MockQuestions

ICT Interview Questions

To help you prepare for your ICT interview, here are 25 interview questions and answer examples.

ICT was written by and updated on February 13th, 2020. Learn more here.

Question 1 of 25

What percentage of your time do you spend on the following: Network Architecture, Software and Hardware selection, Network Optimization (including upgrades,) User Support, and Administrative Tasks? How would you change this to better use your time?

How to Answer

This is an operational question in which the interviewer is seeking to understand your work habits and patterns. They may have some preconceived notion of how your time should be spent. A good way to respond to this question is directly and honestly. You should also be prepared for follow-up questions which will clarify what you're doing when performing each of the functions the interviewer has asked about.

Written by William Swansen on February 13th, 2020

Next Question

25 ICT Interview Questions & Answers

  • 1. What percentage of your time do you spend on the following: Network Architecture, Software and Hardware selection, Network Optimization (including upgrades,) User Support, and Administrative Tasks? How would you change this to better use your time?

      How to Answer

      This is an operational question in which the interviewer is seeking to understand your work habits and patterns. They may have some preconceived notion of how your time should be spent. A good way to respond to this question is directly and honestly. You should also be prepared for follow-up questions which will clarify what you're doing when performing each of the functions the interviewer has asked about.

      Written by William Swansen on February 13th, 2020

      1st Answer Example

      "This is an interesting question, which I don't often think about. My best estimate is the following: I spend the majority of my time defining the network architecture and optimizing the network performance. Combined, these probably occupied 50% of my day. The next biggest component is user support which takes about 25% of my time. Administrative tasks probably represent about 15%, and the remaining 10% is spent on hardware and software selection."

      Written by William Swansen on February 13th, 2020

      Experienced

      "No two days for an ICT Administrator are identical, but were I to average things out, my time is probably spent in the following manner: I spend a great deal of time optimizing the network and reviewing the network architecture. These both directly impact the network performance and are the most important tasks I can perform. User support requires at least 25% of my time and often occurs adhoc when issues arise. The balance of my time is spent on administrative tasks and selecting hardware and software. Addressing network performance takes about 60% of the time, administrative tasks about 15% and hardware and software selection about 10%."

      Written by William Swansen

  • 2. What source control tools have you used when managing an ICT network and why did you select these?

      How to Answer

      This is a strictly operational question which asks you not to define the tools, but only name them and describe how you use them to manage an ICT Network. Rather than list every tool you use, only identify the top three, providing the name and a brief explanation of the tool and its functions. The danger here is providing too much rather than too little information.

      Written by William Swansen on February 13th, 2020

      1st Answer Example

      "I use several different control tools to manage ICT networks. The one I use the most and which has become the standard in the ICT industry is CVS. While this is easy to use, it is not as feature-rich as some other solutions. Another tool I use is SVM or Subversion as is sometimes called. It helps to monitor and control the versions of software across the network. It is also incorporated into some of the development languages. Occasionally I will use GIT because, unlike CVS or SVN, it is a distributed product."

      Written by William Swansen on February 13th, 2020

      2nd Answer Example

      "Like most ICT Administrators, I use several source control tools. These include SVN, GIT, and CVS. Each has unique features that make it useful in specific situations. While CVS is my default tool, I do use SVN because of its inclusion in many of the software development languages our team employs. GIT is more powerful and applicable in distributed environments. However, you need to be very experienced in order to use it."

      Written by William Swansen

  • 3. What is clustering? Describe its use in an ICT environment.

      How to Answer

      It was mentioned earlier that you should expect the majority of questions you asked during an interview as an ICT Administrator to be either operational or technical. This is another example of a hybrid question that incorporates both of these features. Straightforwardly answer the question, with little embellishment. Anticipate follow-up questions from the interviewer.

      Written by William Swansen on February 13th, 2020

      1st Answer Example

      "Clustering is connecting two or more computers in a manner that enables them to behave as a single data processor. The purpose of this is to create a parallel processing environment, perform a load balancing and establish fault tolerance."

