25 ICT Interview Questions & Answers
Below is a list of our ICT interview questions. Click on any interview question to view our answer advice and answer examples. You may view six answer examples before our paywall loads. Afterwards, you'll be asked to upgrade to view the rest of our answers.
1. What percentage of your time do you spend on the following: Network Architecture, Software and Hardware selection, Network Optimization (including upgrades,) User Support, and Administrative Tasks? How would you change this to better use your time?
How to Answer
This is an operational question in which the interviewer is seeking to understand your work habits and patterns. They may have some preconceived notion of how your time should be spent. A good way to respond to this question is directly and honestly. You should also be prepared for follow-up questions which will clarify what you're doing when performing each of the functions the interviewer has asked about.
Written by William Swansen on February 13th, 2020
Answer Example
"This is an interesting question, which I don't often think about. My best estimate is the following: I spend the majority of my time defining the network architecture and optimizing the network performance. Combined, these probably occupied 50% of my day. The next biggest component is user support which takes about 25% of my time. Administrative tasks probably represent about 15%, and the remaining 10% is spent on hardware and software selection."
Written by William Swansen on February 13th, 2020
Experienced
"No two days for an ICT Administrator are identical, but were I to average things out, my time is probably spent in the following manner: I spend a great deal of time optimizing the network and reviewing the network architecture. These both directly impact the network performance and are the most important tasks I can perform. User support requires at least 25% of my time and often occurs adhoc when issues arise. The balance of my time is spent on administrative tasks and selecting hardware and software. Addressing network performance takes about 60% of the time, administrative tasks about 15% and hardware and software selection about 10%."
Written by William Swansen
2. What source control tools have you used when managing an ICT network and why did you select these?
How to Answer
This is a strictly operational question which asks you not to define the tools, but only name them and describe how you use them to manage an ICT Network. Rather than list every tool you use, only identify the top three, providing the name and a brief explanation of the tool and its functions. The danger here is providing too much rather than too little information.
Written by William Swansen on February 13th, 2020
1st Answer Example
"I use several different control tools to manage ICT networks. The one I use the most and which has become the standard in the ICT industry is CVS. While this is easy to use, it is not as feature-rich as some other solutions. Another tool I use is SVM or Subversion as is sometimes called. It helps to monitor and control the versions of software across the network. It is also incorporated into some of the development languages. Occasionally I will use GIT because, unlike CVS or SVN, it is a distributed product."
Written by William Swansen on February 13th, 2020
2nd Answer Example
"Like most ICT Administrators, I use several source control tools. These include SVN, GIT, and CVS. Each has unique features that make it useful in specific situations. While CVS is my default tool, I do use SVN because of its inclusion in many of the software development languages our team employs. GIT is more powerful and applicable in distributed environments. However, you need to be very experienced in order to use it."
Written by William Swansen
3. What is clustering? Describe its use in an ICT environment.
How to Answer
It was mentioned earlier that you should expect the majority of questions you asked during an interview as an ICT Administrator to be either operational or technical. This is another example of a hybrid question that incorporates both of these features. Straightforwardly answer the question, with little embellishment. Anticipate follow-up questions from the interviewer.
Written by William Swansen on February 13th, 2020
1st Answer Example
"Clustering is connecting two or more computers in a manner that enables them to behave as a single data processor. The purpose of this is to create a parallel processing environment, perform a load balancing and establish fault tolerance."
Written by William Swansen on February 13th, 2020
2nd Answer Example
"Clustering is the act of connecting two or more computers to make them appear and function as a single computer. This can be done with software such as Microsoft Cluster Server. The purpose of clustering is to increase performance, such as in the case of high-performance computing, provide failover and increased availability, or to create a parallel processing environment."
Written by William Swansen
4. What is the role of continuous integration systems in the automated-build process?
How to Answer
Yet another hybrid operational and technical question. By now, you should be starting to recognize these. As a reminder, the best way to answer these questions is to define the term and then provide an example of how it is used in your day to day work.
