Tuesday, January 8, 2013

Troubleshoot 10 common Exchange problems

1.Users cannot access server. – If you users can not access your Exchange system, but your system and Exchange services are running, there are several possible explanations. The first thing to check is that your network is responding properly. If users do have lost network connectivity, you will need to check their overall connectivity status, connectivity to other servers on the same switch as the Exchange server, also check the network controller in your Exchange system and verify that the system has connectivity to elsewhere on your network. Another possible reason for users not being able to connect to your Exchange system is if your Active Directory has stopped authenticating users. If your users cannot authenticate, then they will not be able to log into your Exchange system.




2.User’s messages are disappearing from their mailbox. – If messages are disappearing from users mailbox, one common cause of this is the auto archive feature in Outlook. This happens when the PST file being archived to becomes corrupt. To correct this you must find the PST, and run the ScanPST.exe tool (included with Outlook) to repair the PST file.



3.A user’s account was mistakenly deleted from Active Directory, and now they cannot access their mail. – If a users account has been deleted from Active Directory, their association to their mailbox is deleted. Normally, you can just right click the mailbox in Exchange System Manager and reconnect the mailbox to a new account. If this option is not available, you may need to run the Mailbox Cleanup on the Information Store containing the mailbox.



4.Outgoing mail is not being delivered, and is stuck in your queue. – If your outgoing mail is not being delivered, and is stuck in your queue, the first corrective action you should take is to restart your SMTP service. If this does not work, you should check your DNS resolution. Perform an nslookup (with type=mx) on your mail server, and see if you can resolve several domains you commonly exchange mail with. If you cannot pull MX records for those domains, then you should perform and IPCONFIG /FLUSHDNS to flush your DNS cache. If this does not work, then you will need to begin troubleshooting your DNS infrastructure.



5.Mail is not being delivered to a Distribution List – If you have one (or more) distribution lists that are not receiving mail that is being sent to them, you need to check that the group type in Active Directory has not been changed from the group type Distribution to the group type Security.



6.Mail to a certain user is not being delivered, and a trace shows it as stopping at the step “Submitted to Categorizer” – If you have a message that is not being delivered, and a trace shows that it never goes past the step “Submitted to Categorizer” it shows that Exchange is unable to determine what should be done with the mail. One common cause of this, is that the message is being sent to a users contact. If this is the case, delete the contact and recreate it. This will often correct the problem, as the contact has become corrupt.



7.Some users passwords are rejected when attempting to access your system through IMAP – If a users password contains a special ASCII character (such as ½), they will not be able to access IMAP. Passwords must contain only standard characters and symbols to access IMAP.



8.SMTP Service keeps crashing. – If you SMTP service keeps crashing, the first thing you should do is to empty your mail queues, then restart the service. Many times a corrupt piece of mail will cause the service to crash when it attempts to process it.   Reference  Link : http://www.techrepublic.com/i/tr/downloads/home/troubleshoot_10_common_exchange_problems.pdf

Friday, December 28, 2012

Active Directory Interview Questions Answers

Answer for Active Directory Interview Questions

 

