Sie sind auf Seite 1von 42

Q1. What does the physical structure of active directory contain?

Physical structures include domain controllers and sites. Q2.What is nesting? The creation of an OU inside another OU. IMP: - once you go beyond about 12 OUs deep in a nesting structure, you start running into significant performance issues. Q3. What is trust relationship and how many types of trust relationship is there in exchange 2003? Since domains represent security boundaries, special mechanisms called trust relationships allow objects in one domain (called the trusted domain) to access resources in another domain (called the trusting domain). Windows Server 2003 supports six types of trust relationships: Parent and child trusts Tree-root trusts External trusts Shortcut trusts Realm trusts Forest trusts

Q4. What is a site? A Windows Server 2003 site is a group of domain controllers that exist on one or more IP subnets (see Lesson 3 for more on this) and are connected by a fast, reliable network connection. Fast means connections of at least 1Mbps. In other words, a site usually follows the boundaries of a local area network (LAN). If different LANs on the network are connected by a wide area network (WAN), youll likely create one site for each LAN. Q5. What is the use of site? Sites are primarily used to control replication traffic. Domain controllers within a site are pretty much free to replicate changes to the Active Directory database whenever changes are made. Domain controllers in different sites compress the replication traffic and operate based on a defined schedule, both of which are intended to cut down on network traffic. More specifically, sites are used to control the following: Workstation logon traffic Replication traffic Distributed File System (DFS) Distributed File System (DFS) is a server component that provides a unified naming convention for folders and files stored on different servers on a network. DFS lets you create a single logical hierarchy for folders and files that is consistent on a network, regardless of where on the network those items are actually stored. Files represented in the DFS might be stored in multiple locations on the network, so it makes sense that Active Directory should be able to direct users to the closest physical location of the data they need. To this end, DFS uses site information to direct a client to the server that is hosting the requested data within the site. If DFS does not find a copy of

the data within the same site as the client, DFS uses the site information in Active Directory to determine which file server that has DFS shared data is closest to the client. File Replication Service (FRS) Every domain controller has a built-in collection of folders named SYSVOL (for System Volume). The SYSVOL folders provide a default Active Directory location for files that must be replicated throughout a domain. You can use SYSVOL to replicate Group Policy Objects, startup and shutdown scripts, and logon and logoff scripts. A Windows Server 2003 service named File Replication Service (FRS) is responsible for replicating files in the SYSVOL folders between domain controllers. FRS uses site boundaries to govern the replication of items in the SYSVOL folders. Q6. What are the objects a site contains? Sites contain only two types of objects. The first type is the domain controllers contained in the site. The second type of object is the site links configured to connect the site to other sites. Q7.What is a Site link? Within a site, replication happens automatically. For replication to occur between sites, you must establish a link between the sites. There are two components to this link: the actual physical connection between the sites (usually a WAN link) and a site link object. The site link object is created within Active Directory and determines the protocol used for transferring replication traffic (Internet Protocol [IP] or Simple Mail Transfer Protocol [SMTP]). The site link object also governs when replication is scheduled to occur. Q8. Explain Replication in Active directory? Windows Server 2003 uses a replication model called multimaster replication, in which all replicas of the Active Directory database are considered equal masters. You can make changes to the database on any domain controller and the changes will be replicated to other domain controllers in the domain. Domain controllers in the same site replicate on the basis of notification. When changes are made on a domain controller, it notifies its replication partners (the other domain controllers in the site); the partners then request the changes and replication occurs. Because of the high-speed, low-cost connections assumed within a site, replication occurs as needed rather than according to a schedule. You should create additional sites when you need to control how replication traffic occurs over slower WAN links. For example, suppose you have a number of domain controllers on your main LAN and a few domain controllers on a LAN at a branch location. Those two LANs are connected to one another with a slow (256K) WAN link. You would want replication traffic to occur as needed between the domain controllers on each LAN, but you would want to control traffic across the WAN link to prevent it from affecting higher priority network traffic. To address this situation, you would set up two sites one site that contained all the domain controllers on the main LAN and one site that contained all the domain controllers on the remote LAN.