Written by William Swansen on February 13th, 2020
1st Answer Example
"Continuous Integration, or CI, is a development practice which helps to reduce errors and bugs while developing a new software feature or application. The CI and automated build server will recognize when a new piece of code has been developed. It will then run a test that will determine if the build was successful or whether it needs attention from the development team. This is an integral part of our software development process."
Written by William Swansen on February 13th, 2020
2nd Answer Example
"Continuous integration, or CI, is a practice used by developers to ensure that the code they've built is correct before it is integrated into the software application on which they are working. The way we use CI is to require our developers to deposit their code into a shared repository several times a day. We then run build tests on the code to ensure that it was built correctly. This has been very effective at maintaining the integrity of our applications."
Written by William Swansen
5. What is the role of the DMZ in network architecture? How do you enforce relational integrity in database design?
How to Answer
Another example of a hybrid operational and technical question. You are first being asked to define an ICT term, followed by an explanation of how it is used in the work you perform. The best way to address questions like this is to provide the definition and then give an example of how you would use the technology. Anticipate follow-up questions from the interviewer since this is very specific and topical.
Written by William Swansen on February 13th, 2020
1st Answer Example
"DMZ, which is short for DeMilitarized Zone, are buffer zones set up between public and private networks. The purpose of a DMZ is to maintain the security of the network and filter out any unwanted traffic. The traffic is screened using a firewall or another security appliance before it is allowed into the private network."
Written by William Swansen on February 13th, 2020
2nd Answer Example
"A DMZ is a security strategy that helps keep unwanted traffic out if the client's private network. It is analogous to creating a small isolated network positioned between the Internet and the private network. While it is not 100% effective, it does provide the ICT administrators with one more line of defense, and additional time to detect malicious traffic trying to penetrate the network."
Written by William Swansen
6. When is the last time you downloaded an ICT utility from the internet to make your work more productive, and what was it?
How to Answer
This question is a hybrid between operational and technical. The interviewer will ask this type of question to confirm that you understand the importance of ICT Utilities, know where to get them, and to gain some information on the programs you prefer to use. As a seasoned ICT professional, you should be able to answer this question easily and give some examples of recent software utilities you've downloaded.
Written by William Swansen on February 13th, 2020
1st Answer Example
"As an ICT administrator, I'm constantly looking for new tools and utilities to use to maintain the integrity and performance of the networks I manage. I have a few go-to software programs that I use. These include the McAfee suite of antivirus programs, WinZip for file compression, Paragon Partition Manager for disk management, and Razer Cortex for disk cleanup. I usually obtain these directly from the manufacturer's website."
Written by William Swansen on February 13th, 2020
2nd Answer Example
"System utility software as a key component when administrating and managing ICT network environments. I'm careful about the tools I use because I want them to be effective and affordable. In addition to the traditional tools from Microsoft, McAfee, and other providers, I use some very specific tools, especially for managing the network. These include SolarWinds Remote Monitoring and Management, Kaseya VSA, LogicMonitor, and Sensu. I have longstanding relationships with most of these vendors and even get the suit some of the products in their beta or pre-release form."
Written by William Swansen
7. What is the difference between OLAP and OLTP? When is each used?
How to Answer
This technical question is requesting that you define the difference between two similar terms commonly encountered in an ICT environment. This type of question is used to separate senior ICT Administrators from individuals with less experience and expertise in the field. You may want to start by defining each term and then stating the differences between them as well as how the technology is used.
Written by William Swansen on February 13th, 2020
Answer Example
"OLTP stands for online transaction processing. It is a common data processing system used in an ICT environment. Examples of this include retail sales and financial transactions. OLAP stands for online analytical process. The key difference between these two types of technology it is OLTP consists of large volumes of short transactions. OLAP is characterized by smaller numbers of more complex and larger transactions."
