Sie sind auf Seite 1von 57

What is RAID? And its Levels?

RAID (REDUNDANT ARRY OF INDEPENDENT DISKS) is a set of technology standards for teaming disk drives to improve fault tolerance and performance. RAID LEVELS:

RAID Levels
Level 0 1 2 3 4 5 6 Striping Mirroring Parallel Access with Specialized Disks Synchronous Access with Dedicated Parity Disk Independent Access with Dedicated Parity Disk Independent Access with Distributed Parity Independent Access with Double Parity Name

RAID 0 -- Optimized for Performance


RAID 0 uses striping to write data across multiple drives simultaneously. This means that when you write a 5GB file across 5 drives, 1GB of data is written to each drive. Parallel reading of data from multiple drives can have a significant positive impact on performance. The trade-off with RAID 0 is that if one of those drives fail, all of your data is lost and you must restore from backup. RAID 0 is an excellent choice for cache servers, where the actual data being stored is of little value, but performance is very important.

Striping is the automated process of writing data across multiple drives simultaneously. Striping is used to increase the performance of disk reads. When using striping, if you write a 5GB file across 5 drives, 1GB of data is written to each drive. Parallel reading of data from multiple disks can have a significant positive impact on performance, because the physical disk drive is most often the performance bottleneck. Striping is used in RAID Level 0.

RAID 1 -- Optimized for Redundancy

RAID 1 uses mirroring to write data to multiple drives. This means that when you write a file, the file is actually written to two disks. If one of the disks fails, you simply replace it and rebuild the mirror. The tradeoff with RAID 1 is cost. With RAID 1, you must purchase double the amount of storage space that your data requires. Mirroring is the automated process of writing data to two drives simultaneously. Mirroring is used to provide redundancy. If one drive fails, the redundant drive will continue to store the data and provide access to it. The failed drive can then be replaced and the drive set can be re-mirrored. Mirroring is used in RAID Level 1.

Software Mirroring vs. Hardware Mirroring


Disk mirroring can be implemented entirely in software. Software mirroring can be less expensive, but it is also slower. Software mirroring requires the host computer to write the mirrored data twice. Disk mirroring can be implemented in hardware on the host I/O controller. The burden of writing each bit of data twice is placed upon the I/O controller, which is specifically designed for it. Disk mirroring can also be implemented in hardware on an external storage device, such as a RAID array. In this case, mirroring is completely removed from the hosts responsibility.

Hot Swappable Hardware


If the hardware is hot swappable, it is possible to replace a failed disk without powering off the computer. You take out the old drive and put in the new drive with no service outage. If the hardware does not support hot-swap, you must schedule a service outage, shut down and power-off the system, and then replace the drive.

Mirroring vs. Duplexing


Mirroring is the technique of using redundant disks. Duplexing is mirroring, with the addition of redundant host I/O controllers. If you are using mirroring and your host I/O controller fails, you will not be able to access your data until you replace the host I/O controller. With Duplexing, your data will still be available through the redundant controller.

RAID 5 -- A Good Compromise


RAID 5 stripes data across multiple disks. RAID 5, however, adds a parity check bit to the data. This slightly reduces available disk capacity, but it also means that the RAID array continues to function if a single disk fails. In the event of a disk failure, you simply replace the failed disk and keep going. The tradeoffs with RAID 5 are a small performance penalty in write operations and a slight decrease in usabable storage space.

RAID 0+1 -- Optimize for Performance and Redundancy


RAID 0+1 combines the performance of RAID 0 with the redundancy of RAID 1. To build a RAID 0+1 array, you first build a set of RAID 1 mirrored disks and you then combine these disk sets in a RAID 0 striped array. A RAID 0+1 array can survive the loss of one disk from each mirrored pair. RAID 0+1 cannot survive the loss of two disks in the same mirrored pair. 1. What is DHCP? How we configure DHCP? Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a DHCP server to automatically assign an IP address to an individual computer's TCP/IP stack software. DHCP assigns a number dynamically from a defined range of numbers (i.e., a scope) configured for a given network. Client computers configured to use DHCP for IP assignment do not need to have a statically assigned IP address. In addition, they generally do not need to have addresses configured for DNS servers or WINS servers, as these are also set by the DHCP server. DHCP assigns a TCP/IP address when a system is started. Typically, it works like this: 1. A user turns on a computer with a DHCP client. 2. The client computer sends a broadcast request (called a DISCOVER or DHCPDISCOVER), looking for a DHCP server to answer. 3. The router directs the DISCOVER packet to the correct DHCP server. 4. The server receives the DISCOVER packet. Based on availability and usage policies set on the server, the server determines an appropriate address (if any) to give to the client. The server then temporarily reserves that address for the client and sends back to the client an OFFER (or DHCPOFFER) packet, with that address information. The server also configures the client's DNS servers, WINS servers, NTP servers, and sometimes other services as well.

5. The client sends a REQUEST (or DHCPREQUEST) packet, letting the server know that it intends to use the address. 6. The server sends an ACK (or DHCPACK) packet, confirming that the client has a been given a lease on the address for a server-specified period of time. When a computer uses a static IP address, it means that the computer is manually configured to use a specific IP address. One problem with static assignment, which can result from user error or inattention to detail, occurs when two computers are configured with the same IP address. This creates a conflict that results in loss of service. Using DHCP to dynamically assign IP addresses minimizes these conflicts. 2. What are the ways to configure DNS & Zones?
Domain Name System is the full form of the abbreviation DNS. It can be configured by clicking the Start button, pointing to the Programs, pointing to Administrative Tools and clicking DNS Manager (which has two zones, namely the Forward Lookup Zone and the Reverse Lookup Zone). When the DNS Server Configuration Wizard starts, click Next. If it does not auto-start, it can be started by right-clicking the users server name object in the DNS Manager console and choosing the Configure Your Server option. The next step is to choose to add a forward lookup zone, click Next and ensure whether the new forward lookup zone is a primary zone or not. It can only accept dynamic updates if it is a primary zone. Click Primary, and then click Next. It must be ensured that the zone name must either be the same as the users Active Directory Domain name or the same as the suffix for all the computers on the network which are to be registered with the DNS server (in case of a stand-alone or workgroup environment). Type the name of the zone and then click Next. The default name is accepted for the new zone file. Then click Next. Choose to add a reverse lookup zone now and click Next. Click Primary and then click Next. Type the name of the zone and then click Next. The zone name should be the same as the Network ID of your local subnet. Accept the default name for the new zone file and click Next. Then click Finish to complete the Server Configuration Wizard.

3. What are the types of backup? Explain each?


There are three types of backup. They are full backup, incremental backup and differential backup. Full backup is defined as a complete set of all the files which the user wishes to back up. It is considered to be the reference set for the user. A full backup is performed only occasionally. An incremental backup is a backup of all those files which have changed since the last time any time of backup was performed. A differential backup is a backup of those files which have changed since the last time a full backup was performed. It should be performed at regular intervals

4. What are FMSO Roles? List them.


FSMO is the acronym for the term flexible single master operation, which is also called floating single master operation .There are two main types of FSMO roles, namely forest-wide FSMO roles and domain-wide FSMO roles. Forest-wide FSMO roles include Schema Master and Domain Naming Master. Domain-wide FSMO roles include Relative ID Master, Infrastructure Master and PDC Emulator.

5. What is scope & super scope?


If you understand the purpose of a superscope explicitly it will make it clear when to use Superscopes. First, a mental trick: Every time you hear the word superscope, mentally (out loud at first) add the word "GROUP" so it becomes "superscopeGROUP" - scopeGroup would have been a much better name for this but that's not what the RFCs chose. A superscope(group) is used when you have a MULTINET-more than one 'logical subnet' on the same 'physical subnet or segment of wire'. You want the DHCP server to service both subnets -- a scope is related to ONE Subnet. So create each scope (per logical subnet) and create a superscopeGROUP because you have a multinet -- add the scopes to the superscope...to group them. It's just a scopegroup.

Takeaway: If your organization is growing faster than you can supply IP addresses, you don't have to fear that you might soon be running on empty--a superscope can come to the rescue. A superscope is a versatile, cost-effective, and easy-to-use solution when youre running out of IP addresses on a network. This walk-through will show you how to set up a superscope and configure it to assign IP addresses. The growth of the young company you work for as network administrator has surpassed all expectations. Everyone--especially the bosses--has every reason to celebrate. But the IT crowd isn't in the same celebratory mood. The reason? They're running on empty (or, more precisely: the DHCP server is). The problem is that the DHCP server is fast running out of IP addresses to dish out to all the new computers being added to serve your company's growing staff complement. There's an exclamation mark hanging like an ill omen over the DHCP server icon (Figure A), an indication that you're dangerously close to the end of the available address pool.

Figure A

The exclamation mark next to the DHCP server name is a warning that the IP addresses from the scope have nearly been depleted.

When the company started out as a small business with 50 PCs three years ago, the 254 IP addresses a Class C subnet offered seemed more than enough for a long time. But now it's a different story. There are just eight unassigned IP addresses left. As the responsible network admin, what are your options? You could lobby for another physical LAN (and thus another subnet), but that would mean you'd have to convince the boss to buy a router (or another one if you already have more than one physical LAN) and (maybe) another DHCP server. But suppose there's really no need for a separate physical LAN, apart from your IP address problem? Changing to another IP address class--maybe Class B, which will provide you with more addresses--is another possibility, but again not a very attractive one. This time you'll have to justify purchasing this address range from your ISP and then face the prospect of migrating from the existing address range (scope) to the new one.

Enter: Superscope
Thankfully, there's a much simpler solution--using a superscope. What's a superscope? A kind of mother of all scopes. It allows you to add more than one scope (called child scopes, or member scopes) under one umbrella.

