Desktop Support Engineer L2

50+ Desktop Support Engineer L2 Interview Questions and Answers

Updated 31 Jul 2024

Popular Companies

search-icon

Q1. What step you will taken after getting any system infected with virus?

Ans.

After getting a system infected with a virus, the first step is to isolate the infected system from the network.

  • Isolate the infected system from the network to prevent further spread of the virus

  • Disconnect the infected system from the internet

  • Disable any network connections on the infected system

  • Notify the IT security team about the infection

  • Run a full system scan using an updated antivirus software

  • Quarantine and remove any identified malware or viruses

  • Restore the system from...read more

Q2. What is pop and imap and smtp and all protocol port number

Ans.

POP, IMAP, and SMTP are email protocols used for sending and receiving emails. Each protocol uses different port numbers.

  • POP (Post Office Protocol) is used for downloading emails from a server to a client. It uses port number 110.

  • IMAP (Internet Message Access Protocol) is used for accessing emails on a server from a client. It uses port number 143.

  • SMTP (Simple Mail Transfer Protocol) is used for sending emails from a client to a server. It uses port number 25.

  • Secure versions ...read more

Desktop Support Engineer L2 Interview Questions and Answers for Freshers

illustration image

Q3. What is active directory and what is the use of active directory?

Ans.

Active Directory is a directory service developed by Microsoft for Windows domain networks.

  • Centralized database for managing network resources

  • Stores information about users, computers, and other network objects

  • Allows administrators to control access and permissions

  • Facilitates single sign-on for users across network services

  • Enables group policy management for network-wide settings

Q4. What are the levels of Office 365 Administration?

Ans.

The levels of Office 365 Administration include Global Administrator, Billing Administrator, User Management Administrator, etc.

  • Global Administrator has full control over all aspects of Office 365 administration

  • Billing Administrator manages the billing and subscription aspects of Office 365

  • User Management Administrator handles user accounts and permissions

  • Exchange Administrator manages Exchange Online

  • SharePoint Administrator handles SharePoint Online

  • Security Administrator man...read more

Are these interview questions helpful?

Q5. If company give you a proper growth every year so how long you will work on same company

Ans.

I would work for the company as long as I feel challenged and fulfilled in my role.

  • I value professional growth and development, so I would stay with a company that provides opportunities for advancement.

  • If I feel that I have reached a plateau in my current role and there are no opportunities for growth, I may consider exploring other options.

  • However, if I am consistently challenged and engaged in my work, I would be happy to stay with the company for many years.

  • Ultimately, my...read more

Q6. How to install proxy certificate in user's machine?

Ans.

To install a proxy certificate in a user's machine, you need to import the certificate into the user's browser or operating system.

  • Export the proxy certificate from the source (e.g. email, website)

  • Import the certificate into the user's browser or operating system settings

  • Verify the installation by accessing a website that requires the proxy certificate

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q7. What is blue screen of death and how to fix BSOD?

Ans.

Blue Screen of Death (BSOD) is a Windows operating system error screen that appears when a system encounters a critical error.

  • BSOD is a stop error screen that appears when the Windows operating system encounters a critical error that it cannot recover from.

  • Common causes of BSOD include hardware failures, driver issues, software conflicts, and corrupt system files.

  • To fix BSOD, you can try restarting the computer, checking for hardware issues, updating drivers, running system d...read more

Q8. how can you solve a bluescreen error?

Ans.

Bluescreen errors can be solved by identifying the root cause and taking appropriate actions.

  • Check for any recent hardware or software changes

  • Run a virus scan and check for malware

  • Update drivers and operating system

  • Check for overheating or hardware failures

  • Restore system to a previous working state

  • If all else fails, reinstall the operating system

Desktop Support Engineer L2 Jobs

Desktop Support Engineer L2 || Andheri/Prbhadevi Mumbai 2-5 years
Progressive Infotech
3.4
₹ 1 L/yr - ₹ 3 L/yr
Mumbai Suburban
Desktop Support Engineer L2 3-5 years
ITMantra Techintellect Pvt. Ltd.
3.0
Bangalore / Bengaluru

Q9. What is pst and ost in outlook What is bsod what is dns what is vpn.

Ans.

PST and OST are Outlook data files. BSOD is Blue Screen of Death. DNS is Domain Name System. VPN is Virtual Private Network.

