MockQuestions MockQuestions
Interviews Questions by Career
Interviews Questions by Company
Interviews Questions by Topic
Get Started
Interview Coach 1:1
Gain the confidence you need by asking our professionals any interview scenario, question, or answer you are unsure about.
Let Us Review Your Answers
Our interviewing professionals will gladly review and revise any answer you send us. Allowing you to craft perfect responses for your next job interview.
Interview Questions by Topic
Interview Questions by Career
Interview Questions by Company

ICT Interview
Questions

25 Questions and Answers by William Swansen

Published February 13th, 2020 | William Swansen is an author, job search strategist and career advisor who assists individuals from all over the world.
Question 1 of 25
What percentage of your time do you spend on the following: Network Architecture, Software and Hardware selection, Network Optimization (including upgrades,) User Support, and Administrative Tasks? How would you change this to better use your time?
View Answers
How to Answer
This is an operational question in which the interviewer is seeking to understand your work habits and patterns. They may have some preconceived notion of how your time should be spent. A good way to respond to this question is directly and honestly. You should also be prepared for follow-up questions which will clarify what you're doing when performing each of the functions the interviewer has asked about.
1000s of Interview Questions
Win your next job by practicing from our question bank. We have thousands of questions and answers created by interview experts.
Top 25 ICT Interview Questions with Full Content
1.
What percentage of your time do you spend on the following: Network Architecture, Software and Hardware selection, Network Optimization (including upgrades,) User Support, and Administrative Tasks? How would you change this to better use your time?
This is an operational question in which the interviewer is seeking to understand your work habits and patterns. They may have some preconceived notion of how your time should be spent. A good way to respond to this question is directly and honestly. You should also be prepared for follow-up questions which will clarify what you're doing when performing each of the functions the interviewer has asked about.

William's Answer #1
"This is an interesting question, which I don't often think about. My best estimate is the following: I spend the majority of my time defining the network architecture and optimizing the network performance. Combined, these probably occupied 50% of my day. The next biggest component is user support which takes about 25% of my time. Administrative tasks probably represent about 15%, and the remaining 10% is spent on hardware and software selection."
William's Answer #2
"No two days for an ICT Administrator are identical, but were I to average things out, my time is probably spent in the following manner: I spend a great deal of time optimizing the network and reviewing the network architecture. These both directly impact the network performance and are the most important tasks I can perform. User support requires at least 25% of my time and often occurs adhoc when issues arise. The balance of my time is spent on administrative tasks and selecting hardware and software. Addressing network performance takes about 60% of the time, administrative tasks about 15% and hardware and software selection about 10%."
2.
What source control tools have you used when managing an ICT network and why did you select these?
This is a strictly operational question which asks you not to define the tools, but only name them and describe how you use them to manage an ICT Network. Rather than list every tool you use, only identify the top three, providing the name and a brief explanation of the tool and its functions. The danger here is providing too much rather than too little information.

William's Answer #1
"I use several different control tools to manage ICT networks. The one I use the most and which has become the standard in the ICT industry is CVS. While this is easy to use, it is not as feature-rich as some other solutions. Another tool I use is SVM or Subversion as is sometimes called. It helps to monitor and control the versions of software across the network. It is also incorporated into some of the development languages. Occasionally I will use GIT because, unlike CVS or SVN, it is a distributed product."
William's Answer #2
"Like most ICT Administrators, I use several source control tools. These include SVN, GIT, and CVS. Each has unique features that make it useful in specific situations. While CVS is my default tool, I do use SVN because of its inclusion in many of the software development languages our team employs. GIT is more powerful and applicable in distributed environments. However, you need to be very experienced in order to use it."
3.
What is clustering? Describe its use in an ICT environment.
It was mentioned earlier that you should expect the majority of questions you asked during an interview as an ICT Administrator to be either operational or technical. This is another example of a hybrid question that incorporates both of these features. Straightforwardly answer the question, with little embellishment. Anticipate follow-up questions from the interviewer.

William's Answer #1
"Clustering is connecting two or more computers in a manner that enables them to behave as a single data processor. The purpose of this is to create a parallel processing environment, perform a load balancing and establish fault tolerance."
William's Answer #2
"Clustering is the act of connecting two or more computers to make them appear and function as a single computer. This can be done with software such as Microsoft Cluster Server. The purpose of clustering is to increase performance, such as in the case of high-performance computing, provide failover and increased availability, or to create a parallel processing environment."
4.
What is the role of continuous integration systems in the automated-build process?
Yet another hybrid operational and technical question. By now, you should be starting to recognize these. As a reminder, the best way to answer these questions is to define the term and then provide an example of how it is used in your day to day work.

William's Answer #1
"Continuous Integration, or CI, is a development practice which helps to reduce errors and bugs while developing a new software feature or application. The CI and automated build server will recognize when a new piece of code has been developed. It will then run a test that will determine if the build was successful or whether it needs attention from the development team. This is an integral part of our software development process."
William's Answer #2
"Continuous integration, or CI, is a practice used by developers to ensure that the code they've built is correct before it is integrated into the software application on which they are working. The way we use CI is to require our developers to deposit their code into a shared repository several times a day. We then run build tests on the code to ensure that it was built correctly. This has been very effective at maintaining the integrity of our applications."
5.
What is the role of the DMZ in network architecture? How do you enforce relational integrity in database design?
Another example of a hybrid operational and technical question. You are first being asked to define an ICT term, followed by an explanation of how it is used in the work you perform. The best way to address questions like this is to provide the definition and then give an example of how you would use the technology. Anticipate follow-up questions from the interviewer since this is very specific and topical.

William's Answer #1
"DMZ, which is short for DeMilitarized Zone, are buffer zones set up between public and private networks. The purpose of a DMZ is to maintain the security of the network and filter out any unwanted traffic. The traffic is screened using a firewall or another security appliance before it is allowed into the private network."
William's Answer #2
"A DMZ is a security strategy that helps keep unwanted traffic out if the client's private network. It is analogous to creating a small isolated network positioned between the Internet and the private network. While it is not 100% effective, it does provide the ICT administrators with one more line of defense, and additional time to detect malicious traffic trying to penetrate the network."
View All 25 ICT Questions and Answers
Sign up to access our library of 50,000+ Q&As,
plus coaches for one-on-one support, so you can interview more confidently.
More Interview Q&As
Explore expert tips and resources to be more confident in your next interview.
Behavioral
Common
Phone
Tough
Leadership
All Interview Topics
All Career Q&As
About Our Interview Q&As
Our interview questions and answers are created by experienced recruiters and interviewers. These questions and answers do not represent any organization, school, or company on our site. We do not claim they will be asked in any interview you may have. Our goal is to create interview questions and answers that will best prepare you for your interview, and that means we do not want you to memorize our answers. You must create your own answers, and be prepared for any interview question in any interview.