  1.  Active Directory enables single sign on to access resources on the network such as desktops, shared files, printers etc. Active Directory provides advanced security for the entire network and network resources.  Active Directory is more scalable and flexible for administration.
  2. Functional levels help the coexistence of Active Directory versions such as, Windows NT, Windows 2000 Server, Windows Server 2003 and Windows Server 2008. The functional level of a domain or forest controls which advanced features are available in the domain or forest. Although lowest functional levels help to coexist with legacy Active Directory, it will disable some of the new features of Active Directory. But if you are setting up a new Active Directory environment with latest version of Windows Server and AD, you can set to the highest functional level, thus all the new AD functionality will be enabled.
  3. Windows Server 2003 Domain Functional Levels: Windows 2000 mixed (Default), Windows 2000 native, Windows Server 2003 interim, and Windows Server 2003.
    Forest Functional Levels: Windows 2000 (default), Windows Server 2003 interim, Windows Server.
  4. Windows Server 2008 Domain Functional Levels: Windows 2000 Native, Windows Server 2003, Windows Server 2008, Windows Server 2008 R2.
    Forest Functional Levels: Windows 2000, Windows Server 2008, Windows Server 2008 R2.
  5.  It is possible to take a backup copy of existing Domain Controller, and restore it in Windows Server machine in the remote locations with slower WAN link.
  6.  Active Directory is designed for Server Operating System, and it cannot be installed on Windows 7.
  7. Windows Server Operating System. Free hard disk space with NTFS partition. Administrator's privilege on the computer. Network connection with IP address, Subnet Mask, Gateway and DNS address. A DNS server, that can be installed along with first Domain Controller. Windows Server intallation CD or i386 folder.
  8. Flexible Single-Master Operation (FSMO) roles,manage an aspect of the domain or forest, to prevent conflicts, which are handled by Single domain controllers in domain or forest. The tasks which are not suited to multi-master replication, There are 5 FSMO roles, and Schema Master and Domain naming master roles are handled by a single domain controller in a forest, and PDC, RID master and Infrastructure master roles are handled by a single domain controller in each domain.
  9. Infrastrcture master role is a domain-specific role and its purpose is to ensure that cross-domain object references are correctly handled. For example, if you add a user from one domain to a security group from a different domain, the Infrastructure Master makes sure this is done properly.Intrastrcuture master does not have any functions to do in a single domain environment.If the Domain controller with Infrastructure master role goes down in a single domain environemt, there will be no impact at all. Where as, in a complex environment with multiple domains, it may imact creation and modification of groups and group authentication.
  10. Schema Master role and Domain Naming Master role.
  11. PDC Emulator
  12. You should be a member of Enterprise Admins group or the Domain Admins group. Also you should be member of local Administrators group of the member server which you are going to promote as additional Domain Controller.
  13. Use netdom query /domain:YourDomain FSMO command. It will list all the FSMO role handling domain controllers.
  14. No, there should be only one Domain Controller handling RID master role in a Domain.
  15. There should be only one Domain Controller handling Infrastructure master role in a domain. Hence if you have two domains in a forest, you can configure two Infrastructure masters, one in each domain.
  16. If PDC emulator crashes, there will be immediate impact on the environment. User authentication will fail as password changes wont get effected, and there will be frequent account lock out issues. Network time synchronization will be impacted. It will also impact DFS consistency and Group policy replication as well.
  17. Domain controllers and Sites. Domain controllers are physical computers which is running Windows Server operating system and Active Directory data base. Sites are a network segment based on geographical location and which contains multiple domain controllers in each site.
  18. Domains, Organizational Units, trees and forests are logical components of Active Directory.
  19. Active Directory database is divided into different partitions such as Schema partition, Domain partition, and Configuration partition. Apart from these partitions, we can create Application partition based on the requirement.
  20. Adding one group as a member of another group is called 'group nesting'. This will help for easy administration and reduced replication traffic.
  21. Group types are categorized based on its nature. There are two group types: Security Groups and Distribution Groups. Security groups are used to apply permissions to resources where as distribution groups are used to create Exchange server email communication groups. Group scopes are categorized based on the usage. There are three group types: Domain Local Group, Global Group and Universal Group.
  22. Domain local groups are mainly used for granting access to network resources.A Domain local group can contain accounts from any domain, global groups from any domain and universal groups from any domain. For example, if you want to grant permission to a printer located at Domain A, to 10 users from Domain B, then create a Global group in Domain B and add all 10 users into that Global group. Then, create a Domain local group at Domain A, and add Global group of Domain B to Domain local group of Domain A, then, add Domain local group of Domain A to the printer(of Domain A) security ACL.
  23. Active Directory is backed up along with System State data. System state data includes Local registry, COM+, Boot files, NTDS.DIT and SYSVOL folder. System state can be backed up either using Microsoft's default NTBACKUP tool or third party tools such as Symantech NetBackup, IBM Tivoli Storage Manager etc.
  24. There are two types of Active Directory restores, Authoritative restore and Non-Authoritative restore.
