16 KiB
16 KiB
| 1 | id | question | answer | category | difficulty_level | support_type |
|---|---|---|---|---|---|---|
| 2 | 1 | What is the IT help desk ticket submission process? | Submit tickets through the IT portal, email helpdesk@company.com, or call the support line. Include detailed error messages, screenshots, and steps to reproduce. Track ticket status online and expect initial response within 2 business hours. | IT Support | beginner | New hire Training |
| 3 | 2 | How do I set up my company email on mobile devices? | Use the company's mobile device management (MDM) app to configure email. Download Microsoft Outlook or company-approved email client, enter your company credentials, and enable security features. Contact IT if you encounter authentication issues. | IT Support | beginner | New hire Training |
| 4 | 3 | What VPN software should I use for remote access? | Install the company-approved VPN client from the software portal. Use your company credentials to authenticate. Connect before accessing internal resources. Report connection issues to IT with error logs and connection details. | Network Security | intermediate | New hire Training |
| 5 | 4 | How do I request new hardware or software? | Submit requests through the IT procurement portal with business justification. Get manager approval. IT will review compatibility, security compliance, and budget. Standard requests process in 5-7 business days. | IT Procurement | intermediate | On-the-Job Training (OJT) |
| 6 | 5 | What are the password requirements and policies? | Passwords must be 12+ characters with uppercase, lowercase, numbers, and symbols. Change every 90 days. Don't reuse previous 10 passwords. Enable multi-factor authentication. Never share passwords or store them unencrypted. | Security | beginner | New hire Training |
| 7 | 6 | How do I connect to company printers? | Install printer drivers from the IT software portal. Use your network credentials to authenticate. For wireless printing, ensure you're on the company network. Report printing issues to IT with printer name and error messages. | IT Support | beginner | New hire Training |
| 8 | 7 | What is the process for data backup and recovery? | Company data is automatically backed up to secure servers. For critical files, use the shared network drives with version control. Contact IT immediately for data recovery needs. Test backup access quarterly. | Data Management | intermediate | On-the-Job Training (OJT) |
| 9 | 8 | How do I report a security incident or suspected breach? | Report immediately to the IT security team via the emergency hotline or security@company.com. Include details like affected systems, data types, and timeline. Don't attempt to investigate yourself. Preserve evidence and document everything. | Security | advanced | On-the-Job Training (OJT) |
| 10 | 9 | What software is pre-approved for company use? | Check the IT software catalog for approved applications. Common tools include Microsoft Office 365, Adobe Creative Cloud, Slack, and Zoom. Request exceptions for specialized software through the IT review process. | Software Management | intermediate | New hire Training |
| 11 | 10 | How do I set up video conferencing for meetings? | Use company-approved platforms like Zoom or Microsoft Teams. Book meeting rooms with video equipment through the facilities system. Test audio/video 15 minutes before meetings. Contact IT for technical support during meetings. | IT Support | beginner | New hire Training |
| 12 | 11 | What is the company's policy on personal device usage? | Personal devices must comply with BYOD policies including security software, encryption, and remote wipe capabilities. Access company resources only through approved apps and VPN. Report lost devices immediately to IT. | Security | intermediate | New hire Training |
| 13 | 12 | How do I access shared network drives and file servers? | Map network drives using provided server paths. Use your company credentials for authentication. Organize files according to department naming conventions. Request additional access through your manager and IT. | Data Management | beginner | New hire Training |
| 14 | 13 | What should I do if my computer is running slowly? | Restart your computer first. Clear cache and temporary files. Check for malware using company antivirus software. Close unnecessary applications. Submit IT ticket if issues persist with performance details. | IT Support | beginner | On-the-Job Training (OJT) |
| 15 | 14 | How do I configure dual monitors? | Connect monitors to available ports. Use display settings to extend desktop. Install required drivers from IT portal. Contact IT for setup assistance or if monitors aren't detected. Ergonomic setup guidelines available in HR portal. | IT Support | intermediate | New hire Training |
| 16 | 15 | What is the process for software updates and patches? | Updates are deployed automatically during maintenance windows (usually 2-4 AM). Restart when prompted. For urgent updates, IT will send notifications. Don't delay critical security updates. Report update failures immediately. | Software Management | intermediate | On-the-Job Training (OJT) |
| 17 | 16 | How do I access company systems from home? | Connect to VPN first, then access systems through the company portal. Use company-provided equipment when possible. Ensure home network meets security requirements. Report access issues to IT with connection details. | Remote Access | intermediate | New hire Training |
| 18 | 17 | What are the guidelines for cloud storage usage? | Use company-approved cloud services like OneDrive or SharePoint. Don't store sensitive data in personal cloud accounts. Follow data classification guidelines. Enable version control and sharing permissions appropriately. | Data Management | intermediate | On-the-Job Training (OJT) |
| 19 | 18 | How do I troubleshoot internet connectivity issues? | Check physical connections first. Restart router and modem. Test with different devices. Contact ISP if home internet issues. For office network problems, report to IT with location and time of issue. | Network Security | intermediate | On-the-Job Training (OJT) |
| 20 | 19 | What is the process for offboarding IT equipment? | Return all company equipment to IT on your last day. Back up personal files before return. Sign equipment return form. IT will wipe devices and update inventory. Keep confirmation for your records. | IT Procurement | beginner | On-the-Job Training (OJT) |
| 21 | 20 | How do I set up email distribution lists and groups? | Request through IT with group purpose, members, and permissions. Group owners can manage members through the admin panel. Follow naming conventions. Review group membership quarterly for security. | IT Support | intermediate | On-the-Job Training (OJT) |
| 22 | 21 | What cybersecurity training is required? | Complete annual security awareness training covering phishing, malware, social engineering, and data protection. Additional training for roles handling sensitive data. Test your knowledge with quarterly phishing simulations. | Security | beginner | New hire Training |
| 23 | 22 | How do I access the company intranet and internal resources? | Access through the company portal using your credentials. Bookmark frequently used pages. Report broken links or access issues to IT. Use the search function to find specific resources quickly. | IT Support | beginner | New hire Training |
| 24 | 23 | What is the policy on software licensing? | Only use properly licensed software. IT manages enterprise licenses. Don't install personal software on company devices. Report license renewal needs to IT. Audit compliance checks occur quarterly. | Software Management | advanced | On-the-Job Training (OJT) |
| 25 | 24 | How do I configure email signatures and out-of-office messages? | Use Outlook settings to create signatures following company brand guidelines. Include name, title, and contact information. Set out-of-office with dates and alternative contacts. Test before activating. | IT Support | beginner | New hire Training |
| 26 | 25 | What should I do about suspicious emails or phishing attempts? | Don't click links or open attachments. Report to IT using the 'Report Phishing' button or forward to security@company.com. Delete the email after reporting. Update your security awareness knowledge from the incident. | Security | beginner | On-the-Job Training (OJT) |
| 27 | 26 | How do I request administrative privileges for software? | Submit justification through IT ticket system. Manager approval required. IT will review security implications. Privileges granted only when necessary for job functions. Review access rights semi-annually. | Security | advanced | On-the-Job Training (OJT) |
| 28 | 27 | What is the process for server access and permissions? | Request server access through IT with business justification. Manager approval required. Access granted based on principle of least privilege. Review permissions quarterly. Report any access issues immediately. | Network Security | advanced | On-the-Job Training (OJT) |
| 29 | 28 | How do I set up video conferencing equipment in meeting rooms? | Book rooms with AV equipment through facilities system. Arrive 15 minutes early to test. Use touch panels to control displays and cameras. Contact IT for technical support. Document equipment issues for follow-up. | IT Support | intermediate | On-the-Job Training (OJT) |
| 30 | 29 | What are the guidelines for data classification and handling? | Classify data as Public, Internal, Confidential, or Restricted. Follow handling procedures for each level. Use encryption for sensitive data. Store according to classification. Report data classification questions to IT security. | Data Management | intermediate | On-the-Job Training (OJT) |
| 31 | 30 | How do I troubleshoot audio/video issues during virtual meetings? | Test equipment before meetings. Check microphone and camera settings. Update drivers if needed. Use company-approved headsets. Have backup connection ready. Contact IT support for persistent issues with specific error details. | IT Support | intermediate | On-the-Job Training (OJT) |
| 32 | 31 | What is the company's policy on remote desktop access? | Use company-approved remote desktop solutions only. Enable multi-factor authentication. Log off when not in use. Don't share remote access credentials. Report suspicious remote access attempts immediately. | Remote Access | advanced | On-the-Job Training (OJT) |
| 33 | 32 | How do I manage mobile device security? | Enable device encryption and passcode locks. Install company security software. Keep OS and apps updated. Report lost/stolen devices within 1 hour. Use VPN for company data access. Don't jailbreak/root devices. | Security | intermediate | On-the-Job Training (OJT) |
| 34 | 33 | What is the process for IT asset inventory and tracking? | All IT assets are tagged and tracked in the inventory system. Report location changes to IT. Conduct annual asset verification. Return assets when changing roles. Maintain accurate records for compliance. | IT Procurement | intermediate | On-the-Job Training (OJT) |
| 35 | 34 | How do I access cloud-based development environments? | Request access through IT with project details. Use company-approved cloud platforms. Follow security and compliance guidelines. Monitor resource usage and costs. Report access issues to cloud support team. | Cloud Services | advanced | On-the-Job Training (OJT) |
| 36 | 35 | What should I do during system outages or service disruptions? | Check IT status page for updates. Report issues to IT help desk with impact details. Work offline when possible. Communicate with team about alternative arrangements. Follow business continuity procedures. | IT Support | intermediate | On-the-Job Training (OJT) |
| 37 | 36 | How do I configure network settings for specialized applications? | Submit network configuration requests through IT with technical requirements. Include IP addresses, ports, and protocols. Get security team approval for exceptions. Document configurations for future reference. | Network Security | advanced | On-the-Job Training (OJT) |
| 38 | 37 | What is the policy on using public WiFi for company work? | Avoid public WiFi when possible. Use VPN if absolutely necessary. Don't access sensitive data on public networks. Use company-provided mobile hotspot as alternative. Report security incidents immediately. | Security | intermediate | On-the-Job Training (OJT) |
| 39 | 38 | How do I manage database access and permissions? | Request database access through IT with data owner approval. Follow principle of least privilege. Use secure connection methods. Log activities for audit. Review access rights quarterly. Report suspicious database activity. | Data Management | advanced | On-the-Job Training (OJT) |
| 40 | 39 | What are the guidelines for API integration and development? | Use company-approved API frameworks. Follow security best practices including authentication and rate limiting. Document API usage. Monitor performance and errors. Get security review before production deployment. | Software Management | advanced | On-the-Job Training (OJT) |
| 41 | 40 | How do I handle IT equipment during office moves? | Coordinate with IT for equipment relocation. Back up data before moving. Label all equipment clearly. Test connectivity at new location. Update inventory records. Report any damage during moving process. | IT Support | intermediate | On-the-Job Training (OJT) |
| 42 | 41 | What is the process for disaster recovery testing? | Participate in quarterly disaster recovery drills. Test backup restoration procedures. Document test results and issues. Update recovery plans based on findings. Report critical issues to management immediately. | Data Management | advanced | On-the-Job Training (OJT) |
| 43 | 42 | How do I configure firewall rules and security groups? | Submit firewall rule requests through IT security team. Include justification, source/destination, and ports. Follow change management process. Document rules for audit. Review rules quarterly for necessity. | Network Security | advanced | On-the-Job Training (OJT) |
| 44 | 43 | What are the guidelines for bring-your-own-device (BYOD) programs? | Enroll devices in mobile device management. Install security software. Acceptable use policy applies. Company can wipe business data only. Report device changes to IT. No compensation for personal device use. | Security | intermediate | New hire Training |
| 45 | 44 | How do I access IT documentation and knowledge base? | Use the company IT knowledge base portal. Search by topic or error code. Bookmark frequently used articles. Contribute feedback to improve documentation. Contact IT if information is outdated or missing. | IT Support | beginner | New hire Training |
| 46 | 45 | What is the process for software development and deployment? | Use company-approved development tools and repositories. Follow code review procedures. Deploy through staging environments first. Get security approval before production. Monitor performance after deployment. | Software Management | advanced | On-the-Job Training (OJT) |
| 47 | 46 | How do I manage user accounts and access rights? | Request account changes through IT with manager approval. Follow principle of least privilege. Review access rights quarterly. Disable accounts immediately when employees leave. Report suspicious account activity. | Security | intermediate | On-the-Job Training (OJT) |
| 48 | 47 | What are the guidelines for IT incident response? | Follow incident response procedures: detection, analysis, containment, eradication, recovery. Document all actions. Communicate with stakeholders. Report incidents to security team within 1 hour of discovery. | Security | advanced | On-the-Job Training (OJT) |
| 49 | 48 | How do I configure backup and recovery for critical systems? | Identify critical systems and data. Set appropriate backup schedules. Test recovery procedures quarterly. Document recovery time objectives. Monitor backup success rates. Report failures immediately. | Data Management | advanced | On-the-Job Training (OJT) |
| 50 | 49 | What is the policy on using AI and machine learning tools? | Use company-approved AI platforms only. Follow data privacy and security guidelines. Document AI usage and decisions. Get approval for sensitive data processing. Report AI-related security incidents. | Software Management | advanced | On-the-Job Training (OJT) |
| 51 | 50 | How do I participate in IT governance and compliance? | Attend quarterly compliance training. Follow IT policies and procedures. Participate in audits and assessments. Report compliance concerns. Stay updated on regulatory changes affecting IT systems. | Security | advanced | On-the-Job Training (OJT) |