System and Networking Interview Questions PDF
System and Networking Interview Questions PDF
Interview Questions
2. What is BIOS?
3. What is POST?
Intel
Mercury
Asus
Dlink
Gigabyte
6. What is the Mother Board Chipset?
It is part of Mother Board and The ICs Components like VGA, Sound
and Network Integrated in the mother Board called Mother Board
Chip sets.
Core: Having multiple cores means that the computer can work on
more than one task at a time more efficiently, which will help keep
your system running snappily even if you have tasks, such as an
antivirus scan or video render, running in the background.
What is clock speed? The GHz figure you‘ll see represents the number
of clock cycles (calculations) a processor can manage in a second. Put
very simply, a bigger number means a faster processor. For example,
3.6GHz means 3,600,000,000 clock cycles. This figure should never be
used to compare processors from different families, generations or
manufacturers, however. Bigger is not better when comparing AMD
and Intel, or 2nd-gen to 7th-gen Intel processors: different processor
Cache Memory is Built inside the CPU . which is used to store the
Frequently used Information‟s.
(And also Its is faster than the main memory and allows the CPU to
execute instructions and read and write data at a higher speed.)
There are quite a few manufacturers that are producing different BIOS
chips: Award, AMI, Phoenix, and IBM. Most commonly you can find
AMIs, AWARDs and PHOENIXes. The BIOS is stored on a ROM chip.
These ROM BIOS chips can be of different measurements and look different
from each other. Check out the following two types of chips. The one on the
left is an AWARD (as stated on the sticker), while the one on the right is a
Phoenix chip.
15. What are all the Different Types of hard Disk are available?
IDE SATA
BGA
Chips
(Bal
Grid
Array)
SMPS full form is Switching Mode Power Supply. It is a main power supply to
power the each and every component of computer or it converts the main
power supply 230volts to 12volts, 5volts, and 3volts and distribute to all
components of computer.
AT SMPS
ATX SMPS
BTX SMPS
AT SMPS:
AT stands for Advanced Technology. These are all old SMPSs. They had
12pin power connector, this is called as AT power connector. They were
used in Pentium-I, Pentium-MMX, Pentium-II and Pentium-III CPUs.
ATX SMPS:
ATX stands for Advanced Technology extended. They had 20pin Power
connector, this is called as ATX power connector. They were used in
Pentium-III, Pentium-IV and AMD CPUs.
It is very easy to identify Which is the SD RAM or DDR RAM. But in DDR
RAM, we have three types of RAM. these are difficult to identify, which is
DDR-1, DDR-2 or DDR-3.
Very easy to identify the SD RAM, SD RAMs have only two notches. so easy
to identify this is SD RAM. Any RAM chip has label. on the label, there are
some specification of RAM. is it SD RAM or not, speed and capacities are
mentioned on the label. as shown is the blow ram and label. it is SD RAM,
because it has two notches. in the label, it is mentioned as SD RAM, capacity
is 128MB and speed is 133MHz. so this is the 128MB SD RAM.
DDR RAMs have single notch. so identify the DDR RAMs are easy, But DDR
RAMs are three types. so identify the DDR-1, DDR-2 and DDR-3 is difficult.
so to identify DDR RAM, Label is only way to identify is it DDR-1 or DDR-2 or
DDR-3, so DDR type, speeds and capacities are mentioned on the label. here
the RAM is DDR RAM and some label are there. DDR means DDR 1 RAM, first
label is 512MB DDR 1 RAM, second is 1GB DDR2 RAM and third is 2GB DDR3
RAM.
24. What are all the Different Type of Hard Disk Drives?
IDE Stands for Integrated Device Electronics. These drives are also called as
PATA (parallel Advanced Technology Attachment) hard drives. Hard drives
have 40pin data interface and 4 pin power connector and Jumper setting to
change drive setting to connect motherboard. These drives have low speed
and low capacity than SATA and SCSI hard drives. ATA cables are used to
connect Hard drives to motherboard. These drives capacities are 10GB,
20GB, 40GB, 80GB, 120GB, 160GB, 250GB and 320GB.
SATA stands for Serial Advanced Technology Attachment. These drives have
4pin data interface and 7 pin power interface to work and no jumper pins,
because no need to change drive setting. these drives have high speed and
high capacity than IDE hard drives and Low speed and low capacity than
SCSI hard drives. 4pin SATA cables are used to connect hard drives to
motherboard. These drives capacities are 80GB, 120GB, 160GB, 250GB,
320GB, 500GB, 1TB and 2TB.
SCSI stands for Small Computer System Interface. These drives have
generally 50 to 68 pins. These drives are very high capacity and high speed
than both IDE and SATA drives. 50 to 68 pin SCSI data cables are used to
connect these hard drives. Generally these drives are used in servers.
Capacities are 160GB, 250GB, 320GB, and 500GB, 1TB, 2TB, 5TB and 10TB.
Type of Ports
PS/2 Ports
Serial Port
VGA Port
Parallel Port or Printer Port
USB Ports
Ethernet Port
Audio Ports
DVI Port
eSATA Ports
Maximum all motherboards have PS/2 Ports, VGA ports, USB ports, Ethernet
Port
and Audio Ports. but latest motherboards have DVI and eSATA ports.
VGA stands for Video Graphics Array. VGA Port is also one of the back
side ports.
