Hiring an IT guy - questions to ask

This is an aggregated list of questions discussed for hiring an IT guy for your organization at SpiceWorks community forum. Check out their discussion, and description of what question are good and which ones are not that good.

  1. What port does telnet use?
  2. What is SMTP?
  3. How would you troubleshoot a printer?
  4. How does traceroute work?
  5. Walk me through everything that happens in the network from the moment you punch in www.google.com in the address bar to when the browser displays the page?
  6. Can you work this weekend?
  7. What kind of people are your current users? Do you like them?
  8. What role do you think computer support analysts should play in the company?
  9. Assuming you have to work for a living and all jobs pay the same, how would you describe the job you want?
  10. When conflict arises on your team, how do you handle it?
  11. How do you stay current?
  12. What operating system do you prefer and why?
  13. What part of the project life cycle have you worked on?
  14. Describe the project or situation that best demonstrates your coding (or analytical) skills.
  15. What is the differece between local, global and universal groups?
  16. What is the major difference between FAT and NTFS?
  17. Name the FMSO roles and their functions.
  18. You’ve just been asked to create 20 new Users and update 2 GPOs, ASAP! You go to the Administrative Tools, and discover they are all gone. What do you do? What do you suspect happened?
  19. What is a Global Catalog?
  20. Explain the function of DNS.
  21. Explain a “Two-Way Transitive” trust.
  22. In speaking about trusts, what does “Non-transitive” mean?
  23. Describe the lease process of DHCP.
  24. Explain NTP.
  25. What is the 568B wiring scheme?
  26. What us your highest achievement while working in the IT field?
  27. What are your short term goals to achieve?
  28. You have a user call for support for the 5th time on the same issue. How would you handle the call and what would you do differently?
  29. List as many ways you can think of to move a file from a Windows machine to a Linux machine.
  30. Demonstrate recursiveness by implementing a factorial function.
This entry was posted in General, Unix/Linux, Windows. Bookmark the permalink. Post a comment or leave a trackback: Trackback URL.

11 Comments on Hiring an IT guy - questions to ask

  1. Divya
    Posted 7/8/2008 at 10:45 am | Permalink

    Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an e-mail client using either POP or IMAP. In addition, SMTP is generally used to send messages from a mail client to a mail server. This is why you need to specify both the POP or IMAP server and the SMTP server when you configure your e-mail application.

  2. Fareed
    Posted 7/21/2008 at 1:24 pm | Permalink

    Telnet uses port 23.

  3. priyamenon
    Posted 8/1/2008 at 3:15 am | Permalink

    The main function of DNS is the mapping of IP addresses to human readable names.

    Three main components of DNS

    resolver
    name server
    database of resource records(RRs)

  4. priyamenon
    Posted 8/1/2008 at 3:18 am | Permalink

    The Network Time Protocol (NTP) is a protocol for distributing the universal time (UTC) by means of synchronizing the clocks of computer systems over packet-switched, variable-latency data networks. NTP uses UDP port 123 as its transport layer. It is designed particularly to resist the effects of variable latency by using a jitter buffer.

  5. priyamenon
    Posted 8/1/2008 at 3:21 am | Permalink

    23. DHCP leases are used to reduce DHCP network traffic by giving clients specific addresses for set periods of time.

  6. Shadab
    Posted 10/14/2008 at 2:26 am | Permalink

    When you execute a trace route command (ie trace route http://www.yahoo.com), your machine sends out 3 UDP packets with a TTL (Time-to-Live) of 1. When those packets reach the next hop router, it will decrease the TTL to 0 and thus reject the packet. It will send an ICMP Time-to-Live Exceeded (Type 11), TTL equal 0 during transit (Code 0) back to your machine - with a source address of itself, therefore you now know the address of the first router in the path.

    Next your machine will send 3 UDP packets with a TTL of 2, thus the first router that you already know passes the packets on to the next router after reducing the TTL by 1 to 1. The next router decreases the TTL to 0, thus rejecting the packet and sending the same ICMP Time-to-Live Exceeded with its address as the source back to your machine. Thus you now know the first 2 routers in the path.