Q9. What is LDAP? LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to look up information from a server.

An LDAP-aware directory service (such as Active Directory) indexes all the attributes of all the objects stored in the directory and publishes them. LDAP-aware clients can query the server in a wide variety of ways. Q10. What is multimaster replication? Active Directory follows the multimaster replication which every replica of the Active Directory partition held on every domain is considered an equal master. Updates can be made to objects on any domain controller, and those updates are then replicated to other domain controllers. Q11.Which two operations master roles should be available when new security principals are being created and named? Domain naming master and the relative ID master Q12. What are different types of groups? Security groups Security groups are used to group domain users into a single administrative unit. Security groups can be assigned permissions and can also be used as e-mail distribution lists. Users placed into a group inherit the permissions assigned to the group for as long as they remain members of that group. Windows itself uses only security groups. Distribution groups these are used for nonsecurity purposes by applications other than Windows. One of the primary uses is within an e-mail As with user accounts, there are both local and domain-level groups. Local groups are stored in a local computers security database and are intended to control resource access on that computer. Domain groups are stored in Active Directory and let you gather users and control resource access in a domain and on domain controllers. Q13. What is a group scope and what are the different types of group scopes? Group scopes determine where in the Active Directory forest a group is accessible and what objects can be placed into the group. Windows Server 2003 includes three group scopes: global, domain local, and universal. Global groups are used to gather users that have similar permissions requirements. Global groups have the following characteristics: 1. Global groups can contain user and computer accounts only from the domain in which the global group is created. 2. When the domain functional level is set to Windows 2000 native or Windows Server 2003 (i.e., the domain contains only Windows 2000 or 2003 servers), global groups can also contain other global groups from the local domain. 3. Global groups can be assigned permissions or be added to local groups in any domain in a forest. Domain local groups exist on domain controllers and are used to control access to resources located on domain controllers in the local domain (for member servers and workstations, you use local groups on those systems instead). Domain local groups share the following characteristics: 1. Domain local groups can contain users and global groups from any domain in a forest no matter what functional level is enabled.

2. When the domain functional level is set to Windows 2000 native or Windows Server 2003, domain local groups can also contain other domain local groups and universal groups. Universal groups are normally used to assign permissions to related resources in multiple domains. Universal groups share the following characteristics: 1. Universal groups are available only when the forest functional level is set to Windows 2000 native or Windows Server 2003. 2. Universal groups exist outside the boundaries of any particular domain and are managed by Global Catalog servers. 3. Universal groups are used to assign permissions to related resources in multiple domains. 4. Universal groups can contain users, global groups, and other universal groups from any domain in a forest. 5. You can grant permissions for a universal group to any resource in any domain. Q14. What are the items that groups of different scopes can contain in mixed and native mode domains?

Q15. What is group nesting? Placing of one group in another is called as group nesting For example, suppose you had junior level administrators in four different geographic locations, as shown in Figure 4-10. You could create a separate group for each location (named something like Dallas Junior Admins). Then, you could create a single group named Junior Admins and make each of the location-based groups a member of the main group. This approach would allow you to set permissions on a single group and have those permissions flow down to the members, yet still be able to subdivide the junior administrators by location.

Q16. How many characters does a group name contain? 64 Q17. Is site part of the Active Directory namespace?

