Creative Technology
Services
Managed IT Services
Service Tiers
Service Enhancements
Managed Endpoint Support
Managed Infrastructure Support
Managed Network Services
Network Management & Monitoring
Total Network Security Services
Managed Wired & Wireless Networks
Dedicated Connectivity Services
Managed Infrastructure Services
Hybrid Cloud Infrastructure
Data Security & Storage
Software as a Service
Unified Communication
Cyber Security Services
Cyber Awareness and Training
Identity and Access Management
Intrusion Detection and Prevention
Threat Detection and Response
Professional Services
Infrastructure Audit & Gap Analysis
Disaster Recovery & Business Continuity
Digital Transformation
Advisory & Architecture
Managed IT Services
Service Desk
Onsite Support
Infrastructure Monitoring
Client Relationship Management
Managed IT Services
Managed Network Services
Network Management & Monitoring
Total Network Security Services
Managed Wired & Wireless Networks
Dedicated Connectivity Services
Managed Network Services
Managed Infrastructure Services
Hybrid Cloud Infrastructure
Data Security & Storage
Software as a Service
Unified Communication
Managed Infrastructure Services
Cyber Security Services
Cyber Awareness and Training
Identity and Access Management
Intrusion Detection and Prevention
Threat Detection and Response
Cyber Security Services
Professional Services
Infrastructure Audit & Gap Analysis
Disaster Recovery & Business Continuity
Digital Transformation
Advisory & Architecture
Professional Services
Why Lyon
Why Lyon
Team
Careers
Case Studies
News
Connect
Contact Us
Menu
Services
Managed IT Services
Service Tiers
Service Enhancements
Managed Endpoint Support
Managed Infrastructure Support
Managed Network Services
Network Management & Monitoring
Total Network Security Services
Managed Wired & Wireless Networks
Dedicated Connectivity Services
Managed Infrastructure Services
Hybrid Cloud Infrastructure
Data Security & Storage
Software as a Service
Unified Communication
Cyber Security Services
Cyber Awareness and Training
Identity and Access Management
Intrusion Detection and Prevention
Threat Detection and Response
Professional Services
Infrastructure Audit & Gap Analysis
Disaster Recovery & Business Continuity
Digital Transformation
Advisory & Architecture
Why Lyon
Why Lyon
Team
Career
Case Studies
News
Connect
Contact Us
#SEM1
Solutions Engineer Mark 1
Solutions Engineer Mark 1
Your questions below
Home
Interview
questions
Service Desk Engineer
-
Technical Assessment
Service Desk Analyst
-
Technical Assessment
Solutions Engineer Mark 1
-
Technical Assessment
Infrastructure Engineer
-
Technical Assessment
Solutions Engineer Mark 2
-
Technical Assessment
Solutions Engineer Mark 3
-
Technical Assessment
Network Engineer
-
Technical Assessment
Basic Info
Full Name
Email
Mobile Number
Questions
1- What is the main difference between NAT (Network Address Translation) and PAT (Port Address Translation), Provide an example?
2- Typically on a network would you configure a DHCP to be located on a server or a network device? Explain the reasons behind your preferences?
3- A user is getting an incorrect IP address when pinging a DNS name; you have flushed the DNS and checked what DNS servers they are using and the entries are correct on the server, what would be the problem?
4- A trust relationship for a workstation with the domain has failed, why has this happened and how can you resolve this?
5- What is the IPMI interface used for on rack mounted workstations, name three main reasons?
6- A DRAC/ILO web interface is accessible via the web browser however the server console is not accessible via the browser, explain a few reasons this maybe?
7- What’s the difference between expanding a virtual disk in Hyper-V vs a VMware environment?
8- Users on a network aren’t able to logon to the network following a Windows update on the domain controller. The security update installed on the server is required to remain on the server. How best would you fix this?
9- What is TTL used for on DNS records – provide an example where altering these records would be useful.
10- What is the difference between a VBK, VIB, VRB file in Veeam?
11- How can shadow copies on a mapped drive be restricted only to a few individual active directory users?
12- What considerations should be made when dealing with windows server shares for both Macs and PCs?
13- You’ve been tasked to create two Wi-Fi networks for guests and company users, how best would you achieve logical isolation?
14- On a rack workstation how would you instruct the off-board graphics display to act as the primary display? Would this interfere with your console access to the machine?
15- A company is working entirely remotely to the office and use a mixture of direct server connections over VPN and RDP over VPN to access the resources on their network. A few users have called up in the past 10 mins complaining that their RDP sessions are slow. What could be potentially the main reason for this?
16- What is the numerical TCP port value associated with the following protocols RDP, HTTP, HTTPS, FTP, DNS and SSH?
17- What is the difference between a tagged and untagged VLAN port on layer two switches?
18- What versions of Server Message Block (SMB) are no longer supported on the latest macOS operating system?
19- On an iMac you need to assess the size of a folder. The folder is owned by other system users. How could you accurately find out how much storage they took up?
20- What tool would you use to create an application that automatically mounts shares to a server when a user opens the application?
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Write to us,
we will get back to you soon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.