Interview questions for IT specialist

Posted on 2010-03-24
Medium Priority
Last Modified: 2013-11-16
Thank you for helping. My company has 50 windows workstation with outlook 2003, exchange server 2007, Domain controller with AD on 2003 server, 2003 file server and Cisco ASA. I’m looking to hire an IT specialist to take care all the computers, servers and network. I need 10 interview questions with answer for this IT specialist. Thank you =)

Question by:weikiiro
LVL 19

Accepted Solution

vmwarun - Arun earned 400 total points
ID: 28506339
Active Directory

1.What are SYSVOL and NETLOGON Folders ?
2.What is a NTDS.dit file ?
3.Differentiate between Transitive and Nontransitive Trusts
4.How do you troubleshoot Replication Issues between Active Directory SItes ?
5.What are Security & Distribution Groups ?
6.What is Distributed File System and what are its pros and cons?
7.What is dcpromo /adv switch do ?
8.What is the difference between Windows Server 2008 and Windows Server 2003 Active Directory Functionality ?
9.What does Active Directory Integrated DNS means ?
10.What is APIPA (Automatic Private IP Addressing) ?

CCNA,MCSE, MCSA or MCTS Certification would be an added advantage.

Also check whether the person has any exposure to Virtualization such as Microsoft Hyper-V, Citrix XenServer or VMware ESX since this would be very helpful if you go for consolidation in future.

Expert Comment

ID: 28508856
What type of switches are at the doors? Sounds like something spanning tree could take care of automatically.

Expert Comment

ID: 28508929
Not exactly sure how that posted here. Was meant for another question.
Will You Be GDPR Compliant by 5/28/2018?

GDPR? That's a regulation for the European Union. But, if you collect data from customers or employees within the EU, then you need to know about GDPR and make sure your organization is compliant by May 2018. Check out our preparation checklist to make sure you're on track today!

LVL 24

Assisted Solution

Awinish earned 400 total points
ID: 28514695
Ask basic question,coz if basics is cleared person will able to handle anything.
LVL 57

Assisted Solution

by:Mike Kline
Mike Kline earned 400 total points
ID: 28515376
Daniel has a ton of questions in a four part series


Arun's questions are all valid

You are expecting him to sort of know a little bit of everything so don't get to down if they can't answer every hard question.  Attitude is also very important for that type of job.

Good luck


LVL 17

Assisted Solution

by:Premkumar Yogeswaran
Premkumar Yogeswaran earned 400 total points
ID: 28523484
Check this blog...!

Assisted Solution

Tymetwister earned 400 total points
ID: 28589194
What two FSMO roles of AD does Microsoft recommend should not be put on the same server?
What is the Active Directory Connector (ADC) used for?
Explain the correct way to clear Exchange transaction logs.
Which utility is used to check Exchange database integrity?
What is the name of the Exchange database file?
What is DNS and why is it important?
When would a DNS "A" record typically be used?
What are some of the standard port numbers for: (HTTP, FTP, SMTP, Telnet)
What is NTDLR?
How would you configure a client machine for remoting if you wanted to use a different port number?

Just some ideas. Covers a lot of different ground.

Author Comment

ID: 29230122
Thank you all for your help. =)

Featured Post

Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this post, we will learn to set up the Group Naming policy and will see how it is going to impact the Display Name and the Email addresses of the Group.
What is the biggest problem in managing an exchange environment today? It is the lack of backups, disaster recovery (DR) plan, testing of the DR plan or believing that it won’t happen to us.
This video shows how to quickly and easily deploy an email signature for all users in Office 365 and prevent it from being added to replies and forwards. (the resulting signature is applied on the server level in Exchange Online) The email signat…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

601 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question