NO: - When a user browses the logical namespace, computers and users are grouped into domains and OUs without reference to sites. However, site names are used in the Domain Name System (DNS) records, so sites must be given valid DNS names. Q18. What is DFS? The Distributed File System is used to build a hierarchical view of multiple file servers and shares on the network. Instead of having to think of a specific machine name for each set of files, the user will only have to remember one name; which will be the 'key' to a list of shares found on multiple servers on the network. Think of it as the home of all file shares with links that point to one or more servers that actually host those shares. DFS has the capability of routing a client to the closest available file server by using Active Directory site metrics. It can also be installed on a cluster for even better performance and reliability. Understanding the DFS Terminology it is important to understand the new concepts that are part of DFS. Below is a definition of each of them. Dfs root: You can think of this as a share that is visible on the network, and in this share you can have additional files and folders. Dfs link: A link is another share somewhere on the network that goes under the root. When a user opens this link they will be redirected to a shared folder. Dfs target (or replica): This can be referred to as either a root or a link. If you have two identical shares, normally stored on different servers, you can group them together as Dfs Targets under the same link. The image below shows the actual folder structure of what the user sees when using DFS and load balancing.

Figure 1: The actual folder structure of DFS and load balancing Windows 2003 offers a revamped version of the Distributed File System found in Windows 2000, which has been improved to better performance and add additional fault tolerance, load balancing and reduced use of network bandwidth. It also comes with a powerful set of command-line scripting tools which can be used to make administrative backup and restoration tasks of the DFS namespaces easier. The client windows operating system consists of a DFS client who provides additional features as well as caching. Q19. What are the types of replication in DFS?

There are two types of replication: * Automatic - which is only available for Domain DFS * Manual - which is available for stand alone, DFS and requires all files to be replicated manually. Q20. Which service is responsible for replicating files in SYSVOL folder? File Replication Service (FRS) Q21. What all can a site topology owner do? The site topology owner is the name given to the administrator (or administrators) that oversee the site Topology. The owner is responsible for making any necessary changes to the site as the physical network grows and changes. The site topology owners responsibilities include: making changes to the site topology based on changes to the physical network topology. tracking subnetting information for the network. This includes IP addresses, subnet masks, and the locations of the subnets. monitoring network connectivity and setting the costs for links between sites. Q22. What are the ports used with Active directory? Port 389 for LDAP querying DC Port 3268 for global Catalog Port 88 for Kerberos

1. How can Active Directory be installed? Ans. Active Directory can be installed in one of two ways: 1. By using the dcpromo.exe command. 2. By using the Configure the Server administrative tool. 2. How can Active Directory Installation be verified?

Ans. Active Directory installation can be Verify by checking for SRV and A records on the DNS server for the new domain controller. 3. In Which mode the Active Directory is installed initially? Ans. Active Directory is initially installed in mixed mode; if you want to change it to native mode, you will have to do it manually. 4. Does the native mode support NT4 Domain Controller? Ans. Once converted to native mode, a domain cannot revert to mixed mode to support NT 4 domain controllers. 5. How can Authoritative Restore be performed? Ans. Authoritative restore can be Perform by booting the computer in Directory Services Repair Mode and running ntdsutil.exe. 6. How can new sites be configured in Active Directory? Ans. New sites are configured through Active Directory Sites and Services. After creating a new site, the following tasks must be completed: 1. Add appropriate IP subnets to the site. 2. Install or move a domain controller or controllers into the site. Although a domain controller is not required for a site, it is strongly recommended. 3. Connect the site to other sites with the appropriate site link. 4. Select a server to control and monitor licensing within the site. 5. All site links are bridged by default. 6. Site link bridges can be explicitly defined if a network is not fully routed. 7. How can Inbound Replication be configured? Ans. Inbound replication can be configured through connection objects. 8. What is KCC and what is its function? Ans. The KCC (Knowledge Consistency Checker) maintains schedules and settings for default site links and bridges. Administrator-configured connection objects require manual configuration and maintenance. 9. When Cost is used? Ans. Cost is used to determine which path to take between sites when multiple links exist. 10. What Information is kept in GC Servers? Ans. Global Catalog (GC) servers maintain a read- only subset of information in the complete Active Directory database. 11. What is the Procedure of Configuring GC Server? Ans. To configure a server as a GC server, use Active Directory Sites and Services. Select the desired domain controller, then right-click on NTDS settings and choose properties. Check the box for Global Catalog. 12. How can Backup of AD System state data be taken? Ans. The AD system state data backup can be taken by using windows 2000 backup utility. 13. When Authoritative restore is used? Ans. Authoritative restore is used when you want your restored settings to overwrite existing AD settings on other domain controllers, such as if an object (OU, user account, and so on) are accidentally deleted from the database.

14. When Non-Authoritative restore is used? Ans. Non-Authoritative restore is use when you are restoring out-of-date information and want the restored data to be overwritten by newer data stored in Active Directory on other domain controllers. For example, you would do this if you were recovering a DC from a failed hard drive and restored the server. 15. What is Kerberos Trust? Ans. All domains in a tree automatically establish two way trust relationships called Kerberos trusts. Trust relationships between Windows 2000 domains and NT 4 domains must be configured manually, just as you would configure a trust relationship between two NT 4 domains. 16. Does the Caching Server store editable copy of database? Ans. Caching servers do not store an editable copy of the zone database. Active directory integrated zones can reside only on domain controllers, not member servers or non-Windows 2000 servers of any kind (NT 4, Unix, and so on). 17. What should be checked if a user gets an error message Domain controller cannot be found while logging in? Ans. If a user who is trying to log on gets an error that a Domain controller cannot be found, check for the presence of SRV records in the DNS database for domain controllers. 18. What is the function of secure dynamic updates? Ans. Secure dynamic updates allow only computers and users who have been given permission to update their records into the DNS database. Secure dynamic update is supported only for Active Directory integrated zones. 19. How DNS Replication is accomplished? Ans. DNS replication is accomplished through Active Directory replication for AD integrated zones and zone transfer for standard zones. 20. Why should a reverse lookup zone be configured? Ans. A reverse lookup zone must be configured in order to perform reverse lookup queries. Installing AD through Configure Your Server does not create a reverse lookup zone in DNS.

1. What are the required components of Windows Server 2003 for installing Exchange 2003? - ASP.NET, SMTP, NNTP, W3SVC 2. What must be done to an AD forest before Exchange can be deployed? - Setup /forestprep 3. What Exchange process is responsible for communication with AD? - DSACCESS

4. What 3 types of domain controller does Exchange access? - Normal Domain Controller, Global Catalog, Configuration Domain Controller 5. What connector type would you use to connect to the Internet, and what are the two methods of sending mail over that connector? - SMTP Connector: Forward to smart host or use DNS to route to each address 6. How would you optimize Exchange 2003 memory usage on a Windows Server 2003 server with more than 1 GB of memory? - Add /3Gb switch to boot.ini 7. What would a rise in remote queue length generally indicate? - This means mail is not being sent to other servers. This can be explained by outages or performance issues with the network or remote servers. 8. What would a rise in the Local Delivery queue generally mean? - This indicates a performance issue or outage on the local server. Reasons could be slowness in consulting AD, slowness in handing messages off to local delivery or SMTP delivery. It could also be databases being dismounted or a lack of disk space. 9. What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP and Global Catalog? - SMTP 25, POP3 110, IMAP4 143, RPC 135, LDAP 389, Global Catalog - 3268 10. Name the process names for the following: System Attendant? MAD.EXE, Information Store STORE.EXE, SMTP/POP/IMAP/OWA INETINFO.EXE 11. What is the maximum amount of databases that can be hosted on Exchange 2003 Enterprise? - 20 databases. 4 SGs x 5 DBs. 12. What are the disadvantages of circular logging? - In the event of a corrupt database, data can only be restored to the last backup. 13. Explain hidden shares. Hidden or administrative shares are share names with a dollar sign ($) appended to their names. Administrative shares are usually created automatically for the root of each drive letter. They do not display in the network browse list. 14. How do the permissions work in Windows 2000? What permissions does folder inherit from the parent? When you combine NTFS permissions based on users and their group memberships, the least restrictive permissions take precedence. However, explicit Deny entries always override Allow entries. 15. Why cant I encrypt a compressed file on Windows 2000? You can either compress it or encrypt it, but not both. 16. If I rename an account, what must I do to make sure the renamed account has the same permissions as the original one? Nothing, its all maintained automatically. 17. Whats the most powerful group on a Windows system? Administrators. 18. What are the accessibility features in Windows 2000? StickyKeys, FilterKeys Narrator, Magnifier, and On-Screen Keyboard. 19. Why cant I get to the Fax Service Management console? You can only see it if a fax had been installed. 20. What do I need to ensure before deploying an application via a Group Policy? Make sure its either an MSI file, or contains a ZAP file for Group Policy. 21. How do you configure mandatory profiles? Rename ntuser.dat to ntuser.man 22. I cant get multiple displays to work in Windows 2000. Multiple displays have to use peripheral connection interface (PCI) or Accelerated Graphics Port (AGP) port devices to work properly with Windows 2000. 23. Whats a maximum number of processors Win2k supports? 2 24. I had some NTFS volumes under my Windows NT installation. What happened to NTFS after Win 2k installation? It got upgraded to NTFS 5. 25. How do you convert a drive from FAT/FAT32 to NTFS from the command line? convert c: /fs:ntfs 26. Explain APIPA. Auto Private IP Addressing (APIPA) takes effect on Windows 2000 Professional computers if no DHCP server can be contacted. APIPA assigns the computer an IP address within the range of 169.254.0.0 through 169.254.255.254 with a subnet mask of 255.255.0.0. 27. How does Internet Connection Sharing work on Windows 2000? Internet Connection Sharing (ICS) uses the DHCP Allocator service to assign dynamic IP addresses to clients on

28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55.

the LAN within the range of 192.168.0.2 through 192.168.0.254. In addition, the DNS Proxy service becomes enabled when you implement ICS. What is Active Directory schema? What are the domain functional levels in Windows Server 2003? What are the forest functional levels in Windows Server 2003? What is global catalog server? How we can raise domain functional & forest functional level in Windows Server 2003? Which is the default protocol used in directory services? What is IPv6? What is the default domain functional level in Windows Server 2003? What are the physical & logical components of ADS In which domain functional level, we can rename domain name? What is multimaster replication? What is a site? Which is the command used to remove active directory from a domain controller? How we can create console, which contain schema? What is trust? What is the file thats responsible for keep all Active Directory database? What is DHCP? How we configure DHCP? What are the ways to configure DNS & Zones? What are the types of backup? Explain each? What are Levels of RAID 0, 1, 5? Which one is better & why? What are FMSO Roles? List them. Describe the lease process of the DHCP server. Disaster Recovery Plan? What is scope & super scope? Differences between Win 2000 Server & Advanced Server? Logical Diagram of Active Directory? What is the difference between child domain & additional domain server? FTP, NNTP, SMTP, KERBEROS, DNS, DHCP, POP3 port numbers? What is Kerberos? Which version is currently used by Windows? How does Kerberos work?

Microsoft Exchange Server interview questions 1. 2. 3. 4. 5. Distribution List? GAL, Routing Group, Stm files, Eseutil & ininteg - what are they used for? What is MIME & MAPI? List the services of Exchange Server 2000? How would you recover Exchange server when the log file is corrupted?

WINDOWS 2000 Name 3 differences between Windows 2000 Standard and Windows 2000 Advanced Server. Windows 2000 Server (formerly Windows NT Server 5.0) will offer industry-leading functionality and will support new systems with up to four-way SMP (symmetrical multiprocessing, the ability to

