Difficult System Administration Interview Preparation Guide
Download PDF

System Administrator frequently Asked Questions by expert members with experience in System Administration. These questions and answers will help you strengthen your technical skills, prepare for the new job test and quickly revise the concepts

73 System Administrator Questions and Answers:

Table of Contents:

Difficult  System Administrator Job Interview Questions and Answers
Difficult System Administrator Job Interview Questions and Answers

2 :: Explain the personal characteristics of a system administrator?

System administrators are experts at handling hardware and software. They are quick with both their hands and their head. They can work alone, but they know when and how to communicate with others, whether to report problems, learn information needed to fix problems, or instruct employees regarding technical issues.

3 :: Define Domain control?

A domain controller (DC) is a server that handles all the security requests from other computers and servers within the Windows Server domain.
there was a primary domain controller and a backup domain controller. The primary DC focused on domain services only to avoid the possibility of a system slow down or crash due to overtasking from managing other functionality and security requests. In the event of a primary DC going down, a backup DC could be promoted and become the primary DC to keep the rest of the server systems functioning correctly.

4 :: Can you please explain the difference between firewall and antivirus?

★ Firewall:
Firewall is in other hand a program which protects your system from outsider/intruder/hacker attacks. These attacks may not be virus type. In some cases hackers can take control of your system remotely and steal your data or important information from system. If your system is directly connected to internet or a large network than you can install a software firewall in your PC to protect your self from unauthorized access. Firewall is available either in software or in hardware form. For a single PC you may need a software firewall while a large corporate implements hardware firewall to protect all of their systems from such attacks.
★ Antivirus:
The prime job of an anivirus is protect your system from computer viruses. Your computer may be standalone or part of network or connected to Internet you need an antivirus program. It actively monitors when you are using your system for any virus threat from different sources. if it found one it tries to clean or quarantine the virus ultimately keeping your system and data safe.

5 :: Can you give an example of systems you have been working with as an administrator?

These typically are: Windows and Linux, which support either Asset Management or GIS. Typical duties include engineering, support and maintenance, and research for the purpose of innovation and upgrading.

6 :: What experience you have with hardware components?

Installation and replacement are some of the most frequently performed operations with hardware. Sometimes a system administrator might need to rebuild a hardware component.

7 :: Define tree?

An Active Directory tree is a collection of Active Directory domains that begins at a single root and branches out into peripheral, child domains. Domains in an Active Directory tree share the same namespace. An Active Directory forest is a collection of Active Directory trees, similar to a real world forest. Catalog Server.

8 :: Define virtual machine files?

The first thing to know is what files are used to create a virtual machine:
★ .XML files
These files contain the virtual machine configuration details. There is one of these for each virtual machine and each snapshot of a virtual machine. They are always named with the GUID used to internally identify the virtual machine or snapshot in question.
★ .BIN files
This file contains the memory of a virtual machine or snapshot that is in a saved state.
★ .VSV files
This file contains the saved state from the devices associated with the virtual machine.
★ .VHD files
These are the virtual hard disk files for the virtual machine
★ .AVHD files
These are the differencing disk files used for virtual machine snapshots

9 :: Tell me what role do characteristics such as assertiveness and problem solving play in the career of a system administrator?

Analytical thinking and problem solving is crucial to be able to analyze software or hardware malfunction. They are also necessary to be able to improve or upgrade systems so that they suit company needs. Assertiveness also plays a role because administrators have to make decisions. They decide on solutions, security measures, and things like system upgrades.

10 :: Tell me is team-work part of a system administrator's typical day?

Administrators are typically called in to offer technical support for teams working on a project. Support might mean technical troubleshooting or the development and explanation of technological strategy with regards to the project goals and means.

11 :: Explain DSRM mode?

Directory Services Restore Mode (DSRM) is a special boot mode for repairing or recovering Active Directory. It is used to log on to the computer when Active Directory has failed or needs to be restored.
To manually boot in Directory Services Restore Mode, press the F8 key repeatedly. Do this immediately after BIOS POST screen, before the Windows logo appears. (Timing can be tricky; if the Windows logo appears you waited too long.) A text menu menu will appear. Use the up/down arrow keys to select Directory Services Restore Mode or DS Restore Mode. Then press the Enter key.

12 :: Explain the difference between host, guest, and virtual machine?

★ A host system (host operating system) would be the primary & first installed operating system. If you are using a bare metal Virtualization platform like Hyper-V or ESX, there really isn't a host operating system besides the Hypervisor. If you are using a Type-2 Hypervisor like VMware Server or Virtual Server, the host operating system is whatever operating system those applications are installed into.
★ A guest system (guest operating system) is a virtual guest or virtual machine (VM) that is installed under the host operating system. The guests are the VMs that you run in your virtualization platform.
Some admins also call the host & guest the parent and child.

13 :: Explain Hyper-visor?

You can think of a Hyper-visor as the kernel or the core of a virtualization platform. The Hyper-visor is also called the Virtual Machine Monitor. The Hyper-visor has access to the physical host hardware.

14 :: How to setting file permissions on a folder using group policy?

The setting is located under Computer Configuration, Windows Settings, Security Settings, File System. Here's the procedure:
Go to the location in the Group Policy listed above.
Right-click File System.
Click Add File.
In the "Add a file or folder" window, select the folder (or file) for which you want the permissions to be set, and click OK.
In the security box that pops up, you can add a user or a group that needs permission to the folder.

15 :: What is the Command to add client to Domain?

NETDOM /Domain:MYDOMAIN /user:adminuser /password:apassword MEMBER MYCOMPUTER /JOINDOMAIN

16 :: What are the benefits of using GPMC?

Easy administration of all GPOs across the entire Active Directory Forest View of all GPOs in one single list.
Backup and restore of GPOs Migration of GPOs across different domains and forest.

17 :: Explain NSlookup?

Nslookup.exe is a command-line administrative tool for testing and troubleshooting DNS servers. This tool is installed along with the TCP/IP protocol through Control Panel.
MS-DOS utility that enables a user to look up an IP address of a domain or host on a network.

18 :: Explain group nesting?

Adding one group as a member of another group is called 'group nesting'. This will help for easy administration and reduced replication traffic.

19 :: Explain the difference between local, global and universal groups?

Domain local groups assign access permissions to global domain groups for local domain resources. Global groups provide access to resources in other trusted domains. Universal groups grant access to resources in all trusted domains.

20 :: Define global catalog?

The Global Catalog is a database that contains all of the information pertaining to objects within all domains in the Active Directory environment.

21 :: Explain group policy backup?

To backup a single GPO, right-click the GPO, and then click Back Up.
To backup all GPOs in the domain, right-click Group Policy Objects and click Back Up All.

22 :: Where are the group policies stored?

C:WindowsSystem32GroupPolicy.

24 :: Which GPO settings in the computer and user parts?

Computer Configuration, User ConfigurationName.

25 :: Can I deploy non-MSI software with GPO?

Create the file in .zap extension.
System Administrator Interview Questions and Answers
73 System Administrator Interview Questions and Answers