VGA port is used to connect monitors, Which has 15 pin in three rows. It is
always in blue color. This is also a D shape connector and This is female
port. This port is come from motherboard. when your VGA port has broken,
You must get the PCI VGA card to connect monitor. This VGA connector
supports analog and digital monitors. That means VGA , SVGA Monitors
USB Port
USB stands for Universal Serial Bus. It is a universal port and used for all
latest devices.
Symbol of USB
USB/versions
USB 1.1: Many versions from introduced USB. USB 1.1 released in 1998. It
supports 1.5 Mbitspersecond.
USB 2.0: It released in 2000. USB 1.1 has been upgraded by USB 2.0 with
Hi-Speed. It supports 480 Mbits per second. so that, this is called as hi-
speed USB.
USB 3.0: It released in 2008. It is 10 times faster than USB 2.0. speed is 5
Gbits per second.
Parallel Port is also called as Printer port. Because it is used for printers only.
It is a 25 Pin female port and D shape connector. It is bidirectional port,
send and receive data at a time. It supports Dot Matrix Printers only. Latest
motherboards doesn't have the parallel port.
Serial Port
Serial Port is used to connect external modems and old model serial mice.
Two serial port were in old motherboard. now all motherboards have only
one serial port. It has 9 pins, it is a male connector and D shape connector.
PS/2 Type of Port, simple PS 2 Ports. Here are the PS/2 ports, one for
keyboard and second for mice.
Some are also called as 6 pin PS/2 Ports. Maximum all motherboards have
two PS/2 Ports. Purple color PS/2 port for keyboard and green color PS/2
port for mice device. Latest motherboard only one PS/2 Port. Purple color
PS/2 port is only for keyboard not for mice, at the same green color PS/2
port is only for mice not for keyboard.It has 6 pins.
In older days 5 pin Din connector was used for Keyboard. PS/2 Ports are
replaced Din Port. PS/2 Ports are designed in 1987.
Front Side Bus. Another name for the system bus. The Front Side Bus
connects the CPU to main memory. A microprocessor bus that connects the
CPU to aLevel 2 cache is called Back Side Bus. Typically, a backside bus runs
at a faster clock speed than the Front Side Bus.
An LGA socket is the connection point for a central processing unit (CPU)
to fit into a motherboard. The LGA stands for Land Grid Array.
30. What Is Hyper Threading? What Is The Use Of It?
A thread of execution, or simply a "thread," is one series of instructions
sent to the CPU. Hyper-threading is a technology developed to help make
better use of spare processing cycles. Hyper-threaded processors have a
duplicate set of registers, small spaces of high-speed memory storage used
to hold the data that is currently needed to execute a thread.
When a CPU core is delayed, waiting for data to be retrieved from another
place in memory, it can use these duplicate registers to spend the spare
computation cycles executing a different thread. The second set of registers
will be pre-loaded with the data needed to execute the second thread, so
the CPU core can begin work immediately
First we have to check the hard disk power cable then check the Hard
Disk Data Cable
Any lose contact. Then Fix them properly.
There are three types of SMPSs. They are AT, ATX, BTX. These three
types of SMPSs have different connectors and each wire has different
voltages. Here the connectors and its voltages.
AT SMPSs have 12 pin power connector, ATX SMPSs have 20 pin power
connector and BTX SMPSs have 24 and 28 pin power connectors. AT power
supplies were used in 80‘s and from 1996 we use ATX power supplies. Here
are the AT, ATX and BTX SMPSs voltages and users.
Find the 24 Pin connector from SMPS then We have to short the Green and
Black wire using U shape bend wire.
If SMPS fan rotates then SMPS is fine if the FAN does not rotate then
SMPS is Faulty.
Hard disk drive is internal storage media in a computer, on which you can
install operating system and save different data. Sometimes, some problems
probably occur on a hard disk drive, in which situation you usually cannot
write data to the hard disk drive. Even worse, the hard disk drive becomes
inaccessible and does not allow you to read or copy any file.
Common hard disk drive error and problems:
You may face different kinds of problems on a hard disk drive, which usually
result from following possible reasons:
Device error or Non-System disk or disk error, Replace strike any key
when ready
HDD Controller Failure
Invalid partition table
No ROM Basic, System Halted
Error loading operating system or Missing operating system
If you receive not formatted error on system partition, your computer may
be not able to boot normally. You usually need to reinstall Windows
operating system and reformat the disk drive to fix the problem. If hard
disk drive shows not formatted error on a data partition, it usually has no
influence on system partition. However, you cannot access the hard disk
drive when it asks to be formatted and changes to RAW file system.
Solution: Extract all inaccessible files from the hard disk drive without a data
recovery tool and then format the disk drive from RAW to NTFS or FAT32
Hard Disk File or Directory Is Corrupted and Unreadable Error
It pops up error message "file or directory is corrupted and unreadable"
when you double click a hard disk drive on computer. This problem usually
occurs when the partition table gets damaged.
Solution:
1. Assign a new drive letter to the partition of hard disk drive. For
example, if the hard disk drive E shows the error message, you can assign
another drive letter like F, G, etc to this partition (Please make sure that
there is no other partition has the same drive letter when you attempt to
assign a new drive letter).
2. Click "Start" > "Programs" > "Command Prompt" > enter "chkdsk /f
e:" (e: is the drive letter of the partition that shows the error message)
3. Run Windows Error-checking tool to check and repair bad sectors on
the hard disk drive which shows the error message
4. If all solutions above failed, you can format hard disk drive to fix the
problem.
Hard Disk I/O Device Error
It shows I/O device error on hard disk drive? This problem may result from
hard disk bad sectors, unformatted error, file directory corruption or I/O
address conflict, etc.