Written by William Swansen on February 13th, 2020
Experienced
"OLTP and OLAP or similar in that they both define online processes. OLTP stands firm online transaction processing. Examples of this include retail transactions as well as transactions related to finance, such as stock trading. OLAP stands for online analytical process. These are processes used to analyze large sets of data for decision-making and other functions. An example of an OLAP is Netflix analyzing your viewing habits and then making recommendations for other content."
Written by William Swansen
8. What is a cross-site scripting attack, and how do you defend against it?
How to Answer
An interviewer will ask this question, which, of course, is technical in nature to both test your knowledge and to ensure that you know how to combat this type of attack. As a seasoned ICT administrator, you should be able to answer this question easily with both the definition of the term and a description of how you would defend against it. Since you won't know the technical expertise of the interviewer, keep your answer at a high level. They will ask follow-up questions if they need more information from you.
Written by William Swansen on February 13th, 2020
Answer Example
"Cross-site scripting or XSS is a type of security vulnerability that is most commonly found in web applications. It enables attackers to inject a malicious script into the web pages. This allows attackers to bypass common security measures. The best way to combat XSS attacks is to sanitize any input from the users."
Written by William Swansen on February 13th, 2020
Experienced
"A cross-site scripting attack or XSS is a type of injection, in which malicious scripts are injected into the otherwise benign and trusted website. It is typically in the form of a message sent to a legitimate user of the site. Inside the message is a malicious script which then infects the system and provides access to the hacker. These types of attacks can be addressed using techniques including escaping, validating the input, and sanitizing anything a user inputs into the system."
Written by William Swansen
9. What do you do to ensure consistency across ICT development, quality, and production environments?
How to Answer
One of the most important aspects of an ICT environment is consistency. Any inconsistencies create problems that are difficult to resolve. The result of this is higher costs or less reliable telephony and information networks. The interviewer will ask this operational question to ensure that you are aware of the importance of consistency and have methods that you use to ensure it.
Written by William Swansen on February 13th, 2020
Answer Example
"Consistency in an ICT environment is critical, and it's one of the items I am constantly addressing. The best way to ensure this is to document everything. Having a standard set of procedures, technology standards, up to date documentation, and accurate and current training all contribute to a consistent and stable environment."
Written by William Swansen on February 13th, 2020
Experienced
"One of the first things I learned during my training was that the easiest way to manage a complex ICT environment is to maintain consistency. The best way to achieve this is to create standards and document everything. I've always insisted on creating procedural manuals that describe the company's standard technologies and the processes utilized to manage these. I also incorporate this philosophy into the periodic training new operators and staff are required to attend."
Written by William Swansen
10. What are the most important communications network performance metrics, and how do you monitor them?
How to Answer
As an ICT Professional, it is important that you understand how network performance is monitored and optimized. The interviewer knows this and is attempting to see how you accomplish maximizing the speed and performance of a communications network. This is why they are hiring you, so this may be one of the more important questions you will be asked. Again, it should be easy for you to respond to this question if you keep this in mind and rely on your experience in this field.
Written by William Swansen on February 13th, 2020
Answer Example
"I believe the most important network performance metric is bandwidth, which is the maximum data transmission rate possible on a network. Other metrics I use to determine how the network is performing include throughput, latency, packet loss, retransmission, and availability. I monitor these through a consolidated dashboard which provides me and my team with the performance data on a real-time basis."
Written by William Swansen on February 13th, 2020
Experienced
"The majority of my time as a network administration manager is spent monitoring the performance of the network. The key metric I focus on is bandwidth since this dictates the data transmission rates and the amount of network traffic the system can accommodate. Other metrics include latency, packet loss, throughput, and connectivity. There are a number of network management tools available, but the one key characteristic I look for is that the tool has a consolidated dashboard that enables my team to view the complete network and all these metrics on a single screen."
