Top 100 Desktop Support Engineer Interview Questions

  1. Home
  2. Database
  3. Top 100 Desktop Support Engineer Interview Questions
Top 100 desktop support interview questions

Becoming a Desktop Support Engineer requires you to know your way around desktop hardware, software applications, operating systems and network connectivity. Together with problem solving to resolve problems while maximizing efficient use of computing resources. As a Desktop Support Engineer you will be required to fix issues with an organization’s desktop computers and laptops, as well as handle concerns with servers and security issues affecting business networks.

When a customer has an incident or a service request, the Desktop Engineer’s task is to assist them by phoning them or updating the incident with a solution. To pass through your job interview successfully on the first try, go to Wisdomjobs’ website for Desktop Engineer job interview questions and answers. Finding a new work can be so time-consuming that it becomes a job in and of itself. If you have experience with systems and graphics engineering, you should prepare thoroughly for employment interviews. Here’s our advice on what you should do to prepare for a job interview so you may easily attain your career goals.

1. What is Active Directory and how does it work?

The security of the computer and software is ensured by Active Directory, which authorizes and authenticates all users and computers in a window domain network. Various functions, such as creating admin users and connecting to printers or external hard drives, can be managed via Active Directory.

2. What is DHCP and how does it work?

The dynamic host configuration protocol (DHCP) stands for dynamic host configuration protocol. It’s a method of allocating IP addresses to a large number of computers in a network. It helps in managing a large number of IP’s very easily.

3. What is the difference between scope and super scope?

The scope includes IP addresses such as gateway IP, subnet mask, and DNS server IP. It can be used to communicate with the rest of the network’s computers. When you combine two or more scopes, you obtain a superscope.

4. Define DNS.

Domain Naming Service (DNS) is a service that converts IP addresses to names and names to IP addresses. DNS acts as a translator for computers, allowing them to understand numbers rather than letters. If we enter, for example, the computer will not recognise it and will utilise DNS to translate ( to (numbers) before executing the instruction.

5. What do you mean by forward and reverse lookup in DNS?

Reverse lookup refers to the process of translating an IP address into a name, whereas forward lookup refers to the process of converting names into an IP address.

6. What is the difference between a ‘A’ and a ‘MX’ record?

The ‘A’ record, also known as the host record, can be used to map an IP address to a specific name. DNS can determine the IP address of a name using this record. The ‘MX record,’ also known as the mail exchanger record, is used to identify the location of the mail server. In DNS, the record can also be found.

7. What is IPCONFIG stand for?

The IPCONFIG command is used to display IP information about the computer, such as DNS and gateway IP addresses.

8. If you couldn’t utilize switches to connect two computers, what would you do ?

Without the usage of switches, cross cables are utilised to link two computers.

9. What do you mean by the term Domain?

A domain is a collection of computers that the internet recognises. It can be utilised by computers that are managed centrally. When you instal Active Directory, it creates this folder.

10. Explain how you’ll restore data if your system is infected with a virus?

You’ll need to install a new hard drive with the most recent anti-virus software and an operating system with the most recent patches. Connect the infected HDD as a secondary drive before starting your system, then scan and clean the contaminated hard drive. You can now copy the files into the system.

11. What operating system are you using?

The operating system serves as a translator between software and hardware. It performs the function of a user interface.

12. What are the different kinds of operating systems, or O.S.?

The following are the two types of operating systems:

  • Network Operating System (NOS) is an acronym for Network Operating System. Windows NT, 2000, and 2003 are examples of NOS.
  • SOS stands for “Simple Operating System.” Windows 95, 98, and ME are examples of SOS.

13. What is the RAS server?

Remote Access Server is the abbreviation for Remote Access Server. It enables you to use a tool or information that is normally stored on a network or on IT devices using a combination of hardware and software, such as connecting to a printer or a file. It’s typically reserved for networked mobile users. It connects its users to the internet via a phone line. It can also be used to connect two or more offices in a network.

14. What exactly is a VPN server?

The term VPN refers to a virtual private network. It’s a secure communications network that allows businesses and organisations to connect privately over a public network. This is utilised by the network’s mobile users.

15. What is the distinction between a RAS server and a VPN server?

RAS is a true local area connection between two connections, whereas VPN is a local connection that spans a broad geographical region.

16. What exactly is an IAS server?

The acronym IAS stands for Internet Authentication Service. They perform accounting and auditing, as well as centralised connection authentication and authorization, for several types of network access, including wireless, authenticating switches, and remote access dial-up.

17. Define Ping Command

The Ping command is used to check physical IP connectivity between two or more devices.

18. What exactly do you mean when you say clustering? What are the advantages?

Clustering is the process of one or more computers working together as a single system and sharing resources. Clustering has the advantage of reducing the burden on a single system by distributing the load, as well as providing service redundancy.

19. What is the definition of a group?

The term “group” refers to a collection of user accounts. It allows for network administration to be simplified.

20. What is the definition of a child domain?

The member domain of Windows 2000 Active Directory is referred to as a kid domain.

Tableau Desktop Certified Professional free practice test

21. What are the advantages of having a child domain?

  • The following are some of the advantages of the child domain:
  • Network traffic is low.
  • Administrative costs are low.
  • Defensible perimeter

22. What exactly is OU?

The acronym OU stands for Organizational Unit. It’s an Active Directory container that can hold users, groups, and machines. It’s the lowest unit on which a group policy can be set by an administrator.

23. What is the meaning of group policy?

All users in the network have expedited access thanks to group policies. It can be used to set security and networking settings for a user. You can preserve control over some functions by using group policy, such as not allowing users to shut down the system, access the control panel, or run commands.

24. When it comes to permission, rights, and policy, what’s the difference?

On active directories, such as the site, domain, and OU, the term “policy” is used. Users and groups are given “Rights,” whereas network resources such as files, folders, and printers are given “Permission.”

25. What are the meanings of DC and ADC?

  • The Domain Controller is abbreviated as DC, and the Additional Domain Controller is abbreviated as ADC.
  • The domain controller’s backup is the ADC. The domain controller is a server that verifies security information such as user id and password.

26. What is the difference between a DC and an ADC (Additional Domain Controller)?

There is one distinction between the domain controller and the additional domain controller: the domain controller has all five operational roles available, but the ADC only has three.

27. What is the difference between a DC (Domain Controller) and an ADC (Additional Domain Controller) in terms of their operational roles?

DC (Domain controller) has the following operational roles:

  • Firstly, Master of Domain Naming
  • Secondly, Master Schema
  • Master RID
  • Emulator for PDC
  • Master of Infrastructure

The ADC (Additional Domain Controller) has the following operational roles:

  • Emulator for PDC
  • Master RID
  • Master of Infrastructure

28. What is the definition of a “Default Gateway”?

The default gateway is the network’s router’s IP address. In any instance, if the user wishes to connect to a different network or is unable to discover their own, their inquiry will be sent to the default gateway.

29. In MS Outlook, how do you make a backup of your emails?

To make a backup in Microsoft Outlook, navigate to the control panel. Go to the mail option in the control panel, then open the data file, pick personal folder, and click open folder. After that, you must copy the.pst file and paste it anywhere you want the backup to be saved.

30. What is the difference between a trusting domain and a trusted domain?

Resources are available in the trusting domain, whereas a user’s account is available in the trusted domain.

31. What is the speed of the BUS?

BUS speed is the rate of communication between the microprocessor and the RAM.

32. How do you refer to the Active Directory Partitions?

Active directory partitions are divided into three categories.

  • Schema division
  • Partition for configuration
  • Partitioning by domain

33. What is the main distinction between a Gateway and a Router that you can think of?

A gateway uses a different network architecture than a router, which uses the same one.

34. What is the contents of the packet?

A packet is a logical grouping of data that includes a header that contains user data as well as location data.

35. What is SCSI, and how does it work?

Small Computer System Interface is the acronym for Small Computer System Interface. It’s a standard electronic interface that lets personal computers connect with peripheral devices like disc drives, tape drives, printers, and CD-ROM drives. The data transfer rate in “SCSI” is extremely rapid.

36. How many classes are there for “IP addresses” and what are the ranges?

They are segregated into five classes

  1. Firstly, Class A  ===          0 -126 ( 127 is reserved for loop back)
  2. Secondly, Class B  ====    128- 191
  3. Thirdly, Class C  ====    192-223
  4. Next, Class D  ====   224-239
  5. Class E  ====   240-255

37. What does the word FIXMBR mean?

FIXMBR is a repair programme. It fixes the Partition Boot Sector’s Master Boot Record.

38. What is the meaning of the term SID?

Security Identifier is the abbreviation for Security Identifier. SID is the unique ID assigned to each computer entity.

39. What’s the distinction between incremental and differential backups?

  • Only files that have changed since the last backup will be selected by differential backups.
  • Only the data that has changed since the last backup will be selected in incremental backups.
  • For example, On Sunday, you make a backup of five 40-MB text files. The total size of the backup will be 200MB.
  • You only update two lines in ONE of the text files on Monday.
  • Only the altered text file will be backed up when using differential backup. The total size of the backup will be 40MB.
  • Only the data corresponding to the two lines will be backed up when using incremental backup. The entire size of the backup will be measured in bytes.

40. What is the difference between a server operating system and a desktop operating system?

Server OS allows for centralised user administration, shared resources, and security, whereas desktop OS simply allows for local administration.

Exam AZ-140: Microsoft Azure free practice test

41. What’s the difference between an MSI and an EXE file?

MSI (Microsoft Installer) allows you to instal, uninstall, and repair software using just one file.

To install and uninstall the software, the EXE file requires two files. Moreover, MSI will instruct users to use the add and remove program in the control panel to remove the existing product first and then install the new program, whereas EXE can detect the existing version of the software and give them the option to uninstall it, whereas EXE can detect the existing version of the software and give them the option to uninstall it, whereas MSI will instruct users to use the add and remove program in the control panel to remove the existing product first and then install the new program.

42. What exactly is BSOD? What are your options for resolving the issue?

The Blue Screen Of Death is abbreviated as BSOD. When the operating system or hardware fails, Windows is unable to run the software and displays a blue screen with a code. The best way to fix this issue is to restart the computer. If it doesn’t work, try starting the computer in safe mode.

43. What does the PTR (Program Trouble Record) stand for?

This programme record, which is the polar opposite of the ‘A’ record, is used to check if the server name is associated with the IP address. This record is also known as Reverse DNS records or pointer records because it is created in the reverse lookup zone.

  • PTR record= Give me an IP address and I’ll give you the name ‘A’ record= Give me the IP address and I’ll give you the name
  • ‘A’ record= Give me the name and I will give you the IP address

44. What is the definition of a reservation?

In the DHCP server, the term “Reservation” is basically utilised. Some network equipment or computer systems require a specific IP address, in which case we establish a reservation for that computer system in the DHCP server. By making a reservation, you gain access to that specific IP address while also preventing other computer systems from using it.

45. What is the difference between an SMTP server and a POP server?

  • Postal protocol is abbreviated as POP. Its primary function is to send and receive mail.
  • Simple mail transfer protocol (SMTP) is an acronym for simple mail transfer protocol. In the network, it is used for receiving mail.

46. What is the purpose of RIS and why do you utilise it?

Remote installation services (RIS) is an acronym for remote installation services. It’s used to transfer a Windows server image to new hardware. We utilise RIS because installing the OS from a CD every time would take too long.

47. What is “Bootloader”?

The bootloader makes it easier to instal the operating system on the computer. It facilitates the booting process and gives users the option of selecting an operating system when starting the machine.

48.What Is a Domain Name System (DNS)?

DNS stands for Domain Naming Service, and it’s responsible for translating IP addresses into names and names into IP addresses. DNS acts as a translator for computers, allowing them to understand numbers rather than letters. If we enter, for example, the computer will not recognise it and will utilise DNS to translate ( to (numbers) before executing the instruction.

49. What Is Blue Screen And How Does It Work? What Would You Do If Your Computer Stopped Working?

The main issue is RAM. Check it first, then proceed to safe mode. Scanning your PC with an antivirus programme and updating drivers (motherboard approved drivers or suggested software) should be done at the same time.

50. How Do You Make A Hard Disk Dynamic?

To convert a basic disc to a dynamic disc, go to Run and type diskmgmt.msc. After that, choose the hardisk and right-click it.

51. How Do I Create A Windows System Service File?

When Windows File Protection is enabled, altering or deleting a system file that does not have a file lock to prevent it from being overwritten causes Windows to restore the original copy of the file promptly and discreetly. A cached folder containing backup copies of these files is used to restore the original version of the file.

52. What Is The Technical Difference Between Desktop Support and Help Desk?

The following are the distinctions between desktop support and helpdesk:

  • Desktop support is the person who performs on-the-spot troubleshooting.
  • The person who receives the call and troubleshoots it remotely is the helpdesk support.

53. How Do I Make Desktop Icons Look Bigger?

On the desktop, right-click. Go to the properties tab and then the appearance tab. After that, go to the effects tab. A door will swing open. Choose the option to use a large font. Then click OK to apply the changes. That is all there is to it.

54. Define TFT

TFT-LCD (Thin Film Transistor-Liquid Crystal Display) is a Liquid Crystal Display (LCD) version that improves image quality by using Thin-Film Transistor (TFT) technology. TFT LCD is a type of active matrix LCD that is often confused with LCD. Both flat panel screens and projectors use it. TFT displays, which are frequently available in sizes ranging from 12 to 30 inches, are rapidly overtaking competitive CRT technology in computers.

55. On the networking side, what is the IP range? How Do We Fix Outlook Problems? How Do I Set Up Ldap In Outlook?

  • On the networking side, IP range is linked to DHCP and Address pools. Ex: to -> Can be configured as an address range that can be sent to client computers, whereas to are not.
  • On Outlook, you can set up LDAP by going to Tools->Account settings-Address books-Select new address book->
  • Select LDAP address book, then enter server information in the following box.

56. What is The Best Way To Make Desktop Icons Smaller Or Larger?

Simply right-click the mouse button in a blank place on your main desktop, then scroll down and click properties. You’re in the display settings menu, and on the top bar, you’ll find a button labelled “appearance,” which you should select. Click the advanced button once you’ve arrived at the appearance tab (it should be in the lower right corner) Once you’ve arrived at the advanced window, you’ll notice a scroll down menu with desktop displayed; click on this and scroll down to icons; now simply increase the font size of the icons, and the icons will grow larger; to increase the font size of the text, there’s a bar beneath that; it’ll list the format the text is displayed in, and to the right of that will be the font size; to the left of that will be the font size; to the right of that will be the font size.

57. What’s the best way to access a client in a different location from the server?

When we use MSTSC (Remote Desktop Connection) to access systems in different locations, we will Remote Access to the Server from the client system, and from the Server, we will Remote Access the other location’s Server, and from that server, we will access the clients of that location.

It is the most dependable method. You can also utilise third-party Remote Connectivity Applications like TeamViewer if your network has Internet access. You can use TeamViewer to connect to any system over the internet.

58. What Is The Best Way To Install A Pre-Existing Printer On A User’s Computer?

Navigate to the control panel, then to the add hardware wizard. After that, carefully read all of the alternatives. Insert the software CD if the system requires it; otherwise, the system will install it automatically. Restart your computer.

59. How Can You Reboot Directly To Your Desktop Instead Of Having To Login Every Time You Reboot Or Turn On Your Computer?

To manage your computer, first right-click on it and then select manage. A window appears at that point. Then look for users and groups in your area. The total number of users will then appear. Then right-click on the user name you’ve typed in. Set a password by clicking Set Password. Simply press the OK button. You will be taken di the next time on words.

60. How To Tell If The Print Spool In Running And Where Is It Located? Where Does It Store Spooled Print Jobs?

Print spooler is a critical service in Windows that allows you to utilise a printer to print documents on a local or network printer. If this service is interrupted for any reason, the printer will not work on that computer.

HDI  Desktop Support Manager free practice test

61. What Is a Firewire Port and How Does It Work? What Are Its Functions?

A FireWire port is a type of Serial Port that uses FireWire Technology to quickly transport data from one electronic device to another.

The FireWire connector may communicate with a variety of different devices. FireWire, for example, can be an excellent way to connect a scanner to a computer system. Because the transmission rate in a FireWire port can reach 400Mbps, data transfer is quite quick and of high quality.

62. What do you think a Desktop Support Engineer’s responsibilities are?

A Desktop Support Engineer’s main tasks include:

The OS was installed flawlessly.

  • Maintaining all of the operating systems that have been installed.
  • Installing new software and making sure it’s up to date.
  • Remote desktops can be connected.
  • Anti-virus software is used to scan the operating system on a regular basis to safeguard it against virus attacks.
  • Managing the backup and recovery operations.
  • Optimizing and maintaining the operating system on a regular basis.

63. What is the purpose of the IPCONFIG command?

  • IPCONFIG is a console application that runs from the Windows command prompt. It has a number of command-line arguments.
  • ipconfig provides the network adapter’s configured information, such as the gateway, IP address, and subnet mask, in a concise manner.
  • ipconfig /all exposes extensive network adapter information such as DNS, MAC address, DHCP, subnet mask, IP address, gateway, and so on.
  • The IP address of the network adapter is released with ipconfig /release. It’s mostly used for network adapters that get their IP addresses from a DHCP server.
  • The IP address is renewed with ipconfig /renew.
  • The command ipconfig /displaydns displays the DNS Resolver Cache.

64. What are the elements of reservation?

A reservation consists of the following elements:

  • A reservation name – This is something that the administrators assign.
  • An IP address for the client.
  • Media Access Control (MAC) – Address of the client.
  • A description assigned by the administration.
  • Boot Protocol, DHCP Reservation or both.

65. What do you mean when you say “reservation”?

A specific IP address is required by some computer systems or network devices. Reservations are made in the DHCP server for that specific machine in certain instances. It grants access to that system through that IP address and prevents other systems from accessing it.

66. How to export the OST mailbox as PST files ?

  • Select the files option.
  • Navigate to open and export and click on import and export.
  • Go to Export a file option and click next.
  • Click on the Microsoft Exchange server and click next again.
  • Select the folder that you want to export and click on next.
  • Browse a location to save the new PST file.
  • Choose the options for duplicate items.
  • Finish

67. How to use Archiving to save OST files as PST ?

  • Firstly, Launch Outlook
  • Secondly, Select option, From the file menu.
  • Thirdly, Select the advanced option and click on auto-archive settings.
  • Select the frequency of running auto-archiving.
  • Pick the folder for saving the archived files and provide the options for archiving.
  • Click OK and you are done.

68. What do you mean by NTLDR Error ?

This issue commonly happens when the computer attempts to boot from a non-bootable flash drive or hard drive. This issue can also be caused by corrupt and misconfigured hard drives, OS upgrade problems, obsolete BIOS, loose IDE connectors, and corrupt files.

69. How do you fix the NTLDR Error?

  1. Restart your system. If the errType or is a fluke, then it will be fixed.
  2. Check your optical disk and floppy drive.
  3. Disconnect any external drive.
  4. Check for the settings of all drives in BIOS to make sure they are correct.
  5. Restore the important system files from the original Windows CD.
  6. Replace or repair the boot.ini file.
  7. Write a new Windows partition boot sector.
  8. Repair the master boot record for Windows.
  9. Reset all power cables and internal data.
  10. Update the BIOS of your motherboard.
  11. Repair the installation of your OS.
  12. Perform a clean installation of the OS.

70. How are you going to fix a system that constantly restarting?

There are a few options for correcting this problem.

  • First, turn off the auto-restart feature.When the Windows logo appears after turning on the computer, press the F8 key.
  • From the boot menu that displays on the screen, select safe mode.
  • Start in safe mode and open the Run Window.
  • Click OK after typing sysdm.cp.
  • Go to the advanced tab and click on the Startup and Recovery section’s settings.
  • Uncheck the Automatically Restart option box under System Failure. Click OK to save your changes.
  • Then, delete the problematic registry entries.

71. How can I go right to my desktop without having to log in every time my computer reboots or turns on?

It can be done by following the below steps:

  • Launch Run Window.
  • Type netplwiz for Windows 10 and control userpasswords2 for all the versions of Windows.
  • You will be taken to the User Accounts window. Here you can control their various aspects and properties. Then, go to the Users Tab.
  • Uncheck the box beside – Users Must Enter A User Name And Password To Use This Computer option.
  • Choose an account to log in automatically on reboot.
  • Type in the username and password.
  • Click OK
  • It’s done. Next time when you restart the system, you will directly login to the desktop of the chosen account.

72. Is it possible to add a system to a domain? How?

  1. Go to the control panel.
  2. Select system and security.
  3. Click on the system.
  4. Go to Computer name, domain, and workgroup settings.
  5. Select change settings.
  6. Navigate to the Computer Name tab and select change.
  7. Click on Domain under the Member Of option.
  8. Type in the domain name which you want the system to join.
  9. Click Ok and then do that again.
  10. Restart the system.

73. What is the difference between a RAS and a VPN Server?

RAS is an industry-standard remote connection method.Is meant for the medium and large-sized network.
Is ExpensiveExtremely economical
Is UnstableStable and secure.
Not fun to deal with.Hassle-free and easy to deal with.

74. What is a Parallel Port?

Data is transmitted in parallel through a parallel port. It sends data in 8-bit increments. It is quicker than using a serial port. It’s a female connector with 25 pins.

75. What is the purpose of a serial port?

Serial ports send data in a sequential format. It works by sending data one bit at a time. It is a method of transferring data one bit at a time. It’s a slower port than parallel. It’s a male connector with 9 or 25 pins.

76. What Is the Role of the Operation Master?

The Network’s Domain Controller has the Operation Master Role. Operation master positions are divided into five categories:

  • Schema master
  • Domain Naming Master
  • RID Master
  • PDC Emulator
  • Infrastructure Master

77. Explain about Site?

A site is a physical location where all domains are available. The replication traffic between two or more different sites in the network is managed by the site.

78. What is the meaning of Forest?

A forest is a collection of trees that share a common structure but not a shared name space (Schema).

79. What Are the Requirements for a Basic Home Network?

  • Router/Hub
  • LAN cards,
  • LAN (local area network) cables

80. Which Command Is Used To Check Ip Configuration?

You can use ipconfig /all to display all of the current TCP/IP configuration values, including the IP address, subnet mask, default gateway, and Windows Internet Naming Service (WINS) and DNS configurations.

ArcGIS Desktop Associate (EADA 19-001) free practice test

81. What Is The Best Way To Start In Safe Mode?

Open Run and type “msconfig” into the box. A system configuration window will appear; click the Boot tab, check the “Safe boot” box, and choose “Minimal” for a normal safe boot. When you click Apply, your computer will restart in Safe Mode the next time it boots up.

Restart your computer. As soon as your system starts to boot, start tapping the F8 key. This will give you a variety of boot options, including Safe Mode.

82. What Is Safe Mode’s Purpose? When Is It Appropriate To Use It In Windows?

We frequently need to launch Windows in Safe Mode to remove spyware, troubleshoot driver issues, and perform other diagnostic tasks. To execute the operating system, only a few particular programmes and files with restricted driver support are required. This will enable you to eliminate viruses, replace damaged drivers, and perform other diagnostic operations that are not possible in Normal Mode.

83. How Do I Find The Path That A Packet Takes To Its Destination?

Using “tracert” command lets you see the path traveled by a packet to its destination.

85. Name the five Microsoft office applications?

The five Microsoft office applications:

  • Firstly, MS Access
  • Secondly, MS Excel
  • Thirdly, MS PowerPoint
  • MS Outlook

86. What is the use Boot.ini?

Boot.ini is utilized to make a decision which working system options are displayed during the start-up procedure.

87. What is the BUS speed?

The speed of communication velocity between microprocessor and RAM is known as BUS speed.

88. Define Fix Boot.

Fix boot writes an innovative partition boot sector on to the coordination partition.

89.What is the difference between a server and a desktop operating system?

While server OS provides centralised administration for users, shared resources, and security, desktop OS provides a single point of contact for local administration.

90. Define SID.

SID refers to Security Identifier. Every computer object has a single ID which is known as SID.

91. What is an IP Address and where can I find one?

Your computer’s IP address is a number that is allocated to it to identify its existence and position on a network. As part of the identifying process, the DHCP server will assign a number to each machine connected to the network.

92. What do you mean by Blue Screen of Death (BSOD)?

Bad hardware is the most typical cause of BSOD; the issue displays as a blue screen that crashes the computer. BSODs can be caused by conflicts in hardware, software, or drivers. To troubleshoot a BSOD, perform a full hardware diagnostic on the computer and update all of the drivers.

93. How would you change folder permissions?

You can change folder permissions through Group Policy but it can also be done at the local level with Administrator Privileges. Under folder properties, select the Security tab and then the Edit button, after which a pop-up will provide and ability to add users and allow for reading, Write. Execute, or Full permissions.

94. What makes a Switch different from a Hub?

There are a few key distinctions between a Switch and a Hub. A hub connects numerous computers to a single network, whereas a switch divides the same network into multiple segments. Second, with a Hub, all computers linked to it receive data packets at the same time, which can cause latency concerns. Switch can control this by sending data packets only to computers that have requested them.

95. How would you restore data from a computer infected with a virus?

You would extract the HD from the infected PC in order to successfully and safely retrieve data. Slave it to a computer with the most recent virus definitions, Microsoft patches, and drivers. You’d next check the disc for viruses, and after they’re gone, you’d be able to extract any data that needed to be recovered.

96.What is the distinction between RAM and ROM?

RAM stands for random access memory, which is used to temporarily store data. It is the data on which the computer is now processing. Read-only memory, or ROM, is a type of permanent memory storage for storing vital data. The BIOS is a good example.

97. What are the benefits of using device drivers?

Device drivers are also a type of software that is required to execute the system’s hardware components. These are fundamental issues, and any candidate should be able to answer them.

98. What is MS CONFIG?

To troubleshoot drivers and starting processes, utilise the Microsoft Configuration Utility. It can be used to hide, enable, or disable Microsoft services such as WLAN auto-config, security centre, and Windows Defender, among others.

You can access all information about tools such as internet properties, IP configuration, applications, task manager, and so on using this command. You may also change boot settings by adjusting boot parameters, and you can assist speed things up by eliminating launch apps that aren’t essential.

99. How can you display the System Properties dialogue box with the keyboard?

Windows logo key + pause can be utilised.

100. How do you use the keyboard to open Windows Mobility Center?

x + Windows logo key


These are some of the most common interview questions for Desktop Support. These interview questions will definitely help you analyze and enhance your present level of expertise if you are someone who has recently begun a career in Desktop Support. We hope this was of assistance! Testpreptraining will keep you safe while you practice!

ArcGIS Desktop Professional (EADP 19-001) free practice test