41, System is power on, but beep sound occurs. What would be
the problem?
One long beep: Memory problem
One long and two short beeps: Video error
One long and three short beeps: Video error
Continuous beeps: Video/memory problem
Other beeps: Check the motherboard manual
42. What is Power Good Signal? Explain its functionality.
In addition to the voltages and currents that a computer needs to operate,
power supplies also provide a signal called the Power-Good signal,
sometimes written as Power_OK or Power Good or you can distinguish it by
its gray color. Its purpose is to tell the computer all is well with the power
supply and that the computer can continue to operate normally. If the
Power-Good signal is not present at startup, the CPU is held in reset state. If
a Power-Good signal goes down during operation the CPU will shutdown.
The Power-Good signal prevents the computer from attempting to operate
on improper voltages and damaging itself.
Windows 7 Windows XP
Real system restore No Real System restore option
Bit locker feature available No Bit locker option
(Bit locker which helps you
protect your sensitive information
from hackers)
The shutdown and the startup is Slow
very fast in Windows 7
Windows 7 provides good Less
Graphical User Interface (GUI)
components
In windows 7 there is no It is necessary to install drivers.
necessity for the drivers to be
installed
User defined themes can be in Windows XP themes cannot be
implemented in Windows 7 created by the user
provides maximum security to Windows XP this feature is not
the operating system available.
A start button included on the taskbar but doesn't open the menu. It'll
take users to the start screen when clicked
In 8.1 they really want users to sign in with a Microsoft Account and store
all their user files online via SkyDrive
3. What is minimum Hardware requirements for windows 7 ?
Processor: 1 gigahertz (GHz) or faster with support for PAE, NX, and
SSE2 (more info)
RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit)
Hard disk space: 16 GB (32-bit) or 20 GB (64-bit)
Graphics card: Microsoft DirectX 9 graphics device with WDDM driver
5. What is DirectX?
Windows Display Driver Model (WDDM) is the graphic driver architecture for
video card drivers running Microsoft Windows versions beginning with
Windows Vista.
It support Disk Quota (Means we limit the disk space for Windows
usres when logged in c: and d: in Hard disk.
FAT 32
Maximum size of partition is up to 2 TB.
Maximum File size is up to 4 GB.
File & folder Encryption is not possible.
20. How will you convert FAT32 to NTFS?
To convert a volume to NTFS from the command prompt
Open Command Prompt. In the command prompt window, type
C:> convert drive_letter: /fs:ntfs
For example, typing convert D: /fs:ntfs would format drive D: with the
ntfs format.
A primary partition contains one file system. The first partition (C:) must
be a primary partition..
An extended partition is a primary partition which contains secondary
partition(s). A hard disk may contain only one extended partition..
Delete will delete all the virus infected files and Quarantine create a copy
from an infected file and produce a new one..
25. What are the procedures for cleaning an infected virus system?
Unplug the system from the Network if it is in a Network & Scan the System
with the Updated Antivirus..
26. When system booting “NTLDR file Missing” Error. What would be
the solution?
Firewall Restricts the System from Unwanted User Login to the computer
thro the Internet or Local Area Network..
Members of the Administrator group have total control over the computer
and everything on it. The user named Administrator is the default
account within this group
The Power User class can perform any task except for those reserved for
Administrators. They are allowed to carry out functions that will not
directly affect the operating system or risk security
A network printer is shared by more than one computer using the IP Address
that is assigned to the printer.
A local printer is directly connected to one computer & shared using
sharing & security
First is the POST, this stands for Power On Self-Test, for the computer. This
process tests memory as well as a number of other subsystems. You can
usually monitor this as it runs each test. After that is complete the system will
run POST for any device that has BIOS (Basic Input-Output System).
35. One fine morning system is not able to login into domain.
What could be the problem?
10 Systems
Packet Internet Gopher is a simple command line network tool that you
can use to verify your connectivity to a network.
39. What would the problem if the system gets hanged off?
Incremental Backup will take the Back up of incremented data and it will
clear the Archive Bit after Taking the backup.
Differential Backup will take the Back up of Differential Data and it will
not clear the Archie bit.
46. What is an ActiveX control?
ActiveX is a software component of Microsoft Windows. If you have Internet
Explorer, then ActiveX is already installed on your computer. ActiveX
controls are small programs, sometimes called add-ons that are used on the
Internet. They can enhance your browsing experience by allowing animation
or they can help with tasks such as installing security updates at Microsoft
Update.
47. What is Patch?
A patch is a piece of software designed to update a computer program or its
supporting data, to fix or improve it. This includes fixing security
vulnerabilities [1] and other bugs, with such patches usually called bug
fixes or bug fixes, and improving the usability or performance
48. What is service pack (SP)?
An Service Pack is a small set of applications with software patches or
security loops removing errors and bugs, modifying components or adding
new features. Its purpose is to improve user productivity from earlier
versions. Most major software vendors release application service packs
annually or as required.
Swipe in from the right edge of the screen, and then tap Search. ...
Tap or click Settings.
In the search box, type Windows Update.
Tap or click Install optional updates.
In the details pane, click Check for updates, and then wait while
Windows looks for the latest updates for your computer.
50. What are all Different types of Security updates in
Windows? There are three types of updates:
Service packs
Regular updates
Security updates
Service packs upgrade systems to the most current code base. Updates and
security updates resolve a known issue. Updates should be adopted on an
as-needed basis. They should be evaluated and applied only if computers
within the organization are experiencing the problem the update is designed
to resolve.