  25. Non-Authoritative means, a normal restore of a single Domain controller in case that particular domain controller OS or hardware crashed. After non-authoritative restoration completed, compares its data base with peer domain controllers in the network and accepts all the directory changes that have been made since the backup. This is done through multi master replication. 
    Where as, in Authoritative restore, a restored data base of a Domain controller forcefully replicated to all the other domain controllers. Authoritative restore is performed to recover an active directory resource or object(eg. an Organizational Unit) which accidentally deleted and it needs to be restored.
  26. We can use NTDSUTIL command line to perform Authoritative restore of Active Directory. First, start a domain controller in 'Directory Service Restore Mode'. Then, restore the System State data of Domain controller using NTBACKUP tool. This is non-authoritative restore. Once non-authoritative restore is completed, we have to perform authoritative restore immediately before restarting the Domain Controller. 
    Open command prompt and type NTDSUTIL and enter, then type authoritative restore and press enter, then type restore database and press enter, click OK and then click Yes. This will restore all the data in authoritative restore mode. If you want to restore only a specific object or sub-tree, you can type below command instead of 'restore database'.
    restore subtree ou=OU_Name,dc=Domain_Name,dc=xxx
  27. Authoritative restore, Configurable settings, Partition management, Set DSRM Password etc.
  28. A tombstone is a container object for deleted items from Active Directory database, even if objects are deleted, it will be kept hidden in the active directory data base for a specific period. This period is known as tombstone lifetime. Tombstone lifetime is 180 days on Windows Server 2003 SP1 and later versions of Windows Server.
  29. Garbage collection is a process of Active Directory. This process starts by removing the remains of previously deleted objects from the database. These objects are known as tombstones. Then, the garbage collection process deletes unnecessary log files. And the process starts a defragmentation thread to claim additional free space. The garbage collection process is running on all the domain controllers in an interval of 12 hours.
  30. In multimaster replication method, replication conflicts can happen. Objects with replication conflicts will be stored in a container called 'Lost and Found' container. This container also used to store orphaned user accounts and other objects.
  31. Lost and Found container can be viewed by enabling advanced features from View menu of Active Directory User and Computers MMC.
  32. Yes, it is included.
  33. [Never say no] We had set up an additional domain for a new subsidiary of the firm, and I was a member of the team who handled installation and configuration of domain controllers for the sub domain.[or] I was supporting an existing Active Directory network environment of the company, but I have installed and configured Active Directory in test environment several occasions.
  34. No one installs Active Directory in a cluster. There is no need of clustering a domain controller. Because Active Directory provides total redundancy with two or more servers.
  35. Active Directory Recycle bin is  a feature of Windows Server 2008 AD. It helps to restore accidentally deleted Active Directory objects without using a backed up AD database, rebooting domain controller or restarting any services.
  36. Read only domain controller (RODC) is a feature of Windows Server 2008 Operating System. RODC is a read only copy of Active Directory database and it can be deployed in a remote branch office where physical security cannot be guaranteed. RODC provides more improved security and faster log on time for the branch office.
  37. To find out forest and domain functional levels in GUI mode, open ADUC, right click on the domain name and take properties. Both domain and forest functional levels will be listed there. TO find out forest and domain functional levels, you can use DSQUERY command.
  38. KCC can be expanded as Knowledge Consistency Checker. It is a protocol procecss running on all domain controllers, and it generates and maintains the replication topology for replication within sites and between sites.
  39. We can use command line tools such as repadmin and dcdiag. GUI tool REPLMON can also be used for replication monitoring and troubleshooting.
  40. SYSVOL is a folder exits on each domain controller, which contains Actvie Directory related files and folders. SYSVOL mainly stores important elements of Group Policy Objects and scripts, and it is being replicated among domain controllers using File Replication Service (FRS).
  41. Kerberos is a network authentication protocol. Active Directory uses Kerberos for user and resource authentication and trust relationship functionality. Kerberos uses port number 88.
  42. All versions of Windows Server Active Directory use Kerberos 5.
  43. Kerberos 88, LDAP 389, DNS 53, SMB 445.
  44. FQDN can be expanded as Fully Qualified Domain Name.It is a hierarchy of a domain name system which points to a device in the domain at its left most end. For example in system.
  45. Dsadd - to add an object to the directory, Dsget - displays requested properties of an object in AD, Dsmove - Used to move one object from one location to another in the directory, DSquery - To query specific objects.
  46. A tree in Active Directory is a collection of one or more domains which are interconnected and sharing global resources each other. If a tree has more than one domain, it will have contiguous namespace. When we add a new domain in an existing tree, it will be called a child domain.
    A forest is a collection of one or more trees which trust each other and sharing a common schema.It also shares common configuration and global catalog. When a forest contains more than one tree, the trees will not form a contiguous namespace.
