Office 365
accounts, it's generally 50GB to 100GB. IMAP and POP accounts have different limits
depending on server configuration.

2. Empty the Deleted Items and Junk Folders:

● Deleted Items: Right-click the "Deleted Items" folder and choose "Empty folder."
● Junk Email: Right-click the "Junk Email" folder and choose "Empty folder."

3. Archive or Export Emails:

● Archive: In Outlook Desktop, go to "File" → "Tools" → "Clean Up Old Items." This will
move older emails to an archive folder stored locally.
● Export Emails: You can export old emails to a PST file by going to "File" → "Open &
Export" → "Import/Export" → "Export to a file." This will free up space by moving emails
off the server.

4. Delete Large Attachments:

● Search for emails with large attachments using the "Has Attachments" filter. You can
then delete or save these attachments locally and remove them from Outlook.

5. Use Online Archive (For Office 365 Users):


● If enabled by the organization, move old emails to the online archive. This option is
available through "Outlook Web" or "File" → "Tools" → "Clean Up Mailbox."

6. Check for Additional Storage:

● If you're using a business account (Office 365), check with the administrator to see if
they can increase the mailbox storage quota.

Q. Laptop Reimage/Reset inquiry Bootable USB.

Ans : Reimaging or resetting a laptop for a new hire using a bootable USB drive is a common
practice in IT departments to ensure that the laptop is configured with a fresh installation of the
operating system and company-specific software. Here’s a step-by-step guide to help you
through the process.

Steps to Reimage/Reset a Laptop Using a Bootable USB

1. Prepare the Bootable USB Drive

Before you can start reimaging, you need a bootable USB with the appropriate operating system
(e.g., Windows, macOS, Linux). Below are the steps to create one.

For Windows:

● Download the Windows 10/11 ISO from the Microsoft website or use the Windows
Media Creation Tool.
● Insert a USB flash drive (minimum 8GB capacity).
● Use the Media Creation Tool to create a bootable USB:
1. Download and open the Windows Media Creation Tool.
2. Select Create installation media for another PC.
3. Choose the Language, Edition, and Architecture.
4. Select USB flash drive as the media to use, then choose your USB device.
5. The tool will download the necessary files and create the bootable USB.

2. Backup Important Data

If the laptop contains any important files, backup data before proceeding, as the reimage
process will erase all existing data on the machine.

3. Boot from the USB Drive


To reimage the laptop, you need to boot from the USB drive instead of the laptop's internal hard
drive.

Steps:

1. Insert the Bootable USB into the laptop.


2. Restart the laptop and enter the BIOS/UEFI settings by pressing the appropriate key
(usually F2, F10, F12, or ESC) during the boot process.
3. In the BIOS menu, look for Boot Options or Boot Order.
4. Change the boot order to USB drive as the first boot device.
5. Save and Exit the BIOS settings. The laptop will now boot from the USB.

4. Install/Reimage the Operating System

For Windows:

1. The laptop should boot into the Windows Setup wizard.


2. Choose your Language, Time, and Keyboard preferences and click Next.
3. Click on Install Now.
4. Enter a Windows product key if prompted or choose to skip this step if the laptop is
licensed through a Digital License.
5. Accept the license terms and click Next.
6. Choose Custom: Install Windows only (advanced) to perform a fresh install.
7. Select the drive/partition where Windows will be installed and click Next.
8. Windows will start installing the operating system. This may take some time.
9. After installation, follow the on-screen instructions to set up Windows.

5. Install Company Software and Configure Settings

After the operating system is installed, you’ll need to:

● Install any required company software (e.g., Microsoft Office, antivirus, VPN clients).
● Configure network settings (e.g., connect to the company’s Wi-Fi or Ethernet).
● Install any drivers that may be required (for network, display, etc.).
● Join the laptop to the company’s domain or Azure Active Directory if applicable.
● Apply group policies or configure user profiles as needed.

6. Join the Laptop to the Company Domain (if applicable)

If the laptop will be used in an organization with a Windows Server Active Directory, you may
need to join the laptop to the domain:

For Windows:

● Open Settings > Accounts > Access work or school.