    This keeps going until you reach the destination. Since you are sending UDP packets with the destination address of the host you are concerned with, once it gets to the destination the UDP packet is wanting to connect to the port that you have sent as the destination port, since it is an uncommon port, it will most like be rejected with an ICMP Destination Unreachable (Type 3), Port Unreachable (Code 3). This ICMP message is sent back to your machine, which will understand this as being the last hop, therefore trace route will exit, giving you the hops between you and the destination.

    The UDP packet is sent on a high port, destined to another high port. On a Linux box, these ports were not the same, although usually in the 33000. The source port stayed the same throughout the session, however the destination port was increase by one for each packet sent out.

    One note, traceroute actually sends 1 UDP packet of TTL, waits for the return ICMP message, sends the second UDP packet, waits, sends the third, waits, etc, etc, etc.

    If during the session, you receive * * *, this could mean that that router in the path does not return ICMP messages, it returns messages with a TTL too small to reach your machine or a router with buggy software. After a * * * within the path, trace route will still increment the TTL by 1, thus still continuing on in the path determination.

  7. Shadab
    Posted 10/14/2008 at 2:34 am | Permalink

    NTFS

    1)allows access local to w2k,w2k3,XP,win NT4 with SP4 & later may get access for somefile.

    2)Maximum size of partition is 2 Terabytes & more.

    3)Maximum File size is upto 16TB.

    4)File & folder Encryption is possible only in NTFS.

    FAT 32

    1)Fat 32 Allows access to win 95,98,win millenium,win2k,xp on local partition.

    2)Maximum size of partition is upto 2 TB.

    3)Maximum File size is upto 4 GB.

    4)File & folder Encryption is not possible.

  8. Shadab
    Posted 10/14/2008 at 2:37 am | Permalink

    The global catalog is a distributed data repository that contains a searchable, partial representation of every object in every domain in a multidomain Active Directory forest. The global catalog is stored on domain controllers that have been designated as global catalog servers and is distributed through multimaster replication. Searches that are directed to the global catalog are faster because they do not involve referrals to different domain controllers.

  9. Shadab
    Posted 10/14/2008 at 2:40 am | Permalink

    A two-way trust can be thought of as a combination of two, opposite-facing one-way trusts, so that, the trusting and trusted domains both trust each other (trust and access flow in both directions). This means that authentication requests can be passed between the two domains in both directions. Some two-way relationships can be either nontransitive or transitive depending on the type of trust being created. All domain trusts in an Active Directory forest are two-way, transitive trusts. When a new child domain is created, a two-way, transitive trust is automatically created between the new child domain and the parent domain.

  10. Shadab
    Posted 10/14/2008 at 2:48 am | Permalink

    In a transitive trust relationship, the trust relationship extended to one domain is automatically extended to all other domains that trust that domain.
    And In a nontransitive trust relationship, the trust is bound by the two domains in the trust relationship; it does not flow to any other domains in the forest.

  11. Raj
    Posted 1/9/2009 at 1:55 pm | Permalink

    Here are a few simple techniques that will solve many printer problems.

    Reboot your computer. This generally solves most printing problems.
    If it’s not printing, or you’re getting a message about the Fax printer, change your default printer: Start - Settings - Printers/Faxes. Right-click the printer you want, and then select (left-click) Set as Default.
    Check and make sure all connections going to and coming from the printer are firmly in place.
    Check that the printer is on-line:
    Start - Settings - Printers, right-click the printer.
    If there isn’t a checkmark by “Set as Default”, left-click that option to select it.
    Print a test page. If that prints and the application you are using doesn’t, you probably will need to contact the application’s vendor for support.
    Turn off your printer for 10 seconds and turn it back on. Make a note of any error messages or flashing lights when the printer is turned back on.
    If your printer is connected directly to another computer, try rebooting that computer. If your printer is connected to a JetDirect box, try unplugging the JetDirect box for 10 seconds.
    You may wish to uninstall and then re-install your printer.

Post a Comment

Your email is never published nor shared. Required fields are marked *

*
*