  47. Replication between domain controllers inside a single site is called Intrasite replication, where as replication between domain controllers located in different sites is called Intersite replication. Intrasite replication will be very frequent, where as Intersite replication will be with specific interval and in a controlled fashion just to preserve network bandwidth.
  48. Shortcut trust is a manually created transitive trust which is configured to enable fast and optimized authentication process.For example, If we create short cut trust between two domains of different trees, they can quickly authenticate each other without traveling through the entire parent domains. short cut trust can be either one-way or two-way.
  49. Selective authentication is generally used in forest trust and external trusts. Selective authentication is a security setting which allows administrators to grant access to shared resources in their organization’s forest to a limited set of users in another organization’s forest. Selective authentication method can decide which groups of users in a trusted forest can access shared resources in the trusting forest.
  50. Trusts can be categorized by its nature. There can be two-way trust or one-way trust,implicit or explicit trust, transitive or non transitive trust. Trust can be categorized by types, such as parent and child, tree root trust, external trust, realm trust forest trust and shortcut trust.
  51. ADAC- Active Directory Administrative Center is a new GUI tool came with Windows Server 2008 R2, which provides enhanced data management experience to the admin. ADAC helps administrators to perform common Active Directory object management task across multiple domains with the same ADAC instance.
  52. ADSIEDIT- Active Directory Service Interfaces Editor is a GUI tool which is used to perform advanced AD object and attribute management. This Active Directory tool helps us to view objects and attributes that are not visible through normal  Active Directory Management Consoles. ADSIEDIT can be downloaded and installed along with Windows Server 2003 Support Tools.
  53. This is due to domain functional level. If domain functional level of Windows Server 2003 AD is Windows 2000 Mixed, Universal Group option will be greyed out. You need to raise domain functional level to Windows 2000 native or above.
  54. ADMT - Active Directory Migration Tool, is a tool which is used for migrating Active Directory objects from one domain to another. ADMT is an effective tool that simplifies the process of migrating users, computers, and groups to new domains.
  55. When a domain controller is disconnected for a period that is longer than the tombstone life time, one or more objects that are deleted from Active Directory on all other domain controllers may remain on the disconnected domain controller. Such objects are called lingering objects. Lingering objects can be removed from Windows Server 2003 or 2008 using REPADMIN utility.
  56. The Global catalog is a container which contains a searchable partial replica of all objects from all domains of the forest, and full replica of all objects from the domain where it is situated. The global catalog is stored on domain controllers that have been designated as global catalog servers and is distributed through multimaster replication. Global catalogs are mostly used in multidomain, multisite and complex forest environment, where as Global catalog does not function in a single domain forest.
  57. In a forest that contains only a single Active Directory domain, there is no harm in placing both GC and Infrastructure master in same DC, because Infrastructure master does not have any work to do in a single domain environment. But in a forest with multiple and complex domain structure, the infrastructure master should be located on a DC which is not a Global Catalog server. Because the global catalog server holds a partial replica of every object in the forest, the infrastructure master, if placed on a global catalog server, will never update anything, because it does not contain any references to objects that it does not hold.
  58. Command line method:  nslookup gc._msdcs.<forest root DNS Domain Name>, nltest /dsgetdc:corp /GC. GUI method: Open DNS management, and under ‘Forward Lookup Zone’, click on GC container. To check if a server is GC or not, go to Active Directory Sites and Services MMC and under ‘Servers’ folder, take properties of NTDS settings of the desired DC and find Global Catalog option is checked.
  59. As per Microsoft, a single AD domain controller can create around 2.15 billion objects during its lifetime.
  60. When a user enters a user name and password, the computer sends the user name to the KDC. The KDC contains a master database of unique long term keys for every principal in its realm. The KDC looks up the user's master key (KA), which is based on the user's password. The KDC then creates two items: a session key (SA) to share with the user and a Ticket-Granting Ticket (TGT). The TGT includes a second copy of the SA, the user name, and an expiration time. The KDC encrypts this ticket by using its own master key (KKDC), which only the KDC knows. The client computer receives the information from the KDC and runs the user's password through a one-way hashing function, which converts the password into the user's KA. The client computer now has a session key and a TGT so that it can securely communicate with the KDC. The client is now authenticated to the domain and is ready to access other resources in the domain by using the Kerberos protocol.
  61. Lightweight Directory Access Protocol (LDAP) is an Internet standard protocol which is used as a standard protocol for Active Directory functions. It runs directly over TCP, and can be used to access a standalone LDAP directory service or to access a directory service that is back-ended by X.500.
  62. Active Directory related files are by default located at %SystemRoot%\ntds folder. NTDS.DIT is the main Active Directory database file. Apart from this other files such as EDB.LOG, EDB.CHK, RES1.LOG, TEMP.EDB etc. are also located at the same folder.
  63. Global Catalog servers produce huge traffic related to the replication process.There for making all the domain controllers in the forest as Global Catalog servers will cause network bandwidth poroblem. GCs should be placed based on Network bandwidth and user or application requirement.