      Written by William Swansen on February 13th, 2020

      2nd Answer Example

      "Clustering is the act of connecting two or more computers to make them appear and function as a single computer. This can be done with software such as Microsoft Cluster Server. The purpose of clustering is to increase performance, such as in the case of high-performance computing, provide failover and increased availability, or to create a parallel processing environment."

      Written by William Swansen

  • 4. What is the role of continuous integration systems in the automated-build process?

      How to Answer

      Yet another hybrid operational and technical question. By now, you should be starting to recognize these. As a reminder, the best way to answer these questions is to define the term and then provide an example of how it is used in your day to day work.

      Written by William Swansen on February 13th, 2020

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 5. What is the role of the DMZ in network architecture? How do you enforce relational integrity in database design?

      How to Answer

      Another example of a hybrid operational and technical question. You are first being asked to define an ICT term, followed by an explanation of how it is used in the work you perform. The best way to address questions like this is to provide the definition and then give an example of how you would use the technology. Anticipate follow-up questions from the interviewer since this is very specific and topical.

      Written by William Swansen on February 13th, 2020

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 6. When is the last time you downloaded an ICT utility from the internet to make your work more productive, and what was it?

      How to Answer

      This question is a hybrid between operational and technical. The interviewer will ask this type of question to confirm that you understand the importance of ICT Utilities, know where to get them, and to gain some information on the programs you prefer to use. As a seasoned ICT professional, you should be able to answer this question easily and give some examples of recent software utilities you've downloaded.

      Written by William Swansen on February 13th, 2020

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 7. What is the difference between OLAP and OLTP? When is each used?

      How to Answer

      This technical question is requesting that you define the difference between two similar terms commonly encountered in an ICT environment. This type of question is used to separate senior ICT Administrators from individuals with less experience and expertise in the field. You may want to start by defining each term and then stating the differences between them as well as how the technology is used.

      Written by William Swansen on February 13th, 2020

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 8. What is a cross-site scripting attack, and how do you defend against it?

      How to Answer

      An interviewer will ask this question, which, of course, is technical in nature to both test your knowledge and to ensure that you know how to combat this type of attack. As a seasoned ICT administrator, you should be able to answer this question easily with both the definition of the term and a description of how you would defend against it. Since you won't know the technical expertise of the interviewer, keep your answer at a high level. They will ask follow-up questions if they need more information from you.

      Written by William Swansen on February 13th, 2020

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 9. What do you do to ensure consistency across ICT development, quality, and production environments?

      How to Answer

      One of the most important aspects of an ICT environment is consistency. Any inconsistencies create problems that are difficult to resolve. The result of this is higher costs or less reliable telephony and information networks. The interviewer will ask this operational question to ensure that you are aware of the importance of consistency and have methods that you use to ensure it.

      Written by William Swansen on February 13th, 2020

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 10. What are the most important communications network performance metrics, and how do you monitor them?

      How to Answer

      As an ICT Professional, it is important that you understand how network performance is monitored and optimized. The interviewer knows this and is attempting to see how you accomplish maximizing the speed and performance of a communications network. This is why they are hiring you, so this may be one of the more important questions you will be asked. Again, it should be easy for you to respond to this question if you keep this in mind and rely on your experience in this field.

      Written by William Swansen on February 13th, 2020

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 11. In network security, what is a honey pot, and how is it used?

      How to Answer

      This is another technical question which the interviewer is seeking to understand whether you have used advanced network security techniques. If you are a seasoned ICT professional, you should have no trouble answering this question. However, it illustrates that you should be prepared for just about any technical questions you may be asked. You can do this by researching the organization and trying to gain an understanding of the technology they already use.

      For exampl: "A honeypot is a system within an organization's network that is a decoy. Its purpose is to lure in cyber attackers and to detect, deflect or characterize their hacking attempts. This enables the network administration team to create defenses and counter-measures to hackers."