Note
Microsoft introduced the superscope feature with NT4 SP2.

Let's go ahead and create a superscope for the scenario described above. We'll assume DHCP is set up to use the scope 192.168.0.0. We want to add another scope from the

same class (Class C), so let's use 192.168.1.0. But first we need to create a superscope. Here's how: 1. Open DHCP. 2. Right-click on the DHCP server. 3. From the drop-down list, choose New Superscope (Figure B) to launch the New Superscope Wizard. 4. The wizard prompts you to enter a name for the superscope. We'll just call it MySuperscope. 5. On the next screen, you'll be asked to select a scope(s) to add to the superscope. You'll see the list of available scopes--in our example, just 192.168.0.0 (Figure C) Select it and click Next. Figure B

The first step in creating a superscope.

Figure C

Adding scopes to the superscope

The final screen of the wizard informs you that you have successfully completed the New Superscope wizard and gives you the details (Figure D). If you go back into DHCP, you'll see that the new superscope has been created.

Figure D

The last screen of the wizard showing the details of the new superscope.

Adopting another child


Now we're ready to create our brand new child scope that will be watched over by our superscope. 1. 2. 3. 4. 5. Open DHCP. Right-click on the DHCP server. Select New scope (Figure E) to launch the New scope wizard. Choose a name and description for the new scope. As our first scope in this example was called Scope1, we'll just call this one Scope2. The wizard will prompt you to add an IP address range. We'll choose a range from the Class C range 192.168.1.0. (We could also have chosen 192.168.2.0, 192.168.3.0, etc., but we'll stick to ... 1.0, as it follows logically on our first range). As for start and end address, we'll select all available addresses, starting with 192.168.1.1 and ending with 192.168.1.254. Note that the wizard will automatically complete the Length and Subnet Mask fields (Figure F). On the next screen, you can choose which range of addresses you want to exclude, if any. Now, you get to select the duration of IP address leases. The default is eight days. The wizard then gives you the opportunity to configure DHCP options. You can choose to do it now or wait until later. Note, however, that you have to configure the most common options (like DNS server address and default gateway) before

6. 7. 8.

clients can use the scope, so now is as good a time as ever to do it. Just use the same options as your existing scope. 9. After configuring the DHCP options, you are asked whether you want to activate the scope now or later. Once activated, you're done. Figure E

The New scope wizard will walk you through the steps of creating a scope.

Figure F

The address details of the new scope, with a little help from the wizard.

Figure G shows our superscope and two child scopes. Notice the red downward pointing arrow to the right of the toolbar. Don't worry--it doesn't mean your superscope is down. You click on the arrow to deactivate a scope or superscope. Warning: Do not deactivate a superscope unless you want to get rid of all its member scopes! Figure G

The new scope and the two child scopes.

One last step


You now have what is termed a multinet--multiple subnets on a single physical network. But you're not quite there yet. Yes, you have an additional scope; yes, you have a superscope. But your superscope won't assign IP addresses from the new scope. And even if you add a static address from the pool to a client machine, you'll notice that you can't browse the network. You still need to add the route to your DHCP server's network adaptor, and if you have a router, you'll want to add the IP address to it as well. Here's how to add that new address to your NIC: 1. Open your Local Area Connection and click on Properties. 2. Highlight Internet Protocol (TCP/IP) and click on the Properties tab to open the properties screen shown in Figure H. 3. Click on Advanced which will take you to Advanced TCP/IP settings. 4. Select Add. A window will open where you have to add the new IP address (Figure I). Enter the address and click Add. 5. The next window will show both your IP addresses. Click OK, OK again on the next screen, and Close and you're done.

Figure H

The TCP/IP properties screen.

Figure I

Here, you add the address of your new subnet.

Now, if you add an address from the new subnet as a static IP address to a client machine, you should be able to browse the network. I won't go into the details of adding the new IP address range to a router's Ethernet interface, but if you're Cisco certified, you'll find it to be a simple procedure. (If you don't know your way around a router, though, steer clear.)

The commands to add an IP address to an interface look something like this (depending on the interface and address): int e 0/0 ip address 192.168.1.0 255.255.255.0 But you're adding a second address to the same interface, so you have to add the keyword secondary to the command. So to add the address range from our new child scope, the command would be: int e 0/0 ip address 192.168.1.0 255.255.255.0 secondary

Help for remote subnets


So far, we have assumed you have a single physical subnet. But what if you have another one (let's call it physical subnet B) and you're running out of IP addresses there? We're assuming that your DHCP server on subnet A supplies addresses to subnet B. A superscope will also come to your rescue in a scenario like this--with a little help from a relay agent.

Note
A relay agent is a program that relays DHCP/BOOTP messages between clients and servers on different subnets.

Warning: Do not attempt to set up your DHCP server as a relay agent--it won't work as a DHCP server any longer. Instead, try to relay any DHCP requests from clients to "another" DHCP server. To supply IP addresses from a DHCP server located on subnet A to clients on another physical network--subnet B--you'll set up a superscope on subnet A. To this superscope, you'll add one or more child scopes, which will supply IP addresses to clients on subnet B. Because you're concerned only with creating additional scopes to support clients on subnet B, you don't need to include the scope for subnet A as part of the superscope. As most--probably all--modern routers have DHCP/BOOTP relay agent support, as described in RFC 1542, you probably won't need to set up another server as a DHCP

relay agent. So all you'll need to do is configure the router (or have it configured) with its relay agent set to point to the IP address of the DHCP server.

Note
Although you could set up an NT server or workstation as a DHCP relay agent, you can do this only on a server with Windows 2000 server and Windows Server 2003. 6. Differences between Win 2000 Server & Advanced Server? 7. Logical Diagram of Active Directory? What is the difference between child domain & additional domain server? 8. FTP, NNTP, SMTP, KERBEROS, DNS, DHCP, POP3 port numbers? 9. What is Kerberos? Which version is currently used by Windows? How does Kerberos work? 10. boot process in windows nt/xp/2000/2003 11. how do you configure memory dump if c:,d:,e: & paging file is configured so and so way? 12. backups ? which is better, why and which to use when? 13. disaster recovery plan? 14. DHCP lease process 15. DNS zones, chronicle records what are they? 16. DHCP relay agent where to place it? 17. what is active directory compared to SAM? 18. what is GC? how many required for A Tree? 19. what is forest? 20. Group policies? 21. FSMO Roles? 22. What is Active Directory schema? 23. What are the domain functional level in Windows Server 2003? 24. What are the forest functional level in Windows Server 2003? 25. What is global catalog server? 26. How we can raise domain functional & forest functional level in Windows Server 2003? 27. Which is the deafult protocol used in directory services? 28. What is IPv6?

29. What is the default domain functional level in Windows Server 2003?W 30. What are the physical & logical components of ADS 31. In which domain functional level, we can rename domain name? 32. What is multimaster replication? 33. What is a site? 34. Which is the command used to remove active directory from a domain controler? 35. How we can create console, which contain schema? 36. What is trust? 37. What is the file thats responsible for keep all Active Directory database?

Technical Interview Questions Active Directory


What is Active Directory? What is LDAP? Can you connect Active Directory to other 3rd-party Directory Services? Name a few options. Where is the AD database held? What other folders are related to AD? What is the SYSVOL folder?

The sysVOL folder stores the server's copy of the domain's public files. The contents such as group policy, users etc of the sysvol folder are replicated to all domain controllers in the domain. The sysvol folder must be located on an NTFS volume.
Name the AD NCs and replication issues for each NC What are application partitions? When do I use them

Application Directory Partition is a partition space in Active Directory which an application can use to store that application specific data. This partition is then replicated only to some specific domain controllers. The application directory partition can contain any type of data except security principles (users, computers, groups).

How do you create a new application partition

The DnsCmd command is used to create a new application directory partition. Ex. to create a partition named NewPartition on the domain controller DC1.contoso.com, log on to the domain controller and type following command. DnsCmd DC1/createdirectorypartition NewPartition.contoso.com
How do you view replication properties for AD partitions and DCs? What is the Global Catalog? How do you view all the GCs in the forest? Why not make all DCs in a large forest as GCs? Trying to look at the Schema, how can I do that?

What are the Support Tools? Why do I need them? What is LDP? What is REPLMON? What is ADSIEDIT? What is NETDOM? What is REPADMIN? What are sites? What are they used for? What's the difference between a site link's schedule and interval? What is the KCC? What is the ISTG? Who has that role by default? What are the requirements for installing AD on a new server? What can you do to promote a server to DC if you're in a remote location with slow WAN link? How can you forcibly remove AD from a server, and what do you do later? Can I get user passwords from the AD database? What tool would I use to try to grab security related packets from the wire? Name some OU design considerations. What is tombstone lifetime attribute? What do you do to install a new Windows 2003 DC in a Windows 2000 AD? What do you do to install a new Windows 2003 R2 DC in a Windows 2003 AD? How would you find all users that have not logged on since last month? What are the DS* commands? What's the difference between LDIFDE and CSVDE? Usage considerations? What are the FSMO roles? Who has them by default? What happens when each one fails? What FSMO placement considerations do you know of? I want to look at the RID allocation table for a DC. What do I do? What's the difference between transferring a FSMO role and seizing one? Which one should you NOT seize? Why? How do you configure a "stand-by operation master" for any of the roles? How do you backup AD? How do you restore AD? How do you change the DS Restore admin password? Why can't you restore a DC that was backed up 4 months ago? What are GPOs? What is the order in which GPOs are applied? Name a few benefits of using GPMC. What are the GPC and the GPT? Where can I find them? What are GPO links? What special things can I do to them? What can I do to prevent inheritance from above? How can I override blocking of inheritance? How can you determine what GPO was and was not applied for a user? Name a few ways to do that. A user claims he did not receive a GPO, yet his user and computer accounts are in the right OU, and everyone else there gets the GPO. What will you look for? Name a few differences in Vista GPOs Name some GPO settings in the computer and user parts. What are administrative templates? What's the difference between software publishing and assigning? Can I deploy non-MSI software with GPO? You want to standardize the desktop environments (wallpaper, My Documents, Start menu, printers etc.) on the computers in one department. How would you do that? Add Question

What are the required components of Windows Server 2003 for installing Exchange 2003? What must be done to an AD forest before Exchange can be deployed?
(1)

(1)

What Exchange process is responsible for communication with AD? What 3 types of domain controller does Exchange access?
(1)

(1)

What connector type would you use to connect to the Internet, and what are the two methods of sending mail over that connector? ( 1 ) How would you optimise Exchange 2003 memory usage on a Windows Server 2003 server with more than 1Gb of memory? ( 1 ) What would a rise in remote queue length generally indicate? What would a rise in the Local Delivery queue generally mean? Name the process names for the following: System Attendant What are the disadvantages of circular logging? Describe how the DHCP lease is obtained
(1) (1) (1) (1)

What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP and Global Catalog?
(1)

What is the maximum amount of databases that can be hosted on Exchange 2003 Enterprise?
(1)

(1)

I cant seem to access the Internet, dont have any access to the corporate network and on ipconfig my address is 169.254.*.*. What happened? ( 1 ) Weve installed a new Windows-based DHCP server, however, the users do not seem to be getting DHCP leases off of it. ( 1 ) How can you force the client to give up the dhcp lease if you have access to the client PC? What authentication options do Windows 2000 Servers have for remote clients?
(1) (1)

What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP/IP? ( 1 ) What is data link layer in the OSI reference model responsible for? Data link layer is located above the physical layer, but below the network layer. ( 1 ) What is binding order?
(1) (1)

How do cryptography-based keys ensure the validity of data transferred across the network? Should we deploy IPSEC-based security or certificate-based security? What is LMHOSTS file?
(1) (1) (1)

Whats the difference between forward lookup and reverse lookup in DNS? How can you recover a file encrypted using EFS? Explain hidden shares.
(1) (1) (1)

How do the permissions work in Windows 2000? What permissions does folder inherit from the parent? Why cant I encrypt a compressed file on Windows 2000?
(1)

If I rename an account, what must I do to make sure the renamed account has the same permissions as the original one? ( 1 ) Whats the most powerful group on a Windows system? What are the accessibility features in Windows 2000? Why cant I get to the Fax Service Management console?
(1) (1) (1)

What do I need to ensure before deploying an application via a Group Policy? How do you configure mandatory profiles?
(1) (1) (1)

(1)

I cant get multiple displays to work in Windows 2000.

Whats a maximum number of processors Win2k supports?

I had some NTFS volumes under my Windows NT installation. What happened to NTFS after Win 2k installation? ( 1 ) How do you convert a drive from FAT/FAT32 to NTFS from the command line? Explain APIPA.
(1) (1) (1)

How does Internet Connection Sharing work on Windows 2000?

Posted in: Networking, Windows |

Windows sysadmin interview questions


1. Aneesh Says:
March 29th, 2006 at 11:49 pm

What is Active Directory Schema? The Active Directory schema contains formal definitions of every object class that can be created in an Active Directory forest it also contains formal definitions of every attribute that can exist in an Active Directory object. Active Directory stores and retrieves information from a wide variety of applications and services. So that it can store and replicate data from a potentially infinite variety of sources, Active Directory standardizes how data is stored in the directory. By standardizing how data is stored, the directory service can retrieve, update, and replicate data while ensuring that the integrity of the data is maintained. 2. kiran Says:
May 15th, 2006 at 11:46 pm

What is Schema Master? 1) Schema master is a set of rules which is used to define the structure of active directory. It contains definitions of all the objects which are stored in AD. It maintains information and detail information of objects. What is Domain Level Policy? 2) If there are many organizational units and to implement policy on all OUs we use Domain level policy.

What is Global Catalog Server? 3) Global Catalog Server maintains full information about its own domain and partial information about other domains. It is a forest wide role.

What is Site? 4) Sites: one or more well-connected highly reliable and fast TCP/IP subnets. A site allows administrator to configure active directory access and replication topology to take advantage of the physical network. What is the command for running AD? 5) dcpromo to add/remove active directory but first ADC should be removed before DC if we want to remove DC first then check this server is last domain controller in domain. Can you explain us briefly Architecture of Windows 2000/2003? What are main differences in Windows NT and Windows 2000 Architecture? 3. SUVENDU Says:
August 15th, 2006 at 11:08 pm

A).What is global catalog server? A global catalog server is a domain controller it is a master searchable database that contains information about every object in every domain in a forest. The global catalog contains a complete replica of all objects in Active Directory for its host domain, and contains a partial replica of all objects in Active Directory for every other domain in the forest. It have two important functions: i)Provides group membership information during logon and authentication ii)Helps users locate resources in Active Directory B) Which is the command used to remove active directory from a domain controler? ANS DCPROMO in command prompt

4. SUVENDU Says:
August 15th, 2006 at 11:29 pm

In which domain functional level, we can rename domain name? All domain controllers must be running Windows Server 2003, and the Active Directory functional level must be at the Windows Server 2003. Yes u can rename the domain in windows server 2003 5. irfan Says:
September 1st, 2006 at 1:19 am

User(s) are complaining of delays when using the network. What would you do? 6. shaik Says:
September 3rd, 2006 at 12:24 pm

hi NTDS.DIT

We have to open the register to see the schema master fsmo role regsvr 32 schmamgmt. Light wait directory Access Protocal (ldap)

What ever changes done in D.C will effect at A.D, we can call it as multi-master replication. 7. Kumar Ken Says:
September 13th, 2006 at 3:53 pm

To allow users in one domain to access resources in another, AD uses trust. Trust is automatically produced when domains are created. The forest sets the default boundaries of trust, not the domain, and implicit trust is automatic. As well as two-way transitive trust, AD trusts can be shortcut (joins two domains in different trees, transitive, one- or two-way), forest (transitive, one- or two-way), realm (transitive or nontransitive, one- or two-way), or external (non-transitive, one- or two-way) in order to connect to other forests or non-AD domains. AD uses the Kerberos V5 protocol, although NTLM is also supported and web clients use SSL/TLS. Multi-master replication is a method of replication employed by databases to transfer data or changes to data across multiple computers within a group. Multi-master replication can be contrasted with a master-slave method (also known as single-master replication).

Internet Protocol version 6 (IPv6) is a network layer IP standard used by electronic devices to exchange data across a packet-switched internet work. It follows IPv4 as the second version of the Internet Protocol to be formally adopted for general use. What are the domain functional levels in Windows Server 2003? http://technet2.microsoft.com/WindowsServer/en/library/b3674c9b-fab9-4c1ea8f6-7871264712711033.mspx?mfr=true

8. Naresh Nimmagadda Says:


October 13th, 2006 at 9:06 am

ip v6 it ia a 128 bit size address here we can see total 8 octants each octets size is 16 bits separated with : it is in hexa decimal format these 3 types 1.unicast address 2.multicast address 3.anycast address loopback address of ip v6 is ::1 9. Ramanand Says:
November 27th, 2006 at 5:00 am

What is mean by dns,dhcp.? what is maen different between hub and switch ? what is meam by brodcast id? what is mean by loop back id? what is mean by schema ? what is mean by master searchable directory 10. Srikanth Says:
December 8th, 2006 at 6:08 am

10. In which domain functional level, we can rename domain name? The System Properties dialog box can also be used to rename a domain controller, and it does not require the functional level to be raised to Windows Server 2003. 11. Renga Raju Says:
December 13th, 2006 at 11:43 pm

What is Rsop ? Resultant set of policy provides to make policy modification and trouble shooting easier. Rsop is the query object it has two mode

1. logging mode: Polls existing policies and the reports the result of the query. 2. Planning mode: The questions ask about the planned policy and the report the result of the query.

What is the concept for authoritative and non-authoritative restoration? 1. Non-authoriative restore: which accept the entries from other domain controller after restored the data. 2. Authoritative: Not accept the entries from other domain controller. What is the ntds.tit file default size? 40 mb What is multimaster replication? Ans. It is also known as single-master replication. Multi-master replication is a method of replication employed by databases to transfer data or changes to data across multiple computers within a group. Multi-master replication can be contrasted with a master-slave method. What is Integrated DSN In addition to storing primary zone information in Dns we can also store it in active directory as active directory object. This integrates Dns with active directory in order to take advantage of active directory features The benefits are: Zone can be modified from any domain controller within the domain and this information is automatically updated or replicated to all the other domain controllers along with the active directory replication. This replication is said to be multimaster replication. We no longer face the standard DNS server drawbacks. In standard DNS server only the primary server can modify the zone and then replicate the changes to other domain controllers(It was in windows NT4 before). But when DNS gets integrated with AD .Zone can be modified and replicated from any domain controller. Fault tolerance Security

You can prevent access to any updates to zone or individual record preventing insecure dynamic updates. What is DFS? The two technologies in DFS are as follows: DFS Replication. New state-based, multimaster replication engine that is optimized for WAN environments. DFS Replication supports replication scheduling, bandwidth throttling, and a new byte-level compression algorithm known as remote differential compression (RDC). DFS Namespaces. Technology that helps administrators group shared folders located on different servers and present them to users as a virtual tree of folders known as a namespace. DFS Namespaces was formerly known as Distributed File System in Windows 2000 Server and Windows Server 2003. What is system boot process in windows 2000
The Windows 2000 boot process differs slightly between the Intel and RISC platforms. In this article, we look at the differences between these two platforms.

Preboot and Boot Sequences


On Intel-based systems, the boot process is made up of a preboot sequence and boot sequence. The preboot sequence consists of the following steps: 1. 2. Power-On Self Tests (POST) are run. The boot device is found, the Master Boot Record (MBR) is loaded into memory, and its program is run. 3. 4. The active partition is located, and the boot sector is loaded. The Windows 2000 loader (NTLDR) is then loaded.

The boot sequence executes the following steps: 1. 2. 3. The Windows 2000 loader switches the processor to the 32-bit flat memory model. The Windows 2000 loader starts a mini-file system. The Windows 2000 loader reads the BOOT.INI file and displays the operating system selections (boot loader menu).

4.

The Windows 2000 loader loads the operating system selected by the user. If Windows 2000 is selected, NTLDR runs NTDETECT.COM. For other operating systems, NTLDR loads BOOTSECT.DOS and gives it control.

5.

NTDETECT.COM scans the hardware installed in the computer, and reports the list to NTLDR for inclusion in the Registry under the HKEY_LOCAL_MACHINE_HARDWARE hive.

6.

NTLDR then loads the NTOSKRNL.EXE, and gives it the hardware information collected by NTDETECT.COM. Windows NT enters the Windows load phases.

What is paging.
When a program is selected for execution, the system brings it into virtual storage, divides it into pages of four kilobytes, transfers the pages into central storage for execution. To the programmer, the entire program appears to occupy contiguous space in storage at all times. Actually, not all pages of a program are necessarily in central storage, and the pages that are in central storage do not necessarily occupy contiguous space. The pieces of a program executing in virtual storage must be moved between real and auxiliary storage. To allow this, z/OS manages storage in units, or blocks, of four kilobytes. The following blocks are defined: A block of central storage is a frame. A block of virtual storage is a page. A block of auxiliary storage is a slot.

A page, a frame, and a slot are all the same size: Four kilobytes. An active virtual storage page resides in a central storage frame. A virtual storage page that becomes inactive resides in an auxiliary storage slot (in a paging data set). Figure 1 shows the relationship of pages, frames, and slots. In Figure 1, z/OS is performing paging for a program running in virtual storage. The lettered boxes represent parts of the program. In this simplified view, program parts A, E, F, and H are active and running in central storage frames, while parts B, C, D, and G are inactive and have been moved to auxiliary storage slots. All of the program parts, however, reside in virtual storage and have virtual storage addresses.

Figure 1. Frames, pages, and slots

z/OS uses a series of tables to determine whether a page is in real or auxiliary storage, and where. To find a page of a program, z/OS checks the table for the virtual address of the page, rather than searching through all of physical storage for it. z/OS then transfers the page into central storage or out to auxiliary storage as needed. This movement of pages between auxiliary storage slots and central storage frames is called paging. Paging is key to understanding the use of virtual storage in z/OS. z/OS paging is transparent to the user. During job execution, only those pieces of the application that are required are brought in, or paged in, to central storage. The pages remain in central storage until no longer needed, or until another page is required by the same application or a higher-priority application and no empty central storage is available. To select pages for paging out to auxiliary storage, z/OS follows a "Least Used" algorithm. That is, z/OS assumes that a page that has not been used for some time will probably not be used in the near future.

What is the default Functional level in windows server 2003, we can rename domain? The default domain functional level in Windows Server 2003 is Windows 2000 Mixed. We can rename domain name in Windows Server 2003 functional level What is the command for removing active directory the command line? dcpromo /forceremoval Removing Active Directory: If we want to remove Active Directory then we will use command DCPROMO If some one deleted parent domain and we want to remove from child domain then we will use command DCPROMO /FORCEREMOVAL Note: - we should not remove parent domain first. We should start from bottom means child domain and after that its parent and so on. 1. DNS(Domain Name Service):

Its mainly used to resolve from host name(FQDN-Fully Qualified Domain Name) to IP address and IP address to host name.DNS mainly used in Internet. DNS devide in form of hierarchical. 2. DHCP (Dynamic Host Configuration Protocol): DHCP use for provide IP address dynamically to client machine. If that client not able to find DHCP server then client machine will go for APIPA (We have range for APIPA which is 169.254.0.1-169.254.255.254). 3. HUB and SWITCH: Switch is expencive than hub. If more then one user try to send packet at a time collision will occure but in switch we can send. Switch is full duplex. Maximum bandwidth is 100 Mhz and that bandwidth is shared by all of the PCs connected to the hub. Data can be sent in both directions simultaneously, the maximum available bandwidth is 200 Mbps, 100 Mbps each way, and there are no other PCs with which the bandwidth must be shared. 1. Difference between Router and Routing: Router: Router is a device which is used to connect different network. A device or setup that finds the best route between any two networks, even if there are several networks to traverse. Like bridges, remote sites can be connected using routers over dedicated or switched lines to create WANs. Routing: Process of delivering a message across one or more networks via the most appropriate path. 2. Dynamic Routing and Static Routing: Dynamic routing performs the same function as static routing except it is more robust. Static routing allows routing tables in specific routers to be set up in a static manner so network routes for packets are set. If a router on the route goes down the destination may become unreachable. Dynamic routing allows routing tables in routers to change as the possible routes change. There are several protocols used to support dynamic routing including RIP and OSPF 12. Zahed Says:
April 18th, 2007 at 1:45 pm

Hi, i want to know to total process to migrate from Windows NT server to Windows 2000 server. What are all the process will done when we start server tell me briefly which file work for which process.
May 25th, 2007 at 7:22 am

The four domain functional levels are: Windows 2000 Mixed Windows 2000 Native Windows Server 2003 Interim Windows Server 2003 Windows 2000 Mixed When you configure a new Windows Server 2003 domain, the default domain functional level is Windows 2000 mixed. Under this domain functional level, Windows NT, 2000, and 2003 domain controllers are supported. However, certain features such as group nesting, universal groups, and so on are not available. Windows 2000 Native Upgrading the functional level of a domain to Windows 2000 Native should only be done if there are no Windows NT domain controllers remaining on the network. By upgrading to Windows 2000 Native functional level, additional features become available including: group nesting, universal groups, SIDHistory, and the ability to convert security groups and distribution groups. Windows Server 2003 Interim The third functional level is Windows Server 2003 Interim and it is often used when upgrading from Windows NT to Windows Server 2003. Upgrading to this domain functional level provides support for Windows NT and Windows Server 2003 domain controllers. However, like Windows 2000 Mixed, it does not provide new features. Windows Server 2003 The last functional level is Windows Server 2003. This domain functional level only provides support for Windows Server 2003 domain controllers. If you want to take advantage of all the

features included with Windows Server 2003, you must implement this functional level. One of the most important features introduced at this functional level is the ability to rename domain controllers 13. Annveer N. Halkood Says:
July 29th, 2007 at 10:58 pm

what are the types of name resolution? how name resolution will take place? what are the Groups? what is DHCP Relay agent? 14. Thyagu Says:
September 18th, 2007 at 7:48 pm

1. Active Directory schema is collection of object class and attributes. Eg user is an object and its having a lot attributes such as first name ,last name etc It present in only one domain in a forest, schema master is having the ability to update the changes in the Active directory schema. Schema Administrator only can access and edit the schema. You cannot see the AD schema when you installed AD (dcpromo). You need to run the registry file for schema in cmd mode :regsvr32.dll schmmgmt Then you can see the Add -snap in wizard in mmc console ,there you can.. 2. The domain functional level in Windows Server 2003 Domain functional level support only the windows domain controllers not client level o/s. They are four: windows 2000 mixed(by default) supports- win nt, win 2000,win2003. Windows 2000 native- supports- win 2000 ,win 2003 Windows 2003 interim- supports ->win NT, win 2003 Windows 2003 - supports-win 2003 only 3. Forest functional level in Windows Server 2003 There are three windows 2000 mixed supports- win nt, win 2000,win2003. Windows 2000 native- supports- win 2000,win 2003 Windows 2003 - supports-win 2003 only

4. Global Catalog it is a searchable database Engine. It is used to search the objects in a forest. In 2003, Universal Group caching membership is available for speedy logon across domain. Port no: 3268, 3269 it is also taking part of AD replication. 15. Thyagu Says:
September 19th, 2007 at 5:04 pm

5.How we can raise domain functional & forest functional level in Windows Server 2003? AD users and computers>domain functional level->choose DFL as per your environment. AD Domain and Trust>Forest functional level>choose FFL as would your environment. Note: once you have change the DFL and FFL, cannot be revert. 6. The default protocol used in directory services? LDAP. 7. What are the physical & logical components of ADS Physical->sites,domain controller Logical ->Forest,domain,tree,ou 8. In which domain functional level, we can rename domain name Windows 2003 dfl, you can rename the domain. Note: Not recommended to rename the domain by Microsoft itself. You need to follow up the proper procedure to prevent the further issue. Renaming is simple, but forecast issue is lot. 11. Multi-master replication Whenever a change occurs to any object within an Active Directory domain, that change is replicated automatically to all domain controllers within the domain. This process is called multi-master replication. Multi-master replication does not happen instantly across all servers simultaneously. Rather, it is a controlled process where each domain controller peer is updated and validated in a logically controlled procedure.

12. Site: Site is one or more IP subnets. It contains connection objects and computer objects and mainly used for AD replication. 15.Trust is relationship,between forest,domain. 16 NTDS.dit is the file thats responsible for keep all Active Directory database. Hi, Can you pleas answer my query 1.How to Export the Ad data in Excel. Specially Tabs Like (General, Account,Exchange Advance, Security, Members of )Without any 3rd party software. 2. Suppose i have deleted any object from Ad but after 2-3 days i want back that object..What is the process to restore the deleted Ad object. 16. Raj Narayan Says:
November 22nd, 2007 at 4:55 am

Hi, Can anyone give me the answer of the mention Questions: 1. Windows server 2008 is actual which version of Windows server ? 2. Explain NAP in Windows Server 2008 3. How 1 can implement IP verison 6 using Windows Server 2008? 4. What are the enhancements in Terminal server which comes with Win2k8 ? 5. Which version of IIS comes with Windows server 2008? 6. What is the new feature included in Windows Server 2008 which can lock entire hard disk drive? 7. How easy it is to combine Windows Server 2008 os with physical networking & security appliances? 8. What are the certifications available for Windows 2008 track? 9. What is MCP member site and whats advantage of it ? 10. What is TechNet subscription and what indivisual get by subscribing to TechNet? What is DHCP relay agent? If you have two or more subnet,you need to configure more DHCP server in each subnet instead of place DHCP server ,we can configure DHCP relay angent wherever you want. Note:Minimum one DHCP server on your network

What is mean by dns,dhcp ? DNS : it is Domain name system ,this is used to reslove the IP address to site name and, site name to IP address DHCP: It is dynamic host configuration protocol,It is using to distribute the IP to all client systems in a network. It is layer two device(Data Link Layer) What is meam by brodcast id? It will forward the message to all system in a network (255.255.255.255). Example : This is my Ip address 192.168.1.1/30 let we find out the subnet,host address,broadcast address ? Subnet will be 255.255.255.252 My valued host address is 192.168.1.5 to 192.168.1.6 My broadcast address will 192.168.1.7

What is mean by loop back id? It is local host address using this we can check the TCP/IP protocol stack ,special to check the network card (127.0.0.1). 17. Prasath Jayabal Says:
March 3rd, 2008 at 6:24 am

What is mean by schema ? Windows Server 2000/2003 Active Directory uses a database set of rules is called Schema What is the diffence between SD-RAM and DD-RAM ? 1. shaik Says:
June 29th, 2006 at 2:25 am

Can Ichange my DC IP( dns, pref dns, gateway) while dc is working. and can i give another ip. (what happend if i give that ip and what happend about the replication of ther dc when i am in suspend mode) ?

2. mohd.sameer Says:
August 3rd, 2006 at 1:30 am

i have been asked if there is set of 30 harddisk configured for raid 5 if two harddisk failed what about data 3. Tech Says:
September 17th, 2006 at 3:40 am

i have been asked if there is set of 30 harddisk configured for raid 5 if two harddisk failed what about data Tech Interviews comment by mohd.sameer 4. Raj Narayan Says:
September 23rd, 2006 at 12:51 am

Hi, Can anybody give me the answer of the mention questions. 1.How Can i Deploy the Latest Patched in Pc through G.P. wihtout having the Admin Right in Pc. 2.How to remove the $sharing through G.P. in 1000 PCs. 3.In Raid 5,Suppose i have 5 HDD of 10-10 GB, After configuring the Raid how much space do i have for utilise. 4.How Can i Resolve the Svr name through Nslookup. Thanks & Regards, Raj Narayan 5. Debabrata Swain Says:
October 17th, 2006 at 7:49 am

What is difference between scope and superscope ? 6. Aarif Shaikh Says:


November 26th, 2006 at 10:13 am

Q) Can I changed password if my machinces connectivity to DC who holds PDC emulator role has been fails? A) No You cant the password. Q) i have been asked if there is set of 30 harddisk configured for raid 5 if two harddisk failed what about data A) It depends how u had configured ur RAID its only Raid5 or with with spare if its only raid 5 then in raid5 if ur 2 nos of HDD goes then ur raid is gone.

Q) How Can i Deploy the Latest Patched in Pc through G.P. wihtout having the Admin Right in Pc. A) Create a batch file and place all the patches in the Netlogon, and deploy the batch file through GP to all the pcs so the same should take affect after restarting the pc. Q) In Raid 5,Suppose i have 5 HDD of 10-10 GB, After configuring the Raid how much space do i have for utilise. A) -1 out of the total (eg- if u r using 5 u will get only 4 because 1 goes for parity). Q) How Can i Resolve the Svr name through Nslookup A) what exactly u want to do, nslookup command will let u know through which server u r getting routed, (eg- c:\nslookup then u will get ur domain name to which u r getting routed. and if u want to get the name of the pc/server with the ip address then u have to give the command c:\nbtstat -a ip xx-xx-xx-xx) 7. bart Says:
November 29th, 2006 at 12:27 am

How Can i Deploy the Latest Patched in Pc through G.P. wihtout having the Admin Right in Pc. A) Create a batch file and place all the patches in the Netlogon, and deploy the batch file through GP to all the pcs so the same should take affect after restarting the pc. the answer to the above question is incorrect. you cannot deploy a batch file using group policy. you can only publish or assign msi packages or Zap files. They are the only two valid file formats allowable when using intellimirror. in active directory. 8. Rehamn Shaikh Says:
January 5th, 2007 at 8:35 am

What are FMSO Roles? List them ANS:Fsmo roles are server roles in a Forest There are five types of FSMO roles 1-Scheema master 2-Domain naming master 3-Rid master 4-PDC Emullator 5-Infrastructure master 9. Imran Khan Says:
January 11th, 2007 at 1:13 am

What is Kerberos? Which version is currently used by Windows? How does Kerberos work? 10. vamsi Says:
January 30th, 2007 at 8:25 am

what is the difference between 2k and 2k3? what is the difference between dns and wins? what is sysprep? what is netlogon? 11. akshaya Says:
February 2nd, 2007 at 9:07 am

how many types of server? (2) what is hotfrix. (3)what is the difrences btwen 2k , 2k3 and xp? (4)how many types DNS (5)hOW MANY TYPES NET ADDRES? (1)WHAT IS T-VOLI. (7) WHICH PROTOCOL USED FOR SENDING MESSAGE. (8) TELL ME WHY WE R USEING EXCHANGE SERVER? (9) WHAT IS THE FUNCTION OF DHCP? (10) HOW DHCP CONFIGURE? PLEASE SEND ALL ANS I NEED YOUR HELP . 12. usha Says:
February 18th, 2007 at 2:38 am

what is hotfrix. It is hotfix, which microsoft realese whenever there is a bug or for updation of Operating system. (3)what is the difrences btwen 2k , 2k3 and xp? Xp is a client operating system it cannot act as a server, 2k domain name cannot be renamed, no shadow copying, 2k3 domain name can be renamed, shadow copying is possible (4)how many types DNS I think there are about 7 types (1)WHAT IS T-VOLI. Tivoli is montiroing tool (7) WHICH PROTOCOL USED FOR SENDING MESSAGE. SNMP

(9) WHAT IS THE FUNCTION OF DHCP? for providing ip address dynamically 13. Varadarajam Says:
March 26th, 2007 at 3:48 pm

*** What is the difference between Win2k Server and Win2k3? 1. We cant rename domain in Win2k,u can rename in Win2k3 2. IIS 5.0 in Win2k and IIS 6.0 in Win2k3 3. No Volume Shadow Copying in Win2k, its available in Win2k3 4. Active Directory Federation Systems in Win2k3 Like that some other security features added in Win2k3, main features are above ***WHICH PROTOCOL USED FOR SENDING MAIL? SMTP Simple Mail Transfer Protocal is used to Sending mails. ***TELL ME WHY WE R USEING EXCHANGE SERVER? This is a mail server.. we can use this Server to send mails in Intranet as well as outside. *** What is DHCP? To assign ip addresses automatically. *** DHCP relay agent where to place it? DHCP Relay agent u need to place in Software Router. *** what is forest? Is a collection of trees. Tree is nothing but collection domains which is having same name space. domain contains domain controllers.. forest Tree Domain Dont get confused.. Understand carefully. *** what is GC? how many required for A Tree?

Global Catalog server is a Searchable Index book. With this we can find out any object in the Active Directory. Also it works as logon authentication for Group memberships. We can have each domain controller in domain or only first domain controller in a domain.. *** DNS zones, chronicle records what are they? In Windows 2000 there are mainly 3 zones Standard Primary zone information writes in Txt file Standard Secondary copy of Primary Active Directory Integrated Information stores in Active Directory in win2k3 one more zone is added that is Stub zone Stub is like secondary but it contains only copy of SOA records, copy of NS records, copy of A records for that zone. No copy of MX, SRV records etc., With this Stub zone DNS traffic will be low *** FSMO Roles? Flexible Single Master Operation Roles 1. Domain Naming Master Forest Wide Roles 2. Schema Master Forest Wide Roles 3. RID Master Domain Wide Roles 4. PDC Emulator Domain Wide Roles 5. Infrastructure Master Domain Wide Roles RID Master It assigns RID and SID to the newly created object like Users and computers. If RID master is down (u can create security objects upto RID pools are avialable in DCs) else u cant create any object one its down PDC emulator : It works as a PDC to any NT Bdcs in your environment It works as Time Server (to maintain same time in your network) It works to change the passwords, lockout etc., Infrastructure Master: This works when we are renaming any group member ship object this role takes care.

Domain Naming Master : Adding / Changing / Deleting any Domain in a forest it takes care Schema Master : It maintains structure of the Active Directory in a forest. *** FTP, NNTP, SMTP, KERBEROS, DNS, DHCP, POP3 port numbers? FTP : 20, 21 (20 is for controlling, 21 is Transmitting) NNTP : 119 SMTP : 25 Kerberos : 88 DNS : 53 DHCP : 67, 68 Pop3 : 110 *** What is Kerberos? Which version is currently used by Windows? How does Kerberos work? Kerberos is the user uthentication used in Win2000 and Win2003 Active Directory servers Kerberos version in 5.0 Port is : 88 Its more secure and encrypted than NTLM (NT authentication) 14. Sunit Suri Says:
May 21st, 2007 at 11:03 am

What is the new major feature introduced in Exchange 2003, which was not included in Exchange 2000? How can you recover a deleted mail box ? what is the use of ESUtil.exe ? What are the port Numbers for pop3, imap, smtp port, smtp over ssl, pop3 over ssl, imap over ssl ?

Difference between Exchance 2003 and 2007? what is RPC over Http ? What is required for using RPC over Https with MS Outlook ? If you have deleted the user, after you recreated the same user. How you will give the access of previous mail box ? What are the prequisite for installation of Exchange Server ? What is the use of NNTP with exchange ? If NNTP service get stoped, what features of exchange will be effected ? Which protocol is used for Public Folder ? How will take backup of Active Directory ? What are the content of System State backup ? there r more. ill update soon. 15. Harish P Says:
June 1st, 2007 at 2:42 pm

Describe the lease process of the DHCP server. Ans : A DHCP lease is the amount of time that the DHCP server grants to the DHCP client permission to use a particular IP address. A typical server allows its administrator to set the lease time. 16. Harish P Says:
June 1st, 2007 at 3:43 pm

7. Disaster Recovery Plan? Ans: Deals with the restoration of computer system with all attendent software and connections to full functionality under a variety of damaging or interfering external condtions. 17. shan Says:
June 22nd, 2007 at 9:57 am

Which protocol is used for Public Folder ? ANS: SMTP

What is the use of NNTP with exchange ? ANS: This protocol is used the news group in exchange. 18. shan Says:
June 22nd, 2007 at 10:11 am

How will take backup of Active Directory ? Ans: Take the system state data backup. This will backup the active directory database. Microsoft recomend only Full backup of system state database What are the content of System State backup ? The cotents are Boot fles,system files Active directory (if its done on DC) Sysvol folder(if it done on DC) Cerficate service ( on a CA server) Cluster database ( on a clsture server) registry Performance couter configuration inormation Coponet services class registration database 19. shan Says:
June 22nd, 2007 at 9:41 pm

What are the prequisite for installation of Exchange Server ? The pre requsite are IIS SMTP WWW service NNTP .NET Framework ASP.NET Then run Forestprep The run domainprep 20. Brian Says:
June 25th, 2007 at 9:44 am

bart said, How Can i Deploy the Latest Patched in Pc through G.P. wihtout having the Admin Right in Pc. A) Create a batch file and place all the patches in the Netlogon, and deploy the

batch file through GP to all the pcs so the same should take affect after restarting the pc. the answer to the above question is incorrect. you cannot deploy a batch file using group policy. you can only publish or assign msi packages or Zap files. They are the only two valid file formats allowable when using intellimirror. in active directory. Actually you are incorrect as well. If you create a script and assign it to the STARTUP script in a GPO applied to the COMPUTER and not the USER, then it runs as a local administrator on the computer. 21. Shahnawaz Mulla Says:
September 12th, 2007 at 10:42 pm

Where is active directory stored? 22. Khan Says:


October 1st, 2007 at 12:45 am

What is difference between scope and superscope ? Scope in dhcp, where u can specify a range of IP Address which will be leased to the dhcp clients. Superscope is the combination of multiple scopes. 23. Khan Says:
October 1st, 2007 at 12:58 am

Describe the lease process of the DHCP server. DHCP Server leases the IP addresses to the clients as follows : DORA D (Discover) : DHCP Client sends a broadcast packets to identify the dhcp server, this packet will contain the source MAC. O (Offer) : Once the packet is recieved by the DHCP server, the server will send the packet containing Source IP and Source MAC. R (Request) : Client will now contact the DHCP server directly and request for the IP address. A (Acknowledge) : DHCP server will send an ack packet which contains the IP address. The default lease period is 8 days. 24. Khan Says:
October 1st, 2007 at 1:02 am

What is the new major feature introduced in Exchange 2003, which was not included in Exchange 2000? 1) RPC over HTTPS. 2) Volume Shadow Copy for backup. 3) Super upgrade tools like ExDeploy. 4) Improved security, including all those of IIS v 6.0. Pl let me know if u still find more differnces. 25. Khan Says:
October 1st, 2007 at 1:19 am

What are the port Numbers for pop3, imap, smtp port, smtp over ssl, pop3 over ssl, imap over ssl ? POP3 : 110 Standard IMAP4 : 143 SMTP : 25 pop3 over ssl : 992 imap over ssl : 993 26. Khan Says:
October 1st, 2007 at 1:32 am

What are the prequisite for installation of Exchange Server 2003? * IIS * SMTP services * NNTP services * ASP.NET * www services * .net framework 27. Josh Says:
November 28th, 2007 at 11:10 am

What is a smarthost? A Exchange server is having bandwidth issues, explain how you would look at fixing the issue? 28. Jitendra Singh Thakur Says:
December 8th, 2007 at 10:41 am

What is Blue Screen Error? and when it comes? What is clean Booting?

What is warm and cold booting? Difference between clean Boot and safe mode? 29. Anthony Says:
December 19th, 2007 at 7:06 am

What is warm and cold booting? ans:A warm boot, accomplished by pressing the CTRL+ALT+DEL key combination, restarts the computer through the INT19h ROM BIOS routine. This warm-boot procedure usually does not go through the complete boot process; generally, it skips the power-on self test (POST) to save time. In addition, a warm boot frequently fails to reset all adapters in the computers adapter slots. If you use the Reset button to cold boot the computer, it generally restarts the boot process, including the POST. However, this procedure does not necessarily discontinue power to the motherboard. If the power is not interrupted, the cold boot may fail to reset all adapters in the computers adapter slots. if u want any other clarification let me know 30. MANIRASU.R Says:
January 4th, 2008 at 5:18 am

Differents between server 2k and 2k3 advandags inserver 2k3 1.domain renname. 2.domain controller rename 3.multi user propertis selet 4.administrator deleted and rename 5.IP v6 supported 6.Default APIPA 7.maximum group option disable 8.task manager extra two options. 9.security purpose (shutdow time and restart time ask question) 10.forest trust 11.IIS v6 12.shadow copy 31. Mahmood Says:
January 16th, 2008 at 12:34 pm

About the new features in Exchange 2003: 1.Updated Outlook Web Access. 2.Updated VSAPI (Virus Scanning Application Programming Interface)

but in Exchange Server 2003 Enterprise, there are Specific Features which : 1.Eight-node Clustering using the Windows Clustering service in Windows Server (Ent.&Datacenter) 2.Multiple storage groups. 3.X.400 connectors which supports both TCP/IP and X.25.

1. How do you double-boot a Win 2003 server box? The Boot.ini file is set as read-only, system, and hidden to prevent unwanted editing. To change the Boot.ini timeout and default settings, use the System option in Control Panel from the Advanced tab and select Startup. 2. What do you do if earlier application doesnt run on Windows Server 2003? When an application that ran on an earlier legacy version of Windows cannot be loaded during the setup function or if it later malfunctions, you must run the compatibility mode function. This is accomplished by right-clicking the application or setup program and selecting Properties > Compatibility > selecting the previously supported operating system. 3. If you uninstall Windows Server 2003, which operating systems can you revert to? Win ME, Win 98, 2000, XP. Note, however, that you cannot upgrade from ME and 98 to Windows Server 2003. 4. How do you get to Internet Firewall settings? Start > Control Panel > Network and Internet Connections > Network Connections. 5. What are the Windows Server 2003 keyboard shortcuts? Winkey opens or closes the Start menu. Winkey + BREAK displays the System Properties dialog box. Winkey + TAB moves the focus to the next application in the taskbar. Winkey + SHIFT + TAB moves the focus to the previous application in the taskbar. Winkey + B moves the focus to the notification area. Winkey + D shows the desktop. Winkey + E opens Windows Explorer showing My Computer. Winkey + F opens the Search panel. Winkey + CTRL + F opens the Search panel with Search for Computers module selected. Winkey + F1 opens Help. Winkey + M minimizes all. Winkey + SHIFT+ M undoes minimization. Winkey + R opens Run dialog. Winkey + U opens the Utility Manager. Winkey + L locks the computer. 6. What is Active Directory? Active Directory is a network-based object store and service that locates and manages resources, and makes these resources available to authorized users and groups. An underlying principle of the Active Directory is that everything is considered an objectpeople, servers, workstations, printers, documents, and devices. Each object has certain attributes and its own security access control list (ACL).

7. Where are the Windows NT Primary Domain Controller (PDC) and its Backup Domain Controller (BDC) in Server 2003? The Active Directory replaces them. Now all domain controllers share a multimaster peer-to-peer read and write relationship that hosts copies of the Active Directory. 8. How long does it take for security changes to be replicated among the domain controllers? Security-related modifications are replicated within a site immediately. These changes include account and individual user lockout policies, changes to password policies, changes to computer account passwords, and modifications to the Local Security Authority (LSA). 9. Whats new in Windows Server 2003 regarding the DNS management? When DC promotion occurs with an existing forest, the Active Directory Installation Wizard contacts an existing DC to update the directory and replicate from the DC the required portions of the directory. If the wizard fails to locate a DC, it performs debugging and reports what caused the failure and how to fix the problem. In order to be located on a network, every DC must register in DNS DC locator DNS records. The Active Directory Installation Wizard verifies a proper configuration of the DNS infrastructure. All DNS configuration debugging and reporting activity is done with the Active Directory Installation Wizard. 10. When should you create a forest? Organizations that operate on radically different bases may require separate trees with distinct namespaces. Unique trade or brand names often give rise to separate DNS identities. Organizations merge or are acquired and naming continuity is desired. Organizations form partnerships and joint ventures. While access to common resources is desired, a separately defined tree can enforce more direct administrative and security restrictions. 11. How can you authenticate between forests? Four types of authentication are used across forests: (1) Kerberos and NTLM network logon for remote access to a server in another forest; (2) Kerberos and NTLM interactive logon for physical logon outside the users home forest; (3) Kerberos delegation to N-tier application in another forest; and (4) user principal name (UPN) credentials. 12. What snap-in administrative tools are available for Active Directory? Active Directory Domains and Trusts Manager, Active Directory Sites and Services Manager, Active Directory Users and Group Manager, Active Directory Replication (optional, available from the Resource Kit), Active Directory Schema Manager (optional, available from adminpak) 13. What types of classes exist in Windows Server 2003 Active Directory? o Structural class. The structural class is important to the system administrator in that it is the only type from which new Active Directory objects are created. Structural classes are developed from either the modification of an existing structural type or the use of one or more abstract classes. o Abstract class. Abstract classes are so named because they take the form of templates that actually create other templates (abstracts) and structural and auxiliary classes. Think of abstract classes as frameworks for the defining objects. o Auxiliary class. The auxiliary class is a list of attributes. Rather than apply numerous attributes when creating a structural class, it provides a

streamlined alternative by applying a combination of attributes with a single include action. o 88 class. The 88 class includes object classes defined prior to 1993, when the 1988 X.500 specification was adopted. This type does not use the structural, abstract, and auxiliary definitions, nor is it in common use for the development of objects in Windows Server 2003 environments. 14. How do you delete a lingering object? Windows Server 2003 provides a command called Repadmin that provides the ability to delete lingering objects in the Active Directory. 15. What is Global Catalog? The Global Catalog authenticates network user logons and fields inquiries about objects across a forest or tree. Every domain has at least one GC that is hosted on a domain controller. In Windows 2000, there was typically one GC on every site in order to prevent user logon failures across the network. 16. How is user account security established in Windows Server 2003? When an account is created, it is given a unique access number known as a security identifier (SID). Every group to which the user belongs has an associated SID. The user and related group SIDs together form the user accounts security token, which determines access levels to objects throughout the system and network. SIDs from the security token are mapped to the access control list (ACL) of any object the user attempts to access. 17. If I delete a user and then create a new account with the same username and password, would the SID and permissions stay the same? No. If you delete a user account and attempt to recreate it with the same user name and password, the SID will be different. 18. What do you do with secure sign-ons in an organization with many roaming users? Credential Management feature of Windows Server 2003 provides a consistent single sign-on experience for users. This can be useful for roaming users who move between computer systems. The Credential Management feature provides a secure store of user credentials that includes passwords and X.509 certificates. 19. Anything special you should do when adding a user that has a Mac? "Save password as encrypted clear text" must be selected on User Properties Account Tab Options, since the Macs only store their passwords that way. 20. What remote access options does Windows Server 2003 support? Dial-in, VPN, dial-in with callback. 21. Where are the documents and settings for the roaming profile stored? All the documents and environmental settings for the roaming user are stored locally on the system, and, when the user logs off, all changes to the locally stored profile are copied to the shared server folder. Therefore, the first time a roaming user logs on to a new system the logon process may take some time, depending on how large his profile folder is. 22. Where are the settings for all the users stored on a given machine? \Document and Settings\All Users 23. What languages can you use for log-on scripts? JavaScipt, VBScript, DOS batch files (.com, .bat, or even .exe)

Posted in: Windows |

3 Responses to Windows Server 2003 interview and certification questions


1. Anonymous Says:
December 14th, 2004 at 2:03 pm

How can you authenticate between forests? Windows 2000 always uses NTLM for authentication between forests; 2003 will use kerberos if and only if dns is used while setting up the domains. If the netbios name is uses; NTLM is used for 2003. 2. karthick Says:
November 2nd, 2006 at 8:01 pm

i have win2003server and client xp i have configured roaming folder in ads , now i want how to configure roaming frofile configuration. 3. jagjit singh Says:
July 23rd, 2007 at 6:35 am

1 create shared folder on the server as username.dat 2 Now do as start>program>administrative tools>active directory users and groups >username(any)>properties>under profile menu change the path for that user to newly created folder on server 3 Now login from administrative priveliges at client machine and cange path for that folder 4 We can create mandatory profile of that user by renaming the file Posted in: General, Unix/Linux |

5 Responses to Interview questions for a sysadmin


1. A.I MALIK Says:
January 18th, 2007 at 5:53 am

Q-2 VLAN VLAN stand for Virtual Local Area Netwok. I VLAN We break the Whole Netwok into small Segment Which helps us Controlling Broadcost Domain and Providing Authentication for Different segment by appying ACLs. Also it helps by providing ease of Management the Network. Problems can be identified more easily

2. sankaranarayanan Says:
February 1st, 2007 at 9:05 am

Vlan : Vlan defines logical grouping of computers in a lan.set of ports can be assigned to every logical group. Vlan is used to reduce the broadcast packets. Defines to process of one subset of a switch interface as one broad cast domain. Broadcasts are not forwarded between vlans. and each port can be created as Individual vlan. About Port Information: system connected to port is called access ports switch to switch port is called trunk port. 3. Nitesh Bhat Says:
September 18th, 2007 at 11:50 pm

Here are the steps to configure the NFS server in this scenario: 1. Edit the /etc/exports file to allow NFS mounts of the /home directory with read/write access. /home *(rw,sync) 2. Let NFS read the /etc/exports file for the new entry, and make /home available to the network with the exportfs command. [root@bigboy tmp]# exportfs -a [root@bigboy tmp]# 3. Make sure the required nfs, nfslock, and portmap daemons are both running and configured to start after the next reboot. [root@bigboy tmp]# chkconfig nfslock on [root@bigboy tmp]# chkconfig nfs on [root@bigboy tmp]# chkconfig portmap on [root@bigboy tmp]# service portmap start Starting portmapper: [ OK ] [root@bigboy tmp]# service nfslock start Starting NFS statd: [ OK ] [root@bigboy tmp]# service nfs start Starting NFS services: [ OK ]

Starting NFS quotas: [ OK ] Starting NFS daemon: [ OK ] Starting NFS mountd: [ OK ] [root@bigboy tmp]# After configuring the NIS server, we have to configure its clients, This will be covered next. Configuring The NFS Client You also need to configure the NFS clients to mount their /home directories on the NFS server. These steps archive the /home directory. In a production environment in which the /home directory would be actively used, youd have to force the users to log off, backup the data, restore it to the NFS server, and then follow the steps below. As this is a lab environment, these prerequisites arent necessary. 1. Make sure the required netfs, nfslock, and portmap daemons are running and configured to start after the next reboot. [root@smallfry tmp]# chkconfig nfslock on [root@smallfry tmp]# chkconfig netfs on [root@smallfry tmp]# chkconfig portmap on [root@smallfry tmp]# service portmap start Starting portmapper: [ OK ] [root@smallfry tmp]# service netfs start Mounting other filesystems: [ OK ] [root@smallfry tmp]# service nfslock start Starting NFS statd: [ OK ] [root@smallfry tmp]# 2. Keep a copy of the old /home directory, and create a new directory /home on which youll mount the NFS servers directory. [root@smallfry tmp]# mv /home /home.save [root@smallfry tmp]# mkdir /home [root@smallfry tmp]# ll / drwxr-xr-x 1 root root 11 Nov 16 20:22 home drwxr-xr-x 2 root root 4096 Jan 24 2003 home.save [root@smallfry tmp]#

3. Make sure you can mount bigboys /home directory on the new /home directory you just created. Unmount it once everything looks correct. [root@smallfry tmp]# mount 192.168.1.100:/home /home/ [root@smallfry tmp]# ls /home ftpinstall nisuser quotauser smallfry www [root@smallfry tmp]# umount /home [root@smallfry tmp]# 4. Start configuring autofs automounting. Edit your /etc/auto.master file to refer to file /etc/auto.home for mounting information whenever the /home directory is accessed. After five minutes, autofs unmounts the directory. #/etc/auto.master /home /etc/auto.home timeout 600 5. Edit file /etc/auto.home to do the NFS mount whenever the /home directory is accessed. If the line is too long to view on your screen, you can add a \ character at the end to continue on the next line. #/etc/auto.home * -fstype=nfs,soft,intr,rsize=8192,wsize=8192,nosuid,tcp \ 192.168.1.100:/home:& 6. Start autofs and make sure it starts after the next reboot with the chkconfig command. [root@smallfry tmp]# chkconfig autofs on [root@smallfry tmp]# service autofs restart Stopping automount:[ OK ] Starting automount:[ OK ] [root@smallfry tmp]# After doing this, you wont be able to see the contents of the /home directory on bigboy as user root. This is because by default NFS activates the root squash feature, which disables this user from having privileged access to directories on remote NFS servers. Youll be able to test this later after NIS is configured. Note: This automounter feature doesnt appear to function correctly in my preliminary testing of Fedora Core 3. See Chapter 29, Remote Disk Access with NFS, for details. All newly added Linux users will now be assigned a home directory under the new remote /home directory. This scheme will make the users feel their home directories are local, when in reality they are automatically mounted and accessed over your network.

4. srinivas peddapalli Says:


December 5th, 2007 at 7:24 am

linux interview qns 1.How to disable usb ports in linux system. 2.How to give ftpuser permissions to one newly created user. 3.alredy mail server is there in my network,my mail user tell to my mails r not going to outside n outside mails r not comming.. how to troubleshoot it ..where u have to check???? 4.wt is difference btwn NIS and NIS plus. 5.can u increse runlevls in linux? how many runlevels r there in linux kernel.If u increse runlevels how to increse?? 6.U can install two different linux versions in single system.. with out Vmware? 7.wt is diff btwn scp and tcpdump 8.wt is current package version of FTP??/ 5. cloudflashes Says:
January 22nd, 2008 at 10:04 pm

3.What is the subnet for a class C network? 11111111.11111111.11111111.00000000 (255.255.255.0) 1. What are the required components of Windows Server 2003 for installing Exchange 2003? - ASP.NET, SMTP, NNTP, W3SVC 2. What must be done to an AD forest before Exchange can be deployed? Setup /forestprep 3. What Exchange process is responsible for communication with AD? DSACCESS 4. What 3 types of domain controller does Exchange access? - Normal Domain Controller, Global Catalog, Configuration Domain Controller 5. What connector type would you use to connect to the Internet, and what are the two methods of sending mail over that connector? - SMTP Connector: Forward to smart host or use DNS to route to each address 6. How would you optimise Exchange 2003 memory usage on a Windows Server 2003 server with more than 1Gb of memory? - Add /3Gb switch to boot.ini 7. What would a rise in remote queue length generally indicate? - This means mail is not being sent to other servers. This can be explained by outages or performance issues with the network or remote servers. 8. What would a rise in the Local Delivery queue generally mean? - This indicates a performance issue or outage on the local server. Reasons could be slowness in consulting AD, slowness in handing messages off to local delivery or SMTP delivery. It could also be databases being dismounted or a lack of disk space.

9. What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP and Global Catalog? - SMTP 25, POP3 110, IMAP4 143, RPC 135, LDAP 389, Global Catalog - 3268 10. Name the process names for the following: System Attendant? MAD.EXE, Information Store STORE.EXE, SMTP/POP/IMAP/OWA INETINFO.EXE 11. What is the maximum amount of databases that can be hosted on Exchange 2003 Enterprise? - 20 databases. 4 SGs x 5 DBs. 12. What are the disadvantages of circular logging? - In the event of a corrupt database, data can only be restored to the last backup. Posted in: Networking, Windows |

18 Responses to Windows sysadmin interview questions


1. murali Says:
August 17th, 2006 at 8:46 am

hi how to send messages or get control of other system connected in LAN with the client OS is 2000 pro and server is NT workstation 2. Marcus Says:
September 14th, 2006 at 6:39 am

net send computername or user message 3. Emmanuel Says:


October 8th, 2006 at 9:52 am

1.How windows server will configure?. 2.How many types of server?. 3.What is the server evnverment?. I faced one interview they asked how many types of server in your company, how u configured. Please guide me in this mater Thank you. Rmmanue 4. Emmanuel Says:
October 8th, 2006 at 9:57 am

I faced on interview They asked how many servers u have, how u will configure. we havw 400 system, one mail server. But i need how corporate leve configaration. Please guide me in this mater.

Thank you. Emmanuel 5. Javeed Khan Says:


October 16th, 2006 at 4:28 am

Dear Mr. Emmanuel Tell them that you have 400 pc based network, and you configure a Active Directory domain on windows servers to centralize administration tasks. 1) How windows server will configure? 6. Javeed Khan Says:
October 16th, 2006 at 4:33 am

Dear Mr. Emmanuel Tell them that you have 400 pc based network, and you configure a Active Directory domain on windows servers to centralize administration tasks. 1) How windows server will configure? Its depends on the role of the server. If you installing Active Directory, you have to run DCPROMO on commond prompt, and followed instructions. Over all its depends on the role. Simply you can say there is an option in windows Manage Server once you follow the instructions it will guide you to configure your server. 2) How many types of servers? If they are concern with Hardware server, tell them the hardware configuration and vendor of the server. If they are asking about the types of windows server, tell them Standard, enterprise, or Small business server etc. 7. Guruprasad Says:
November 3rd, 2006 at 1:15 am

start > Run > Cmd > Type net send Computername type ur msg 8. bart Says:
November 29th, 2006 at 12:10 am

Question 2: What must be done to an AD forest before Exchange can be deployed? - Setup /forestprep question 2 is incorrect, in order for ms exchange 2k or 2003 to be sucessfully deployed both forestprep and domain prep must successfuly complete first, before the setup.exe of the actual exchange install, or the install and will error out if attempted. 9. haque Says:
March 31st, 2007 at 12:45 am

.How windows server will configure?. 2.How many types of server?. 3.What is the server evnverment?. I faced one interview they asked how many types of server in your company, how u configured. Please guide me in this mater 10. Mohammed Khaja Mohinuddin Says:
May 3rd, 2007 at 1:29 am

1) How to migrate from windows 2000 to 2003 without distrubing the existing Domain ????????? 2) How to migrage from Ms. Exchange 2000 to 2003 and how to configure Outlook Web Access ???????? 3) What r the ports to required to configure to Exchange Server ???????? 4) What is IIS and how to migrate from IIS 5.0 to IIS 6.0 ??? 11. Mohammed Khaja Mohinuddin Says:
May 3rd, 2007 at 1:34 am

1) What r the frequently asked questions on ADS 2003. and what r the main differences between ADS 2000 and 2003 ???????? 2) What are main differences between WINS and DNS ??? 3) Why we have to go to DNS what r the advantages in DNS ??????? 4) What r the frequently asked questions on DNS ???? 5) What r the frequently asked questions on DHCP ???? 6) What r the frequently asked questions FTP ???? 7) What r the frequently asked questions on DFS ???? 8) What r the frequently asked questions on File Server ?????????? 9) What r the frequently asked questions on Print Server ????????? 12. srinivasan Says:
May 17th, 2007 at 2:44 am

1.In windows2000 perfosonal or winxp pc perfomance is very low what is the solution you will give? 2. what is diffrent between AD2000 & AD2003? 3. what is different between windows2000 & NT & winxp? 13. aman Says:
May 30th, 2007 at 1:56 pm

What r the frequently asked questions on ADS 2003. and what r the main differences between ADS 2000 and 2003 ???????? 2) What are main differences between WINS and DNS ??? 3) Why we have to go to DNS what r the advantages in DNS ??????? 4) What r the frequently asked questions on DNS ???? 5) What r the frequently asked questions on DHCP ???? 6) What r the frequently asked questions FTP ???? 7) What r the frequently asked questions on DFS ???? 8) What r the frequently asked questions on File Server ?????????? 9) What r the frequently asked questions on Print Server ????????? 14. seenu Says:
July 18th, 2007 at 2:06 am

XP 1.Firewall 2.Automatic update 3.Media Player 9 is support to DVD 4.Visual style 5.Remote Desktop 6.On Screen Board 7.Program Capability wizard 8 etc.. 15. riyaz,pune Says:
August 31st, 2007 at 5:58 am

Question asked @ interview what is use of NTLDR file where its location what will you do if error occurentldr missing what would be the poroblem if my mails not outgoing. what are the protocols use by outlook. what are diff between outlook & outlook express.

16. kamron Says:


November 27th, 2007 at 1:52 pm

most of these are terrible questions for a general windows/AD sysadmin. Theyre bookish, not realistic; the kind of thing one looks up if one doesnt use every day. Also, too many of the questions are focused on exchange. For example, we outsource exchange, so a windows sysadmin here wouldnt be asked any of those questions 17. Jitendra Says:
December 8th, 2007 at 10:32 am

What are main differences between WINS and DNS ??? WINS:- It is used to resolve IP address into netbios Viceversa it is used prior version of win 2000 DNS:-It is used to resolve IP address into host name.Viceversa it is used in 2000, XP, 2003 server 18. GhKumar Says:
January 9th, 2008 at 1:48 am

what are diff between outlook & outlook express ???? Outlook Express Outlook Express is the e-mail client that is included with Microsoft Internet Explorer 4.x, Microsoft Internet Explorer 5.x, the Microsoft Windows 98 operating system, the Microsoft Windows Millennium Edition (Me) operating system, the Microsoft Windows 2000 operating systems, and Microsoft Office 98 for the Macintosh. Outlook Express is designed for home users who gain access to their e-mail messages by dialing in to an Internet service provider (ISP). Outlook Outlook is Microsofts premier messaging and collaboration client. It is a standalone application that is integrated into Microsoft Office and Exchange Server. Outlook also provides performance and integration with Internet Explorer 5.5. Complete integration of e-mail, calendaring, and contact management, makes Outlook the perfect client for many business users.
1. What are the ways to configure DNS & Zones? 2. What are the types of backup? Explain each? 3. What are Levels of RAID 0, 1, 5? Which one is better & why? 4. What are FMSO Roles? List them. 5. Describe the lease process of the DHCP server. 6. Disaster Recovery Plan? 7. What is scope & super scope? 8. Differences between Win 2000 Server & Advanced Server? 9. Logical Diagram of Active Directory? What is the difference between child domain & additional domain server? 10. FTP, NNTP, SMTP, KERBEROS, DNS, DHCP, POP3 port numbers?

11. What is Kerberos? Which version is currently used by Windows? How does Kerberos work?

1. 2. 3. 4.

GAL, Routing Group, Stm files, Eseutil & ininteg - what are they used for? What is MIME & MAPI? List the services of Exchange Server 2000? How would you recover Exchange server when the log file is corrupted

1. Group Policies - how to apply and order in which they apply. 2. Global catalog servers - how many is a specific two plus site implementation 3. Describe different zones and a scenario in which you would use them 4. What is the system state? 5. What is a Global Catalog server? 6. What is an OU? 7. What Ms tools (standard) are used to troubleshoot AD issues? What tools from the Support kit and resource kit can aid troubleshooting? What the standard mistakes made when setting up Ms products? 8. What do you have to do to secure a Exchange server from being a relay? 9. When a full backup runs what does it do to the log files? 10. What the basic steps to recovering a Lost Exchange/DC server? 11. How do you build redudancy in to DNS? 12. How can you secure AD DNS?

Das könnte Ihnen auch gefallen