Desktop Support Engineer
100+ Desktop Support Engineer Interview Questions and Answers for Freshers
Q1. 1) What is Difference between shared printer and network printer?
A shared printer is connected to a single computer and can be accessed by other computers on the same network. A network printer is directly connected to the network and can be accessed by multiple computers.
Shared printer is connected to a single computer, while network printer is directly connected to the network.
Shared printer can be accessed by other computers on the same network, while network printer can be accessed by multiple computers.
Shared printer requires the comp...read more
Q2. What is technical issue in Desktop support Engineer
Technical issues in Desktop Support Engineer involve hardware, software, network, and security problems.
Hardware issues such as malfunctioning components or peripherals
Software issues such as installation errors or compatibility problems
Network issues such as connectivity or configuration problems
Security issues such as malware infections or unauthorized access
Examples include printer not working, slow computer performance, and internet connection problems
Q3. What's the difference types of mailboxes in Microsoft 365 and use of them? Mainly focused on Shared mailbox.
Different types of mailboxes in Microsoft 365 include user mailbox, shared mailbox, resource mailbox, and linked mailbox.
User mailbox: Assigned to individual users for sending and receiving emails.
Shared mailbox: Used by multiple users for collaboration, such as a team inbox.
Resource mailbox: Represents resources like conference rooms or equipment.
Linked mailbox: Associated with a user account in a separate, trusted forest.
Q4. What is domain controller how to configure and how to add client machine in domain
A domain controller is a server that manages network security and authentication. To configure, install Active Directory Domain Services and promote server to domain controller. To add client machine, join it to the domain.
Domain controller manages network security and authentication
Install Active Directory Domain Services and promote server to domain controller
Add client machine to the domain by joining it
Use domain administrator credentials to configure and manage domain co...read more
Q5. What is Ram? What is HDD.?? What is Motherboard??? How we connect Printer??? How to install OS?? How to Connect wifi printer?? What is IP Address??? Why Computer system display not showing?? PC autometcly resta...
read moreRam is a type of computer memory. HDD is a storage device. Motherboard connects all components. Printer connects via USB or Wi-Fi. OS installation requires booting from a disk or USB. Wi-Fi printer connects via Wi-Fi network. IP address is a unique identifier for devices on a network. Display issues can be caused by faulty hardware or software. Automatic restarts can be caused by hardware or software issues.
Ram is short-term memory that stores data for quick access
HDD is a lo...read more
Q6. What is uefi and legacy system? Ip ranges? Ticketing tool? How to check display is working or not? OS installation?
UEFI and Legacy system, IP ranges, ticketing tool, display check, and OS installation are important aspects of desktop support engineering.
UEFI (Unified Extensible Firmware Interface) is a modern firmware interface that replaces the traditional BIOS.
Legacy system refers to the traditional BIOS-based system.
IP ranges are a set of IP addresses that are used to identify devices on a network.
Ticketing tool is a software used to manage and track support requests.
To check if the di...read more
Share interview questions and help millions of jobseekers 🌟
Q7. What is OSI layer and how many types of OSI layers are there and explain them
OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven distinct layers.
There are 7 types of OSI layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and interacts with the layers above and below it.
For example, the Physical layer deals with the physical connection between devices, while the Application layer de...read more
Q8. What is VPN and how to configure it, why we use vpn and when.
VPN stands for Virtual Private Network. It is used to create a secure connection to another network over the internet.
VPN allows users to securely access a private network from a remote location
It encrypts data to ensure privacy and security
Common protocols used for VPN include PPTP, L2TP, IPsec, and OpenVPN
VPN can be configured on routers, computers, smartphones, and other devices
Organizations use VPN to allow employees to access internal resources securely from outside the ...read more
Desktop Support Engineer Jobs
Q9. What is BSOD error in windows?
BSOD stands for Blue Screen of Death. It is an error screen displayed on Windows operating systems when a fatal system error occurs.
BSOD is a critical error that causes the computer to crash and display a blue screen with error codes.
It is usually caused by hardware or software issues, such as faulty drivers, incompatible software, or hardware failures.
BSOD can prevent the computer from booting up properly and may require troubleshooting or repair.
Common BSOD error codes incl...read more
Q10. What's the reason behind if you are unable to configure a profile on Outlook?
The reason behind being unable to configure a profile on Outlook could be due to incorrect server settings, network issues, or account permissions.
Incorrect server settings such as wrong server address or port number
Network issues like poor internet connection or firewall blocking access
Account permissions not set up correctly
Q11. What's the use of static IP Address within an organization n/w?
Static IP addresses are used within an organization network to provide a consistent and fixed address for devices.
Static IP addresses are used for devices that require constant access and need to be easily identifiable on the network.
They are helpful for servers, printers, and other network devices that need to be accessed remotely.
Static IP addresses can also be used for security purposes, as they are less susceptible to hacking compared to dynamic IP addresses.
They provide ...read more
Q12. What's the difference b/w ost and ost? What's their default port number?
OST stands for Open Systems Technologies and is a file format used by Microsoft Outlook. OST stands for OutSystems Technology and is a low-code platform.
OST (Open Systems Technologies) is a file format used by Microsoft Outlook to store a copy of mailbox data from an Exchange Server. It allows users to access their emails, contacts, and calendar items offline.
OST (OutSystems Technology) is a low-code platform that enables organizations to develop, deploy, and manage enterpris...read more
Q13. What is MBR pation and gpt partition what is DHCP server
MBR and GPT are partitioning schemes used on hard drives. DHCP server assigns IP addresses to devices on a network.
MBR (Master Boot Record) and GPT (GUID Partition Table) are two different partitioning schemes used on hard drives.
MBR is an older partitioning scheme that has limitations on the number and size of partitions that can be created.
GPT is a newer partitioning scheme that allows for larger partitions and more partitions overall.
DHCP (Dynamic Host Configuration Protoc...read more
Q14. What the difference b/w Office 364 and Microsoft 365?
Office 364 is a typo, the correct comparison is between Office 365 and Microsoft 365.
Office 365 is a cloud-based subscription service that includes access to Office applications like Word, Excel, and PowerPoint, as well as other productivity services.
Microsoft 365 is a bundle that includes Office 365, Windows 10, and Enterprise Mobility + Security.
Microsoft 365 offers additional security and management features compared to Office 365.
Office 365 is more focused on productivity...read more
Q15. What's the difference b/w one drive and SharePoint site?
OneDrive is a personal file storage service while SharePoint is a collaborative platform for teams to share and manage content.
OneDrive is primarily for personal file storage and sharing, while SharePoint is designed for team collaboration and content management.
OneDrive is more suitable for individual users to store and access their own files, while SharePoint allows teams to work together on documents, projects, and tasks.
SharePoint offers features like document libraries, ...read more
Q16. What's the difference b/w private and public IP address?
Private IP addresses are used within a network for internal communication, while public IP addresses are used to communicate over the internet.
Private IP addresses are reserved for use within a private network and are not routable on the internet.
Public IP addresses are assigned by Internet Service Providers (ISPs) and are used for communication over the internet.
Examples of private IP address ranges include 192.168.0.0 - 192.168.255.255 and 10.0.0.0 - 10.255.255.255.
An examp...read more
Q17. 1. What is Active directory.
Active Directory is a directory service developed by Microsoft that provides centralized management of network resources.
Active Directory is used to store information about network objects such as users, computers, and groups.
It allows administrators to manage and control access to resources in a network environment.
Active Directory uses a hierarchical structure with domains, trees, and forests.
It supports authentication and authorization processes for users and computers.
Act...read more
Q18. What is PST and how to configure and why use pst
PST stands for Personal Storage Table, used to store email messages, calendar events, and other items in Microsoft Outlook.
PST is a file format used by Microsoft Outlook to store email messages, calendar events, and other items locally on a user's computer.
To configure a PST file in Outlook, go to File > Account Settings > Data Files and add a new PST file.
PST files are commonly used to backup or archive emails, organize messages into folders, or store emails offline.
Using PS...read more
Q19. What is AADS and what group policy management of server 2012
AADS stands for Apple Advanced Directory Services. Group Policy Management is a feature of Windows Server 2012.
AADS is a set of tools and services that allow Mac computers to integrate with Microsoft Active Directory.
Group Policy Management is used to manage and enforce group policies across a network of computers.
Server 2012 includes new features for Group Policy Management, such as the ability to manage policies for Windows 8 and Windows Server 2012.
AADS and Group Policy Ma...read more
Q20. 3) What is dora process?
DORA (Discover Offer Request Acknowledge) is a process used by DHCP to assign IP addresses to devices on a network.
DORA stands for Discover, Offer, Request, and Acknowledge.
It is a four-step process used by DHCP to assign IP addresses to devices on a network.
The Discover message is sent by the client to request an IP address.
The Offer message is sent by the server with an available IP address.
The Request message is sent by the client to request the offered IP address.
The Ackn...read more
Q21. What type of networking will use in organizations
Organizations typically use a combination of wired and wireless networking technologies to meet their networking needs.
Organizations commonly use Ethernet for wired networking within their premises
Wireless networking technologies such as Wi-Fi are also widely used for providing connectivity to devices
Virtual Private Networks (VPNs) are used for secure remote access to organizational resources
Fiber optic cables may be used for high-speed data transmission over long distances
Ne...read more
Q22. What in Networking and what are the types
Networking is the practice of connecting computers and other devices to share resources. Types include LAN, WAN, WLAN, MAN, and PAN.
Local Area Network (LAN) - connects devices within a limited area like a home or office
Wide Area Network (WAN) - connects devices over a large geographical area, often using public infrastructure like the internet
Wireless Local Area Network (WLAN) - uses wireless technology to connect devices within a limited area
Metropolitan Area Network (MAN) -...read more
Q23. What is OS and how you install in a system
OS stands for Operating System. It is a software that manages computer hardware and provides common services for computer programs.
An OS is the most important software that runs on a computer.
It manages the computer's memory, processes, and all of its software and hardware.
To install an OS, you typically need to boot from a installation media such as a CD, DVD, or USB drive.
During installation, you will be prompted to choose the installation location, language, and other sett...read more
Q24. What is ticketing tool? Describe that??
A ticketing tool is a software used to manage and track customer support requests or incidents.
It allows users to submit tickets or requests for assistance.
It assigns tickets to appropriate support staff for resolution.
It tracks the status and progress of each ticket until it is resolved.
It provides reporting and analytics on ticket volume, resolution time, and customer satisfaction.
Examples include ServiceNow, JIRA Service Desk, and Zendesk.
Q25. How to install operating system?
To install an operating system, you need to boot from a bootable media and follow the installation wizard.
Create a bootable media (USB, DVD, etc.) with the operating system image
Insert the bootable media into the computer and restart it
Press the key to enter the boot menu (usually F12 or Del)
Select the bootable media from the list of boot devices
Follow the installation wizard and choose the installation options (language, partition, etc.)
Wait for the installation to complete ...read more
Q26. What is VM ware to create a virtual machine
VMware is a software that allows you to create and run virtual machines on a physical computer.
VMware is a virtualization software that creates a virtual environment on a physical computer.
It allows you to run multiple operating systems on a single machine.
VMware creates a virtual machine that acts like a real computer with its own CPU, memory, and storage.
It is commonly used in data centers to consolidate servers and reduce hardware costs.
Examples of VMware products include ...read more
Q27. 2) Tell any 5 dos commands?
DOS commands are essential for troubleshooting and managing Windows systems. Here are five commonly used commands.
DIR - displays a list of files and subdirectories in a directory
CD - changes the current directory
MD - creates a new directory
COPY - copies one or more files to another location
DEL - deletes one or more files
Q28. What is the latest OS?
The latest OS is macOS Big Sur (11.0.1) for Mac and Windows 10 (20H2) for PC.
macOS Big Sur was released on November 12, 2020 and features a redesigned interface and improved performance.
Windows 10 (20H2) was released on October 20, 2020 and includes new features like a refreshed Start menu and improved notifications.
Other recent OS releases include iOS 14 for Apple mobile devices and Android 11 for Android devices.
Q29. How configure DNS and concept of DNS server
DNS is a system that translates domain names to IP addresses. DNS server is a computer that stores DNS records.
DNS stands for Domain Name System
DNS server stores DNS records which contain information about domain names and their corresponding IP addresses
DNS resolution process involves querying DNS servers to find the IP address of a domain name
DNS can be configured on a local network or on a public network
DNS can be configured using tools like DNS Manager, PowerShell, or com...read more
Q30. 4) what is ITIL?
ITIL stands for Information Technology Infrastructure Library. It is a framework for IT service management.
ITIL provides guidelines for IT service management processes and procedures.
It helps organizations to align their IT services with business needs.
ITIL consists of five core publications: Service Strategy, Service Design, Service Transition, Service Operation, and Continual Service Improvement.
ITIL certification is widely recognized in the IT industry and can enhance care...read more
Q31. What is domain and how to join it.
A domain is a group of computers and devices on a network that share a common set of rules and procedures.
A domain is a logical grouping of computers, users, and resources that share a common security database.
It allows for centralized management of users, computers, and resources.
To join a domain, you need to have administrative credentials and the computer must be connected to the network.
You can join a domain by going to System Properties > Computer Name > Change > Domain ...read more
Q32. Role of deskstop support engineer
Desktop Support Engineers provide technical assistance to users, troubleshoot issues, and maintain computer systems.
Provide technical assistance to users for hardware and software issues
Troubleshoot and resolve technical problems with desktop computers, laptops, printers, and other peripherals
Install, configure, and update software applications and operating systems
Maintain and update computer systems to ensure optimal performance
Train users on basic computer functions and be...read more
Q33. What's are the tools of back up?
Tools for backup include software, hardware, and cloud-based solutions.
Backup software such as Acronis, Veeam, and Backup Exec
Hardware solutions like tape drives, external hard drives, and network-attached storage (NAS)
Cloud-based backup services like Amazon S3, Google Drive, and Microsoft OneDrive
Backup generators and uninterruptible power supplies (UPS) to ensure power continuity
Backup scripts and automation tools to schedule and manage backups
Q34. Can you explain active directory?
Active Directory is a directory service developed by Microsoft for Windows domain networks.
Centralized database for managing network resources
Stores information about users, computers, and other network objects
Allows for authentication and authorization of users
Enables administrators to assign policies, deploy software, and apply updates
Supports hierarchical structure with domains, trees, and forests
Q35. What is the uses of DHCP and DNS
DHCP assigns IP addresses to devices on a network, while DNS translates domain names to IP addresses.
DHCP eliminates the need for manual IP address configuration
DNS allows users to access websites using domain names instead of IP addresses
DHCP and DNS work together to ensure efficient network communication
DHCP leases IP addresses to devices for a set period of time
DNS uses a hierarchical system to translate domain names to IP addresses
Q36. Explain What is domain ?
A domain is a group of computers and devices on a network that are administered as a unit with common rules and procedures.
A domain is a logical grouping of network resources such as computers, printers, and servers.
It allows for centralized management of users, computers, and security policies.
Domains are typically used in business environments to provide a secure and organized network infrastructure.
An example of a domain name is google.com, which represents a group of serv...read more
Q37. What is subnet?? What is subnet of 120?
A subnet is a smaller network within a larger network. The subnet of 120 depends on the subnet mask.
Subnet is a way to divide a larger network into smaller ones
Subnet mask determines the size of the subnet
Subnetting helps in efficient use of IP addresses
The subnet of 120 depends on the subnet mask used
Q38. What is your expected CTC
My expected CTC is negotiable based on the job responsibilities, company size, and benefits package.
My expected CTC is based on my experience, skills, and industry standards.
I am open to discussing the salary range during the interview process.
I am looking for a competitive salary that reflects my qualifications and contributions to the team.
Q39. What will you do if your laptop got crashed?
I would first try to restart the laptop and check for any error messages. If that doesn't work, I would attempt to boot into safe mode or use recovery options.
Attempt to restart the laptop and check for any error messages
Try to boot into safe mode
Use recovery options such as system restore or startup repair
If necessary, seek assistance from IT support team
Q40. How to configure operating system in windows computer?
To configure operating system in a Windows computer, you can access the Control Panel and make changes to settings.
Access Control Panel to make changes to system settings
Configure user accounts, network settings, display settings, etc.
Install and update drivers for hardware components
Set up security features like firewall and antivirus software
Q41. what is full form of RJ45?
RJ45 stands for Registered Jack 45, a type of connector used for Ethernet networking.
RJ45 is a type of connector used for Ethernet networking.
It has 8 pins and is used to connect devices to a network.
RJ45 is commonly used in homes, offices, and data centers.
Examples of devices that use RJ45 connectors include computers, routers, and switches.
Q42. Do you know how to recover data from corrupted OS?
Yes, I can recover data from a corrupted OS by using data recovery software, booting from a live CD, or connecting the hard drive to another computer.
Use data recovery software to scan the corrupted OS for recoverable files
Boot from a live CD or USB drive to access the files on the corrupted OS
Connect the hard drive to another computer as a secondary drive to retrieve the data
Q43. How to test internet connectivity?
To test internet connectivity, use ping command or visit a website.
Use ping command to check if there is a response from a website or IP address
Visit a website to check if it loads properly
Check network settings and cables
Use network diagnostic tools like traceroute or nslookup
Q44. What is blue screen errors?
Blue screen errors, also known as the Blue Screen of Death (BSOD), is a critical system error that causes the computer to crash.
It is a critical system error that causes the computer to crash.
It is also known as the Blue Screen of Death (BSOD).
It is usually caused by hardware or software issues.
It displays a blue screen with an error message and a code.
The code can be used to identify the cause of the error.
Common causes include faulty hardware, outdated drivers, and malware....read more
Q45. How much layer and layer name.
There are 7 layers in the OSI model. Layer names are Physical, Data Link, Network, Transport, Session, Presentation, and Application.
The OSI model has 7 layers.
The layers are Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with adjacent layers.
The layers are organized in a hierarchical manner.
Examples of protocols at each layer include Ethernet at the Data Link layer and HTTP at the Applicatio...read more
Q46. How to installed server 2012 R2
To install Server 2012 R2, you need to have the installation media and follow the steps provided in the setup wizard.
Insert the installation media (DVD or USB) into the server.
Boot the server from the installation media.
Follow the prompts in the setup wizard to select language, time zone, and keyboard layout.
Select the edition of Server 2012 R2 you want to install.
Choose the installation type (custom or upgrade).
Select the disk or partition where you want to install Server 20...read more
Q47. What are the FSMO roles?
FSMO roles are specialized domain controller roles in Active Directory that manage specific operations within the domain.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
Schema Master - Manages changes to the schema.
Domain Naming Master - Manages the addition or removal of domains in the forest.
RID Master - Allocates unique relative identifiers (RID) to each domain controller.
PDC Emulator - Handles backward compa...read more
Q48. What exactly is a blue screen death
A blue screen of death (BSoD) is a stop error screen that appears when a system encounters a critical error that it cannot recover from.
Occurs when the operating system encounters a critical error and is unable to recover
Also known as a stop error or BSoD
Usually displays a blue screen with error codes and information about the error
Requires a system restart to resolve the issue
Q49. How to configure outlook
Configuring Outlook involves setting up email accounts, server settings, and personal preferences.
Open Outlook and click on 'File'
Select 'Add Account' and enter email address and password
Choose account type (e.g. Exchange, IMAP, POP)
Enter server settings (incoming and outgoing mail servers)
Set up additional preferences like signature and email sync settings
Q50. Can you explain layer 3 in osi model?
Layer 3 in OSI model is the network layer responsible for routing and forwarding data packets.
Responsible for logical addressing and routing of data packets
Determines the best path for data to travel through a network
Examples include IP addresses and routers
Interview Questions of Similar Designations
Top Interview Questions for Desktop Support Engineer Related Skills
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month