Holy Bible Audio: HEBREWS (Contemporary English) With Text

1. Can you tell us about yourself?

I am a fully committed, knowledgeable and confident technical support worker who possesses the necessary skills, qualities and experience to meet the demands of the job description.

I take grate satisfaction in the work I carry out as a technical support specialist and I believe the problem-solving capabilities, the communication and interpersonal skills, and the attention to detail I possess will ensure I make a fast and immediate impact within this role.

I can prioritize a large workload; I work very well as part of a team, and I have strong customer focus capabilities that ensure the work I do always provides timely and knowledgeable support that helps my clients, callers and customers achieve their objectives.

If you hire me within this technical support position, I will quickly get up to speed in the role and star contribution to the team’s objectives so that you immediately see a positive return on your investment.

2. Explain the role of Windows Server.

Windows OS Server acts as a centralized computer that provides specific functions and predetermined rules for computers, users and components connected to a network.

3. What is Windows Domain?

Windows Domain Provides access to user accounts, computers, printers and security features as part of database controlled by a domain controller.

4. What is a Firewall?

Firewall is a filter between two or multiple computer sources; it blocks any incoming or outgoing traffic. Firewalls can be in software or hardware forms.

5. What is TCP/IP (TCP over IP)?

TCP is a Transmission Control Protocol that deals with establishing a connection between computers before any data is being sent; in other words it acts as the highway for data packets being send back and forth used by various Protocols.

For example; HTTP OR FTP. TCP also controls and sorts out data packet receive order.

6. Can you explain the difference between HTTP and HTTPS?

HTTP stands for HyperText Transfer Protocol used by majority of websites as means of transmitting website data and it allows for use of hyperlinks. This Protocol mostly user TCP port 80.

HTTPS IS secure version of HTTP that allows for identity verification and low level encryption using TCP prot 443.

7. What is DNS and which port does it use?

DNS stands for “Domain Name System” and it’s mostly used to interpret Domain names in to numeric IP address.
for example; domain name microsoft.com it IP address is 104.71.245.168. DNS uses port 53 TCP or UDP.

8. How many queries does DNS perform and which ones?

DNS can perform two types of queries; Iterative and Recursive.

9. What is Active Directory?

A service of Windows Server OS, Active Directory is used for user and computer authentication within a Domain. It can also enforce security policies with use of GPOs which can also be used to push software installs across domain.

10. Active Directory database is located where?

Database is under the file name NTDS.DIT; and it is located in the %systemRoot%ntds folder of the server.

11. What is a Lingering Object?

If an Object is deleted from Active Directory while Domain Controller is offline it can create a Lingering Object.
When Object is deleted from Active Directory a Tomb Stone (which is temporary) is created which then has to be replicated by Domain controller before it expires.

12. What is RAID?

Stands for Redundant Array of Independent Disks and it used to provide data redundancy (mirroring) across multiple hard disks. It can also be utilized to improve read/write performance across the server by using striping configuration.
For example:
RAID 1; two or more disks with identical data stored(redundancy).
RAID 0; tow or more disks, data distributed evenly to improve performances(no redundancy).

13. Which commands would you use in CMD to test network connectivity?

To test network connectivity ping, tracert or ipconfig commands can be used.

14. What does IntelliMirror do?

As part of Windows Server OS, InterlliMirror provides assistance in managing user data, computer information, applications and settings, This is configured with user Group Policy that defines business roles, group memberships and locations.

For example, if a user moves to a different computer; the applications, and stored files will follow (“mirror”)

15. How do you back up Active Directory?

Active Directory can be backed up by using NTBACKUP tool that comes with 2003 server. With 2008 server a command prompt is used to perform backup: type “wbadmin start systemstatebackup -backuptarget:e”
You can also perform a full server backup through Server Manager (OS 2012+)

16. Do you know what Garbage Collection is?

Garbage Collection is a process designed to free space inside Active Directory.
This is performed by default every 12 hours (defrag).

17. Do you know what SYSVOL folder is?

system Volume folder is a directory that houses a copy of domain files found on a local hard drive within domain Controller.
This data is shared for purpose of replication across domain; for example user logon scripts and Windows Group Policy.

18. Explain what Group Policy is.

A group Policy is used to control user’s desktops, computer configurations and permissions by creating a template for specific groups of members.
Thais makes it easier to control and process large groups of users. For example; Tech Support may have different security permissions compared to regular computer users.

19. Can you name different types of email servers and ports used?

You can have two types of email servers: Incoming Mail Server (POP3 port 110, IMAP 143, HTTP 80) Outgoing Mail Server (SMTP port 25).

20. What is the difference between a forest and a domain?

A Domain is a logic based group of computers, users and devices within Active Directory. A Trees formed-a Forest is created.

21. Do you know what Virtual Machine is?

Virtual Machine is an emulation version of an Operating System. for example; you can have multiple copies of Windows running on a single computer.

22. Do you know what “Tattooing” the registry means?

The group Policy will make the changes to user’s registry but once the Group Policy is no longer in effect, registry values would not revert back leaving them tattooed in.

23. What is a proxy or proxy server?

Proxy deals with filtering network traffic in a sense of preventing access to certain websites and can even monitor user web activity. It can block certain website from being accessed but it can also act as a measure of hiding the true origin at point of access.

24. Can you explain what UDP is?

UDP stands for User Datagram Protocol. Unlike TCP, UDP is constantly broadcasting a connection signal which can allow for faster connection speeds-with TCP you have to wait for connection confirmation which takes time.
UDP sends out data without consideration of what is receiving it; sort of like Radio signal.

25. What is the loop-back IP address?

The loopback IP address is 127.0.0.1 As part of troubleshooting network connection issues; It is used to test Network Interface Card for functioinality. If you ping this IP address and it completes successfully it means your hardware is okay.

26. What is DHCP?

DHCP stands for dynamic Host Configuration Protocol. The main function of DHCP server is to handle distribution of IP address on a network.
Typically, Ip address assigned by DHCP server are “Dynamic”, meaning that they are leased and released dynamically (except static).
To explain it further, if you connect a PC to a network it will get a leased IP address and if you disconnectd or move the PC it will assigned a New IP address.

27. What is FTP and Port used?

FTP is a file Transfer Protocol used to transfer large files between computer with built in ability to pause transfer of data. Ports used by FTP are 20 and 21.

28. What is SSH and Port used?

Also known as Secure Shell; is used to establish a secure connection between devices which can be anything from computers to switches.
For example; you can use SSH at a cafe and connect to ay device anywhere; by establishing a configured Secure shell tunnel between two device.
Thus, making the connection secure.

29. What is the maximum length of UTP cable allowed?

The maximum length of UTP is 90 to 100 meters for a single segment connection. If yo have a switch or a repeater it can compensate for this limitation.

30. What are the layers of OSI model and how many?

There are 7 layers of OSI model: Physical Layer, Data Link, Network, Transport, Session, Presentation and Application.

31. What is the job of network layer?

Network Layer deals with routing, switching and transmitting of data from one point to another, but this layer is also responsible for error handling and packet sequencing.

32. Which types of network cables are used in networking?

Cat-5 runs at 100Mb/s maximum,
Cat-5e can run up to 1Gb/s, and
Cat-6 can run up to 10Gb/s.
Speeds are rated at 100 meters maximum distance.

33. What is a Subnet Mask?

A Subnet Mask holds the information about network and hosts addresses under a subnet.
In order for TCP/I protocol to figure out this information it looks at the 32bit subnet mask number.
Typical example is 255.255.255.0.

34. Can you tell me the difference between a workgroup and a domain?

With a Workgroup you have a collection of systems that a connected to the same network but have their own set of rules and permission set at local level.
With a domain you have a group of systems that are bound by the rules of a domain Controller.