Regards

Mohamed Rafi

 

 

 

 

Active Directory Interview Questions

  1. Explain three main features of Active Directory?
  2. What do you mean by Active Directory functional levels? How does it help an organization’s network functionality?
  3. What are the Domain and Forest functional levels of Windows Server 2003 AD?
  4. What are the Domain and Forest functional levels of Windows Server 2008 AD?
  5. How to add additional Domain Controller in a remote site with slower WAN link?
  6. How do we install Active Directory in Windows 7 Computer?
  7. What are the prerequisites to install Active Directory in a Server?
  8. What is FSMO role? (Or what are Single Master Operations / Flexible Single Master Operations / Operations Master Role / SMO / OMR?)
  9. Explain Infrastructure Master Role. What will be the impact if DC with Infrastructure Master Role goes down?
  10. What are the two forest specific FSMO roles?
  11. Which FSMO role directly impacting the consistency of Group Policy?
  12. I want to promote a new additional Domain Controller in an existing domain. Which are the groups I should be a member of?
  13. Tell me one easiest way to check all the 5 FSMO roles.
  14. Can I configure two RID masters in a domain?
  15. Can I configure two Infrastructure Master Role in a forest? If yes, please explain.
  16. What will be the impact on the network if Domain Controller with PDC Emulator crashes?
  17. What are the physical components of Active Directory?
  18. What are the logical components of Active Directory?
  19. What are the Active Directory Partitions? (Or what are Active Directory Naming Contexts? Or what is AD NC?)
  20. What is group nesting?
  21. Explain Group Types and Group Scopes?
  22. What is the feature of Domain Local Group?
  23. How will you take Active Directory backup?
  24. What are the Active Directory Restore types?
  25. How is Authoritative Restore different from non-Authoritative Restore?
  26. Explain me, how to restore Active Directory using command line?
  27. Tell me few switches of NTDSUTIL command.
  28. What is a tombstone? What is the tombstone lifetime period?
  29. What do you understand by Garbage Collection? Explain.
  30.  What is Lost and Found Container?
  31. Where can I locate Lost and Found Container?
  32. Is Lost and Found Container included in Windows Server 2008 AD?
  33. Have you ever installed Active Directory in a production environment?
  34. Do we use clustering in Active Directory? Why?
  35. What is Active Directory Recycle Bin?
  36. What is RODC? Why do we configure RODC?
  37. How do you check currently forest and domain functional levels? Say both GUI and Command line.
  38. Explain Knowledge Consistency Checker (KCC)
  39. What are the tools used to check and troubleshoot replication of Active Directory?
  40. What is SYSVOL folder used for?
  41. What is the use of Kerberos in Active Directory? Which port is used for Kerberos communication?
  42. Which version of Kerberos is used for Windows 2000/2003 and 2008 Active Directory?
  43. Please name few port numbers related to Active Directory.
  44. What is an FQDN?
  45. Tell me few DS commands and its usage.
  46. Explain Active Directory tree and forest.
  47. What are Intersite and Intrasite replication?
  48. What is shortcut trust?
  49. What is selective Authentication?
  50. Give me brief explanation of different types of Active Directory trusts.
  51. Have you heard of ADAC?
  52. What is the use of ADSIEDIT?  How do we install it in Windows Server 2003 AD?
  53. I am unable to create a Universal Security group in my Active Directory? What will be the possible reason?
  54. What is ADMT? What is it used for?
  55. What do you mean by Lingering Objects in AD? How to remove Lingering Objects?
  56. Explain Global Catalog. What kind of AD infrastructure makes most use of Global Catalog?
  57. Global Catalog and Infrastructure master roles cannot be configure in same Domain Controller. Why?
  58. How do you check all the GCs in the forest?
  59. How many objects can be created in Active Directory? (both 2003 and 2008)
  60. Can you explain the process between a user providing his Domain credential to his workstation and the desktop being loaded? Or how the AD authentication works?
  61. What is LDAP?
  62. Which is default location of Active Directory? What are the main files related to AD?
  63. In a large forest environment, why we don’t configure all Domain Controllers as GCs?
  64. What is NETDOM command line tool used for?
  65. What is role seizure? Who do we perform role seizure?
  66. What is ISTG? What is role of ISTG in Active Directory?
  67. Is it possible to find idle users who did not log in for last few months?
  68. Tell me the order of GPO as it applied.
  69. What are the uses of CSVDE and LDIFDE?
  70. What are the differences between a user object and contact object?
  71. What do you mean by Bridge Head server?
  72. What is urgent replication?
  73. Please explain Realm trust.
  74. Explain object class and object attribute.
  75. My organization wants to add new object attribute to the user object. How do you achieve it?
  76. What do you understand about GUID?
  77. What is the command used for Domain Controller decommissioning?
  78. Have you ever planned and implemented Active Directory infrastructure anywhere? Tell me few considerations we have to take during the AD planning.
  79. Name few differences from Windows Server 2003 AD and Windows Server 2008 AD.
  80. Which domain and forest functional level I will select if I am installing Windows Server 2008 AD in an Existing environment where we have Windows Server 2003 Domain Controllers?
  81. What are the replication intervals for Intersite and intrasite replication? Is there any change in 2003 and 2008?
  82. I want to transfer RID master role to a new Domain Controller. What are the steps I need to follow?
  83. Tell me few uses of NTDSUTIL commands?
  84. Name few services that directly impact the functionality of Domain Controller.
  85. You said there are 5 FSMO roles. Please explain what will be the impact on the AD infra if each FSMO roles fails?
  86. What is Active Directory defragmentation? How do you do AD defragmentation? And why do we do it?
  87. Tell me Different between online and offline defragmentation.
  88. How do you uninstall active directory? What are the precautions we have to take before removing active directory?
  89. A user is unable to log into his desktop which is connected to a domain. What are the troubleshooting steps you will consider?
  90. A Domain Controller called ABC is failing replication with XYZ. How do you troubleshoot the issue?
  91. A user account is frequently being locked out. How do you investigate this issue? What will be the possible solution suggest the user?
  92. Imagine you are trying to add a Windows 7 computer to Active Directory domain. But its showing an error ‘Unable to find Domain Controller’. How will you handle this issue?
  93. What are the services required for Active Directory replication?
  94. What is Active Directory application partition? What are the uses of it?
  95. Many users of a network are facing latency while trying to log into their workstations. How do you investigate this problem?
  96. Now, some questions related to Windows Server 2008 Active Directory. What do you mean by IDA? What are the new components of Windows 2K8 Active Directory?
  97. I want to edit the Active Directory Schema. How can I bring Schema editor into my MMC?
  98. Name few Active Directory Built in groups
  99. What are the differences between Enterprise Administrators and Domain Administrators groups?
  100. I have to create 1000 user objects in my Active Directory domain. Who can I achieve that with least administrative effort? Tell me few tools that I can use.