Written by William Swansen
11. In network security, what is a honey pot, and how is it used?
How to Answer
This is another technical question which the interviewer is seeking to understand whether you have used advanced network security techniques. If you are a seasoned ICT professional, you should have no trouble answering this question. However, it illustrates that you should be prepared for just about any technical questions you may be asked. You can do this by researching the organization and trying to gain an understanding of the technology they already use.
For exampl: "A honeypot is a system within an organization's network that is a decoy. Its purpose is to lure in cyber attackers and to detect, deflect or characterize their hacking attempts. This enables the network administration team to create defenses and counter-measures to hackers."
Written by William Swansen on February 13th, 2020
Entry Level
"A honeypot is a computer which is inserted into the network with the intention to mimic a target of cyberattacks. It can be used to detect attacks or deflect them from other systems which are legitimate targets. It can also be used to gain information about how cyber attackers operate. A honeypot works by being an intentionally vulnerable hole in security. Usually, these devices will take the form of a virtual machine that has been deliberately weakened and placed in an accessible area of the network outside of the firewall and other defenses set up to prevent hacking."
Written by William Swansen
Answer Example
"A honeypot is a system within an organization's network that is a decoy. Its purpose is to lure in cyber attackers and to detect, deflect or characterize their hacking attempts. This enables the network administration team to create defenses and counter-measures to hackers."
Written by William Swansen on February 13th, 2020
12. How often are you able to reuse code that you develop, and can you provide me an example of when you have done this?
How to Answer
What the interviewer is seeking to learn by asking this question is your level of coding skills. ICT professionals should be intimately familiar with coding, even if they don't develop software themselves. Being able to reuse code makes programmers much more efficient. This is because they don't have to write new code and the code they reuse as already been validated.
Written by William Swansen on February 13th, 2020
Answer Example
"Most of the code I use for the applications I manage is written a either Java or Ruby. The benefit of both of these languages is that there are large libraries of code either written by our organization or from other developers which has been tested and validated. I encourage my team to regularly reuse as much code as possible to make their programming activities more efficient and effective. I'd estimate that 25% of the code we use has been recycled."
Written by William Swansen on February 13th, 2020
Experienced
"The longer work in the ICT industry, the more I realize that many applications are similar in nature. This characteristic has enabled me to reuse much of the code I've written or obtained from the libraries for the languages in which I program. An example of this is a network management tool I recently developed. The application is proprietary to my organization, so I was able to reuse about 25% of the code I had developed for a similar application used to manage security across the network. A side benefit of this is that the ICT administrators were already familiar with the security application, so their learning curve was reduced for the new one."
Written by William Swansen
13. What criteria do you use to determine when to sunset an older technology?
How to Answer
This is an interesting operational question. Not only does it seek to understand how you manage technology in an ICT environment, but it also will help the interviewer gain some insight into how you balance cost and productivity. Many technology professionals chase the latest developments in their field and are willing to spend the organization's budget doing this. Others are overly budget conscious and don't upgrade products even when doing so may increase the organization's productivity. The key is finding a balance between these two strategies.
Written by William Swansen on February 13th, 2020
Answer Example
"There are several criteria I use when deciding when to sunset an older technology. The first is the cost of supporting the technology vs. the cost of upgrading it. Second, I consider the logistics of implementing a new technology including retraining the users. The final criteria I use is the impact on the organization, including downtime and any loss of productivity due to the transition."
Written by William Swansen on February 13th, 2020
Experienced
"Deciding when to sunset older technology requires a careful analysis of the impact it would have on the organization. Criteria I use include the cost of continuing to support the older products and whether the manufacturers are providing regular upgrades and patches. The next thing I look at is whether the technology is still productive within the organization and if sunsetting it would impact the productivity in either a negative or positive way. The final criteria is the cost to upgrade the technology and if there are more effective ways to allocate the funds."
Written by William Swansen
14. Describe a time when you were able to improve upon a network design that existed before you began working for the organization.