Service packs keep the product current, and they update and extend a
computer's functionality. Service packs may also contain a limited number
of customer-requested design changes or features.
Updates are code fixes for products that are provided to individual customers
when those customers experience critical problems for which no feasible
workaround is available.
Updates are not intended for general installation, since they do not undergo
extensive beta testing when they are created. Microsoft targets update
support toward enterprise-level customers and designs it to provide an
extra level of security for mission-critical software systems. Updates may
not be distributed outside the customer organization without written legal
consent from Microsoft.
Security Updates
If you are changing to a new antivirus product, you will need to uninstall the
previous antivirus scanner first.
A program or piece of code that is loaded onto your computer without your
knowledge and runs against your wishes.
Viruses can also replicate themselves.
All computer viruses are manmade.
Viruses copy themselves to other disks to spread to other computers.
They can be merely annoying or they can be vastly destructive to your files.
62. Give Few Examples Of
Viruses? Examples of computer
viruses are: Macro virus.
Boot virus.
Logic Bomb virus.
Directory virus.
Resident virus.
A Trojan horse program has the appearance of having a useful and desired
function.
A Trojan Horse neither replicates nor copies itself, but causes damage or
compromises the security of the computer.
The presence of spyware is typically hidden from the user and can
be difficult to detect.
Zombie : Zombie programs take control of your computer and use it and its
Internet connection to attack other computers or networks or to perform
other criminal activities
67. What Is Phishing?
Phishing :
• The message may claim that if you do not click on the link in the
message and log onto a financial web site that your account will be
blocked, or some other disaster.
67.What Is Ransomware?
Ransomware :
Ransomware is a form of malware that essentially holds a computer
system captive while demanding a ransom.
The malware restricts user access to the computer either by encrypting files
on the hard drive or locking down the system and displaying messages that
are intended to force the user to pay the malware creator to remove the
restrictions and regain access to their computer.
68.What Is Spam?
Spam :
Spam is email that you did not request and do not want.
One person's spam is another's useful newsletter or sale ad.
Spam is a common way to spread viruses, trojans, and the like.
Often times software and applications offer ―free‖ versions that come
bundled with adware.
70.How Malware Spreads?
Malware is a program that must be triggered or somehow executed before
it can infect your computer system and spread to others.
Here are some examples on how malware is distributed:
Social network.
Pirated software.
Removable media.
Emails.
Websites.
71. How Can You Protect Your Computer?
Install protection software.
There seems to be a lot of network activity when you are not using the
network.
The available memory on your computer is lower than it should be.
Programs or files appear or disappear without your knowledge.
File names are changed.
73.What Is Anti-malware Program?
77. what does APIPA stand for and how can you tell if your
computer is using it? why would your computer be using it?
The key reason for integrating DNS with AD is that client server
communication takes place with Domain Name. Network needs IP address to
reach the destination; In order to resolve Domain Name to IP Address we
need DNS Server. If DNS Server is not configured properly the network
becomes slow.
First open the Server Manager then select the Add roles and services
then select the DHCP Services and Install it. Then go to Tools and select
DHCP then create the DHCP Scope then
Provide the Starting and ending Range of IP address the provide the DNS
IP Address then it will get configured.
Active Directory has five special roles which are vital for the smooth
running of AD as a Multi master system. Some functions of AD require
there is an authoritative master to which all Domain Controllers can refer
to. These roles are installed automatically and there is normally very little
reason to move them, however if you de-commission a DC and DCPROMO
fails to run correctly or have a catastrophic failure of a DC you will need to
know about these roles to recover or transfer them to another DC.
The forest wide roles must appear once per forest, the domain wide
roles must appear once per domain.
The Roles
There are five FSMO roles, two per forest, three in every Domain. A
brief summary of the role is below.
Schema Master
The schema is shared between every Tree and Domain in a forest and must
be consistent between all objects. The schema master controls all updates
and modifications to the schema.
When moving objects between domains you must start the move on the
DC which is the RID master of the domain that currently holds the object.
PDC Emulator
It is also the password master (for want of a better term) for a domain. Any
password change is replicated to the PDC emulator as soon as is practical. If a
logon request fails due to a bad password the logon request is passed to the
PDC emulator to check the password before rejecting the login request.
Infrastructure Master
AD Integrated Zones allow Secure Dynamic Updates. I.e. there will not be
any duplicate or unwanted records. Since all the information are validated in
active directory.
By creating AD- integrated zone you can also trace hacker and spammer
by creating reverse zone.
AD integrated zones are stored as part of the active directory and support
domain-wide or forest-wide replication through application partitions in AD.
23. How do you backup & Restore AD?
If your DNS server fails, No Client will able to reach the Domain
Controller, which will create authentication and Control Issues.
Normal Backup:-This is default backup in which all files are backed up even
if it was backed up before.
Incremental Backup:-In this type of backup only the files that haven‘t been
backed up are taken care of or backed up.
File Transfer Protocol is used transfer large volume of files and huge number
of files simultaneous between different geographic locations.
34. Specify the Port Number for AD, DNS, DHCP, HTTP, HTTPS,
SMTP, POP3 & FTP
AD - 389
DNS - 53
DHCP Server- 67,
DHCP Client -68
HTTP - 80
HTTPS - 443
SMTP - 25
POP3 - 110
FTP - 21,22
35. Explain Virtual Directory in IIS?
A virtual server can have one home directory and any number of other
publishing directories. These other publishing directories are referred to
as virtual directories.