● Click on Connect and select Join this device to a local Active Directory domain.
● Enter the domain name (e.g., company.local) and provide administrative credentials.
● Restart the laptop for the changes to take effect.

For Azure AD:

● Open Settings > Accounts > Access work or school.


● Click Connect and select Join this device to Azure Active Directory.
● Follow the prompts to log in with an Azure AD account.

7. Test the Laptop

● After completing the setup, test the laptop to ensure all company applications, network
settings, and user accounts are working properly.
● Check for Windows updates or macOS/Linux updates to ensure the system is up to
date.

8. Hand Over the Laptop to the New Hire

● Once everything is set up and tested, provide the laptop to the new hire.
● Make sure to include any necessary login credentials, VPN setup instructions, or help
desk contact information in case they need assistance.

Summary of Steps:

1. Prepare a bootable USB drive with the required OS.


2. Backup important data from the laptop (if necessary).
3. Boot from the USB drive and access the BIOS/UEFI to change boot order.
4. Install the operating system (Windows, macOS, Linux).
5. Install company-specific software and drivers.
6. Join the laptop to the company domain (if needed).
7. Test the system and ensure everything is configured.
8. Deliver the laptop to the new hire.
Additional Questions :

Q. LAN vs WAN

Q. What is a safe mode and how do you get to it? What is it used for?
Ans : In order to reach the safe mode, the computer must be restarted and by pressing F8 key
before the OS loads you will arrive at the selection screen at which you will find the safe mode.
Safe mode is used to troubleshoot driver issues, hardware issues and remove viruses or
unwanted software. In Windows 10 the combination key is “Shift + Restart”.

Q. What is Ip address and how do you find it?


Ans : IP address is a number assigned to your PC to identify its location on a network. You can
find it by opening the CMD and entering ipconfig /all.

Q. What is a default gateway?


Ans : It serves as a path to reach other networks for example in order to reach the internet
outside of your business or home you need a gateway that will open the way for you. IT
basically means a proxy server in a business environment. You can find it by opening the CMD
and entering ipconfig /all.

Q. What is an active directory?


Ans : Active directory is a feature of windows server operating system and contains user
accounts, objects, host names, group policies and the main services for example active
directory will have information about user login credentials in addition it can contain group
policies that will apply different permissions to user accounts that belong to specific groups
within same domain.

Q. What is a Domain?
Ans : Domain is a group of computers and users created for a network in order to control access
with a domain you have a group of systems that are bound by the rules of centralized
authentication server in a domain each system has to connect through the domain server using
provided credentials a computer user will have the main login access once their credentials are
created or added to that specific domain within active directory for example your jobs pc login
will most likely be a domain login.

Q. You receive a trouble ticket that states the printer is not printing correctly, it
prints out weird patterns on paper.
Ans : This issue is caused by a bad or wrong printer driver. Solution is to acquire and install a
correct printer driver, to expand I have noticed that it specifically points out a weird pattern on
paper and not necessarily a faded so in this case it's very clear that ink is not an issue that there
is plenty of ink.So, this is a very clear case of a bad or wrong printer driver after which you have
to simply reinstall it.

Q. What are some commonly used LAN cables?


Ans : There are four types of land cables commonly used. CAT5, CAT5 e, CAT6 and CAT6 a.
CAT5 Speeds are up 100mbps, CAT5 e up to 1000mbps, CAT6 up to 1000mbps certified gigabit
and CAT6 a up to 10,000 mbps. All the speeds are based on a hundred meters maximum
distance.

Q. What is a blue screen of death(BSOD)?


Ans : It is most commonly caused by bad hardware. The error appears as a blue screen
crashing the computer. It can be caused by hardware, software or driver issues and conflicts. In
order to troubleshoot, you will need to run a full hardware diagnostic on the pc and update all of
the drivers.

Q. What is the TCP IP protocol?


Ans : TCP/IP is a data link protocol used on the internet to let computers and other devices
send and receive data. TCP/IP stands for Transmission Control Protocol/Internet Protocol and
makes it possible for devices connected to the internet to communicate with one another across
networks.

