Saturday, January 10, 2015

Technical Questions


Q. What questions would you ask to help isolate a user’s problem?
A. This question is used by the hiring manger to assess your problem-solving abilities. The following represent some of the common questions that you would ask the end-user to help diagnose a situation:
  • When did the problem first start?
  • Has the system ever worked properly?
  • What was the last thing done to the system prior to the failure?
  • Is the issue intermittent or ongoing/constant?
  • Are there any error messages? If so, what are the specific error messages?
  • Has any new hardware been added to the system?
  • Has any new software been added to the system, including downloads from the Internet?
  • Has anything changed with the system (for example, has it been moved) since the issue presented itself?
  • Has anyone else had access to the system?
  • Are there any environmental factors that could be causing the issue?
  • Have you done any troubleshooting on the system on your own?
  • Have you checked all the cables/connections for a tight fit?
Q. What are the main differences between the following operating systems?
A. Unfortunately, most companies have not been able to standardize the operating systems used by users. It’s always critical that you know more than just the current version because there will always be a user who has a problem with an older version. By asking this question, the hiring manager is actually testing your knowledge of different operating systems that you may need to support. The following provides a concise summary of some of the major differences.
Windows 2000 and XP
Overall, XP is a minor update with Windows 2000 designed to get  Windows 2000 technology into the hands of consumers. The major changes include the following:
  • Device driver rollback
  • Remote control (single-user terminal services)
  • New Start menu, control panel, and user interface elements
  • Fast user switching
  • Encrypted file system support for redirected folders
  • Better support for roaming wireless networking
  • Enhanced policies
  • Credential Manager
  • Personal firewall
Q. What are typical virus sources and how do you prevent virus attacks?
A. This is virus protection 101 just to ensure that you understand the basics of protecting against viruses. Possible virus sources include e-mail attachments, Internet downloads, and infected floppy disks. To prevent virus infections:
  • Use anti-virus software.
  • Perform regular updates to the virus software definition files and scan engines. Verify updates have succeeded.
  • Perform regularly scheduled virus checks.
  • Configure software to check all files, not just program files.
  • Educate users on virus attacks, their consequences, and how to prevent them.
  • Know where all software came from.
  • Do regular backups.
  • Develop reporting mechanisms to inform server administrators of observed desktop infections and how these could impact the server environment (such as deletions or corruption of files on public shares, hidden payload files that might have been uploaded to servers, and so on).
Q. What are some of the guidelines you would recommend for implementing security at the user level?
A. Security is a major part of the desktop technician’s day-to-day responsibilities. As the closest point of contact to the end-users, technicians need to be savvy on the different methods for enforcing security. Some of the top techniques are included below.
Anti-virus software:
  • Ensure that all users install and regularly use anti-virus software on their PCs.
  • Instruct users to immediately notify the helpdesk when they suspect they’ve contracted a virus.
Password security:
  • Instruct users not to give out their passwords.
  • Instruct users not to write down their passwords.
  • Instruct users to make sure their password cannot be easily guessed by using a combination of alphanumeric characters, including special characters (~ ! @ # $ % ^ & * ( ) + = [ ] { } / ? < > , ; : \ | ` ’ ” .).
  • Instruct users to change their password if they think there is even a slight chance someone knows it.
  • Instruct users to ensure their password is at least eight characters long.
  • Instruct users not to use a variation of their user ID.
  • Regularly change passwords on Administrator accounts on PCs (NT, Windows 2000 and XP)
Desktop security:
  • Instruct users not to leave their workstation logged in overnight.
  • Instruct users to enable screen savers that automatically lock their PC when there is no activity on it for more than five minutes.

5 comments:

  1. That is an extremely smart written article. I will be sure to bookmark it and return to learn extra of your useful information. Thank you for the post. I will certainly return.

    ReplyDelete
  2. Awesome work.Just wanted to drop a comment and say I am new to your blog and really like what I am reading.Thanks for the share

    ReplyDelete
  3. Very interesting blog. A lot of blogs I see these days don't really provide anything that attract others, but I'm most definitely interested in this one. Just thought that I would post and let you know.

    ReplyDelete
  4. I really appreciate your professional approach. These are pieces of very useful information that will be of great use for me in future.

    ReplyDelete
  5. What you're saying is completely true. I know that everybody must say the same thing, but I just think that you put it in a way that everyone can understand. I also love the images you put in here. They fit so well with what you're trying to say. I'm sure you'll reach so many people.

    ReplyDelete

Dear Reader, if you like My Blog content, feel free to comment on our blog posts.