  • PST and OST are data files used by Microsoft Outlook to store emails, contacts, and other data.

  • BSOD is a critical error screen displayed by Windows operating system when it encounters a system error.

  • DNS is a system that translates domain names into IP addresses, allowing computers to communicate with each other over the internet.

  • VPN is a secure connectio...read more

Q10. What is the colour coding of cross cable?

Ans.

The colour coding of a cross cable is different on each end to allow for direct connection between two devices.

  • The colour coding on one end of the cross cable follows the T568A standard, while the other end follows the T568B standard

  • This allows for the direct connection of two devices without the need for a switch or hub in between

  • Commonly used for connecting two computers directly or connecting a computer to a printer

Q11. How to backup pst file My system is very slow so what do

Ans.

To backup a PST file, you can simply copy and paste it to an external drive or cloud storage. To speed up a slow system, try cleaning up temporary files and disabling unnecessary startup programs.

  • Copy and paste the PST file to an external drive or cloud storage

  • Use a backup software to automate the backup process

  • Clean up temporary files to free up space and improve performance

  • Disable unnecessary startup programs to reduce the load on the system

Q12. how will you solve a hanging desktop.

Ans.

I will troubleshoot the issue by checking for any running programs or processes that may be causing the hang.

  • Check for any running programs or processes that may be causing the hang

  • End any unresponsive programs or processes using Task Manager

  • Check for any hardware issues such as overheating or faulty RAM

  • Perform a virus scan to check for any malware or viruses

  • Update drivers and software to ensure they are up to date

Q13. What is different between router and switches?

Ans.

Routers connect different networks, switches connect devices within a network.

  • Routers operate at the network layer and use IP addresses to forward packets between networks.

  • Switches operate at the data link layer and use MAC addresses to forward frames within a network.

  • Routers can prioritize traffic and perform network address translation (NAT).

  • Switches can create virtual LANs (VLANs) to segment a network.

  • Example of a router: Cisco ISR 4000 series.

  • Example of a switch: Cisco Ca...read more

Q14. How to configure one router to other router connectivity

Ans.

To configure connectivity between two routers, you need to set up routing protocols and configure IP addresses.

  • Configure IP addresses on each router interface

  • Choose a routing protocol (e.g. OSPF, EIGRP) and configure it on both routers

  • Ensure both routers are in the same network or have a route to reach each other

  • Test connectivity using ping or traceroute commands

Q15. How to configur sap in users system

Ans.

To configure SAP in user's system, follow these steps:

  • Install SAP GUI on the user's system

  • Configure the SAP logon pad with the necessary system details

  • Create a user ID and assign the necessary authorizations

  • Test the connection to ensure successful configuration

Q16. What is different between windows 10 and windows 7

Ans.

Windows 10 has a more modern interface, better security features, and improved performance compared to Windows 7.

  • Windows 10 has a Start menu with live tiles, while Windows 7 has a traditional Start menu.

  • Windows 10 has Cortana, a virtual assistant, while Windows 7 does not.

  • Windows 10 has better security features such as Windows Hello, biometric authentication, and improved Windows Defender.

  • Windows 10 has improved performance and faster boot times compared to Windows 7.

  • Windows ...read more

Q17. What is the process migration office365

Ans.

The process of migrating to Office 365 involves planning, preparation, and execution.

  • Assess current infrastructure and identify migration goals

  • Prepare for migration by ensuring compatibility and setting up necessary accounts

  • Execute migration by transferring data and configuring settings

  • Test and verify successful migration

  • Train users on new system and provide ongoing support

  • Examples of migration tools include Microsoft's Migration Manager and third-party solutions like SkyKick

Q18. What is DHCP and how does it work?

Ans.

DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices on a network.

  • DHCP server assigns IP addresses to devices on a network

  • Helps in reducing manual configuration of IP addresses

  • DHCP lease time determines how long an IP address is valid for

  • DHCP Discover, Offer, Request, Acknowledge (DORA) process

  • Example: When a device connects to a network, it sends a DHCP Discover message to find a DHCP server

Q19. What is the use of default gateway?

Ans.

Default gateway is a network device that connects different networks together, allowing devices on one network to communicate with devices on another network.

  • Default gateway is usually the IP address of the router that connects a local network to the internet.

  • It acts as an entry and exit point for network traffic between different networks.

