Filter interviews by
I applied via Newspaper Ad and was interviewed before Oct 2023. There was 1 interview round.
Top trending discussions
posted on 15 Oct 2024
I applied via Recruitment Consulltant and was interviewed in Sep 2024. There were 3 interview rounds.
My future goal is to become a senior Desktop Support Engineer and achieve industry certifications.
Obtain industry certifications such as CompTIA A+ and Microsoft Certified Desktop Support Technician (MCDST)
Gain experience in troubleshooting complex technical issues
Lead projects to improve efficiency and productivity in the IT department
DHCP stands for Dynamic Host Configuration Protocol. It is a network management protocol used to automatically assign IP addresses to devices on a network.
DHCP assigns IP addresses to devices on a network
It also provides other network configuration information such as subnet mask and default gateway
DHCP servers lease IP addresses to devices for a specific period of time
DHCP helps in reducing manual configuration errors
To boot a new laptop, you need to press the power button and wait for the operating system to load.
Press the power button to turn on the laptop
Wait for the manufacturer's logo to appear on the screen
The operating system will start loading
Enter any necessary login credentials if prompted
I applied via Naukri.com and was interviewed in Sep 2024. There were 2 interview rounds.
At a time did the interview of 14 peoples
Bachelor's degree in Computer Science
Bachelor's degree in Computer Science
Courses in networking, operating systems, and programming
Hands-on experience with troubleshooting and technical support
I applied via Naukri.com and was interviewed in May 2024. There were 4 interview rounds.
Medium to hard question.
One is easy problem another one medium problem.
My strength lies in my ability to troubleshoot technical issues efficiently and effectively.
Strong problem-solving skills
Excellent communication skills
Ability to work well under pressure
Attention to detail
Experience with various operating systems and software applications
posted on 14 Nov 2024
I applied via Naukri.com and was interviewed before Nov 2023. There were 2 interview rounds.
I am a dedicated and experienced Desktop Support Engineer with a strong background in troubleshooting and resolving technical issues.
Over 5 years of experience in providing desktop support to end users
Proficient in diagnosing and resolving hardware and software issues
Skilled in setting up and configuring desktops, laptops, and peripherals
Excellent customer service and communication skills
Certified in CompTIA A+ and Mic...
The DORA process stands for Discover, Offer, Request, and Acknowledge. It is a method used in DHCP to assign IP addresses to devices.
Discover: Device sends a broadcast message to discover DHCP servers on the network
Offer: DHCP server responds with an IP address offer to the device
Request: Device requests the offered IP address from the DHCP server
Acknowledge: DHCP server acknowledges the request and assigns the IP addr
An incident is an unplanned interruption to an IT service or reduction in the quality of an IT service. A service request is a formal request from a user for something to be provided.
An incident is a disruption to normal operation that requires immediate attention to restore service.
A service request is a formal request from a user for information, advice, a standard change, or access to a service.
Examples: Incident -
The outlook file responsible for taking backup is the PST file.
PST file stores emails, contacts, calendar events, and other data in Outlook.
Users can manually backup their PST file by exporting it from Outlook.
Third-party backup software can also be used to automatically backup the PST file.
SMTP - 25, POP - 110, IMAP - 143
SMTP uses port 25 for sending emails
POP uses port 110 for receiving emails
IMAP uses port 143 for accessing emails
I applied via Company Website and was interviewed in Sep 2023. There were 2 interview rounds.
BSOD stands for Blue Screen of Death, a Windows error screen displayed when a system encounters a critical error. Networking refers to the practice of connecting computers and other devices to share resources. PST and OST files are used in Microsoft Outlook to store email data. Outlook is an email client developed by Microsoft.
BSOD is a Windows error screen that appears when a critical system error occurs.
Networking in...
A printer is a device that produces text or graphics on paper or other media.
Printers can be connected to computers or networks to produce physical copies of digital documents.
There are different types of printers such as inkjet, laser, and dot matrix printers.
Printers can be used for printing documents, photos, labels, and more.
Common printer manufacturers include HP, Canon, Epson, and Brother.
I applied via Naukri.com and was interviewed in Aug 2023. There was 1 interview round.
I applied via Naukri.com and was interviewed in Mar 2023. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Oct 2021. There were 5 interview rounds.
Desktop l2 level related questions
How to configur system in domain
To configure SAP in user's system, follow these steps:
Install SAP GUI on the user's system
Configure the SAP logon pad with the necessary system details
Create a user ID and assign the necessary authorizations
Test the connection to ensure successful configuration
Outlook 365 offers numerous advantages for users.
Access to emails, contacts, and calendar from anywhere with internet connection
Collaboration and sharing features for team projects
Integration with other Microsoft Office applications
Automatic updates and security features
Large storage capacity for emails and attachments
Mobile app for easy access on-the-go
Bitlocker is important for securing data on Windows devices.
Encrypts data on Windows devices to prevent unauthorized access
Protects against theft or loss of devices
Meets compliance requirements for data protection
Can be managed centrally through Active Directory
Can be used in combination with other security measures like TPM and Secure Boot
Helps prevent data breaches and protects sensitive information
MFA stands for Multi-Factor Authentication, which is a security process that requires users to provide two or more forms of identification to access a system.
MFA adds an extra layer of security to protect against unauthorized access.
The most common forms of identification used in MFA are passwords, security tokens, and biometric data.
MFA can be implemented through various methods such as SMS codes, mobile apps, or hard...
based on 1 review
Rating in categories
Desktop Support Engineer
5
salaries
| ₹1.1 L/yr - ₹2.6 L/yr |
Information Technology Support Engineer
4
salaries
| ₹2 L/yr - ₹5.5 L/yr |
Computer Hardware & Networking Engineer
4
salaries
| ₹2 L/yr - ₹4 L/yr |
Senior Engineer
3
salaries
| ₹2.2 L/yr - ₹2.2 L/yr |
Desktop Engineer L2
3
salaries
| ₹2.1 L/yr - ₹2.4 L/yr |
TCS
Accenture
Wipro
Cognizant