Beruflich Dokumente
Kultur Dokumente
2. ESX vs ESXi
o ESXi has no service console which is a modified version of RHEL
o ESXi is extremely thin hence results in fast installation + fast boot
o ESXi can be purchased as an embedded hypervisor on hardware
5. FSMO roles
o Schema Master
o Domain naming master
o Infrastructure master
o PDC Emulator
o RID master
6. GPO
o GPO
o Templates (ADMX)
o Block inheritance
o Enforced
o Loopback policy
8. OSI layer
o Application Layer
o Presentation Layer
o Sessions Layer
o Transport Layer
o Network Layer
o DataLink layer
o Physical Layer
10.
HA 5.0
o Slave
o Datastore heartbeat
o Isolation response
11.
PowerOff
Leave Powered On
Shutdown
vMotion
o vMotion enables live migration of running virtual machines from one
host to another with zero downtime
o Prerequisites
1. Host must be licensed for vMotion
2. Configure host with at least one vMotion n/w interface
(vmkernel port group)
3. Shared storage (this has been compromised in 5.1)
4. Same VLAN and VLAN label
5. GigaBit ethernet network required between hosts
6. Processor compatibility between hosts
7. vMotion does not support migration of applications clustered
using Microsoft clustering service
8. No CD ROM attached
9. No affinity is enabled
10.
12.
RAID
o Redundant Array of Independent disks
o A category of disk drives that uses 2 or more drives in a
combination for redundancy and performance
o Most common RAIDs: RAID 0(Striped), RAID 1(Mirroring), RAID 5
13.
Backup types
o Backup types
1. Full backup - Will take the backup of all selected files and
reset the archive bit
2. Copy backup - Will take the backup of all selected files but
does not reset the archive bit
3. Incremental backup - Will take the backup of files whose
archive bits are set and resets it after backup
4. Differential backup - Will take the backup of files whose
archive bits are set but does not reset it after backup
14.
15.
16.
Global Catalog
o Global catalog (GC) is a role handled by domain controllers in an
Active directory model.
o The global catalog stores a full copy of all objects in the directory
for its host domain and a partial copy of all objects for all other
domains in the forest.
o Partial copy refers to the set of attributes that are most used for
searching every object in every domain.
o All domain controllers can be promoted as a GC.
o GC helps in faster search of AD objects.
o The replicas that are replicated to the global catalog also include
the access permissions for each object and attribute.
o If you are searching for an object that you do not have permission
to access, you do not see the object in the list of search results.
Users can find only objects to which they are allowed access.
o Global catalog server clients depend on DNS to provide the IP
address of global catalog servers. DNS is required to advertise
global catalog servers for domain controller location.
o By default, first DC of in a forest will be a global catalog server
17.
18.
RODC
o New feature in Windows 2008
o Only have the read only copy of directory database
o RODC will have all the objects of a normal DC in read only mode.
But this doesnt include passwords. RODC does not store password
of accounts.
o Updates are replicated to RODC by writable DC
o Password caching : A feature which enables RODC to cache
password of the logged in users.
o Password Replication Policy: Determines whether the password can
be cached or not.
o DNS can be integrated with RODC but will not directly register client
updates. For any DNS change, the RODC refers the client to DNS
server that hosts a primary or AD integrated zone
19.
NAS vs SAN
o Both used as storage solution
o NAS can be used by any device connected using LAN whereas SAN
is used only by server class devices with SCSI
o NAS is file based whereas SAN is block based storage
o NAS is cheap while SAN is expensive
o SAN is comparatively faster than NAS
20.
21.
DRS prerequisites
o Shared storage
o Processor compatibility of hosts in the DRS cluster
o vMotion prerequisites
22.
23.
23.
