IT Engineer

100+ IT Engineer Interview Questions and Answers

Updated 3 Jul 2025
search-icon

Asked in TCS

1w ago

Q. What is the difference between a foreign key and a reference key?

Ans.

Foreign key is a column in a table that refers to the primary key of another table, while reference key is not a database term.

  • Foreign key is used to establish a relationship between two tables in a database.

  • Reference key is not a database term, but it can refer to a key used in programming to refer to an object or method.

  • Foreign key ensures data integrity and consistency in the database.

  • Reference key is used in programming to create associations between objects or methods.

  • Ex...read more

Asked in Bandhan Bank

2w ago

Q. What is your experience with troubleshooting computer hardware and network issues?

Ans.

I have extensive experience troubleshooting computer hardware and network issues.

  • Proficient in diagnosing and resolving hardware issues such as faulty components or connectivity problems

  • Skilled in troubleshooting network issues including slow internet speeds or connection drops

  • Experience with using diagnostic tools and software to identify and fix problems

  • Familiar with common hardware and network configurations in both Windows and Mac environments

Asked in S-cci india

1w ago

Q. What is the difference between FAT32 and NTFS?

Ans.

FAT32 is an older file system with limitations on file size and NTFS is a newer file system with advanced security features.

  • FAT32 has a maximum file size of 4GB while NTFS can handle much larger files.

  • NTFS supports file compression, encryption, and permissions while FAT32 does not.

  • FAT32 is compatible with more devices and operating systems than NTFS.

  • NTFS has a journaling feature that helps recover data in case of a system crash.

  • FAT32 is commonly used for USB drives and older ...read more

Q. How can you take a Windows backup?

Ans.

Windows backup can be taken using built-in tools like File History or Backup and Restore.

  • Open Control Panel and select Backup and Restore

  • Click on Set up backup and follow the prompts

  • Choose the files and folders you want to backup

  • Alternatively, use File History to backup specific folders

  • You can also use third-party backup software like Acronis True Image

Are these interview questions helpful?
3d ago

Q. How do we configure an email ID in Exchange?

Ans.

To configure an email ID in Exchange, follow these steps:

  • Open Exchange Admin Center

  • Click on recipients and then on mailboxes

  • Click on the plus sign to create a new mailbox

  • Select the mailbox type and fill in the required details

  • Click on save to create the mailbox

Q. What is the network ID for IP PHONE_NUMBER.0.23?

Ans.

The network id for ip 192.168.0.23 is 192.168.0.0.

  • Identify the subnet mask for the network

  • Perform a bitwise AND operation between the IP address and subnet mask

  • The result is the network id

IT Engineer Jobs

CBRE logo
IT Engineer 5-10 years
CBRE
4.1
₹ 6 L/yr - ₹ 8 L/yr
New Delhi
Viraj Profiles logo
Pulpit Engineer- Section Rolling Mill- Viraj 2-5 years
Viraj Profiles
3.8
Boisar
Xcellance Medical Technologies Pvt Ltd logo
IT Engineer 5-10 years
Xcellance Medical Technologies Pvt Ltd
3.9
₹ 4 L/yr - ₹ 5 L/yr
Navi Mumbai
1w ago

Q. How would you troubleshoot your application after deploying?

Ans.

I would start by checking the application logs, verifying configurations, and testing different scenarios.

  • Check application logs for any errors or warnings

  • Verify configurations to ensure they are correct

  • Test different scenarios to replicate the issue

  • Use monitoring tools to track performance metrics

  • Collaborate with team members to troubleshoot and find solutions

2w ago

Q. What commands are used in a Dockerfile?

Ans.

Commands used in Dockerfile are instructions that define how an image should be built.

  • FROM: specifies the base image

  • RUN: executes commands in a new layer on top of the current image

  • COPY: copies files from the host machine to the image

  • CMD: specifies the default command to run when a container is started

  • EXPOSE: exposes ports from the container to the host machine

  • WORKDIR: sets the working directory for any RUN, CMD, ENTRYPOINT, COPY, and ADD instructions

  • ENV: sets environment var...read more

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q. What troubleshooting steps do you take when a PC becomes slow?

Ans.

Troubleshooting steps for a slow PC

  • Check for malware and viruses

  • Free up disk space

  • Uninstall unnecessary programs

  • Update drivers and software

  • Check for hardware issues

Asked in BA Continuum

2w ago

Q. How do you resolve issues for users?

Ans.

To resolve an excited issue for a user, listen actively, empathize, provide clear instructions, and offer reassurance.

  • Listen actively to the user's concerns and frustrations.

  • Empathize with the user's emotions and acknowledge their feelings.

  • Provide clear instructions on how to resolve the issue step by step.

  • Offer reassurance that the problem will be resolved and provide a timeline if possible.

