Creative Technology
Services
Managed IT Services
Service Tiers
Service Enhancements
Managed Endpoint Support
Managed Infrastructure Support
Managed Network Services
Network Management & Monitoring
Total Network Security Services
Managed Wired & Wireless Networks
Dedicated Connectivity Services
Managed Infrastructure Services
Hybrid Cloud Infrastructure
Data Security & Storage
Software as a Service
Unified Communication
Cyber Security Services
Cyber Awareness and Training
Identity and Access Management
Intrusion Detection and Prevention
Threat Detection and Response
Professional Services
Infrastructure Audit & Gap Analysis
Disaster Recovery & Business Continuity
Digital Transformation
Advisory & Architecture
Managed IT Services
Service Desk
Onsite Support
Infrastructure Monitoring
Client Relationship Management
Managed IT Services
Managed Network Services
Network Management & Monitoring
Total Network Security Services
Managed Wired & Wireless Networks
Dedicated Connectivity Services
Managed Network Services
Managed Infrastructure Services
Hybrid Cloud Infrastructure
Data Security & Storage
Software as a Service
Unified Communication
Managed Infrastructure Services
Cyber Security Services
Cyber Awareness and Training
Identity and Access Management
Intrusion Detection and Prevention
Threat Detection and Response
Cyber Security Services
Professional Services
Infrastructure Audit & Gap Analysis
Disaster Recovery & Business Continuity
Digital Transformation
Advisory & Architecture
Professional Services
Why Lyon
Why Lyon
Team
Careers
Case Studies
News
Resources
News
Guides
Connect
Contact Us
Menu
Services
Managed IT Services
Service Tiers
Service Enhancements
Managed Endpoint Support
Managed Infrastructure Support
Managed Network Services
Network Management & Monitoring
Total Network Security Services
Managed Wired & Wireless Networks
Dedicated Connectivity Services
Managed Infrastructure Services
Hybrid Cloud Infrastructure
Data Security & Storage
Software as a Service
Unified Communication
Cyber Security Services
Cyber Awareness and Training
Identity and Access Management
Intrusion Detection and Prevention
Threat Detection and Response
Professional Services
Infrastructure Audit & Gap Analysis
Disaster Recovery & Business Continuity
Digital Transformation
Advisory & Architecture
Why Lyon
Why Lyon
Team
Career
Case Studies
Resources
News
In-depth guides
News
Connect
Contact Us
Solutions Engineer L1 - Infrastructure
Solutions Engineer L1 - Infrastructure
Your questions below
Home
Interview
questions
Client Success Manager
-
Technical Assessment
Service Desk Engineer L0
-
Technical Assessment
Service Desk Engineer L1
-
Technical Assessment
Service Desk Engineer L2 - Apple
-
Technical Assessment
Solutions Engineer L2 - Network
-
Technical Assessment
Solutions Engineer L1 - Infrastructure
-
Technical Assessment
Solutions Engineer L2 - Security
-
Technical Assessment
Solutions Engineer L2 - Cloud
-
Technical Assessment
Solutions Engineer L2 - Infrastructure
-
Technical Assessment
Basic Info
Full Name
Email
Mobile Number
Questions
1- A Veeam backup job is failing on a Hyper-V host with the error "snapshot deletion failed." The backup runs nightly and is critical. Walk through your troubleshooting approach and what could cause this.
2- A user remotely accessing a workstation via RDP reports sluggish performance, particularly with file transfers. Everything else on the network tests fine. What are the top 3 things you'd check?
3- What is the best practice for storing and recovering BitLocker keys across 150 encrypted machines on the network? Where should these be backed up?
4- A domain with three domain controllers is experiencing slow AD replication. How would you diagnose this, and what command-line tools would you use?
5- A GPO you deployed to force Windows Defender configuration isn't applying to 15 machines in the correct OU. The machines are showing the GPO in scope. What are the most likely reasons?
6- You need to uninstall multiple versions of legacy software from 100 machines, but you don't have the original installers. What's the best approach?
7- A site has 200 devices but only a /25 subnet with one DHCP scope. You're running low on addresses. What are your options, and what would you recommend immediately?
8- A user needs to recover a single Excel file that was deleted 5 days ago from a VM backup. What's the fastest way to restore this without recovering the entire VM?
9- Some users can resolve internal DNS names; others cannot. All have the same DNS server configuration pointing to your on-premises DC. What could be the cause?
10- Before applying a critical security update to a production Windows Server, what are your top 5 pre-update checks?
11- You can connect to a server's iDRAC web interface, but the remote console won't launch. What are the main reasons this could happen?
12- You're setting up a new Hyper-V virtual switch for sensitive applications that need network isolation. What switch types are available, and which would you use for isolation?
13- A workstation is connected to a 10Gb floor port but shows only 1Gb connection speed in device manager. Hardware tests fine, switch is fine. What's the problem?
14- A laptop blue screens every time it docks to a manufacturer-approved docking station. You've tested with another approved dock—same issue. Docking software is installed. What could cause this?
15- What are the key licensing models in Microsoft 365 (E3, E5, Business), and how do you determine which SKUs a mixed user base needs?
16- Name the critical steps for a bare-metal domain controller restore from Veeam, and what's the most important consideration post-restore?
17- What are the main performance bottlenecks in MDT deployments, and how would you identify which is causing slow deployment times?
18- What are the key differences between IPSec and L2TP VPN protocols, and in what scenarios would you choose one over the other?
19- You have a critical Windows Server security patch with a known incompatibility with a legacy app. Walk me through your decision-making process?
20- During a network audit, you find devices connected to a subnet that shouldn't be there. How would you identify them, and what tools would you use?
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Write to us,
we will get back to you soon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.