      Written by William Swansen on February 13th, 2020

      Entry Level

      "A honeypot is a computer which is inserted into the network with the intention to mimic a target of cyberattacks. It can be used to detect attacks or deflect them from other systems which are legitimate targets. It can also be used to gain information about how cyber attackers operate. A honeypot works by being an intentionally vulnerable hole in security. Usually, these devices will take the form of a virtual machine that has been deliberately weakened and placed in an accessible area of the network outside of the firewall and other defenses set up to prevent hacking."

      Written by William Swansen

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 12. How often are you able to reuse code that you develop, and can you provide me an example of when you have done this?

      How to Answer

      What the interviewer is seeking to learn by asking this question is your level of coding skills. ICT professionals should be intimately familiar with coding, even if they don't develop software themselves. Being able to reuse code makes programmers much more efficient. This is because they don't have to write new code and the code they reuse as already been validated.

      Written by William Swansen on February 13th, 2020

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 13. What criteria do you use to determine when to sunset an older technology?

      How to Answer

      This is an interesting operational question. Not only does it seek to understand how you manage technology in an ICT environment, but it also will help the interviewer gain some insight into how you balance cost and productivity. Many technology professionals chase the latest developments in their field and are willing to spend the organization's budget doing this. Others are overly budget conscious and don't upgrade products even when doing so may increase the organization's productivity. The key is finding a balance between these two strategies.

      Written by William Swansen on February 13th, 2020

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 14. Describe a time when you were able to improve upon a network design that existed before you began working for the organization.

      How to Answer

      An interviewer will ask this type of operational question for two reasons. The first is to gain an understanding of your skills in designing complex communication networks. The second reason is to get some insight into your interpersonal communication style. This is important because, in addition to your technical skills, you'll need to be able to work with other people and the organization and be compatible with the company's culture. The mistake some people make after taking on a new job is to begin making recommendations for improvements before they have learned the details of the existing operation. Make sure that you clarify that you were on board for some time before you recommended an upgrade to the company's network design.

      Written by William Swansen on February 13th, 2020

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 15. Describe the elements of an N-tier architecture and their appropriate use.

      How to Answer

      Yet another example of a technical question in which the interviewer is requesting you to define the term and then explain its use. When working on the field of Information and Communication Technology, you should expect a lot of technical questions during an interview. The best way to prepare is to study up on the terms you typically encounter in this job.

      Written by William Swansen on February 13th, 2020

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 16. Describe the difference between optimistic and pessimistic locking.

      How to Answer

      In this technical question, the interviewer is asking you to define the difference between two similar terms. Only the most experienced ICT qualified administrators will be able to address this. A good way to answer this question is to define each term, then provide an example of how the technology is applied.

      Written by William Swansen on February 13th, 2020

      Entry Level

      "While these are both record locking technologies, their function differs dramatically. I pessimistic locking, when are user updates a record it is then locked. The record can only be updated again after the record is unlocked. Conversely, using optimistic locking, a record can be updated by one user and then other users can update it. The only time the record is locked is when a user is actively updating it. Optimistic locking is applied to applications where users are allowed to collaborate with each other."

      Written by William Swansen

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 17. Define 'authentication,' and 'authorization,' and the tools that are used to support them in enterprise deployments.

      How to Answer

      Yet another technical question asking you to define some terms and demonstrate that you know how to work with the technology they involve. As with most technical questions, the best strategy is a straightforward answer defining the terms followed by a brief description of the tools used to manage them. The interviewer will ask you a follow-up question if they'd like some additional information.

      Written by William Swansen on February 13th, 2020

      Entry Level

      "These terms are similar but different. Authentication confirms your identity to gain access to the system while authorization determines whether you are in fact authorized to have access to the resources. Authentication usually requires a username and password. Authorization and be done in a variety of ways which confirm the identity of the user who has provided their credentials through the authentication process. While these two processes differ, the tools used to execute them are the same and include APIs and LDAP servers."

      Written by William Swansen

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 18. Do you prefer to manage people or technology, and why?

      How to Answer

      The correct answer to this type of question is both. But since the interviewer asked you to choose, you need to select one or the other. As with some previous questions, there is no right answer to this. The key point is to be able to defend your choice and provide the reasoning behind it. Always answer questions involving a choice positively and don't speak negatively about the option you didn't choose.

      Written by William Swansen on February 13th, 2020

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 19. You have created a piece of code that didn't work in production. You found the bug during testing, and nobody else is aware of it. What would you do next?

      How to Answer

      While this appears to be an operational question, it is actually seeking to understand your level of integrity. There are several ways you can address this issue, but when answering the question be sure to respond in a manner that the company will find acceptable. As you probably have heard before there is the right way and there's an expedient way. While you might use the expedient way in real life, always answer a question like this in the right way.

      Written by William Swansen on February 13th, 2020

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 20. You have been asked to research a new business application. You find two solutions, an on-premise solution, and a cloud-based one. Assuming they are functionally equivalent, which would you recommend?

      How to Answer

      At first, this appears to be a very simple question to answer. However, what the interview was actually looking for is not so much an answer but rather your rationale behind it. Either of these options is appropriate, as long as you can describe why you are recommending the one you choose.

      Written by William Swansen on February 13th, 2020

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 21. The CTO wants to know how much it would cost to bring in five more people on your team. They give you very vague requirements for the job they are looking for you to do. How would you react?

      How to Answer

      looking to understand how you work with senior management. This is another behavioral question, which you can answer by using past experience to project your behavior in this specific situation. Your answer should reflect the difficulty of making decisions or providing information when you lack critical data, and how you overcome this.

      Written by William Swansen on February 13th, 2020

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 22. What is the biggest ICT challenge you have faced, and how did you handle it?

      How to Answer

      Every job has its challenges, and the key is overcoming them. The interviewer will ask you this question to gain some understanding of how you approach a business challenge and what steps you take to overcome it. This can be considered a behavioral question because it asks you to describe how you would behave when facing a challenge. Behavioral questions are best answered within the STAR framework. This stands for Situation, Task, Action, and Result. Using this process, you can walk the interviewer through your answer in a systematic manner. Always emphasize the results, because that's what they are most interested in.

      Written by William Swansen on February 13th, 2020

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 23. Tell me about the project you are most proud of and what your contribution was.

      How to Answer

      This is a situational question which the interviewer is using to explore your capabilities and supporting Information & Communication Technology. They're interested in your answer, but they're also trying to learn more about your project management skills. Your answer should cover the project, your role, any challenges you overcame, and the results. Hopefully, you have researched the organization and have some understanding of their technology. If so, your answer should align with either project they've recently completed or ones they may be considering.

      Written by William Swansen on February 13th, 2020

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 24. Given the problem of increasing latency on the network, what solution would you recommend? Explain your thought process.

      How to Answer

      This is another technical question geared towards determining your competency and specific network management duties. As an experienced network administrator, you should be able to answer this type of questions easily. However, if for some reason, you don't know the answer, you should admit this and then explain to the interviewer how you would go about finding and implementing the solution.

      Written by William Swansen on February 13th, 2020

      Entry Level

      "I'll have to admit that this is a topic with which I'm not familiar. I manage many aspects of a network, including design, maintenance, and performance. However, other members of our team focused on the latency issue. Whenever I encounter a topic that I'm not familiar with, I have several ways of finding the information and implementing a solution. These include an online search, contacting representatives from the manufacturer's hardware support team, or posting a question on one of the many network support forums I participate in. I'm usually able to find the answer quickly using one of these methodologies."

      Written by William Swansen

      Answer Examples Have Been Hidden

      Please upgrade to view

  • 25. Describe the most innovative network upgrade that you initiated and what you did to convince the organization to implement this change.

      How to Answer

      This is a technical question which the interviewer is using to understand your skill sets in creating and managing ICT Networks. When responding to this question, it's recommended that you selected a topic that you are very familiar with and can speak about in depth. You should anticipate follow-up questions from the interviewer asking additional details about the upgrade that you identified.

      Written by William Swansen on February 13th, 2020

      Answer Examples Have Been Hidden

      Please upgrade to view