How to Answer
An interviewer will ask this type of operational question for two reasons. The first is to gain an understanding of your skills in designing complex communication networks. The second reason is to get some insight into your interpersonal communication style. This is important because, in addition to your technical skills, you'll need to be able to work with other people and the organization and be compatible with the company's culture. The mistake some people make after taking on a new job is to begin making recommendations for improvements before they have learned the details of the existing operation. Make sure that you clarify that you were on board for some time before you recommended an upgrade to the company's network design.
Written by William Swansen on February 13th, 2020
Answer Example
"In my previous organization I took the time to gain a complete understanding of their network topology, how it was performing, what upgrades they already had planned. Once I fully understood the existing network design, I made some recommendations that would reduce the latency, consolidate some of the hardware, and add some tools which would make it easier to manage the network. Most of my recommendations were approved and implemented and resulted in the improvements I had forecast."
Written by William Swansen on February 13th, 2020
Experienced
"Communication Network Technology is constantly evolving and changing. This provides opportunities for upgrades, which often claim to be able to improve the performance, lower the cost, or make it easier to manage the network. However, as with anything, there are tradeoffs. When evaluating and ICT Network or possible improvement, I always seek to understand the existing topology as well as the business objectives of the organization. I can then make recommendations that will both improve performance and meet the business objectives while not extending the budget or creating additional complexity."
Written by William Swansen
15. Describe the elements of an N-tier architecture and their appropriate use.
How to Answer
Yet another example of a technical question in which the interviewer is requesting you to define the term and then explain its use. When working on the field of Information and Communication Technology, you should expect a lot of technical questions during an interview. The best way to prepare is to study up on the terms you typically encounter in this job.
Written by William Swansen on February 13th, 2020
Answer Example
"N-tier architecture which, is also called multi-tier architecture, separates the three components of software functions. These three components are the processing, data management, and presentation functions. They're separated from each other both physically and logically. The benefit of this is that the technology can be delivered in as fast a manner as possible and easily managed due to the distinct functions being segregated from each other."
Written by William Swansen on February 13th, 2020
Experienced
"An N-tier architecture is one in which the three components of a software function are segregated into different layers. This improves the performance of the individual functions as well as the ability for the administrators to manage each of the functions. The top tier function is the presentation layer, the next layer is the logic tier, and the final layer is the data function. Structuring the functions in this manner also provides the shortest path for the data to get to the user after it has been queried or manipulated."
Written by William Swansen
16. Describe the difference between optimistic and pessimistic locking.
How to Answer
In this technical question, the interviewer is asking you to define the difference between two similar terms. Only the most experienced ICT qualified administrators will be able to address this. A good way to answer this question is to define each term, then provide an example of how the technology is applied.
Written by William Swansen on February 13th, 2020
Entry Level
"While these are both record locking technologies, their function differs dramatically. I pessimistic locking, when are user updates a record it is then locked. The record can only be updated again after the record is unlocked. Conversely, using optimistic locking, a record can be updated by one user and then other users can update it. The only time the record is locked is when a user is actively updating it. Optimistic locking is applied to applications where users are allowed to collaborate with each other."
Written by William Swansen
Answer Example
"Pessimistic locking describes a process where a record is locked after the data is updated. This prevents anyone else from accessing the record. The lock can be released, and the record can then be updated. Optimistic locking, on the other hand, allows multiple users to open the same record and update it. The only time the record is locked is when someone is actively updating it. This is typically used for web applications in which collaboration is occurring."
Written by William Swansen on February 13th, 2020
17. Define 'authentication,' and 'authorization,' and the tools that are used to support them in enterprise deployments.
How to Answer
Yet another technical question asking you to define some terms and demonstrate that you know how to work with the technology they involve. As with most technical questions, the best strategy is a straightforward answer defining the terms followed by a brief description of the tools used to manage them. The interviewer will ask you a follow-up question if they'd like some additional information.
Written by William Swansen on February 13th, 2020
Entry Level
"These terms are similar but different. Authentication confirms your identity to gain access to the system while authorization determines whether you are in fact authorized to have access to the resources. Authentication usually requires a username and password. Authorization and be done in a variety of ways which confirm the identity of the user who has provided their credentials through the authentication process. While these two processes differ, the tools used to execute them are the same and include APIs and LDAP servers."