 

Wednesday, July 25, 2012

Job Descriptions for Incident Manager

Incident Managers

1. Understand the Incident and the diagnostic/resolution actions attempted already by the Service Desk and any other Technology Tracks
2. Use the designated or allotted communication bridge, monitoring facilities and on-call schedule from Technology tracks to facilitate immediate attention from all required parties
3. Authorize any IVR message updates for Service Desk
4. Work with all stakeholders to identify the workaround or resolution for the Incident
5. Set expectations of all stakeholders about the timelines and permissions required for the resolution
6. Send Periodic updates to the stakeholders (and if required, to the customers) through Service Desk, until the Incident is resolved
7. Initiate Emergency Changes if required, mobilize cross functional teams, External Vendors and obtain approvals for the mitigation actions from all stakeholders
8. Retain the Technical Observation Post (certain ad-hoc individuals who observe the service after the Incident is resolved) in order to insure that the resolution has actually resolved the Incident and that the Services have returned to their normal state
9. Open Problem Tickets as per Problem Management Policy and Procedures
10. Document in retrospect, the actions taken, learning and approvals in the service Management tools
11. Document the new knowledge learning and any other recommendations in a Critical Incident Report and submit the report to the audience in line with the Critical Incident Management procedures.
12. Periodically audit Incident records and coach the Incident Management staff to 
13. insure that "ticket hops" are reduced to the minimum
14. avoid possible misuse of "Pending" status by resolving groups
15. enforce the use of available knowledgebase, Configuration Management Database and Known Error Database for quicker resolution of Incidents
16. Quality of updates being made into the Incident Records
17. Devise, measure, report, monitor and improve the internally designed KPIs to improve the efficiency of Incident Management process. Example: Ticket hops, Incidents per staff, Incidents resolved using KB
Regards
Mohamed Rafi
GSM :91-9791133997