Q. How does the booting system work?

Ans.

Booting system involves initializing hardware, loading operating system and executing startup scripts.

  • Power on the computer to start the boot process

  • BIOS/UEFI firmware checks hardware components

  • Bootloader loads operating system kernel

  • Operating system initializes drivers and services

  • Startup scripts run to configure system settings

  • Examples: GRUB, Windows Boot Manager

Q. What is ticketing tool and encryption

Ans.

A ticketing tool is a software used to manage and track customer support requests. Encryption is the process of converting data into a code to prevent unauthorized access.

  • Ticketing tools help IT engineers manage and prioritize support requests

  • Encryption is used to protect sensitive data from unauthorized access

  • Common encryption methods include AES, RSA, and SHA

  • Encryption is used in various applications such as online banking, email, and messaging services

Asked in TCS

1w ago

Q. What parameters should we consider before configuring IPsec VPN?

Ans.

Considerations for configuring IPsec VPN

  • Security requirements of the network

  • Bandwidth requirements

  • Compatibility with existing network infrastructure

  • Authentication and encryption protocols

  • Key management

  • Firewall and NAT traversal

  • Client compatibility

  • Scalability

  • Redundancy and failover

  • Logging and monitoring

  • Regulatory compliance

Asked in DB Schenker

1w ago

Q. How much experience do you have in this field?

Ans.

I have X years of experience in the IT engineering field.

  • I have worked on various projects involving network infrastructure design and implementation.

  • I am proficient in programming languages such as Java and Python.

  • I have experience in troubleshooting and resolving technical issues.

  • I have worked with different operating systems such as Windows, Linux, and macOS.

  • I have experience in cloud computing and virtualization technologies.

  • I have worked with different databases such as ...read more

2w ago

Q. How many tickets were you handling, and how much time did you spend resolving each ticket?

Ans.

I handled an average of 20-25 calls tickets per day and took around 30-45 minutes to solve each ticket.

  • Handled 20-25 calls tickets per day

  • Took 30-45 minutes to solve each ticket

  • Prioritized urgent tickets first

  • Collaborated with team members to solve complex tickets

Q. What is the use of the ping command?

Ans.

Ping command is used to test the connectivity between two devices on a network.

  • Ping command sends an ICMP echo request to the target device and waits for a response.

  • It measures the round-trip time for the packet to travel from the source device to the target device and back.

  • It can also be used to determine the IP address of a device on a network.

  • Ping command is useful for troubleshooting network connectivity issues.

  • It can also be used to check the status of a website or serve...read more

Asked in Cinépolis

1d ago

Q. explain concepts of lan, wan , important of rj45 cable

Ans.

LAN and WAN are types of computer networks. RJ45 cable is important for connecting devices in a network.

  • LAN stands for Local Area Network and is used to connect devices within a small geographical area like an office or a building.

  • WAN stands for Wide Area Network and is used to connect devices over a large geographical area like cities or countries.

  • RJ45 cable is used to connect devices in a network and is important for transmitting data between them.

  • RJ45 cable is also known a...read more

2w ago

Q. How to maintain data ? MS office , Tally,ERP,CRM

Ans.

Data can be maintained using various software such as MS Office, Tally, ERP, and CRM.

  • Identify the type of data to be maintained

  • Choose the appropriate software for the specific data

  • Ensure regular backups are taken to prevent data loss

  • Implement security measures to protect sensitive data

  • Train employees on how to use the software effectively

1w ago

Q. What do you know about Active Directory?

Ans.

Active Directory is a Microsoft service that manages network resources and allows for centralized authentication and authorization.

  • Active Directory is used to manage users, computers, and other network resources

  • It allows for centralized authentication and authorization

  • It uses a hierarchical structure of domains and organizational units (OUs)

  • Group Policy Objects (GPOs) can be used to enforce policies and settings across the network

  • Active Directory can integrate with other Micr...read more

Q. What is the subnet mask for IP PHONE_NUMBER.45.21?

Ans.

The subnet mask for IP 192.168.45.21 is typically 255.255.255.0.

  • Subnet masks determine the network and host portions of an IP address.

  • The default subnet mask for a Class C network is 255.255.255.0.

  • Subnet masks are represented in dotted decimal notation.

Asked in BR Softech

2w ago

Q. 1 Wap print even num in python/ C 2 Wap print Fibonacci series num in python

Ans.

Print even numbers in Python and Fibonacci series in Python.

  • For printing even numbers in Python, use a loop to iterate through a range of numbers and check if each number is divisible by 2.

  • For printing Fibonacci series in Python, use a loop to generate the series by adding the previous two numbers in the sequence.

  • Example for even numbers in Python: for i in range(1, 11): if i % 2 == 0: print(i)

  • Example for Fibonacci series in Python: a, b = 0, 1 for _ in range(10): print(a) a,...read more

Q. How can you find an IP address?

Ans.