Only when installing active directory and DNS in the same server (AD
Integrated Zones) we can select Secure Dynamic Updates. Then all the
records will automatically be updated in DNS. Since all the information
is validated in active directory there will not be any duplicate or
unwanted records
Basic Disk: Basic Disk uses a partition table to manage all partitions on the
disk, and it is supported by DOS and all Windows versions. A disk with
installed OS would be default initialized to a basic one. A basic disk contains
basic volumes, such as primary partitions, extended partition, and all logical
partitions are contained in extended partition.
46. If the Client machine does not receive the IP Address from DHCP
server how do you troubleshoot?
We have to go command Prompt and type the following command.
Ipconfig /renew
47. What is “hosts” files?
53. By default, if the name is not found in the cache or local hosts
file, what is the first step the client takes to resolve the FQDN name
into an IP address?
DNS Issues
55. Describe how the DHCP lease is obtained.
It‘s a four-step process consisting of (a) IP request, (b) IP offer, (c)
IP selection and (d) acknowledgement.
57. We‟ve installed a new Windows-based DHCP server, however,
the users do not seem to be getting DHCP leases off of it.
A Local profile is a folder that contains all the settings pertaining to a user‘s
working environment. By default, the profile is stored in the C:\Users
directory.
A roaming profile, on the other hand, is stored on a network instead on the
local drive of the machine where you are logged. A Roaming profile is cached
locally by default. The advantage of a roaming profile is that a user can log into
any machine in the domain and have a consistent working environment.
The concept of a roaming profile is that the user‘s profile is stored on a file
share, and it is downloaded from the file server whenever a user logs in,
doesn‘t matter on which machine. It is cached in C:\Users on the
computer that the user is logged into.
When the user is logged out, the content changes of the profile are
saved back to the file server.
What is Mandatory profile?
A mandatory user profile is a roaming user profile that has been pre-
configured by an administrator to specify settings for users. Settings
commonly defined in a mandatory profile include (but are not limited to):
icons that appear on the desktop, desktop backgrounds, user preferences in
Control Panel, printer selections, and more. Configuration changes made
during a user's session that are normally saved to a roaming user profile
are not saved when a mandatory user profile is assigned.
Page File Is Storage Space For The Virtual Memory, Page File Uses Hard Disk
Space As a Memory To Provide Memory Allocation...
61. Where are group policies stored?
%SystemRoot%System32\Group Policy
64. You change the group policies, and now the computer and user
settings are in conflict. Which one has the highest priority?
POP3 is the Post office Protocols ver 3 which is used to receive the
mails from related mail server. And TCP port no is 110.
SMTP is the Simple Mail transfer protocols which is used to send the
mail. The TCP Port number is 25
POP3 means Post Office Protocol 3 is a protocol that offers a simple way
for users to use mailboxes and download messages to their computers. It
allows users to download mails from the mail server to the local server and
enables you to read the mail even if you are offline.
SMTP or Simple Mail Transfer Protocol allows you to send emails and not
to receive them, it act as Mail Transfer Agent (MTA) to deliver your e-mail
to the recipient‘s mail server.
Preview message in the message list: You can figure it out from
the message list itself, what message to read and what to be
ignored, as you can see a little description of mail on the mailing list.
Quicker respond with inline replies: Just with one click you can
reply to the mail sender and act as a real-time chat
8) Explain how you can access AOL e-mail account with Outlook?
PST is the personel storage file which is used to store all the
outlook messages.
An OST file (.ost) is an offline folder file in Microsoft Outlook. Offline folders
make it possible for the user to work offline and then to synchronize
changes with the Exchange server the next time they connect. The ability to
work offline is useful in environments with limited or unreliable connectivity.
On the other hand, PST stands for Personal Storage Tables. These are also
known as personal folders or personal files. It is not created by Outlook or
the Exchange server. Instead, you (or any user, for that matter) can create
it to store all your emails, contacts, calendar entries etc. These PST files can
be stored anywhere in your computer and it makes it that much easier for
you to keep a backup copy of your PST files or move it from one computer to
another.
Until Outlook 2002, a PST file could hold only upto 2GB of data. And as it
approached that limit it would start to become unstable. But from Outlook
2003 onwards, it could hold up to 10 times that limit.
If, at any point of time your PST files become unstable, you can still repair it
using the Scanpst.exe utility, which you can find when you run a search in
Similarly, if your OST file happens to become corrupted, you can scan it and
repair it with the Scanost.exe utility. You will find it when you search for it
in your computer.
Step 1: To start backing up your files in Outlook 2013 and 2016, click the
File menu and select Open & Export from the left-hand menu.
Step 2: Click the Import/Export button to open the Import and Export
Wizard, which will also kick you out of the touch-friendly menu system — it‘s
best to have a conventional keyboard and mouse or touchpad for the
following steps. In Outlook 2010, click File, select Options, and click
Advanced.
Step 3: Click Export to open the wizard. The following steps are identical
for all three versions of Outlook.
Step 4: Select Export to a file from the action list and click Next, which will
result in two options. Select Outlook Data File (.pst), and click Next again.
On the next screen, select which files and folders you want to back up. Most
of the time, you‘ll want to create a complete backup of the files for one
account. To do this, simply click the email address associated with the
account, the first item in the list, and click Next. Make sure that Include
subfolders is checked so that you capture all the information.