Wednesday, June 29, 2011

50 COMMON INTERVIEW QUESTIONS AND ANSWERS

50 COMMON INTERVIEW QUESTIONS AND ANSWERS  [Don't forget to have a look at free bonus at the end of this document.]  Review these typical interview questions and think about how you would answer them. Read the questions listed; you will also find some strategy suggestions with it.  1. Tell me about yourself: The most often asked question in interviews. You need to have a short statement prepared in your mind. Be careful that it does not sound rehearsed. Limit it to work-related items unless instructed otherwise. Talk about things you have done and jobs you have held that relate to the position you are interviewing for. Start with the item farthest back and work up to the present.  2. Why did you leave your last job? Stay positive regardless of the circumstances. Never refer to a major problem with management and never speak ill of supervisors, co-workers or the organization. If you do, you will be the one looking bad. Keep smiling and talk about leaving for a positive reason such as an opportunity, a chance to do something special or other forward-looking reasons.  3. What experience do you have in this field? Speak about specifics that relate to the position you are applying for. If you do not have specific experience, get as close as you can.  4. Do you consider yourself successful? You should always answer yes and briefly explain why. A good explanation is that you have set goals, and you have met some and are on track to achieve the others.  5. What do co-workers say about you? Be prepared with a quote or two from co-workers. Either a specific statement or a paraphrase will work. Jill Clark, a co-worker at Smith Company, always said I was the hardest workers she had ever known. It is as powerful as Jill having said it at the interview herself.  6. What do you know about this organization? This question is one reason to do some research on the organization before the interview. Find out where they have been and where they are going. What are the current issues and who are the major players?  7. What have you done to improve your knowledge in the last year? Try to include improvement activities that relate to the job. A wide variety of activities can be mentioned as positive self-improvement. Have some good ones handy to mention.  8. Are you applying for other jobs? Be honest but do not spend a lot of time in this area. Keep the focus on this job and what you can do for this organization. Anything else is a distraction.  9. Why do you want to work for this organization?  © JobsAssist.com (www.jobsassist.com ) and VyomWorld.com (www.vyomworld.com ) - Free Student Resources  50 Common Interview Questions and Answers  This may take some thought and certainly, should be based on the research you have done on the organization. Sincerity is extremely important here and will easily be sensed. Relate it to your long-term career goals.  10. Do you know anyone who works for us? Be aware of the policy on relatives working for the organization. This can affect your answer even though they asked about friends not relatives. Be careful to mention a friend only if they are well thought of.  11. What kind of salary do you need? A loaded question. A nasty little game that you will probably lose if you answer first. So, do not answer it. Instead, say something like, That's a tough question. Can you tell me the range for this position? In most cases, the interviewer, taken off guard, will tell you. If not, say that it can depend on the details of the job. Then give a wide range.  12. Are you a team player? You are, of course, a team player. Be sure to have examples ready. Specifics that show you often perform for the good of the team rather than for yourself are good evidence of your team attitude. Do not brag, just say it in a matter-of-fact tone. This is a key point.  13. How long would you expect to work for us if hired? Specifics here are not good. Something like this should work: I'd like it to be a long time. Or As long as we both feel I'm doing a good job.  14. Have you ever had to fire anyone? How did you feel about that? This is serious. Do not make light of it or in any way seem like you like to fire people. At the same time, you will do it when it is the right thing to do. When it comes to the organization versus the individual who has created a harmful situation, you will protect the organization. Remember firing is not the same as layoff or reduction in force.  15. What is your philosophy towards work? The interviewer is not looking for a long or flowery dissertation here. Do you have strong feelings that the job gets done? Yes. That's the type of answer that works best here. Short and positive, showing a benefit to the organization.  16. If you had enough money to retire right now, would you? Answer yes if you would. But since you need to work, this is the type of work you prefer. Do not say yes if you do not mean it.  17. Have you ever been asked to leave a position? If you have not, say no. If you have, be honest, brief and avoid saying negative things about the people or organization involved.  18. Explain how you would be an asset to this organization You should be anxious for this question. It gives you a chance to highlight your best points as they relate to the position being discussed. Give a little advance thought to this relationship.  19. Why should we hire you? Point out how your assets meet what the organization needs. Do not mention any other candidates to make a comparison.  © JobsAssist.com (www.jobsassist.com ) and VyomWorld.com (www.vyomworld.com ) - Free Student Resources  50 Common Interview Questions and Answers  20. Tell me about a suggestion you have made Have a good one ready. Be sure and use a suggestion that was accepted and was then considered successful. One related to the type of work applied for is a real plus.  21. What irritates you about co-workers? This is a trap question. Think real hard but fail to come up with anything that irritates you. A short statement that you seem to get along with folks is great.  22. What is your greatest strength? Numerous answers are good, just stay positive. A few good examples: Your ability to prioritize, Your problem-solving skills, Your ability to work under pressure, Your ability to focus on projects, Your professional expertise, Your leadership skills, Your positive attitude .  23. Tell me about your dream job. Stay away from a specific job. You cannot win. If you say the job you are contending for is it, you strain credibility. If you say another job is it, you plant the suspicion that you will be dissatisfied with this position if hired. The best is to stay genetic and say something like: A job where I love the work, like the people, can contribute and can't wait to get to work.  24. Why do you think you would do well at this job? Give several reasons and include skills, experience and interest.  