35. Can yo give and example of DNS issue?

If a host cannot be reached by it’s name over the network but can be reached using an ip address indicates a problem with DNS.

36. How would you analyze connection between a local host and a server?

A “TRACERT” command is used to accomplish this test. Trace Route can provide detailed path information taken through switches, servers, computes in reaching final destionation.

37. What is ipconfig command used for?

Ipconfig command is used to determine TCP/IP settings, DHCP configuration, DNS Defatl Gateway, and Subnet mask. It can also be used to change Local DHCP settings; for example: ipconfig /release and /renew.

38. What is VPN?

A virtual Private Network allows users to create a secure connection over public network such as internet.
This is commonly used by mobile work in order to access company’s network from a remote location.

39. What is a Network Switch?

A Network Switch is used to create or control a network at physical layer in which multiple devices are connected and share data.
This is accomplished by receiving, processing and forwarding of data in form of data packets.

40. Why should we hire you?

You should talk about your experience and how you could use that to benefit the company.

41. What do you expect to be doing in this Technical Support role on a daily basis?

I will have numerous duties and responsibilities that are all centred on ensuring I provide timely and quality technical support to customers and clients on daily basis.

I will be required to troubleshoot technical issues, provide product support, assist in the launch of new applications and ensure I talk customers through matters to get to the root of the issue so it can be rectified in as fast a time as possible.

Other duties include resolving network problems, identifying hardware and software solutions, and conducting relevant tests to ensure problems are non-recurring.

I understand technical support is a role that requires the ability to manage lots of tasks concurrently, the ability to demonstrate exceptional communication and problem-solving skills, and the desire to maintain a high level of competence in the role that ensures you can conduct your duties consistently to a high standard.

42. Why do you want to work for us?

  • I’d like to work for you because you are a company that has a strong track record of achievement.

It is clear from the people I have spoken to that you support your staff, and you have ambitious plans for the future.

  • We spend a lot of time at work and being in a technical support role requires a supportive employer who wants to provide the right training and the right working environment that enables its staff to operate at a high level.
  • Working for your company I will have all of those things, and I am very much looking forward to being a part of your team if I am successful at the interview today.

43. Why do you want to work in technical support?

I’ve always been the type of person who wants to work in a role where no two days are the same, where I am pushed and challenged technically and where I get to deal with a variety of issues and problems that test my knowledge and my skillet.

Working in technical support gives me all of this, and more. I also want to work in an environment where I have the responsibility for ensuring my own competence and my knowledge is kep up to date.

I enjoy learning new things and working in technical support requires you to constantly evolve with the ever-changing technological advances that come into the sector on a regular basis.

44. How would you calm down and irate caller or customer?

Whenever dealing with a difficult or irate call it is very important to listen to them, to give them the opportunity to explain how they feel, and to make them feel valued.

I would use effective communication skills to listen to their issue and I would ask the right questions at the right time to get to the bottom of their problem with a view to coming up with the right technical solution in as fast a time as possible.

If you show the caller or the customer you genuinely care about their issue, and you demonstrate confidence and technical know-how when dealing with the problem, this will massively help to build trust and it will enable you to seek away forward that is in their best interests.

45. How would you deal with a customer that calls up for assistance on a product that you have no knowledge on? the person

who has knowledge relating to the product is not available and the customer needs and answer urgently.

I would be resourceful, and I would refer to the technical manual or the operating procedures to get to the bottom of the issue in as fast a time as possible.

I would be honest with the caller and explain how I would need a little bit more time to carry out some research to ascertain the issue and to come up with a resolution for them.

I would give the caller the option to either wait on the call, or to have me call them back within a predetermined time-frame with and update.

I would then ensure I called back the customer or client as agreed with an update on the progress I was making against their issue, and I would not stop until I had found a solution to the problem.

 

I wish you all the best, happy job hunting – GOD Bless you!.

Leave a Reply

Your email address will not be published.