  • Without a default gateway, devices on a network would not be able to communicate with devices on other networks.

  • It helps in routing networ...read more

Q20. How to bulk wipe in mdm intune

Ans.

Bulk wipe in mdm intune

  • Navigate to Intune portal and select Devices

  • Select the devices you want to wipe

  • Click on the 'Wipe' button and confirm the action

  • The devices will be wiped in bulk

Q21. What difference between pst and ost

Ans.

PST is a personal storage table used by Outlook to store email data while OST is an offline storage table used for cached Exchange mode.

  • PST is a file format used by Microsoft Outlook to store email data on a local computer

  • OST is an offline storage table used for cached Exchange mode

  • PST files can be imported and exported while OST files cannot

  • PST files can be accessed even without an internet connection while OST files require a connection to the Exchange server

  • PST files have ...read more

Q22. What is the use of IP address?

Ans.

IP address is a unique numerical label assigned to each device connected to a computer network.

  • Identifies devices on a network

  • Facilitates communication between devices

  • Allows devices to send and receive data packets

  • Can be IPv4 (e.g. 192.168.1.1) or IPv6 (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334)

Q23. What is the use of VPN?

Ans.

VPN is a technology that allows users to securely connect to a private network over the internet.

  • VPN encrypts data to ensure privacy and security

  • It allows users to access resources on a private network remotely

  • Commonly used for remote work, accessing geo-restricted content, and enhancing online security

  • Examples include NordVPN, ExpressVPN, and Cisco AnyConnect

Q24. what will you do if outlook not open?

Ans.

Check for any error messages, restart Outlook, verify network connectivity, repair or reinstall Outlook if necessary.

  • Check for any error messages displayed when trying to open Outlook

  • Restart Outlook and see if it opens successfully

  • Verify network connectivity to ensure Outlook can connect to the mail server

  • If the issue persists, repair or reinstall Outlook

  • Check for any recent updates or changes that may have caused the issue

Q25. What is the use of DNS?

Ans.

DNS is a system that translates domain names to IP addresses, allowing users to access websites using human-readable names.

  • DNS stands for Domain Name System

  • It helps in translating domain names (like www.google.com) to IP addresses (like 172.217.3.206)

  • DNS is crucial for internet functionality as it allows users to access websites using easy-to-remember names

Q26. Do you know how to install software

Ans.

Yes, I know how to install software on various operating systems.

  • I am familiar with the installation process on Windows, Mac, and Linux systems.

  • I can follow installation instructions provided by software vendors.

  • I am experienced in troubleshooting installation issues such as compatibility errors or missing dependencies.

Q27. What is the outlook and how to configure

Ans.

Outlook is an email client developed by Microsoft. It can be configured by adding email accounts and setting up server settings.

  • To configure Outlook, open the application and click on File > Add Account

  • Enter your email address and password, and Outlook will automatically detect the server settings

  • If the server settings are not detected, you can manually configure them by selecting the option 'Manual setup or additional server types'

  • Common server settings include incoming and ...read more

Q28. What is the process of mfa

Ans.

MFA stands for Multi-Factor Authentication, which is a security process that requires users to provide two or more forms of identification to access a system.

  • MFA adds an extra layer of security to protect against unauthorized access.

  • The most common forms of identification used in MFA are passwords, security tokens, and biometric data.

  • MFA can be implemented through various methods such as SMS codes, mobile apps, or hardware tokens.

  • MFA is becoming increasingly important in toda...read more

Q29. Defferent between offline outlook and online outlook?

Ans.

Offline Outlook allows users to access emails without an internet connection, while Online Outlook requires an internet connection to access emails.

  • Offline Outlook stores emails locally on the user's device, allowing access without internet connectivity.

  • Online Outlook requires an active internet connection to access emails stored on the server.

  • Offline Outlook is useful for users who need to access emails while traveling or in areas with limited internet connectivity.

  • Online Ou...read more

Q30. What is a public network IP range

Ans.

A public network IP range is a range of IP addresses that are accessible from the internet.

  • Public network IP ranges are assigned by Internet Assigned Numbers Authority (IANA)

  • Examples of public IP ranges include 1.0.0.0 to 126.255.255.255 for Class A, 128.0.0.0 to 191.255.255.255 for Class B, and 192.0.0.0 to 223.255.255.255 for Class C

  • Public IP addresses are unique and globally routable

Q31. Can you join system into domain

Ans.

Yes, I can join a system into a domain.

  • Yes, I have experience joining systems into domains using Active Directory.

  • I understand the process of adding a computer to a domain and configuring domain settings.

  • I can troubleshoot any issues that may arise during the domain joining process.

Q32. What is Tenant in Office 365

Ans.

Tenant in Office 365 refers to a group of users who share a common access with specific privileges.

  • A tenant is a dedicated instance of Office 365 that an organization subscribes to.

  • It includes a unique domain name, user accounts, and a set of services and features.

  • Each tenant has its own security and compliance policies, and can be managed by a global administrator.

  • Multiple tenants can be managed by a single Office 365 account.

  • Examples of tenants include businesses, schools, ...read more

Q33. Why bitlocker is important

Ans.

Bitlocker is important for securing data on Windows devices.

  • Encrypts data on Windows devices to prevent unauthorized access

  • Protects against theft or loss of devices

  • Meets compliance requirements for data protection

  • Can be managed centrally through Active Directory

  • Can be used in combination with other security measures like TPM and Secure Boot

  • Helps prevent data breaches and protects sensitive information

Q34. What is your fature plan?

Ans.

My future plan is to continue growing my skills and knowledge in the IT field, with a focus on becoming an expert in cloud computing.

  • I plan to take courses and certifications in cloud computing

  • I want to gain hands-on experience with cloud platforms like AWS and Azure

  • I hope to eventually become a cloud architect or engineer

  • I also plan to stay up-to-date with emerging technologies and industry trends

Q35. How to rejoin in Domain

Ans.

To rejoin a computer in a domain, follow these steps:

  • Open System Properties and click on the 'Computer Name' tab

  • Click on the 'Change' button and select the 'Domain' option

  • Enter the domain name and provide the credentials of a domain user with appropriate permissions

  • Restart the computer for the changes to take effect

Q36. Describe Hostfile and responsibilities?

Ans.

Hostfile is a plain text file that maps hostnames to IP addresses.

  • Hostfile is used by the operating system to resolve domain names to IP addresses.

  • It can be edited manually to add or remove entries.

  • It can also be used to block access to certain websites by redirecting them to a different IP address.

  • Hostfile is located in different directories depending on the operating system. For example, in Windows it is located in C:\Windows\System32\drivers\etc\hosts.

  • Hostfile can also be ...read more

Q37. What is Active Directory

Ans.

Active Directory is a Microsoft service that manages network resources and user accounts.

  • It is used to authenticate and authorize users and computers in a Windows domain network.

  • It provides a centralized location for managing and storing information about network resources such as servers, printers, and applications.

  • It allows administrators to assign policies, deploy software, and apply security settings to all devices and users in the network.

  • It uses a hierarchical structure...read more

Q38. What is the outlook 365

Ans.

Outlook 365 is a cloud-based email and calendar service provided by Microsoft.

  • It allows users to access their emails, contacts, and calendars from anywhere with an internet connection.

  • It offers features such as shared calendars, task management, and email scheduling.

  • It integrates with other Microsoft Office applications such as Word, Excel, and PowerPoint.

  • It provides a large amount of storage space for emails and attachments.

  • It offers various security features to protect user...read more

Q39. Advantages of outlook 365

Ans.

Outlook 365 offers numerous advantages for users.

  • Access to emails, contacts, and calendar from anywhere with internet connection

  • Collaboration and sharing features for team projects

  • Integration with other Microsoft Office applications

  • Automatic updates and security features

  • Large storage capacity for emails and attachments

  • Mobile app for easy access on-the-go

Q40. What is dns? Domain name system

Ans.

DNS stands for Domain Name System. It is a decentralized naming system that translates domain names into IP addresses.

  • DNS is used to resolve domain names to their corresponding IP addresses.

  • It helps in the efficient routing of internet traffic by translating human-readable domain names into machine-readable IP addresses.

  • DNS operates through a hierarchical structure of name servers that store and distribute domain name information.

  • It plays a crucial role in the functioning of ...read more

Q41. How will you install the OS

Ans.

I will install the OS using a bootable installation media or network deployment tools.

  • Create a bootable installation media (USB or DVD) with the OS image

  • Boot the computer from the installation media

  • Follow the on-screen instructions to install the OS

  • Configure settings such as language, time zone, and user accounts

  • Install necessary drivers and updates post installation

Q42. What is Subnet mask?

Ans.

Subnet mask is a 32-bit number used to identify the network and host portions of an IP address.

  • It is used to divide an IP address into network and host portions.

  • It is represented in decimal format, like 255.255.255.0.

  • It is used in conjunction with IP addresses to determine network and host addresses.

  • It is used in routing decisions to determine the best path for network traffic.

Q43. Can you configure outlook

Ans.

Yes, I can configure Outlook for users on their computers.

  • I can set up email accounts, configure server settings, and troubleshoot any issues that may arise.

  • I am familiar with setting up email signatures, rules, and folders in Outlook.

  • I can also assist with importing/exporting contacts and calendar events.

  • I have experience with setting up Outlook on mobile devices as well.

Q44. Can you take mail backup

Ans.

Yes, I can take mail backup using tools like Outlook, Thunderbird, or third-party backup software.

  • I can use email clients like Outlook or Thunderbird to manually backup emails and attachments.

  • I can also use third-party backup software like MailStore or CodeTwo to automate the backup process.

  • It's important to regularly backup emails to prevent data loss in case of system failure or accidental deletion.

Q45. Difference between cat5 and cat6

Ans.

Cat5 supports up to 100 Mbps while Cat6 supports up to 10 Gbps.

  • Cat5 has a maximum bandwidth of 100 MHz while Cat6 has a maximum bandwidth of 250 MHz.

  • Cat6 has stricter specifications for crosstalk and system noise compared to Cat5.

  • Cat6 cables are thicker and less flexible than Cat5 cables.

  • Cat6 cables are more expensive than Cat5 cables.

  • Cat6 is recommended for high-speed data transfers and larger networks.

  • Cat5 is suitable for basic home and office networks.

Q46. Windows os full information

Ans.

Windows OS is a popular operating system developed by Microsoft.

  • Windows OS is available in different versions such as Windows 7, 8, 10, etc.

  • It has a graphical user interface (GUI) and supports multitasking.

  • Windows OS supports various file systems such as NTFS, FAT32, exFAT, etc.

  • It comes with built-in applications such as Microsoft Office, Internet Explorer, Windows Media Player, etc.

  • Windows OS can be customized with themes, wallpapers, and screensavers.

  • It supports different t...read more

Q47. What is operating system

Ans.

An operating system is a software that manages computer hardware and software resources and provides common services for computer programs.

  • An operating system acts as an intermediary between the user and the computer hardware.

  • It provides a user-friendly interface for interacting with the computer.

  • It manages the allocation of resources such as memory, processing power, and storage.

  • Examples of operating systems include Windows, macOS, Linux, and Android.

Frequently asked in, ,

Q48. what is AD? What is DHCP?

Ans.

AD stands for Active Directory, a Microsoft technology used for managing users, computers, and other resources in a network. DHCP stands for Dynamic Host Configuration Protocol, a network protocol used for assigning IP addresses to devices.

  • AD is used for centralized management of network resources

  • AD allows for authentication and authorization of users and devices

  • DHCP automatically assigns IP addresses to devices on a network

  • DHCP reduces the need for manual IP address configur...read more

Q49. Different types of RAM

Ans.

Different types of RAM include DDR, DDR2, DDR3, DDR4, and LPDDR.

  • DDR (Double Data Rate)

  • DDR2 (Double Data Rate 2)

  • DDR3 (Double Data Rate 3)

  • DDR4 (Double Data Rate 4)

  • LPDDR (Low Power Double Data Rate)

Q50. Difference between IPV4 vs IPV6

Ans.

IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses, allowing for more unique addresses and improved security features.

  • IPv4 addresses are written in decimal format (e.g. 192.168.1.1) while IPv6 addresses are written in hexadecimal format (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334)

  • IPv4 supports up to 4.3 billion unique addresses, which is becoming insufficient with the growth of internet-connected devices, while IPv6 supports 340 undecillion unique addresses

  • IPv4 us...read more

1
2
Next
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions for Desktop Support Engineer L2 Related Skills

Interview experiences of popular companies

3.7
 • 5.2k Interviews
3.6
 • 3.7k Interviews
3.9
 • 2.9k Interviews
4.0
 • 475 Interviews
3.8
 • 163 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Desktop Support Engineer L2 Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter