IT Engineer
100+ IT Engineer Interview Questions and Answers
Q1. What is active directory ? Role of DNS server ? Difference between RAM & ROM ? Knowledge on installation of various softwares and Drivers ? Layers of OSI model ? TCP/IP Configuration ? Knowledge on various type...
read moreThe interview questions cover a wide range of topics including Active Directory, DNS, RAM, ROM, OSI model, networking devices, LAN/WAN/MAN/PAN troubleshooting, Outlook and Lotus Notes configuration, data backup and recovery, BSOD troubleshooting, and command prompt basics.
Active Directory is a Microsoft service that manages network resources and user accounts.
DNS server translates domain names into IP addresses.
RAM is volatile memory used for temporary storage while ROM is no...read more
Q2. Tell me if computer wifi is not working what are the first step to troubleshoot?
The first steps to troubleshoot a computer wifi issue
Check if the wifi is enabled on the computer
Restart the computer and the wifi router
Ensure the computer is within range of the wifi signal
Check if other devices can connect to the wifi network
Update the wifi driver on the computer
Reset the network settings on the computer
IT Engineer Interview Questions and Answers for Freshers
Q3. What is Mac address and how many bit in MAC address?
A MAC address is a unique identifier assigned to network interfaces for communications on a network. It is 48 bits long.
MAC address stands for Media Access Control address
It is a hardware address assigned to network interfaces by the manufacturer
MAC addresses are used in Ethernet and Wi-Fi networks
They consist of six groups of two hexadecimal digits separated by colons or hyphens
Example: 00:1A:2B:3C:4D:5E
Q4. Tell me if windows show a blue screen what are the main problem in this side?
A blue screen in Windows indicates a system crash or error.
Hardware failure
Driver issues
Corrupted system files
Malware or virus infections
Overheating
Memory issues
Power supply problems
Q5. What is the L2 switch and tell me which software to configure the switch?
L2 switch is a network switch that operates at the data link layer (Layer 2) of the OSI model.
L2 switch forwards data packets based on MAC addresses
It provides fast and efficient communication within a local area network (LAN)
Examples of L2 switch software include Cisco IOS, Juniper Junos, and HP ProCurve
Q6. How can you take a backup of outlook and what the location os pst?
Outlook backup can be taken by exporting PST file. PST file location varies based on Outlook version and OS.
Open Outlook and click on File menu
Select Open & Export and then click on Import/Export
Select Export to a file and click on Next
Select Outlook Data File (.pst) and click on Next
Select the folder to backup and choose the location to save the PST file
Click on Finish to complete the backup process
PST file location can be found by searching for *.pst files on the computer
In...read more
Share interview questions and help millions of jobseekers 🌟
Q7. What the color coding of straight cable and crossover cable?
The color coding of a straight cable is the same on both ends, while a crossover cable has a different color coding on each end.
Straight cable: Both ends have the same color coding
Crossover cable: Each end has a different color coding
Straight cable is used to connect different types of devices (e.g., computer to switch)
Crossover cable is used to connect similar devices (e.g., computer to computer or switch to switch)
Common color coding for straight cable: Orange-white, Orange...read more
Q8. How will you check internet connectivity in case Google blog by the company policy.?
To check internet connectivity in case Google blog is blocked by company policy, use ping command or test connectivity to other websites.
Use the ping command to check if the company's network can reach Google's servers
Test connectivity to other websites like Microsoft, Facebook, or any other popular website
Check if DNS resolution is working properly by pinging the IP address of Google's blog directly
Use network diagnostic tools like traceroute or nslookup to identify any netw...read more
IT Engineer Jobs
Q9. What is the difference between stack and queue in data structures,and provide examples of use cases for each?
Stack is Last In First Out (LIFO) data structure, while Queue is First In First Out (FIFO).
Stack: LIFO - Last In First Out. Examples: Undo functionality in text editors, function call stack in programming.
Queue: FIFO - First In First Out. Examples: Print queue, message queue in operating systems.
Q10. What is OSI layer? And take name of its all layers.
OSI layer is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system.
OSI stands for Open Systems Interconnection.
It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the adjacent layers.
Example: Physical layer deals with the physical transmission of data, while the Application layer deals with user interface...read more
Q11. If SMPS not working how you can troubleshoot?
To troubleshoot a non-working SMPS, check power connections, test the power supply, inspect for physical damage, and replace faulty components.
Check power connections and ensure they are properly plugged in
Test the power supply using a multimeter to check if it is providing the correct voltage
Inspect the SMPS for any physical damage such as burnt components or bulging capacitors
Replace faulty components like blown fuses, damaged capacitors, or faulty fans
Q12. what is ip addressing and explain the classes of ip addressing.
IP addressing is a method of assigning unique numerical identifiers to devices on a network. There are five classes of IP addressing.
IP addressing assigns unique numerical identifiers to devices on a network.
The five classes of IP addressing are A, B, C, D, and E.
Each class has a different range of IP addresses and is used for specific purposes.
Class A addresses are used for large networks, with the first octet ranging from 1 to 126.
Class B addresses are used for medium-sized...read more
Q13. What's new processor in market by intel and of which generation?
The latest processor by Intel is the 11th Gen Intel Core processors.
The 11th Gen Intel Core processors are codenamed Tiger Lake.
They are built on Intel's 10nm SuperFin process technology.
They offer improved performance, AI capabilities, and graphics.
Some examples of 11th Gen Intel Core processors are the Core i7-1185G7 and Core i5-1135G7.
Q14. Do you able to punch lan cables?? If yes then what's its colour codes?
Yes, I am able to punch LAN cables. The color codes are: Orange/White, Orange, Green/White, Blue, Blue/White, Green, Brown/White, Brown.
I am familiar with T568A and T568B wiring standards
I know that the color codes are used to identify the wires in the cable
I can use a cable tester to ensure that the cable is properly wired
Examples of color codes: Orange/White wire is for pin 1, Orange wire is for pin 2, Green/White wire is for pin 3, etc.
Q15. How will you behave in case system is not working and users are calling again and again?
I will prioritize resolving the issue and communicate with users to keep them informed.
I will remain calm and professional while addressing the issue.
I will prioritize resolving the issue as quickly as possible.
I will communicate with the users to keep them informed of the progress.
I will escalate the issue to higher authorities if necessary.
I will document the issue and the steps taken to resolve it for future reference.
Q16. Explain a Scenario will be based on server failure without physical interaction. How you will resolve this issue?
In case of server failure without physical interaction, remote troubleshooting and diagnostics can be performed to identify and resolve the issue.
Access the server remotely using a management console or remote desktop software.
Check system logs and error messages to identify the root cause of the failure.
Perform diagnostic tests to determine if the issue is hardware-related or software-related.
Restart the server or specific services if necessary to attempt to resolve the issu...read more
Q17. Write a program for putting all zeroes in arrays , that contains both zeoroes and non zero numbers , to the last of the array
Program to move all zeroes in an array to the end
Loop through the array and check for zeroes
If a zero is found, remove it from its current position and append it to the end of the array
Repeat until all zeroes are moved to the end
Q18. How to find out windows versions?
To find out windows versions, use the 'winver' command or check the system properties.
Use the 'winver' command in the Run dialog box
Check the system properties in the Control Panel
Use the 'systeminfo' command in the Command Prompt
Look for the version number in the About section of the Settings app
Q19. What is minimum voltage in ram?
The minimum voltage in RAM is 1.35V for DDR3 and 1.2V for DDR4.
DDR3 RAM has a minimum voltage of 1.35V
DDR4 RAM has a minimum voltage of 1.2V
Lower voltage RAM can help reduce power consumption and heat generation
Q20. Troubleshooting steps when pc not getting on
Troubleshooting steps for a PC that won't turn on
Check power source and cables
Check power supply unit
Check motherboard and CPU
Check RAM and other components
Check for any error messages or beeps
Try booting in safe mode
Try a different power outlet
Check for any loose connections
Q21. How to many types of operating system?
There are several types of operating systems including Windows, macOS, Linux, and Unix.
Operating systems can be categorized as single-user or multi-user.
They can also be categorized as single-tasking or multi-tasking.
Examples of operating systems include Windows, macOS, Linux, Unix, Android, iOS, and Chrome OS.
Q22. What the is the bus speed of ram?
The bus speed of RAM refers to the speed at which data is transferred between the RAM and the memory controller.
Bus speed is measured in MHz and determines the maximum amount of data that can be transferred per second.
The bus speed of DDR4 RAM ranges from 2133 MHz to 4266 MHz.
Higher bus speeds result in faster data transfer and better performance.
The bus speed of RAM should match the bus speed of the motherboard for optimal performance.
Q23. how would you approach connection issue with a client and remotely advise them to fix the problem (during covid)
I would use remote access tools to troubleshoot the connection issue with the client and guide them through the steps to fix it.
Initiate a remote session using tools like TeamViewer or AnyDesk to access the client's computer
Identify the root cause of the connection issue by checking network settings, firewall configurations, or internet connectivity
Guide the client through troubleshooting steps such as resetting the router, checking cables, or updating drivers
Provide clear in...read more
Q24. Troubleshooting steps when pc network not working
Troubleshooting steps for PC network issues
Check physical connections
Restart the router/modem
Check network settings
Run network troubleshooter
Check for malware/virus
Update network drivers
Reset network settings
Q25. What is DHCP ip and difference between manual ip and DHCP ?
DHCP is a protocol that automatically assigns IP addresses to devices on a network. Manual IP requires users to manually configure IP settings.
DHCP stands for Dynamic Host Configuration Protocol
DHCP automatically assigns IP addresses to devices on a network
Manual IP requires users to manually configure IP settings such as IP address, subnet mask, gateway, and DNS servers
DHCP is commonly used in home and business networks to simplify network configuration
Manual IP is often use...read more
Q26. What is oops concept and what is numpy and pandas in python
Oops concept is object-oriented programming principles. Numpy and Pandas are libraries in Python for numerical computing and data manipulation.
Oops concept involves principles like inheritance, encapsulation, polymorphism, and abstraction.
Numpy is a library for numerical computing in Python, providing support for large, multi-dimensional arrays and matrices.
Pandas is a library for data manipulation and analysis in Python, offering data structures like DataFrame for handling s...read more
Q27. What is The difference between the foreign key and reference key
Foreign key is a column in a table that refers to the primary key of another table, while reference key is not a database term.
Foreign key is used to establish a relationship between two tables in a database.
Reference key is not a database term, but it can refer to a key used in programming to refer to an object or method.
Foreign key ensures data integrity and consistency in the database.
Reference key is used in programming to create associations between objects or methods.
Ex...read more
Q28. What is auto scaler in AWS?Which one is more preferable horizontal or vertical?
Auto scaler in AWS automatically adjusts the number of EC2 instances in a group based on traffic or performance metrics.
Auto scaler helps in maintaining optimal performance and cost efficiency by scaling EC2 instances up or down as needed.
Horizontal scaling adds more instances to the existing pool, while vertical scaling increases the size of existing instances.
Horizontal scaling is generally more preferable as it provides better fault tolerance and scalability compared to ve...read more
Q29. What's the difference between fat32 and NTFS?
FAT32 is an older file system with limitations on file size and NTFS is a newer file system with advanced security features.
FAT32 has a maximum file size of 4GB while NTFS can handle much larger files.
NTFS supports file compression, encryption, and permissions while FAT32 does not.
FAT32 is compatible with more devices and operating systems than NTFS.
NTFS has a journaling feature that helps recover data in case of a system crash.
FAT32 is commonly used for USB drives and older ...read more
Q30. How can you take a windows backup?
Windows backup can be taken using built-in tools like File History or Backup and Restore.
Open Control Panel and select Backup and Restore
Click on Set up backup and follow the prompts
Choose the files and folders you want to backup
Alternatively, use File History to backup specific folders
You can also use third-party backup software like Acronis True Image
Q31. How do we configure an email I'd in Exchange?
To configure an email ID in Exchange, follow these steps:
Open Exchange Admin Center
Click on recipients and then on mailboxes
Click on the plus sign to create a new mailbox
Select the mailbox type and fill in the required details
Click on save to create the mailbox
Q32. Find out the network id for ip 192.168.0.23?
The network id for ip 192.168.0.23 is 192.168.0.0.
Identify the subnet mask for the network
Perform a bitwise AND operation between the IP address and subnet mask
The result is the network id
Q33. Troubleshooting steps when pc get slow
Troubleshooting steps for a slow PC
Check for malware and viruses
Free up disk space
Uninstall unnecessary programs
Update drivers and software
Check for hardware issues
Q34. How to resolve excited issue to the user.
To resolve an excited issue for a user, listen actively, empathize, provide clear instructions, and offer reassurance.
Listen actively to the user's concerns and frustrations.
Empathize with the user's emotions and acknowledge their feelings.
Provide clear instructions on how to resolve the issue step by step.
Offer reassurance that the problem will be resolved and provide a timeline if possible.
Q35. How to work in booting system?
Booting system involves initializing hardware, loading operating system and executing startup scripts.
Power on the computer to start the boot process
BIOS/UEFI firmware checks hardware components
Bootloader loads operating system kernel
Operating system initializes drivers and services
Startup scripts run to configure system settings
Examples: GRUB, Windows Boot Manager
Q36. What is ticketing tool and encryption
A ticketing tool is a software used to manage and track customer support requests. Encryption is the process of converting data into a code to prevent unauthorized access.
Ticketing tools help IT engineers manage and prioritize support requests
Encryption is used to protect sensitive data from unauthorized access
Common encryption methods include AES, RSA, and SHA
Encryption is used in various applications such as online banking, email, and messaging services
Q37. How would you troubleshoot your application after deploying
I would start by checking the application logs, verifying configurations, and testing different scenarios.
Check application logs for any errors or warnings
Verify configurations to ensure they are correct
Test different scenarios to replicate the issue
Use monitoring tools to track performance metrics
Collaborate with team members to troubleshoot and find solutions
Q38. What parameter we should consider before configure IP sec VPN
Considerations for configuring IPsec VPN
Security requirements of the network
Bandwidth requirements
Compatibility with existing network infrastructure
Authentication and encryption protocols
Key management
Firewall and NAT traversal
Client compatibility
Scalability
Redundancy and failover
Logging and monitoring
Regulatory compliance
Q39. how much experince about this field
I have X years of experience in the IT engineering field.
I have worked on various projects involving network infrastructure design and implementation.
I am proficient in programming languages such as Java and Python.
I have experience in troubleshooting and resolving technical issues.
I have worked with different operating systems such as Windows, Linux, and macOS.
I have experience in cloud computing and virtualization technologies.
I have worked with different databases such as ...read more
Q40. How many calls tickets you where handling and how much time you use to take solving the ticket
I handled an average of 20-25 calls tickets per day and took around 30-45 minutes to solve each ticket.
Handled 20-25 calls tickets per day
Took 30-45 minutes to solve each ticket
Prioritized urgent tickets first
Collaborated with team members to solve complex tickets
Q41. What is use of ping command?
Ping command is used to test the connectivity between two devices on a network.
Ping command sends an ICMP echo request to the target device and waits for a response.
It measures the round-trip time for the packet to travel from the source device to the target device and back.
It can also be used to determine the IP address of a device on a network.
Ping command is useful for troubleshooting network connectivity issues.
It can also be used to check the status of a website or serve...read more
Q42. explain concepts of lan, wan , important of rj45 cable
LAN and WAN are types of computer networks. RJ45 cable is important for connecting devices in a network.
LAN stands for Local Area Network and is used to connect devices within a small geographical area like an office or a building.
WAN stands for Wide Area Network and is used to connect devices over a large geographical area like cities or countries.
RJ45 cable is used to connect devices in a network and is important for transmitting data between them.
RJ45 cable is also known a...read more
Q43. How to maintain data ? MS office , Tally,ERP,CRM
Data can be maintained using various software such as MS Office, Tally, ERP, and CRM.
Identify the type of data to be maintained
Choose the appropriate software for the specific data
Ensure regular backups are taken to prevent data loss
Implement security measures to protect sensitive data
Train employees on how to use the software effectively
Q44. What do you know about Active Directory?
Active Directory is a Microsoft service that manages network resources and allows for centralized authentication and authorization.
Active Directory is used to manage users, computers, and other network resources
It allows for centralized authentication and authorization
It uses a hierarchical structure of domains and organizational units (OUs)
Group Policy Objects (GPOs) can be used to enforce policies and settings across the network
Active Directory can integrate with other Micr...read more
Q45. Find out the subnet mask for ip 192.168.45.21
The subnet mask for IP 192.168.45.21 is typically 255.255.255.0.
Subnet masks determine the network and host portions of an IP address.
The default subnet mask for a Class C network is 255.255.255.0.
Subnet masks are represented in dotted decimal notation.
Q46. 1 Wap print even num in python/ C 2 Wap print Fibonacci series num in python
Print even numbers in Python and Fibonacci series in Python.
For printing even numbers in Python, use a loop to iterate through a range of numbers and check if each number is divisible by 2.
For printing Fibonacci series in Python, use a loop to generate the series by adding the previous two numbers in the sequence.
Example for even numbers in Python: for i in range(1, 11): if i % 2 == 0: print(i)
Example for Fibonacci series in Python: a, b = 0, 1 for _ in range(10): print(a) a,...read more
Q47. How can you find IP address?
IP address can be found using command prompt or network settings.
Use 'ipconfig' command in command prompt to find IP address
Go to network settings and look for 'IPv4 Address' or 'IP Address'
Use online IP lookup tools to find IP address of a website
Q48. How to troubleshooting system?
Troubleshooting a system involves identifying and resolving issues that prevent it from functioning properly.
Start by gathering information about the problem and its symptoms
Use diagnostic tools to identify the root cause of the issue
Develop and implement a plan to resolve the problem
Test the system to ensure the issue has been resolved
Document the troubleshooting process and solution for future reference
Q49. What is the Colour coding for straight cable ?
The colour coding for straight cable follows a specific pattern to ensure proper connections.
The colour coding for straight cable typically follows the T568A or T568B standard
In T568A, the colour coding is: white-green, green, white-orange, blue, white-blue, orange, white-brown, brown
In T568B, the colour coding is: white-orange, orange, white-green, blue, white-blue, green, white-brown, brown
Q50. What are the commands we use in Dockerfile?
Commands used in Dockerfile are instructions that define how an image should be built.
FROM: specifies the base image
RUN: executes commands in a new layer on top of the current image
COPY: copies files from the host machine to the image
CMD: specifies the default command to run when a container is started
EXPOSE: exposes ports from the container to the host machine
WORKDIR: sets the working directory for any RUN, CMD, ENTRYPOINT, COPY, and ADD instructions
ENV: sets environment var...read more
Top Interview Questions for IT Engineer Related Skills
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month