Q. What is DHCP?
Ans : DHCP stands for dynamic host configuration protocol and it deals with handling IP
addresses for all computers connected to a network. Each computer is allowed to have
connection to the network or Internet resources after Dhcp Server assigns an ip address
dynamically. Dynamic type of ip address can change at any point.
Q. What is DNS?
Ans : DNS stands for domain name system, and it reroutes known host names to the ip address
that hosts its service. For example, dns for Microsoft.com is located at (IP) . but it can change
randomly. You could say that it serves as an address book for the host names, which are then
translated into numbers in order for computers to understand it. In this example, it assigns and
routes web address names to web hosting services.

Q. What is VPN?
Ans : A virtual private network is commonly used as a secure way to connect from remote
location to network resources in your business/company. For example, you can take your laptop
to a coffee shop, start a vpn, and through it, securely connect to a pc at work or access
company's emails and files.

Q. What is the PING command?


Ans: PING command is used to determine whether your computer can reach external or internal
resources. For example, Through command prompt type ping Microsoft.com to test connection.
This function sends four packets of data which are sent back as acknowledgment of successful
connection. It also provides the latency results measured in milliseconds.

Q. What is a Group Policy?


Ans : Active directory assigns a group policy to each new user added into the database. For
example, if you work in desktop support, your user login credentials and permissions will be
assigned to a group policy. In Active Directory, you can take any user and place them into a
group that has predetermined settings. Group policy can restrict read or write or execute and
restrict access to network resources.

Q. What is a .PST file?


Ans : .PST is a file extension used by Microsoft Outlook Archives. An email archive would
commonly be known PST.

Q. What is the difference between Switch and Hub?


Ans : There are a couple of main differences between switch and a hub. Hub can be used to
connect multiple computers to a single network, while switch can be used to create multiple
segments of the same network. Second difference is that with a hub, all computers connected
share bandwidth, which can create latency issues. Switch can regulate this by only sending data
packets to computers that requested the data and is able to regulate bandwidth. A hub transmits
all data to all connected devices and cannot make routing or forwarding decisions. A switch has
intelligent routing and allows users to decide which devices will receive which communications.

Q. How would you recover data from Virus infected computer?


Ans : In order to successfully and safely recover data, you would extract the hard drive from the
infected computer. Slave it to the second computer that has updated virus definitions, updated
Microsoft patches and drivers. From there, you would scan the drive for viruses. And once a
virus is removed, you can extract the data that needs to be recovered.

Q. What happens to the lost Email?


Ans : You can check the status of sent or received emails through the Exchange Admin centre
and perform a message trace :

- Go to Exchange Admin -> Mail flow -> Message trace.


- Start trace -> Enter Sender email address and in recipients, select all and select the time
range.
- Hit Search.

Q. What is the difference between Office 365 groups and distribution?


Ans : Office 365 group creates group emails, shared workspace, files and calendars. On the
other hand, a distribution list is just an email list.

Q. What happens to reported email messages?


Ans : To report an email message, you can do it through the exchange admin, after which it is
sent to security and compliance for a review. From Message Trace and select the report.

Q. What is ‘Rank’ in a group policy?


Ans : If you have a new group policy and wish for it to overwrite others or previous policy, you
just need to rank the new policy with a higher number. This is done in the team's Admin center.

Q. What are Wireless Access Points (AP)?


Ans : Wireless APs are primarily used by medium and large organizations. It is managed by a
single router. Using Wireless APs makes it easier to manage the network. It is only for the
wireless devices to connect to.

Q. What are the Email servers?


Ans. There are three main servers for email. POP3, SMTP, IMAP.

POP3 : Post office protocol 3 - Usually downloads the emails to your device and removes them
from the server so you can read them offline. So, it limits access from the other devices.
IMAP : Internet Message Access Protocol - It keeps your emails to the server and also across
the devices so you can access your messages from anywhere.
SMTP : It is used to send and receive emails to the servers. Where POP3 and IMAP used to
retrieve the emails from the server.

Notes :

- At least connect your laptop to the VPN or ethernet once in 30 days.


- Domain Control (DC) = AD, File server = Network Drive
- TAKE APPROVALS BEFORE DOING ANY BIG STEPS!!!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy