Desktop Support Engineer L2
50+ Desktop Support Engineer L2 Interview Questions and Answers
Q1. What step you will taken after getting any system infected with virus?
After getting a system infected with a virus, the first step is to isolate the infected system from the network.
Isolate the infected system from the network to prevent further spread of the virus
Disconnect the infected system from the internet
Disable any network connections on the infected system
Notify the IT security team about the infection
Run a full system scan using an updated antivirus software
Quarantine and remove any identified malware or viruses
Restore the system from...read more
Q2. What is pop and imap and smtp and all protocol port number
POP, IMAP, and SMTP are email protocols used for sending and receiving emails. Each protocol uses different port numbers.
POP (Post Office Protocol) is used for downloading emails from a server to a client. It uses port number 110.
IMAP (Internet Message Access Protocol) is used for accessing emails on a server from a client. It uses port number 143.
SMTP (Simple Mail Transfer Protocol) is used for sending emails from a client to a server. It uses port number 25.
Secure versions ...read more
Desktop Support Engineer L2 Interview Questions and Answers for Freshers
Q3. What is active directory and what is the use of active directory?
Active Directory is a directory service developed by Microsoft for Windows domain networks.
Centralized database for managing network resources
Stores information about users, computers, and other network objects
Allows administrators to control access and permissions
Facilitates single sign-on for users across network services
Enables group policy management for network-wide settings
Q4. What are the levels of Office 365 Administration?
The levels of Office 365 Administration include Global Administrator, Billing Administrator, User Management Administrator, etc.
Global Administrator has full control over all aspects of Office 365 administration
Billing Administrator manages the billing and subscription aspects of Office 365
User Management Administrator handles user accounts and permissions
Exchange Administrator manages Exchange Online
SharePoint Administrator handles SharePoint Online
Security Administrator man...read more
Q5. If company give you a proper growth every year so how long you will work on same company
I would work for the company as long as I feel challenged and fulfilled in my role.
I value professional growth and development, so I would stay with a company that provides opportunities for advancement.
If I feel that I have reached a plateau in my current role and there are no opportunities for growth, I may consider exploring other options.
However, if I am consistently challenged and engaged in my work, I would be happy to stay with the company for many years.
Ultimately, my...read more
Q6. How to install proxy certificate in user's machine?
To install a proxy certificate in a user's machine, you need to import the certificate into the user's browser or operating system.
Export the proxy certificate from the source (e.g. email, website)
Import the certificate into the user's browser or operating system settings
Verify the installation by accessing a website that requires the proxy certificate
Share interview questions and help millions of jobseekers 🌟
Q7. What is blue screen of death and how to fix BSOD?
Blue Screen of Death (BSOD) is a Windows operating system error screen that appears when a system encounters a critical error.
BSOD is a stop error screen that appears when the Windows operating system encounters a critical error that it cannot recover from.
Common causes of BSOD include hardware failures, driver issues, software conflicts, and corrupt system files.
To fix BSOD, you can try restarting the computer, checking for hardware issues, updating drivers, running system d...read more
Q8. how can you solve a bluescreen error?
Bluescreen errors can be solved by identifying the root cause and taking appropriate actions.
Check for any recent hardware or software changes
Run a virus scan and check for malware
Update drivers and operating system
Check for overheating or hardware failures
Restore system to a previous working state
If all else fails, reinstall the operating system
Desktop Support Engineer L2 Jobs
Q9. What is pst and ost in outlook What is bsod what is dns what is vpn.
PST and OST are Outlook data files. BSOD is Blue Screen of Death. DNS is Domain Name System. VPN is Virtual Private Network.
PST and OST are data files used by Microsoft Outlook to store emails, contacts, and other data.
BSOD is a critical error screen displayed by Windows operating system when it encounters a system error.
DNS is a system that translates domain names into IP addresses, allowing computers to communicate with each other over the internet.
VPN is a secure connectio...read more
Q10. What is the colour coding of cross cable?
The colour coding of a cross cable is different on each end to allow for direct connection between two devices.
The colour coding on one end of the cross cable follows the T568A standard, while the other end follows the T568B standard
This allows for the direct connection of two devices without the need for a switch or hub in between
Commonly used for connecting two computers directly or connecting a computer to a printer
Q11. How to backup pst file My system is very slow so what do
To backup a PST file, you can simply copy and paste it to an external drive or cloud storage. To speed up a slow system, try cleaning up temporary files and disabling unnecessary startup programs.
Copy and paste the PST file to an external drive or cloud storage
Use a backup software to automate the backup process
Clean up temporary files to free up space and improve performance
Disable unnecessary startup programs to reduce the load on the system
Q12. how will you solve a hanging desktop.
I will troubleshoot the issue by checking for any running programs or processes that may be causing the hang.
Check for any running programs or processes that may be causing the hang
End any unresponsive programs or processes using Task Manager
Check for any hardware issues such as overheating or faulty RAM
Perform a virus scan to check for any malware or viruses
Update drivers and software to ensure they are up to date
Q13. What is different between router and switches?
Routers connect different networks, switches connect devices within a network.
Routers operate at the network layer and use IP addresses to forward packets between networks.
Switches operate at the data link layer and use MAC addresses to forward frames within a network.
Routers can prioritize traffic and perform network address translation (NAT).
Switches can create virtual LANs (VLANs) to segment a network.
Example of a router: Cisco ISR 4000 series.
Example of a switch: Cisco Ca...read more
Q14. How to configure one router to other router connectivity
To configure connectivity between two routers, you need to set up routing protocols and configure IP addresses.
Configure IP addresses on each router interface
Choose a routing protocol (e.g. OSPF, EIGRP) and configure it on both routers
Ensure both routers are in the same network or have a route to reach each other
Test connectivity using ping or traceroute commands
Q15. How to configur sap in users system
To configure SAP in user's system, follow these steps:
Install SAP GUI on the user's system
Configure the SAP logon pad with the necessary system details
Create a user ID and assign the necessary authorizations
Test the connection to ensure successful configuration
Q16. What is different between windows 10 and windows 7
Windows 10 has a more modern interface, better security features, and improved performance compared to Windows 7.
Windows 10 has a Start menu with live tiles, while Windows 7 has a traditional Start menu.
Windows 10 has Cortana, a virtual assistant, while Windows 7 does not.
Windows 10 has better security features such as Windows Hello, biometric authentication, and improved Windows Defender.
Windows 10 has improved performance and faster boot times compared to Windows 7.
Windows ...read more
Q17. What is the process migration office365
The process of migrating to Office 365 involves planning, preparation, and execution.
Assess current infrastructure and identify migration goals
Prepare for migration by ensuring compatibility and setting up necessary accounts
Execute migration by transferring data and configuring settings
Test and verify successful migration
Train users on new system and provide ongoing support
Examples of migration tools include Microsoft's Migration Manager and third-party solutions like SkyKick
Q18. What is DHCP and how does it work?
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices on a network.
DHCP server assigns IP addresses to devices on a network
Helps in reducing manual configuration of IP addresses
DHCP lease time determines how long an IP address is valid for
DHCP Discover, Offer, Request, Acknowledge (DORA) process
Example: When a device connects to a network, it sends a DHCP Discover message to find a DHCP server
Q19. What is the use of default gateway?
Default gateway is a network device that connects different networks together, allowing devices on one network to communicate with devices on another network.
Default gateway is usually the IP address of the router that connects a local network to the internet.
It acts as an entry and exit point for network traffic between different networks.
Without a default gateway, devices on a network would not be able to communicate with devices on other networks.
It helps in routing networ...read more
Q20. How to bulk wipe in mdm intune
Bulk wipe in mdm intune
Navigate to Intune portal and select Devices
Select the devices you want to wipe
Click on the 'Wipe' button and confirm the action
The devices will be wiped in bulk
Q21. What difference between pst and ost
PST is a personal storage table used by Outlook to store email data while OST is an offline storage table used for cached Exchange mode.
PST is a file format used by Microsoft Outlook to store email data on a local computer
OST is an offline storage table used for cached Exchange mode
PST files can be imported and exported while OST files cannot
PST files can be accessed even without an internet connection while OST files require a connection to the Exchange server
PST files have ...read more
Q22. What is the use of IP address?
IP address is a unique numerical label assigned to each device connected to a computer network.
Identifies devices on a network
Facilitates communication between devices
Allows devices to send and receive data packets
Can be IPv4 (e.g. 192.168.1.1) or IPv6 (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334)
Q23. What is the use of VPN?
VPN is a technology that allows users to securely connect to a private network over the internet.
VPN encrypts data to ensure privacy and security
It allows users to access resources on a private network remotely
Commonly used for remote work, accessing geo-restricted content, and enhancing online security
Examples include NordVPN, ExpressVPN, and Cisco AnyConnect
Q24. what will you do if outlook not open?
Check for any error messages, restart Outlook, verify network connectivity, repair or reinstall Outlook if necessary.
Check for any error messages displayed when trying to open Outlook
Restart Outlook and see if it opens successfully
Verify network connectivity to ensure Outlook can connect to the mail server
If the issue persists, repair or reinstall Outlook
Check for any recent updates or changes that may have caused the issue
Q25. What is the use of DNS?
DNS is a system that translates domain names to IP addresses, allowing users to access websites using human-readable names.
DNS stands for Domain Name System
It helps in translating domain names (like www.google.com) to IP addresses (like 172.217.3.206)
DNS is crucial for internet functionality as it allows users to access websites using easy-to-remember names
Q26. Do you know how to install software
Yes, I know how to install software on various operating systems.
I am familiar with the installation process on Windows, Mac, and Linux systems.
I can follow installation instructions provided by software vendors.
I am experienced in troubleshooting installation issues such as compatibility errors or missing dependencies.
Q27. What is the outlook and how to configure
Outlook is an email client developed by Microsoft. It can be configured by adding email accounts and setting up server settings.
To configure Outlook, open the application and click on File > Add Account
Enter your email address and password, and Outlook will automatically detect the server settings
If the server settings are not detected, you can manually configure them by selecting the option 'Manual setup or additional server types'
Common server settings include incoming and ...read more
Q28. What is the process of mfa
MFA stands for Multi-Factor Authentication, which is a security process that requires users to provide two or more forms of identification to access a system.
MFA adds an extra layer of security to protect against unauthorized access.
The most common forms of identification used in MFA are passwords, security tokens, and biometric data.
MFA can be implemented through various methods such as SMS codes, mobile apps, or hardware tokens.
MFA is becoming increasingly important in toda...read more
Q29. Defferent between offline outlook and online outlook?
Offline Outlook allows users to access emails without an internet connection, while Online Outlook requires an internet connection to access emails.
Offline Outlook stores emails locally on the user's device, allowing access without internet connectivity.
Online Outlook requires an active internet connection to access emails stored on the server.
Offline Outlook is useful for users who need to access emails while traveling or in areas with limited internet connectivity.
Online Ou...read more
Q30. What is a public network IP range
A public network IP range is a range of IP addresses that are accessible from the internet.
Public network IP ranges are assigned by Internet Assigned Numbers Authority (IANA)
Examples of public IP ranges include 1.0.0.0 to 126.255.255.255 for Class A, 128.0.0.0 to 191.255.255.255 for Class B, and 192.0.0.0 to 223.255.255.255 for Class C
Public IP addresses are unique and globally routable
Q31. Can you join system into domain
Yes, I can join a system into a domain.
Yes, I have experience joining systems into domains using Active Directory.
I understand the process of adding a computer to a domain and configuring domain settings.
I can troubleshoot any issues that may arise during the domain joining process.
Q32. What is Tenant in Office 365
Tenant in Office 365 refers to a group of users who share a common access with specific privileges.
A tenant is a dedicated instance of Office 365 that an organization subscribes to.
It includes a unique domain name, user accounts, and a set of services and features.
Each tenant has its own security and compliance policies, and can be managed by a global administrator.
Multiple tenants can be managed by a single Office 365 account.
Examples of tenants include businesses, schools, ...read more
Q33. Why bitlocker is important
Bitlocker is important for securing data on Windows devices.
Encrypts data on Windows devices to prevent unauthorized access
Protects against theft or loss of devices
Meets compliance requirements for data protection
Can be managed centrally through Active Directory
Can be used in combination with other security measures like TPM and Secure Boot
Helps prevent data breaches and protects sensitive information
Q34. What is your fature plan?
My future plan is to continue growing my skills and knowledge in the IT field, with a focus on becoming an expert in cloud computing.
I plan to take courses and certifications in cloud computing
I want to gain hands-on experience with cloud platforms like AWS and Azure
I hope to eventually become a cloud architect or engineer
I also plan to stay up-to-date with emerging technologies and industry trends
Q35. How to rejoin in Domain
To rejoin a computer in a domain, follow these steps:
Open System Properties and click on the 'Computer Name' tab
Click on the 'Change' button and select the 'Domain' option
Enter the domain name and provide the credentials of a domain user with appropriate permissions
Restart the computer for the changes to take effect
Q36. Describe Hostfile and responsibilities?
Hostfile is a plain text file that maps hostnames to IP addresses.
Hostfile is used by the operating system to resolve domain names to IP addresses.
It can be edited manually to add or remove entries.
It can also be used to block access to certain websites by redirecting them to a different IP address.
Hostfile is located in different directories depending on the operating system. For example, in Windows it is located in C:\Windows\System32\drivers\etc\hosts.
Hostfile can also be ...read more
Q37. What is Active Directory
Active Directory is a Microsoft service that manages network resources and user accounts.
It is used to authenticate and authorize users and computers in a Windows domain network.
It provides a centralized location for managing and storing information about network resources such as servers, printers, and applications.
It allows administrators to assign policies, deploy software, and apply security settings to all devices and users in the network.
It uses a hierarchical structure...read more
Q38. What is the outlook 365
Outlook 365 is a cloud-based email and calendar service provided by Microsoft.
It allows users to access their emails, contacts, and calendars from anywhere with an internet connection.
It offers features such as shared calendars, task management, and email scheduling.
It integrates with other Microsoft Office applications such as Word, Excel, and PowerPoint.
It provides a large amount of storage space for emails and attachments.
It offers various security features to protect user...read more
Q39. Advantages of outlook 365
Outlook 365 offers numerous advantages for users.
Access to emails, contacts, and calendar from anywhere with internet connection
Collaboration and sharing features for team projects
Integration with other Microsoft Office applications
Automatic updates and security features
Large storage capacity for emails and attachments
Mobile app for easy access on-the-go
Q40. What is dns? Domain name system
DNS stands for Domain Name System. It is a decentralized naming system that translates domain names into IP addresses.
DNS is used to resolve domain names to their corresponding IP addresses.
It helps in the efficient routing of internet traffic by translating human-readable domain names into machine-readable IP addresses.
DNS operates through a hierarchical structure of name servers that store and distribute domain name information.
It plays a crucial role in the functioning of ...read more
Q41. How will you install the OS
I will install the OS using a bootable installation media or network deployment tools.
Create a bootable installation media (USB or DVD) with the OS image
Boot the computer from the installation media
Follow the on-screen instructions to install the OS
Configure settings such as language, time zone, and user accounts
Install necessary drivers and updates post installation
Q42. What is Subnet mask?
Subnet mask is a 32-bit number used to identify the network and host portions of an IP address.
It is used to divide an IP address into network and host portions.
It is represented in decimal format, like 255.255.255.0.
It is used in conjunction with IP addresses to determine network and host addresses.
It is used in routing decisions to determine the best path for network traffic.
Q43. Can you configure outlook
Yes, I can configure Outlook for users on their computers.
I can set up email accounts, configure server settings, and troubleshoot any issues that may arise.
I am familiar with setting up email signatures, rules, and folders in Outlook.
I can also assist with importing/exporting contacts and calendar events.
I have experience with setting up Outlook on mobile devices as well.
Q44. Can you take mail backup
Yes, I can take mail backup using tools like Outlook, Thunderbird, or third-party backup software.
I can use email clients like Outlook or Thunderbird to manually backup emails and attachments.
I can also use third-party backup software like MailStore or CodeTwo to automate the backup process.
It's important to regularly backup emails to prevent data loss in case of system failure or accidental deletion.
Q45. Difference between cat5 and cat6
Cat5 supports up to 100 Mbps while Cat6 supports up to 10 Gbps.
Cat5 has a maximum bandwidth of 100 MHz while Cat6 has a maximum bandwidth of 250 MHz.
Cat6 has stricter specifications for crosstalk and system noise compared to Cat5.
Cat6 cables are thicker and less flexible than Cat5 cables.
Cat6 cables are more expensive than Cat5 cables.
Cat6 is recommended for high-speed data transfers and larger networks.
Cat5 is suitable for basic home and office networks.
Q46. Windows os full information
Windows OS is a popular operating system developed by Microsoft.
Windows OS is available in different versions such as Windows 7, 8, 10, etc.
It has a graphical user interface (GUI) and supports multitasking.
Windows OS supports various file systems such as NTFS, FAT32, exFAT, etc.
It comes with built-in applications such as Microsoft Office, Internet Explorer, Windows Media Player, etc.
Windows OS can be customized with themes, wallpapers, and screensavers.
It supports different t...read more
Q47. What is operating system
An operating system is a software that manages computer hardware and software resources and provides common services for computer programs.
An operating system acts as an intermediary between the user and the computer hardware.
It provides a user-friendly interface for interacting with the computer.
It manages the allocation of resources such as memory, processing power, and storage.
Examples of operating systems include Windows, macOS, Linux, and Android.
Q48. what is AD? What is DHCP?
AD stands for Active Directory, a Microsoft technology used for managing users, computers, and other resources in a network. DHCP stands for Dynamic Host Configuration Protocol, a network protocol used for assigning IP addresses to devices.
AD is used for centralized management of network resources
AD allows for authentication and authorization of users and devices
DHCP automatically assigns IP addresses to devices on a network
DHCP reduces the need for manual IP address configur...read more
Q49. Different types of RAM
Different types of RAM include DDR, DDR2, DDR3, DDR4, and LPDDR.
DDR (Double Data Rate)
DDR2 (Double Data Rate 2)
DDR3 (Double Data Rate 3)
DDR4 (Double Data Rate 4)
LPDDR (Low Power Double Data Rate)
Q50. Difference between IPV4 vs IPV6
IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses, allowing for more unique addresses and improved security features.
IPv4 addresses are written in decimal format (e.g. 192.168.1.1) while IPv6 addresses are written in hexadecimal format (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334)
IPv4 supports up to 4.3 billion unique addresses, which is becoming insufficient with the growth of internet-connected devices, while IPv6 supports 340 undecillion unique addresses
IPv4 us...read more
Top Interview Questions for Desktop Support Engineer L2 Related Skills
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month