25.
o RODC
o WDS instead of RIS
o Services have been changed as roles - server manager
o Introduction of hyper V- only on 64 bit versions
o Enhanced event viewer
o Bitlocker feature
o Server core installation without GUI
o MMC 3.0, with three pane view
o Key management services(KMS) to activate Windows OS without
connecting to Microsoft site
o Performance enhancement using technologies like Windows
SuperFetch,ReadyBoost and Readydrive
o Windows Aero user interface
o Instant search
o Support for IPv6 in DNS
2. ESX vs ESXi
5. FSMO roles
o Schema Master
o Domain naming master
o Infrastructure master
o PDC Emulator
o RID master
6. GPO
o GPO
o Templates (ADMX)
o Block inheritance
o Enforced
o Loopback policy
8. OSI layer
o Application Layer
o Presentation Layer
o Sessions Layer
o Transport Layer
o Network Layer
o DataLink layer
o Physical Layer
10.
HA 5.0
o Slave
o Datastore heartbeat
o Isolation response
11.
PowerOff
Leave Powered On
Shutdown
vMotion
o vMotion enables live migration of running virtual machines from one
host to another with zero downtime
o Prerequisites
12.
RAID
o Redundant Array of Independent disks
o A category of disk drives that uses 2 or more drives in a
combination for redundancy and performance
o Most common RAIDs: RAID 0(Striped), RAID 1(Mirroring), RAID 5
13.
Backup types
o Backup types
1. Full backup - Will take the backup of all selected files and
reset the archive bit
2. Copy backup - Will take the backup of all selected files but
does not reset the archive bit
14.
15.
16.
Global Catalog
o Global catalog (GC) is a role handled by domain controllers in an
Active directory model.
o The global catalog stores a full copy of all objects in the directory
for its host domain and a partial copy of all objects for all other
domains in the forest.
o Partial copy refers to the set of attributes that are most used for
searching every object in every domain.
o All domain controllers can be promoted as a GC.
o GC helps in faster search of AD objects.
o The replicas that are replicated to the global catalog also include
the access permissions for each object and attribute.
o If you are searching for an object that you do not have permission
to access, you do not see the object in the list of search results.
Users can find only objects to which they are allowed access.
o Global catalog server clients depend on DNS to provide the IP
address of global catalog servers. DNS is required to advertise
global catalog servers for domain controller location.
o By default, first DC of in a forest will be a global catalog server
17.
18.
RODC
o New feature in Windows 2008
o Only have the read only copy of directory database
o RODC will have all the objects of a normal DC in read only mode.
But this doesnt include passwords. RODC does not store password
of accounts.
o Updates are replicated to RODC by writable DC
o Password caching : A feature which enables RODC to cache
password of the logged in users.
o Password Replication Policy: Determines whether the password can
be cached or not.
o DNS can be integrated with RODC but will not directly register client
updates. For any DNS change, the RODC refers the client to DNS
server that hosts a primary or AD integrated zone
19.
NAS vs SAN
o Both used as storage solution
o NAS can be used by any device connected using LAN whereas SAN
is used only by server class devices with SCSI
o NAS is file based whereas SAN is block based storage
o NAS is cheap while SAN is expensive
o SAN is comparatively faster than NAS
20.
21.
DRS prerequisites
o Shared storage
o Processor compatibility of hosts in the DRS cluster
o vMotion prerequisites
22.
23.
23.
25.
o Traverse folder takes effect only when the group or user is not
granted the "Bypass traverse checking user" right in the Group
Policy snap-in. This permission does not automatically allow running
program files.
1. Maximum number of LUNs that can be attached to a host (ESXi
5.0)
o 256
6. Loadbalancer vs Clustering
o Clustering
1. Cluster is a group of resources that are trying to achieve a
common objective, and are aware of one another.
2. Clustering usually involves setting up the resources (servers
usually) to exchange details on a particular channel (port)
and keep exchanging their states, so a resources state is
replicated at other places as well.
3. It usually also includes load balancing, wherein, the request is
routed to one of the resources in the cluster as per the load
balancing policy
ii.
Load Balancing
1.
Assign :
1. If you assign the program to a user, it is installed when the
user logs on to the computer. When the user first runs the
program, the installation is completed.