IP address can be found using command prompt or network settings.

  • Use 'ipconfig' command in command prompt to find IP address

  • Go to network settings and look for 'IPv4 Address' or 'IP Address'

  • Use online IP lookup tools to find IP address of a website

Q. How do you troubleshoot a system?

Ans.

Troubleshooting a system involves identifying and resolving issues that prevent it from functioning properly.

  • Start by gathering information about the problem and its symptoms

  • Use diagnostic tools to identify the root cause of the issue

  • Develop and implement a plan to resolve the problem

  • Test the system to ensure the issue has been resolved

  • Document the troubleshooting process and solution for future reference

1w ago

Q. What is the color coding for a straight-through Ethernet cable?

Ans.

The colour coding for straight cable follows a specific pattern to ensure proper connections.

  • The colour coding for straight cable typically follows the T568A or T568B standard

  • In T568A, the colour coding is: white-green, green, white-orange, blue, white-blue, orange, white-brown, brown

  • In T568B, the colour coding is: white-orange, orange, white-green, blue, white-blue, green, white-brown, brown

Q. How do you troubleshoot networking issues related to switches and IT hardware?

Ans.

Troubleshooting network switches involves diagnosing connectivity issues, configuration errors, and hardware failures.

  • Check physical connections: Ensure all cables are securely connected and undamaged.

  • Verify switch configuration: Use commands like 'show running-config' to check for misconfigurations.

  • Test VLAN settings: Ensure devices are on the correct VLAN and that VLANs are properly configured.

  • Inspect for link lights: Check the LED indicators on the switch ports for connect...read more

Q. How do you back up data from a laptop or PC?

Ans.

Data backup of laptop/pc can be done using external hard drives, cloud storage, or backup software.

  • Use an external hard drive to manually backup important files

  • Use cloud storage services like Google Drive or Dropbox to backup files online

  • Use backup software like Acronis True Image or EaseUS Todo Backup to automate the backup process

  • Create a backup schedule to ensure regular backups are performed

  • Test the backup to ensure it can be restored in case of data loss

Q. Describe a time you used logic to solve an engineering problem.

Ans.

Used logic to troubleshoot network connectivity issue by systematically checking hardware and software components.

  • Identified the symptoms of the issue, such as devices not connecting to the network or slow internet speeds.

  • Checked physical connections, network settings, and device configurations to pinpoint the root cause.

  • Used troubleshooting tools like ping, traceroute, and network analyzers to gather data and analyze network traffic.

  • Implemented solutions based on the analysi...read more

Asked in Apollo Tyres

2w ago

Q. What are the default storage formats for .ost and .pst files?

Ans.

OST and PST are file formats used by Microsoft Outlook for storing email data.

  • OST files are used for offline access to Exchange server mailboxes

  • PST files are used for archiving and backing up email data

  • OST files are automatically created when Outlook is configured with Exchange server

  • PST files can be created manually by the user

  • OST files are typically larger in size than PST files

2d ago

Q. What is a DHCP server, and how does it function?

Ans.

A DHCP server is a network server that automatically assigns IP addresses and other network configuration settings to devices on a network.

  • DHCP servers provide dynamic IP address allocation to devices on a network

  • They also assign subnet masks, default gateways, DNS server addresses, and other network configuration parameters

  • DHCP servers use a lease mechanism to control the amount of time a device can use an IP address before it must be renewed

  • DHCP servers reduce the administr...read more

Q. How do you work in Linux?

Ans.

Working in Linux involves using the command line interface to navigate and execute tasks.

  • Learn basic commands such as ls, cd, mkdir, and rm

  • Understand file permissions and how to change them with chmod

  • Use package managers like apt-get or yum to install and update software

  • Become familiar with text editors like vi or nano

  • Use shell scripting to automate tasks

  • Join online communities and forums for support and learning opportunities

Previous
1
2
3
4
5
6
7
Next

Interview Experiences of Popular Companies

TCS Logo
3.6
 • 11.1k Interviews
Infosys Logo
3.6
 • 7.9k Interviews
Wipro Logo
3.7
 • 6.1k Interviews
Cognizant Logo
3.7
 • 5.9k Interviews
Amazon Logo
4.0
 • 5.4k Interviews
View all
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

IT Engineer Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Trusted by over 1.5 Crore job seekers to find their right fit company
80 L+

Reviews

10L+

Interviews

4 Cr+

Salaries

1.5 Cr+

Users

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2025 Info Edge (India) Ltd.

Follow Us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter
Profile Image
Hello, Guest
AmbitionBox Employee Choice Awards 2025
Winners announced!
awards-icon
Contribute to help millions!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos
Add office benefits
Add office benefits