Step 5: If you want greater control of what‘s backed up, click an individual
mail folder, the Contacts or Calendars section, or any of the other options in
the list. By default, all of the folders within a selected folder will be backed up
as well. To disable this behavior, uncheck the box marked include subfolders.
To remove specific email messages from the backup, such as mail sent to or
from your personal address, click filters. On this screen, you can create a
search by word, subject or body field, to or from address, or time. More
advanced filters, including size, flags, and importance ratings, are available via
the More Choices and Advanced tabs. When you‘re finished setting up your
filters, click OK to return to the export menu.
Step 6: The next screen allows you to select the location and name of
your backup file. Click Browse, then navigate to the folder you want, name
the file, and click OK. The browser window will then close.
Using the Tool called scanpst.exe we can repair the PST file.
C:\Users\admin\AppData\Local\Microsoft\Outlook\Outlook.pst
An Archive is a way to reduce the size of your Outlook Data File when the
amount of email you keep starts to tax your computers resources, causing it
to slow down. Unlike a traditional backup in which a copy is made, archived
items are moved to a separate Outlook Data File and set aside to be
accessed when needed.
Open Outlook.
In the window that opens you can change the settings to Archive:
Click OK and the Archive file will be created and attached to Outlook.
The Archive process will then run using the settings you previously entered.
All email received before the date you selected will be moved to the Archive
file. If the email being Archived is in a folder named John Doe, it will be
stored in a folder named John Doe in the Archive file. If a folder does not
have email old enough to be Archived, the folder will not be created in the
Archive file until it does.
When the Archive process has finished, right-click on the Archive and select
Close"archive".
In the main window, tap on options NEW, now click the arrow right of
the NEW button and select Meeting Request
Click on options and then recurrence
Select the type of details from your options and then click OK
Enter the recipient‘s mail address and then click send
Go to the main menu, tap on tools option and select ―options‖ tab
It will open a window, under preference tab; you will have the option,
―Junk E-mail‖ and ―E-mail options.‖
If you click on ―junk e-mail‖ option, it will open another window
In this window, you can choose the option and click on the checker‘s box
the way you required like ―permanently delete suspected junk emails‖ or
―disable links and other functionality in phishing messages.‖
In the end, tap on ―Apply‖ and then click ―OK‖.
Through that you can login and use all features of office 365 like
word, excel, PowerPoint and Mail.
Convert notes to tasks inside your calendar and assign them to colleagues
with reminders and deadlines. Send meeting minutes taken in OneNote
by email and automatically add details (date, location, attendees,…) for
each meeting they‘re related to.
Use a simple keyboard shortcut (Ctrl+P) to turn your mouse into a laser
pointer during your PowerPoint presentations. You can also use the
Presenter Mode commands. This feature has been part of PowerPoint for
years, but was recently integrated for touch-screen devices. If you hold
your finger or stylus down on the device, the red button fake laser pointer
will appear.
5. Power Map in Excel: Turning data into a map
Power Map is part of the powerful and interactive data visualization
features in Excel, which are enhanced with Power BI, the solution for
analyzing, visualizing and sharing data insights. You can turn rows of data
into a 3D interactive map with Power Map, which includes the ability to
filter data using three different filters: List, Range, or Advanced.
The Resume Reading feature in Word allows you to pick up where you left
off, even on different devices! Word automatically bookmarks the last page
you were reading!
You get the Office Web Apps with your Office 365 subscription, so you can
work on your cloud files from any up-to-date Web browser on an Internet-
connected computer. You don‘t have to install the Office software on the
computer.
You also get access to Office Mobile Apps so you can use Word, Excel,
PowerPoint, Outlook and OneDrive directly from your smartphone or tablet
while you‘re on the move! Download them from your Android or iOS
device store.
20. if Out look is Too slow how do you troubleshoot?
This is the most common of Outlook‘s problems. Over time, emails, notes,
calendar entries, attachments etc. keep piling up in the Outlook PST
making it abnormally large in size. It eventually reaches to such an extent
that working with Outlook becomes nearly impossible due to its utterly slow
speed.
Solution – The first solution here is to starve the PST. You need to remove
any and everything that is causing the PST to bloat up. Find out the folder
called ―Larger Than 100 Kb‖ in Outlook 2007, it will contain all emails that
are larger than 100 Kb. Delete all unwanted old emails (especially the ones
with bulky attachments). If you really need an attachment, save it to the
disk but clear it out of the PST. Also, delete all other unwanted emails and
clear out the Trash.
The second thing that could do wonders is Archiving. Archive your emails
by year. This will save large amounts of data to your disk relieving the PST
of its burden.
It‘s ironical how something that‘s meant to help can itself become a cause of
the trouble. Many Outlook add-ins claim to help around with Outlook‘s
working and make things easier for you but heaven turns into hell when any
of the add-ins corrupt. Sadly quite a few add-ins have bugs and many are
poorly written. A corrupted add-in can cause Outlook to crash without
warning. And if you were in the middle of composing a rather long and
important email, the frustration can be imagined. Installing too many add-
ins can make Outlook slow too.
When your internet connection is working properly and still you are
experiencing the same issue; you should check your Outlook configuration
settings. The server settings play a vital role and if there is some issue with
it; you can‘t send or receive emails.
When there is some error with the incoming server settings, you will not
get emails in your account. If your outgoing server settings are incorrect,
you can‘t send emails. This issue needs to resolve with; either reconfiguring
the settings or updating the settings and try sending emails.
Type the desired text of your under ―EDIT SIGNATURE‖ and then click
OK and click OK again
24.) Given below are some of the commonly used MS Outlook „Run‟
Commands:
Click Start then choose Run then type each of the following commands
followed by <<Enter>>
1: Outlook /Safe (Opens the outlook in Safe mode)
2: Outlook /Cleanprofile (cleans the profile)
Backing up your .pst file occasionally is a good idea. How often depends on
you. But if you get a lot of important mail, every day isn‘t too often. To
back up your Personal Folder file and all its subfolders, simply export it, as
follows:
Choose Import and Export from the File menu to launch the wizard.
Select Personal Folder File (.pst) from the Create A File Of Type list
and click Next.
Choose Personal Folders from the Select The Folder To Export From list.
Check the Include Subfolders option and click Next.
Network Layer (Decides the physical path that should be taken by the
data as per the network conditions)
Transport Layer (Ensures that the messages are delivered in sequence and
without any loss or duplication)
Size of the Network is defined as the geographic area and the number of
computers covered in it. Based on the size of the network they are
classified as below,
Based on the size of the Network they are classified as below,
Link – The physical medium or the communication path through which the
devices are connected in a network is called as a Link.
Node – The devices or the computers connected to the links are named as
nodes.
Router / Gateway – A device/computer/node that is connected to different
networks is termed as a Gateway or Router. The basic difference between
these two is that Gateway is used to control the traffic of two contradictory
networks whereas router controls the traffic of similar networks.
Topology: This deals with how the computers or nodes are arranged in
the network. The computers are arranged physically or logically.
Medium: This is nothing but the medium used by the computers for
communication.
Network Topology is nothing but the physical or logical way in which the
devices (like nodes, links, and computers) of a network are arranged.
Physical Topology means the actual place where the elements of a
network are located.
Logical Topology deals with the flow of data over the networks. A Link is
used to connect more than two devices of a network. And more than
two links located nearby forms a topology.
The network topologies are classified as mentioned below
1) Bus Topology: In Bus Topology, all the devices of the network are
connected to a common cable (also called as the backbone). As the devices
are connected to a single cable, it is also termed as Linear Bus Topology.
The advantage of the star topology is that if a link breaks then only that
particular link is affected. The whole network remains undisturbed. The
main disadvantage of the star topology is that all the devices of the network
are dependent on a single point (hub). If the central hub gets failed, then
the whole network gets down.
Decryption is the process of converting back the encrypted data to its normal
form. An algorithm called cipher is used in this conversion process.
The terms Internet, Intranet and Extranet are used to describe how a
network application should be accessed. In Internet anyone can access
the application from anywhere in world. In Intranet only the authorized
users from the company for which the application was built can access the
application. In Extranet selected external users are allowed to access the
application which was built for Internet.
WAN (Wide Area Network) network is used to connect the networks which
are spread over the different geographical location.
12.) What is the backbone network?
The network which connects two or more networks together is considered as
a backbone network. Usually backbone network contains high speed data
transferring devices such as routers and switches. Backbone network should
never be used for end user connectivity. The network which provides end
user connectivity should be connected through the backbone network.
UTP cable has four pairs of wires. Each pair has two wires, twisted with each
other. So there are total eight wires in UTP cable.
How many wires are used for data transmission in UTP cable?
Only four wires from eight wires are used in data transmission.
19) Which wires are used for data transmission in UTP cable?
The wires 1, 2, 3 and 6 are used for data transmission in UTP cable. The
wires 1 and 2 are used to transmit the data while wires 3 and 6 are used to
receive the data.
In Straight through UTP cable all pins are matched on both sides. Pin-1
connects with Pin-1; Pin2 connects Pin2, this way each pin connects with
the same number of pin on other side.
In Cross-over cable the pins which send data from one end connect with
the pins which receive data on other end. Pin1 connects with Pin3 while
Pin2 connects with Pin6.
Hub/Switch to Hub/Switch
System to System
Router to Router
Router to System
SSH or Secure Shell is most well known by Linux users, but has a great deal
that it can be used for. SSH is designed to create a secure tunnel between
devices, whether that be systems, switches, thermostats, toasters, etc. SSH
also has a unique ability to tunnel other programs through it, similar in
concept to a VPN so even insecure programs or programs running across
unsecure connections can be used in a secure state if configured correctly.
SSH runs over TCP port 22.
28) Name Three Steps Which You Would Use To Troubleshoot Ftp
Server Related Problems.
Test basic connectivity with ping, Check with nmap if the ports are open
(20 and 21). Check if a firewall is restricting traffic to the server.
Straight Cable
Cross Cable
The theoretical length is 100 meters but after 80 meters you may see
drop in speed due to loss of signal.
32) What Would You Use To Connect Two Computers Without Using
Switches?
Cross cable.
From the output we can find out the IP address, DNS IP address, gateway
IP address assigned to that computer.
When DHCP server is not available the Windows client computer assigns an
automatic IP address to itself so that it can communicate with the network
computers. This ip address is called APIPA. It‘s in the range of 169.254.0.0
to 169.254.255.255
Logical Address : It‘s Called as Ip Address (IPv4 -32 bit & IPv6 -128 bit)
Public IP addresses:
Private IP addresses:
10.0.0.0 10.255.255.255
172.16.0.0 172.31.255.255
192.168.0.0 192.168.255.255
A default gateway is a routing device used to forward all traffic that is not
addressed to a destination within the local network or local subnet. If you
don‘t have a default gateway, it is not possible to communicate with the
network device/host of different networks.