2. If you assign the program to a computer, it is installed when
the computer starts, and it is available to all users who log on
to the computer. When a user first runs the program, the
installation is completed.
ii.
Publish :
1. You can publish a program distribution to users.
2. When the user logs on to the computer, the published
program is displayed in the Add or Remove Programs dialog
box, and it can be installed from there.
ii.
msi packages are used for installation. Normal exe would not work.
iii.
Windows cannot install the software while the user is already logged
on. The user need to log off and log in
8. Group policy security filtering for users. Which all users are in
there by default. Members of Authenticated Users group
o Security filtering is a way of refining which users and computers will
receive and apply the settings in a Group Policy object (GPO)
o In order for the GPO to apply to a given user or computer, that user
or computer must have both Read and Apply Group Policy (AGP)
permissions on the GPO, either explicitly, or effectively through
group membership
o By default, all GPOs have Read and AGP both Allowed for the
Authenticated Users group.
o The Authenticated Users group includes both users and computers.
This is how all authenticated users receive the settings of a new
GPO when it is applied to an organizational unit, domain or site
10.
L3 switch vs Routers
o L3 switches just have the ethernet ports only whereas the routers
have WAN interfaces
o QoS is not available with L3 switches whereas in routers it can be
enabled
o Routers have expansion slots and cards that allow them to use
different media types, like serial connections for T1 and T3 circuits
11.
VLAN vs Subnet
o VLAN works at layer 2 while subnet is at layer 3
o Subnets are more concerned about IP addresses.
o VLANs bring more network efficiency
o Subnets have weaker security than VLANs as all the subnet uses the
same physical network
12.
13.
14.
Robocopy
o Microsoft tool used for copying files effectively
o It has plenty of options to manage the copy process
15.
How do you patch microsoft applications? Frequency of
patches released by Microsoft
o The Microsoft applications can be patched using WSUS
o In WSUS, we can create several computer groups to manage this
patch process.
o MS patches are released once in a month
16.
o GPO behaviour : Local Policy > Site GPO > Domain GPO > OU GPO
> Child OU GPO
o GPC - Group Policy Container :This is the AD portion of the group
policy. This can be viewed using ADSI edit. It stores version
information, status information, and other policy information. When
you create a new GPO, an AD object of class groupPolicyContainer
gets created under the System\Policies container within your AD
domain
o GPT - Group Policy Template : The GPT is where the GPO stores the
actual settings. It stores software policy script, and deployment
information.
o GPT is stored in SYSVOL share (\\DomainNameHere\SYSVOL\Policies)
whereas GPC is stored in the AD
17.
http://frankdenneman.nl/2011/01/11/beating-a-dead-horse-using-cpu-affinity/
18.
VMversion 4 vs VMversion 7
o Version 4
Version 7
Runs on vSphere 4.x
2. Max supported RAM 256 GB
3. Max vCPUs 8
4. MS cluster is supported
5. 10 NICs/VM
6. USB support
19.
What happens to the VMs if a standalone host is taken to
maintenance mode?
o In case of standalone servers , VMware recommends that VMs
should be powered off before putting the server in maintenance
mode
o If we put the standalone host in maintenance mode without
powering off the VMs, it will remain in the entering maintenance
mode state until the VMs are all shutdown
o When all the VMs are powered down, the host status changes to
under maintenance
http://pubs.vmware.com/vsphere-4-esxvcenter/index.jsp#using_drs_clusters_to_manage_resources/c_using_maintenanc
e_mode.html
20.
21.
How does the backup software recognize that a file has
changed since last backup?
o The files use a bit called archive bit for tracking any change in the
file.
o The backup softwares normally checks the archive bit of the file to
determine whether the file has to be backed up or not
22.
23.
ESXi 5.1
64
1 TB
10
62 TB
64
1 TB
10
1 TB
ESXi 5.0
ESXi 4.x
32
1 TB
10
1 TB
8
255 GB
10
2 TB for 8MB block
160
2 TB
256
64 TB
512
160
1 TB
256
64 TB
320
VMs
vCPU
RAM
vNIC
VMDK size
Hosts
Logical CPU
Memory
LUNs
LUN size
Virtual Machines
320
4 TB
256
64 TB
512
160
2 TB
256
64 TB
512
24.
What is the major difference between Windows server 2008
and windows server 2012 in terms of AD promotion?
25.
1. What is vSAN?
o
Port binding is used in iSCSI when multiple VMkernel ports for iSCSI reside
in the same broadcast domain and IP subnet, to allow multiple paths to an
iSCSI array that broadcasts a single IP address.
Array Target iSCSI ports must reside in the same broadcast domain and IP
subnet as the VMkernel port.
All VMkernel ports used for iSCSI connectivity must reside in the same
broadcast domain and IP subnet.
All VMkernel ports used for iSCSI connectivity must reside in the same
vSwitch.
7. Which esxtop metric will you use to confirm latency issue of storage ?
o
These adapters will only become Active if the defined Active adapters
have failed.
Fixed
Round Robin
Jumbo Frames
80,443,902
Users assigned with the 'No Access' role for an object, cannot view or
change the object in any way
ESX Admins
vmware-cmd
esxtop
vmkfstools
8000
\var\log\vmware
No
vMotion
Management traffic
Major difference between ESXi 5.1 and ESXi 5.5 free versions
Till ESXi 5.1 free version there was a limit to the maximum physical
memory to 32 GB. But from 5.5 onwards this limit has been lifted.
o
o
In Server 2012, you can convert a server into DC using the server
manager console. Under Server Manager, add a new role "Active Directory
Domain Services"
Yes, you can. Apart from MSI packages, GPO also supports deployment of
ZAP files
The refresh interval can be configured manually using group policy - GPO
--> Computer Configuration --> Administrative Templates --> System -->
Group Policy --> Set Group Policy refresh interval for Computers
restored domain controller. This is why Backup does not allow you to
restore data from a backup that is older than the tombstone lifetime.
o
I want to look at the RID allocation table for a DC. What do I do?
The Netlogon services help the client servers to connect to the Domain
Once the database is moved, move the logs using the command move
logs to D:\AD
Windows 2003 R2 - 31
Windows 2008
Windows 2008 R2 - 47
Windows 2012
Windows 2012 R2 - 69
- 44
- 56
Administrator account?
o
24
With the help of Option 82, the DHCP server identifies the client network
and assigns an IP from that network.
Group policy preference is a set of new settings that were released with
Windows 2008, that allows IT administrators to do anything they want to
configure in a corporate environment.
This is a part of Windows Support tools which helps us to make any LDAP
searches against the Active Directory
This depends on the type of controller used. If you are using modern RAID
controllers and are trying to replace with the same model, then the RAID
should work without any issues as the RAID configuration or metadata is
stored in the disk array. But you should ensure that you are using the
same model from vendor or a model which is compatible with the failed
controller.
RAID 5 - This RAID is the most popular RAID configuration. This works on
the parity principle. Minimum 3 disks required. Even if one disk fail, the
data of the failed disk can be calculated from the parity stored in the other
2 disks.
RAID 0 and RAID 1 has got excellent Read and Write performance.
Yes..
DAS is Direct Attached Storage. DAS is available with many vendors. When
a server has exhausted all its storage resource, we can connect a DAS
solution to it. DAS can be connected to a server using SAS cable.
UPN resolution - The users cannot login to the domain using the username
abc@example.com
Dell provides the update in different file formats. One for Windows , one
for linux...If it is a VMware server, then download the Non-Packaged exe
format from Dell website and copy it to a DOS bootable USB drive.
Shutdown the server and boot from USB drive and execute the file.
DSET
Dell Server E-Support Tool (DSET) provides the ability to collect hardware,
storage and operating system information from Dell PowerEdge server.
What is default time after which the DHCP client assigns itself an
APIPA ?
The client waits for 60 seconds before which it assigns automatic private
ip address.