25. What are you looking for in a job? See answer # 23  26. What kind of person would you refuse to work with? Do not be trivial. It would take disloyalty to the organization, violence or lawbreaking to get you to object. Minor objections will label you as a whiner.  27. What is more important to you: the money or the work? Money is always important, but the work is the most important. There is no better answer.  28. What would your previous supervisor say your strongest point is? There are numerous good possibilities: Loyalty, Energy, Positive attitude, Leadership, Team player, Expertise, Initiative, Patience, Hard work, Creativity, Problem solver  29. Tell me about a problem you had with a supervisor Biggest trap of all. This is a test to see if you will speak ill of your boss. If you fall for it and tell about a problem with a former boss, you may well below the interview right there. Stay positive and develop a poor memory about any trouble with a supervisor.  30. What has disappointed you about a job? Don't get trivial or negative. Safe areas are few but can include: Not enough of a challenge. You were laid off in a reduction Company did not win a contract, which would have given you more responsibility.  31. Tell me about your ability to work under pressure.  © JobsAssist.com (www.jobsassist.com ) and VyomWorld.com (www.vyomworld.com ) - Free Student Resources  50 Common Interview Questions and Answers  You may say that you thrive under certain types of pressure. Give an example that relates to the type of position applied for.  32. Do your skills match this job or another job more closely? Probably this one. Do not give fuel to the suspicion that you may want another job more than this one.  33. What motivates you to do your best on the job? This is a personal trait that only you can say, but good examples are: Challenge, Achievement, Recognition  34. Are you willing to work overtime? Nights? Weekends? This is up to you. Be totally honest.  35. How would you know you were successful on this job? Several ways are good measures: You set high standards for yourself and meet them. Your outcomes are a success.Your boss tell you that you are successful  36. Would you be willing to relocate if required? You should be clear on this with your family prior to the interview if you think there is a chance it may come up. Do not say yes just to get the job if the real answer is no. This can create a lot of problems later on in your career. Be honest at this point and save yourself future grief.  37. Are you willing to put the interests of the organization ahead of your own? This is a straight loyalty and dedication question. Do not worry about the deep ethical and philosophical implications. Just say yes.  38. Describe your management style. Try to avoid labels. Some of the more common labels, like progressive, salesman or consensus, can have several meanings or descriptions depending on which management expert you listen to. The situational style is safe, because it says you will manage according to the situation, instead of one size fits all.  39. What have you learned from mistakes on the job? Here you have to come up with something or you strain credibility. Make it small, well intentioned mistake with a positive lesson learned. An example would be working too far ahead of colleagues on a project and thus throwing coordination off.  40. Do you have any blind spots? Trick question. If you know about blind spots, they are no longer blind spots. Do not reveal any personal areas of concern here. Let them do their own discovery on your bad points. Do not hand it to them.  41. If you were hiring a person for this job, what would you look for? Be careful to mention traits that are needed and that you have.  42. Do you think you are overqualified for this position? Regardless of your qualifications, state that you are very well qualified for the position.  © JobsAssist.com (www.jobsassist.com ) and VyomWorld.com (www.vyomworld.com ) - Free Student Resources  50 Common Interview Questions and Answers  43. How do you propose to compensate for your lack of experience? First, if you have experience that the interviewer does not know about, bring that up: Then, point out (if true) that you are a hard working quick learner.  44. What qualities do you look for in a boss? Be generic and positive. Safe qualities are knowledgeable, a sense of humor, fair, loyal to subordinates and holder of high standards. All bosses think they have these traits.  45. Tell me about a time when you helped resolve a dispute between others. Pick a specific incident. Concentrate on your problem solving technique and not the dispute you settled.  46. What position do you prefer on a team working on a project? Be honest. If you are comfortable in different roles, point that out.  47. Describe your work ethic. Emphasize benefits to the organization. Things like, determination to get the job done and work hard but enjoy your work are good.  48. What has been your biggest professional disappointment? Be sure that you refer to something that was beyond your control. Show acceptance and no negative feelings.  49. Tell me about the most fun you have had on the job. Talk about having fun by accomplishing something for the organization.  50. Do you have any questions for me? Always have some questions prepared. Questions prepared where you will be an asset to the organization are good. How soon will I be able to be productive? and What type of projects will I be able to assist on? are examples.  IMPORTANT RESOURCES FOR STUDENTS  World's Largest Free eBooks directory - www.bestebooksworld.com    Take Free Online Exams/Mock exams for GRE, GATE, TOEFL, MCSD, MCSE, CCNA, CAT, C, C++, JAVA, IIT etc at www.testsworld.com   Get Complete set of Placement papers of all companies & Software jobs FREE at www.jobsassist.com  FREE Download 20,000++ softwares & ebooks at www.vyomlinks.com    Get Thousands of FREE Source codes in most of Computer platforms at www.sourcecodesworld.com   Get your FREE dose of Fresher/Experienced Jobs direct to your mail box at www.jobsassist.com/careermag  © JobsAssist.com (www.jobsassist.com ) and VyomWorld.com (www.vyomworld.com ) - Free Student Resources  50 Common Interview Questions and Answers   Get FREE directory of 5000 IT companies at www.vyomlinks.com/itdirectory   Submit your Resume to 6000+ companies at one GO at www.vyomworld.com/jobs/resume/offer.asp   Discuss freely every thing on earth to the greatest possible depth at www.discussionsworld.com  FREE Bonus - 500+ Technical Interview Questions with Answers  There are 175 Pages in this eBook which contains the questions on the following streams with answers  Data Structures C C++/OOPS Quantitative Aptitude UNIX RDBMS SQL Computer Networks Operating Systems.  Download URL : www.bestebooksworld.com/digital/ Username : techebook Password : t@ch@b00k  This is a limited time access to download the eBook, so make sure you download the eBook before the password gets expired.  Hope you enjoy reading this eBook and it helps you in getting a much better job!



Regards
Mohamed Rafi