Desktop Support Engineer
700+ Desktop Support Engineer Interview Questions and Answers

Asked in HCLTech

Q. What is APIPA? WHAT IS SUBNETMASK? DIFFERENCE BETWEEB IPv4 and IPv6. How many types of os installation? What is BIOS AND what is use of CMOS BATTARY? WHST IS HDD and how many types of HDD? How to shot SMPS AND...
read moreA set of technical questions related to desktop support engineering.
APIPA is Automatic Private IP Addressing used when DHCP server is not available.
Subnet mask is used to divide an IP address into network and host portions.
IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses.
There are two types of OS installation: clean installation and upgrade installation.
BIOS is a firmware that initializes hardware during bootup. CMOS battery is used to power the BIOS settings.
HDD ...read more

Asked in HCLTech

Q. Diffrence between router and switch? Differnce between TCP AND UDP? what is port no. Of SMTP AND POP3? What is Printer? How to add new printer? What is BSOD? HOW to fix it? How to take backup of data in outlook...
read moreQuestions related to networking and technical support.
Router connects multiple networks and switches connect devices within a network.
TCP is a connection-oriented protocol while UDP is connectionless.
SMTP uses port number 25 and POP3 uses port number 110.
Printer is a device that produces a hard copy of digital documents.
To add a new printer, go to Control Panel > Devices and Printers > Add a Printer.
BSOD (Blue Screen of Death) is an error screen displayed on Windows systems.
T...read more
Desktop Support Engineer Interview Questions and Answers for Freshers

Asked in HCLTech

Q. What is outlook?, how to configure outlook?
Outlook is a personal information manager from Microsoft used for email, calendar, contacts, and tasks.
Open Outlook and click on File > Add Account
Enter your email address and password
Follow the prompts to complete the setup
Configure server settings if necessary
Test the account to ensure it is working properly

Asked in Tech Mahindra

Q. 1) What is Difference between shared printer and network printer?
A shared printer is connected to a single computer and can be accessed by other computers on the same network. A network printer is directly connected to the network and can be accessed by multiple computers.
Shared printer is connected to a single computer, while network printer is directly connected to the network.
Shared printer can be accessed by other computers on the same network, while network printer can be accessed by multiple computers.
Shared printer requires the comp...read more

Asked in Inspirisys Solution

Q. If the internet is not working, what troubleshooting options are available?
Troubleshooting options for internet connectivity issues.
Check if other devices are able to connect to the internet
Restart the router/modem
Check if the Ethernet cable is properly connected
Check if the Wi-Fi password is correct
Check if the DNS settings are correct
Run network troubleshooter
Disable and re-enable network adapter
Check for any software or firewall blocking internet access

Asked in CMS IT Services

Q. How can you determine the hostname of a client system from a remote system?
To know the hostname of a client system through a remote system, use the command prompt or PowerShell.
Open the command prompt or PowerShell on the remote system
Type 'nslookup
' The hostname of the client system will be displayed
Alternatively, use the 'ping -a
' command to display the hostname
Desktop Support Engineer Jobs




Asked in Wipro

Q. How to rectify data recovery, dual monitor connection
To rectify data recovery, dual monitor connection, check cables, update drivers, and use data recovery software.
Check cables and connections for dual monitor setup
Update drivers for graphics card and monitor
Use data recovery software to recover lost data
Ensure proper backup procedures are in place to prevent data loss

Asked in Wipro

Q. What steps would you take if your system was infected with malware, and how would you back up your data?
If infected with malware, isolate system, run antivirus scan, remove malware, backup data to external device.
Isolate infected system from network to prevent further spread of malware
Run antivirus scan to detect and remove malware
If antivirus scan fails, use malware removal tools or seek professional help
Backup important data to external device before attempting any fixes
Ensure backup device is not infected with malware before restoring data
Share interview questions and help millions of jobseekers 🌟

Asked in Tech Mahindra

Q. What are common technical issues encountered in Desktop Support Engineering?
Technical issues in Desktop Support Engineer involve hardware, software, network, and security problems.
Hardware issues such as malfunctioning components or peripherals
Software issues such as installation errors or compatibility problems
Network issues such as connectivity or configuration problems
Security issues such as malware infections or unauthorized access
Examples include printer not working, slow computer performance, and internet connection problems

Q. The OSI model has seven layers, as shown in Table 5.1. The layers may be listed in top-to-bottom or bottom-to-top order. Using the latter, they are Physical, Data Link, Network, Transport, Session, Presentation...
read moreThe OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The Physical layer is responsible for the physical transmission of data.
The Data Link layer provides error-free transmission of data frames between nodes on a network.
The Network layer handles routing and logical addressing.
The Transport layer ensures reliable delivery of data between end systems.
The Session layer establishes, manages, and terminates connections...read more

Asked in CMS IT Services

Q. Where can we find system and application error logs?
System and application error logs can be found in various locations.
System logs can be found in Event Viewer on Windows or Console on macOS.
Application logs can be found in the application's installation directory or in a designated log folder.
Third-party tools like Splunk or ELK can also be used to aggregate and analyze logs.
Logs can also be accessed remotely through SSH or other remote access protocols.

Asked in Axiom Technologies

Q. What's the difference types of mailboxes in Microsoft 365 and use of them? Mainly focused on Shared mailbox.
Different types of mailboxes in Microsoft 365 include user mailbox, shared mailbox, resource mailbox, and linked mailbox.
User mailbox: Assigned to individual users for sending and receiving emails.
Shared mailbox: Used by multiple users for collaboration, such as a team inbox.
Resource mailbox: Represents resources like conference rooms or equipment.
Linked mailbox: Associated with a user account in a separate, trusted forest.

Asked in CMS IT Services

Q. What is MAC address and IP address ?
MAC address is a unique identifier assigned to a network interface controller, while IP address is a numerical label assigned to devices connected to a network.
MAC address stands for Media Access Control address
It is a 48-bit address assigned to a network interface controller
It is used to identify devices on a network
IP address stands for Internet Protocol address
It is a numerical label assigned to devices connected to a network
It is used to identify devices and enable commun...read more

Asked in Wipro

Q. Os installed and networking , what is hardware
Hardware refers to the physical components of a computer system, such as the motherboard, CPU, RAM, and hard drive.
Hardware is the physical components that make up a computer system
Examples of hardware include the motherboard, CPU, RAM, hard drive, and network interface card
Hardware is essential for a computer system to function properly
Hardware can be upgraded or replaced to improve performance or fix issues
Asked in Sujata Computer's Pvt.ltd

Q. What is domain controller how to configure and how to add client machine in domain
A domain controller is a server that manages network security and authentication. To configure, install Active Directory Domain Services and promote server to domain controller. To add client machine, join it to the domain.
Domain controller manages network security and authentication
Install Active Directory Domain Services and promote server to domain controller
Add client machine to the domain by joining it
Use domain administrator credentials to configure and manage domain co...read more
Asked in Inayam Infotech

Q. What is the fix for corrupted boot files or a missing/corrupted Boot Manager?
To fix corrupted boot files or missing/corrupted Boot Manager, you can use the Windows Recovery Environment.
Boot into the Windows Recovery Environment using installation media or the Advanced Startup Options.
Select the appropriate language and keyboard layout.
Choose 'Troubleshoot' > 'Advanced options' > 'Command Prompt'.
Run the following commands: bootrec /fixboot, bootrec /fixmbr, bootrec /rebuildbcd.
Restart the computer and check if the issue is resolved.
Asked in Vinayak Compserve

Q. What is Ram? What is HDD.?? What is Motherboard??? How we connect Printer??? How to install OS?? How to Connect wifi printer?? What is IP Address??? Why Computer system display not showing?? PC autometcly resta...
read moreRam is a type of computer memory. HDD is a storage device. Motherboard connects all components. Printer connects via USB or Wi-Fi. OS installation requires booting from a disk or USB. Wi-Fi printer connects via Wi-Fi network. IP address is a unique identifier for devices on a network. Display issues can be caused by faulty hardware or software. Automatic restarts can be caused by hardware or software issues.
Ram is short-term memory that stores data for quick access
HDD is a lo...read more

Asked in Dixit Infotech Services

Q. What is uefi and legacy system? Ip ranges? Ticketing tool? How to check display is working or not? OS installation?
UEFI and Legacy system, IP ranges, ticketing tool, display check, and OS installation are important aspects of desktop support engineering.
UEFI (Unified Extensible Firmware Interface) is a modern firmware interface that replaces the traditional BIOS.
Legacy system refers to the traditional BIOS-based system.
IP ranges are a set of IP addresses that are used to identify devices on a network.
Ticketing tool is a software used to manage and track support requests.
To check if the di...read more

Asked in Amara Raja Group

Q. What is OSI layer and how many types of OSI layers are there and explain them
OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven distinct layers.
There are 7 types of OSI layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and interacts with the layers above and below it.
For example, the Physical layer deals with the physical connection between devices, while the Application layer de...read more

Q. What is DHCP AND DNS?
DHCP assigns IP addresses to devices on a network. DNS translates domain names to IP addresses.
DHCP stands for Dynamic Host Configuration Protocol
It automatically assigns IP addresses to devices on a network
DNS stands for Domain Name System
It translates domain names to IP addresses
DNS is used to access websites and other resources on the internet

Asked in Amara Raja Group

Q. What is VPN and how to configure it, why we use vpn and when.
VPN stands for Virtual Private Network. It is used to create a secure connection to another network over the internet.
VPN allows users to securely access a private network from a remote location
It encrypts data to ensure privacy and security
Common protocols used for VPN include PPTP, L2TP, IPsec, and OpenVPN
VPN can be configured on routers, computers, smartphones, and other devices
Organizations use VPN to allow employees to access internal resources securely from outside the ...read more

Asked in Nelito System

Q. How will you take backup from hard drive if OS get corrupted? How to backup C drive Data?
To backup data from a corrupted OS, connect the hard drive to another computer and use backup software or manually copy the files.
Remove the hard drive from the affected computer
Connect the hard drive to another computer using an external enclosure or adapter
Use backup software to create a backup of the data on the C drive
Alternatively, manually copy the important files and folders from the C drive to another storage device

Asked in Axiom Technologies

Q. What could be the reasons for being unable to configure a profile on Outlook?
The reason behind being unable to configure a profile on Outlook could be due to incorrect server settings, network issues, or account permissions.
Incorrect server settings such as wrong server address or port number
Network issues like poor internet connection or firewall blocking access
Account permissions not set up correctly

Asked in Axiom Technologies

Q. What is the use of a static IP address within an organization network?
Static IP addresses are used within an organization network to provide a consistent and fixed address for devices.
Static IP addresses are used for devices that require constant access and need to be easily identifiable on the network.
They are helpful for servers, printers, and other network devices that need to be accessed remotely.
Static IP addresses can also be used for security purposes, as they are less susceptible to hacking compared to dynamic IP addresses.
They provide ...read more

Asked in Inspirisys Solution

Q. What are the different types of priorities in an SLA?
SLA priorities include critical, high, medium, and low.
Critical priority is for issues that require immediate attention and resolution.
High priority is for issues that are important but not as urgent as critical issues.
Medium priority is for issues that are important but can wait for a little while.
Low priority is for issues that are not urgent and can be resolved at a later time.
SLA priorities are usually defined in terms of response time and resolution time.
For example, a c...read more

Asked in 3i Infotech

Q. What is a BSOD error in Windows?
BSOD stands for Blue Screen of Death. It is an error screen displayed on Windows operating systems when a fatal system error occurs.
BSOD is a critical error that causes the computer to crash and display a blue screen with error codes.
It is usually caused by hardware or software issues, such as faulty drivers, incompatible software, or hardware failures.
BSOD can prevent the computer from booting up properly and may require troubleshooting or repair.
Common BSOD error codes incl...read more

Asked in Axiom Technologies

Q. What's the difference b/w ost and ost? What's their default port number?
OST stands for Open Systems Technologies and is a file format used by Microsoft Outlook. OST stands for OutSystems Technology and is a low-code platform.
OST (Open Systems Technologies) is a file format used by Microsoft Outlook to store a copy of mailbox data from an Exchange Server. It allows users to access their emails, contacts, and calendar items offline.
OST (OutSystems Technology) is a low-code platform that enables organizations to develop, deploy, and manage enterpris...read more
Asked in INCA INFOTECH TECHNOLOGIES

Q. What is a switch, and what are the use cases for manageable and non-manageable cables?
A switch is a networking device used to connect multiple devices within a network. Manageable switches allow for configuration and monitoring, while non-manageable switches do not.
Switch is a networking device that connects multiple devices within a network
Manageable switches allow for configuration and monitoring of network traffic
Non-manageable switches do not offer configuration options and are plug-and-play
Examples of manageable switches include Cisco Catalyst series, whi...read more

Asked in Wipro

Q. Are you familiar with DHCP and how it works?
DHCP is a network protocol that assigns IP addresses automatically to devices on a network.
DHCP stands for Dynamic Host Configuration Protocol
It allows devices to obtain IP addresses, subnet masks, default gateways, and DNS servers automatically
DHCP servers lease IP addresses to devices for a specific period of time
DHCP reduces the need for manual IP address configuration
Example: When a device connects to a Wi-Fi network, DHCP assigns it an IP address from the available pool

Asked in Team Computers

Q. how to configured outlook in laptop and net connectivity issue qui
To configure Outlook in a laptop, ensure proper internet connectivity and follow the setup wizard. Troubleshoot connectivity issues by checking network settings and firewall.
Ensure internet connectivity is available
Open Outlook and follow the setup wizard
Enter email address and password
Configure server settings
Check network settings and firewall for connectivity issues
Interview Questions of Similar Designations
Interview Experiences of Popular Companies





Top Interview Questions for Desktop Support Engineer Related Skills



Reviews
Interviews
Salaries
Users

