Creative Technology
Services
Managed IT Services
Service Tiers
Service Enhancements
Managed Endpoint Support
Managed Infrastructure Support
Managed Network Services
Network Management & Monitoring
Total Network Security Services
Managed Wired & Wireless Networks
Dedicated Connectivity Services
Managed Infrastructure Services
Hybrid Cloud Infrastructure
Data Security & Storage
Software as a Service
Unified Communication
Cyber Security Services
Cyber Awareness and Training
Identity and Access Management
Intrusion Detection and Prevention
Threat Detection and Response
Professional Services
Infrastructure Audit & Gap Analysis
Disaster Recovery & Business Continuity
Digital Transformation
Advisory & Architecture
Managed IT Services
Service Desk
Onsite Support
Infrastructure Monitoring
Client Relationship Management
Managed IT Services
Managed Network Services
Network Management & Monitoring
Total Network Security Services
Managed Wired & Wireless Networks
Dedicated Connectivity Services
Managed Network Services
Managed Infrastructure Services
Hybrid Cloud Infrastructure
Data Security & Storage
Software as a Service
Unified Communication
Managed Infrastructure Services
Cyber Security Services
Cyber Awareness and Training
Identity and Access Management
Intrusion Detection and Prevention
Threat Detection and Response
Cyber Security Services
Professional Services
Infrastructure Audit & Gap Analysis
Disaster Recovery & Business Continuity
Digital Transformation
Advisory & Architecture
Professional Services
Why Lyon
Why Lyon
Team
Careers
Case Studies
News
Connect
Contact Us
Menu
Services
Managed IT Services
Service Tiers
Service Enhancements
Managed Endpoint Support
Managed Infrastructure Support
Managed Network Services
Network Management & Monitoring
Total Network Security Services
Managed Wired & Wireless Networks
Dedicated Connectivity Services
Managed Infrastructure Services
Hybrid Cloud Infrastructure
Data Security & Storage
Software as a Service
Unified Communication
Cyber Security Services
Cyber Awareness and Training
Identity and Access Management
Intrusion Detection and Prevention
Threat Detection and Response
Professional Services
Infrastructure Audit & Gap Analysis
Disaster Recovery & Business Continuity
Digital Transformation
Advisory & Architecture
Why Lyon
Why Lyon
Team
Career
Case Studies
News
Connect
Contact Us
#SEM2
Solutions Engineer Mark 2
Solutions Engineer Mark 2
Your questions below
Home
Interview
questions
Service Desk Engineer
-
Technical Assessment
Service Desk Analyst
-
Technical Assessment
Solutions Engineer Mark 1
-
Technical Assessment
Infrastructure Engineer
-
Technical Assessment
Solutions Engineer Mark 2
-
Technical Assessment
Solutions Engineer Mark 3
-
Technical Assessment
Network Engineer
-
Technical Assessment
Basic Info
Full Name
Email
Mobile Number
Questions
1- A user is remotely accessing a workstation in the office using LogMeIn and noticed reasonable performance issues with graphics related applications such as Adobe and Autocad, what could be the reason and how can this be resolved immediately sameday?
2- All workstations for a company are required to be imaged using a standardised image however the company overtime has accumulated three different types of workstation models that carry different drivers. How best would you deliver the recommended drivers to each machine without accumulating all drivers on the master image.
3- A laptop blue screens everytime it is docked to a manufacturer approved docking station. We have tested this with another manufacturer approved docking station and the same results seem to appear. The correct docking station software approved by the manufacturer have been installed as well. What can be the issue?
4- A user is experiencing slow network connections, the adaptor on their machine is showing a 1Gb connection despite them being connected to a 10Gb floor port network. The switch is operating correctly, the workstation hardware and software are all operating correctly. What could be the problem.
5- What is the best way to save Bit Locker keys for a multitude of machines on the network which have recently been encrypted using Bit Locker encryption. The Bit Locker keys are naturally required for encryption recovery or decryption.
6- You need to uninstall a certain software from 100 machines however the versions of software are different between machines and you don't have the original uninstaller. What is the best way to achieve this?
7- A printer requires to be setup with a user on Microsoft 365 to deliver the scan to email function. A Microsoft 365 has been created and entered into the printer settings with the correct SMTP server details however despite full network connectivity and no DNS issues the printer is unable to successfully authenticate with the user details. What are a few reasons behind this issue?
9- Multi factor authentication has been enabled for all users of a company. We however need to bypass any multifactor authentication if the users are based in the office. How best is this achieved?
10- In a hybrid Microsoft 365 setup with on premise Azure AD connect, what is the best practice for password write back, what is the most common?
11- You would need to rename the tenant name of a Microsoft 365 domain, what are the most important areas you need to be aware of before proceeding with the name change.
12- How do you secure an iSCSI connection between a server and a network attached storage unit i.e. a NAS?
13- How does multi tier storage distribution system on a Dell Equalogic affect VHDX files or their content?
14- We need to block a software from being opened across the workstations using a group policy, how best is this achieved?
15- You are instructed to apply windows server updates to a server, what are the top 5 areas you would ensure before applying the updates.
16- You are able to connect to an iDRAC port on a server however unable to connect to the console, what are the main reasons for this?
17- A virtual host in a vmware environment has failed, all of the virtual servers bar one have migrated to the failover host and are operational, why could this be?
18- You are instructed to setup an isolated guest wireless network for a company, how best would you achieve this?
19- What is the difference between a primary VLAN on a switch port and a default VLAN on a switch?
20- In what circumstances would reverse DNS need to be configured on a DNS Server?
21- How would you identify the presence of a rogue DHCP server on a network which is handing IP addresses of the same range but from different scopes? How would you prevent the end users from acquiring IP addresses from rogue DHCP servers?
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Write to us,
we will get back to you soon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.