C:\ getmac
Routers are small electronic devices that join multiple computer networks
together via either wired or wireless connections.
Serial: Serial interfaces are typically used for WAN connections from ISP
(Internet Service Providers) for connectivity types like Frame Relay, T1,
T3, etc
Router uses the following Routing protocols to transmit the data from
one network to another network:
RIP, IGRP, OSPF, EGP, EIGRP, BGP and IS-IS routing protocols
A virtual LAN (Local Area Network) is a logical subnet work that can group
together a collection of devices from different physical LANs. Larger
business computer networks often set up VLANs to re-partition their network
for improved traffic management.
48) What is the Advantages of VLAN?
Hub
Switch Router
Network Layer
Physical Layer Device Data Link Layer Device
Device
Telnet 23
2
3 SMTP 25
DNS 53
4
DNCP server 67
5
6 DHCP Client 68
7 HTTP 80
8 HTTPS 443
RDC 3389
14 Remote
Desktop
connections
What is ITIL?
The five broad components of the ITIL Service Lifecycle cover various other
sub-categories/aspects, including Demand Management, Capacity
Management, Release Management, Incident Management, Event
Management, and so on. These are aspects that are meant to cover all
areas of ITSM (IT Service Management).
4) Strategy Operations:
The Service Design lifecycle phase is about the design of services and
all supporting elements for introduction into the live environment.
Availability Management
Capacity Management
IT Security Management
Supplier Management
Service Transition
In this phase of the lifecycle, the design is built, tested and moved into
production to enable the business customer achieve the desired value. This
phase addresses managing changes: controlling the assets and configuration
items (the underlying components such as hardware, software, etc.)
associated with the new and changed systems, service validation, and
testing and transition planning to ensure that users, support personnel and
the production environment have been prepared for the release to
production.
Change Management
The objective of this process activity is to control the lifecycle of all the
changes. The primary objective of Change Management is to enable
beneficial changes to be made with minimum disruption to IT services.
Change Evaluation
Application Development
Knowledge Management
Event Management
Incident Management
Request Fulfillment
Access Management
Problem Management
Facilities Management
Application Management
Technical Management
Service Review
Process Evaluation
CSI Initiatives
What is an Incident?
All this talk of incidents, service requests, and how we refer to them leads
us to another common question…
When an incident occurs, a user submits a ―ticket.‖ The service desk works
the ticket according to workflows the organization has set up. Simply put,
the incident is the event, and the ticket is the documentation of the event.
It is the physical (err… digital) vehicle through which your service desk is
alerted of an incident and responds to it.
Service requests are not tickets. Service requests are made from a number
of predetermined items that the organization has made available to its
users through the service catalog. There‘s no need to ―create a ticket‖ to
describe a service request. Your organization is already familiar with this
type of request, which is why they built it out and made it available in the
service catalog.
Support Priorities are assigned to all tickets and take the entire service and
our user base into context when assigned. The following table shows
examples of support request response times and assigned priorities.
Remember that you can change an assigned priority at any time and that
the answers to the most common requests are available in the
Knowledgebase at http://support.proofpointessentials.com. The support
team reserves the right to change the priority pending review of the criteria
of your ticket per the table below. You will be notified via a comment in the
ticket if any priority changes are made.
Please remember that in your terms of service, your company, our partner,
shall provide tier 1 support for your end-users. Proof point Essentials Support
will assist in finding a solution for you only after tier 1 resources have been
exhausted. Direct end-user support will not be provided and any direct
contact will be deferred back to our partner for assistance.
Help desk best practices suggest that SLA policies be driven by ticket
priorities. In Freshservice you can define your service levels for Urgent,
High, Moderate and Low priority tickets. You can then use various
automations in Freshservice or manually dictate which ticket constitutes
an Urgent Priority issue and which is Low Priority.
Target
Priority Definition and Typical Examples Response Time
General questions or feature requests
1 Business Week
P4
Questions relating to the Proofpoint
Essentials platform and its operations
which are for information purposes only.
Single group/domain affected. Other email
received by and sent by subscribing
customers unaffected.
The default SLA policy in Freshservice will be applicable to all tickets coming
in to your helpdesk. It will define the due by time on your ticket based on
your the priorities of your tickets. Once you have configured it in your
system, it will control the way your agents work everyday by telling them
what ticket they have to work on next in a sequential order.
You can learn more about how SLA policies work and Due By times here.
You can also create multiple SLA policies in Freshservice for different
customer tiers, products, agent groups etc. For example, you could have
an "Express Support" SLA policy for high value clients.
Requests are for new functionality that takes less than 4 hours to
implement. Requests that take more than 4 hours to implement
are considered projects are billed on a fixed-fee basis.
5. Incident closure
7. Repeatable Process
4. Resolution
Incident Management
1. Analyzing risks.
Configuration Management.
Plan-Do-Check-Act
Process owner
Interrelated Activities.
Q. Explain Classification?
1. The Service Desk is critically important as the very first contact the
organization‘s users have with IT Services.
Examples:
1. Application
3. Application bug
5. Hardware
6. System-down
7. Automatic alert
Incident => an incident is any event that is not part of the standard
operation.
Known Error =>is an incident or problem for which the root cause is
known and for which a temporary workaround or permanent
alternative has been identified.
Request for Change (RFC) is needed in order to fix the known error.
1. Evaluate
2. Plan
3. Build
4. Deploy
5. Operate
Error Control.
Problem Management.
Incident Management
User
Functional Escalation.
Availability Management
Availability Manager
Q. What is SLA?