Written by William Swansen
Answer Example
"While both of these terms involve security and gaining access to a network, they are different in terms of their perspective. Authentication means to confirm your own identity, while authorization means granting access to the network for other users. Tools used for both authentication and authorization include APIs and LDAP servers."
Written by William Swansen on February 13th, 2020
18. Do you prefer to manage people or technology, and why?
How to Answer
The correct answer to this type of question is both. But since the interviewer asked you to choose, you need to select one or the other. As with some previous questions, there is no right answer to this. The key point is to be able to defend your choice and provide the reasoning behind it. Always answer questions involving a choice positively and don't speak negatively about the option you didn't choose.
Written by William Swansen on February 13th, 2020
Answer Example
"While I love technology and can spend all day on coding and solving technical issues, I really enjoy managing people. I like the challenge it presents and motivating people to perform at their best. I achieve this through coaching and mentoring as well as assigning the right person to the right task. I also enjoy collaborating with an innovative team of bright professionals. I found that you can learn from everybody you meet, and I am always looking for opportunities to both learn and teach."
Written by William Swansen on February 13th, 2020
Experienced
"This is a difficult choice because I actually enjoy managing both people and technology. However, I'd have to say that I favor technology. This is the reason I became an ICT specialist. Working with people is interesting due to the dynamics of interpersonal relationships. But I really enjoy managing technology because of its finite nature. At times the technical issues can be challenging and difficult to resolve. Knowing that there is a solution encourages me to work hard using my existing skills or learning new ones. Creating effective communications and technology infrastructures is rewarding and I can't think of anything I'd rather do."
Written by William Swansen
19. You have created a piece of code that didn't work in production. You found the bug during testing, and nobody else is aware of it. What would you do next?
How to Answer
While this appears to be an operational question, it is actually seeking to understand your level of integrity. There are several ways you can address this issue, but when answering the question be sure to respond in a manner that the company will find acceptable. As you probably have heard before there is the right way and there's an expedient way. While you might use the expedient way in real life, always answer a question like this in the right way.
Written by William Swansen on February 13th, 2020
Answer Example
"This has actually happened to me in one of my previous roles. I discovered a bug and knew it would take some effort to patch it. I could have probably done it without anybody noticing, however the time I spent correcting the mistake could have been used for more productive work. What I did was tell my manager and other project stakeholders about the bug and provide an estimate of how much time it would take to repair it. We discussed the impact on the rest of the project and decided to proceed, with complete transparency across the entire team. As it turned out, this had little impact on the overall project and we still finished on time and under budget."
Written by William Swansen on February 13th, 2020
Experienced
"Developing code and creating applications is a team effort involving many people and resources. Anytime something negative or positive occurs it has an impact on the entire team. This is why the best course of action when you find a bug is to inform the group. Being transparent enables you to use the rest of the team and other resources to develop a solution to the problem, while not creating an issue that may delay the development or impact the quality of the work. In software development, honesty is always the best policy."
Written by William Swansen
20. You have been asked to research a new business application. You find two solutions, an on-premise solution, and a cloud-based one. Assuming they are functionally equivalent, which would you recommend?
How to Answer
At first, this appears to be a very simple question to answer. However, what the interview was actually looking for is not so much an answer but rather your rationale behind it. Either of these options is appropriate, as long as you can describe why you are recommending the one you choose.
Written by William Swansen on February 13th, 2020
Answer Example
"While both on-premise and cloud-based application hosting have their merits, I prefer to host applications on-premise. The reason behind this is that it provides the administrators with easier access to the applications and also assures a higher level of security due to no data being transmitted outside of the firewall. It is also likely to provide a higher level of performance. The drawbacks of this or that the licensing costs are probably greater and that were something to happen to the local datacenter, the information could be lost. Solutions to these points include negotiating an enterprise license with the vendor and having an effective disaster recovery plan in place."
Written by William Swansen on February 13th, 2020
Experienced
"Based on my experience, cloud-based hosting is a more effective solution with the majority of applications an enterprise uses. The reason for this is that the cloud hosting companies such as AWS or Microsoft can ensure that their systems are running, and the applications are available nearly 100% of the time. They also make the effort to upgrade their hardware and networks on a regular basis to remain competitive. This alleviates the organization from having to do this for the on-premise infrastructure, thereby lowering the overall cost of supporting the application."
Written by William Swansen
21. The CTO wants to know how much it would cost to bring in five more people on your team. They give you very vague requirements for the job they are looking for you to do. How would you react?
How to Answer
looking to understand how you work with senior management. This is another behavioral question, which you can answer by using past experience to project your behavior in this specific situation. Your answer should reflect the difficulty of making decisions or providing information when you lack critical data, and how you overcome this.
Written by William Swansen on February 13th, 2020
Answer Example
"I've had similar experiences like this when senior management is considering a new initiative but doesn't have a lot of details. Sometimes they are looking for general information or rough estimates. Other times they expect exact details and specific solutions to the issue. The trick is knowing with which of these you are dealing. When presented with this type of question, I will put together a short list of clarifying questions that I will present to the CTO in writing. I will then ask for a meeting to discuss my questions and explore some of the details. This typically results in me being provided additional information about what the decision-makers are looking for and the type of response they expect from me. Once I have this information, I can reply to their inquiry appropriately."
Written by William Swansen on February 13th, 2020
Experienced
"It is fairly typical for senior management to make vague and general inquiries about a topic. Normally they do this in the early stages of exploring a new initiative. When responding to this type of inquiry, I like to have an idea of what level of detail the manager would like in my response. I've discovered that by asking them a limited number of clarifying questions, I can better understand exactly what they're looking for and then provide them with the information they need. Most senior managers appreciate this approach."
Written by William Swansen
22. What is the biggest ICT challenge you have faced, and how did you handle it?
How to Answer
Every job has its challenges, and the key is overcoming them. The interviewer will ask you this question to gain some understanding of how you approach a business challenge and what steps you take to overcome it. This can be considered a behavioral question because it asks you to describe how you would behave when facing a challenge. Behavioral questions are best answered within the STAR framework. This stands for Situation, Task, Action, and Result. Using this process, you can walk the interviewer through your answer in a systematic manner. Always emphasize the results, because that's what they are most interested in.
Written by William Swansen on February 13th, 2020
Answer Example
"The biggest challenge I had to face regarding Information and Communications Technology was getting corporate management to accept and adapt to the rapid pace of change in the industry. Many companies operate under the 'If it's not broke, don't fix it' mentality. However, this doesn't work within the ICT environment. Upgrades need to be implemented regularly to provide for a smooth transition as well as prepare for the next leap in technology. It's very difficult to skip stages in development within ICT. Doing so can create more issues than the new technology resolves. Progressive organizations are aware of this and have a development plan to overcome it."
Written by William Swansen on February 13th, 2020
Experienced
"The biggest challenge I've had to overcome in my previous positions is obtaining the funding needed to operate an effective and efficient ICT program. Many companies have limited technology budgets and try to make do with the legacy systems already in place. However, over time this will impact productivity and can make it more expensive to upgrade the technology once it becomes obsolete. A great example of this is moving from a legacy PBX system to a VoIP communications infrastructure."
Written by William Swansen
23. Tell me about the project you are most proud of and what your contribution was.
How to Answer
This is a situational question which the interviewer is using to explore your capabilities and supporting Information & Communication Technology. They're interested in your answer, but they're also trying to learn more about your project management skills. Your answer should cover the project, your role, any challenges you overcame, and the results. Hopefully, you have researched the organization and have some understanding of their technology. If so, your answer should align with either project they've recently completed or ones they may be considering.
Written by William Swansen on February 13th, 2020
Answer Example
"One of the projects I am most proud of involved converting a company's telecommunications system from a PBX to VoIP. When planning and executing this project, I had to overcome several challenges, including resistance from the employees to have to learn a new technology as well as some technical issues which made the conversion difficult. However, I engaged each of the department heads in the planning process, soliciting their input and getting their buy in to the transition based on the business benefits the company would realize. My team and I completed the project one week ahead of schedule and on budget. The training we provided the company's users made for a smooth transition to the new system. Within three months, we realized the cost savings we had projected, and the company's productivity increased due to the technical features the VoIP system offered. Even the user resistance diminished over time."
Written by William Swansen on February 13th, 2020
Experienced
"A recent project that I work on and that I'm proud of was an analysis of the company's data center operations to determine whether some of the infrastructure could be hosted offsite or moved to the cloud. The purpose of this project was to reduce the operating costs of the datacenter. However, we also had to consider other criteria, including system performance, reliability, security, and sustainability. The analysis was fairly complex and required me to collaborate with several organizations within the company, as well as hosting and cloud vendors such as AWS and Microsoft. It took over three months to compile the data, analyze it and produce a report. I recommended a hybrid hosting solution, which maintained a small hardware footprint on-premise, the majority of the infrastructure and applications moving to a cloud environment, and a hosted backup strategy. Not only did this meet all the criteria the company and established, but it also reduced our infrastructure operating costs by 20% annually."
Written by William Swansen
24. Given the problem of increasing latency on the network, what solution would you recommend? Explain your thought process.
How to Answer
This is another technical question geared towards determining your competency and specific network management duties. As an experienced network administrator, you should be able to answer this type of questions easily. However, if for some reason, you don't know the answer, you should admit this and then explain to the interviewer how you would go about finding and implementing the solution.
Written by William Swansen on February 13th, 2020
Entry Level
"I'll have to admit that this is a topic with which I'm not familiar. I manage many aspects of a network, including design, maintenance, and performance. However, other members of our team focused on the latency issue. Whenever I encounter a topic that I'm not familiar with, I have several ways of finding the information and implementing a solution. These include an online search, contacting representatives from the manufacturer's hardware support team, or posting a question on one of the many network support forums I participate in. I'm usually able to find the answer quickly using one of these methodologies."
Written by William Swansen
Answer Example
"A good way to overcome distance-related network latency is to use a content delivery network (CDN). CDNs have a network of geographically distributed edge locations near the end-users. By decreasing the distance that data has to travel CDNs reduce latency and by extension page load times. The challenge with this type of solution is keeping the information residing on the edge locations updated and synced with the other locations."
Written by William Swansen on February 13th, 2020
25. Describe the most innovative network upgrade that you initiated and what you did to convince the organization to implement this change.
How to Answer
This is a technical question which the interviewer is using to understand your skill sets in creating and managing ICT Networks. When responding to this question, it's recommended that you selected a topic that you are very familiar with and can speak about in depth. You should anticipate follow-up questions from the interviewer asking additional details about the upgrade that you identified.
Written by William Swansen on February 13th, 2020
Answer Example
"Probably the most innovative network upgrade I recommended at one of my previous jobs was replacing the company's switches with the HPE Aruba switch. At that time, this was the newest technology that incorporated software embedded into the hardware. This feature allowed the network administrators to program the switch to manage dynamic changes with the network traffic patterns. As a result, the network operated more efficiently and effectively and provided a better user experience."
Written by William Swansen on February 13th, 2020
Experienced
"An innovative network technology upgrade that I'm most proud of was incorporating the 128T networking platform into a network. This was a software-based, distributed routing which worked to simplify complex networks. The platform used secure routing to simplify network architectures. It provided end-to-end control and visibility without disrupting the existing infrastructure. By adding this technology to our network, we were able to build a network that was session-based and services-centric."
Written by William Swansen