use more than one microprocessor). Ideal for small to medium-sized enterprise application deployments, Web servers, workgroups and branch offices, this version of Windows 2000 is expected to be the most popular server version. Windows 2000 Advanced Server (formerly Windows NT Server 5.0 Enterprise Edition) will be a more powerful departmental and application server, and will also provide rich networking operating system and Internet services. Supporting new systems with up to eight-way SMP, this new product offering is ideal for database-intensive work and integrates clustering and load balancing support to provide excellent system and application availability. Existing Windows NT Server 4.0 Enterprise Edition servers with up to eight-way SMP can install this SKU, which is expected to be priced below today's Windows NT Server Enterprise Edition product. Windows 2000 Datacenter Server (new) will be the most powerful and functional server operating system ever offered by Microsoft. It supports up to 16-way SMP and up to 64 GB of physical memory. Like Windows 2000 Advanced Server, it provides both clustering and load balancing services as standard features. It is optimized for large data warehouses, econometric analysis, large-scale simulations in science and engineering, OLTP, and server consolidation projects. In reference to Windows 2000 DNS, what are resource records -better known as SRV records? http://www.menandmice.com/online_docs_and_faq/glossary/glossarytoc.htm?srv.record.htm What is the current service pack for Windows 2000? Windows 2000 Service Pack 4 Where would I go in Windows 2000 to find out more information in reference to a service not starting? http://www.techspot.com/tweaks/win2k_services/print.shtml Active Directory Services:Directory services are repositories for information about network-based entities, such as applications, files, printers, and people. Directory services are important because they provide a consistent way to name, describe, locate access, manage, and secure information about these resources. Many vendors build specialized repositories or directory services into their applications to enable the specific functionality their customers require. As such, enterprise class directories take an important step towards the consolidation of corporate directories by offering standardsbased interfaces allowing for interoperability and centralized directory management. What is Active Directory? Active Directory, which is an essential component of the Windows 2000 architecture, presents organizations with a directory service designed for distributed computing environments. Active Directory allows organizations to centrally manage and share information on network resources and users while acting as the central authority for network security. In addition to providing comprehensive directory services to a Windows environment, Active Directory is designed to be a consolidation point for isolating, migrating, centrally managing, and reducing the number of directories that companies require. http://www.microsoft.com/windows2000/technologies/directory/ad/default.mspx What is Active directory Database? http://www.windowsnetworking.com/kbase/WindowsTips/Windows2000/AdminTips/ActiveDirector y/ActiveDirectorydatabasefileNTDS.DIT.html The following list contains the Active Directory support files and their functions: Ntds.dit. This is the main AD database. NTDS stands for NT Directory Services. The DIT stands for Directory Information Tree. The Ntds.dit file on a particular domain controller contains all naming contexts hosted by that domain controller, including the Configuration and Schema naming

contexts. A Global Catalog server stores the partial naming context replicas in the Ntds.dit right along with the full Domain naming context for its domain. Edb.log. This is a transaction log. Any changes made to objects in Active Directory are first saved to a transaction log. During lulls in CPU activity, the database engine commits the transactions into the main Ntds.dit database. This ensures that the database can be recovered in the event of a system crash. Entries that have not been committed to Ntds.dit are kept in memory to improve performance. Transaction log files used by the ESE engine are always 10MB. Edbxxxxx.log. These are auxiliary transaction logs used to store changes if the main Edb.log file gets full before it can be flushed to Ntds.dit. The xxxxx stands for a sequential number in hex. When the Edb.log file fills up, an Edbtemp.log file is opened. The original Edb.log file is renamed to Edb00001.log, and Edbtemp.log is renamed to Edb.log file, and the process starts over again. ESENT uses circular logging. Excess log files are deleted after they have been committed. You may see more than one Edbxxxxx.log file if a busy domain controller has many updates pending. Edb.chk. This is a checkpoint file. It is used by the transaction logging system to mark the point at which updates are transferred from the log files to Ntds.dit. As transactions are committed, the checkpoint moves forward in the Edb.chk file. If the system terminates abnormally, the pointer tells the system how far along a given set of commits had progressed before the termination. Res1.log and Res2.log. These are reserve log files. If the hard drive fills to capacity just as the system is attempting to create an Edbxxxxx.log file, the space reserved by the Res log files is used. The system then puts a dire warning on the screen prompting you to take action to free up disk space quickly before Active Directory gets corrupted. You should never let a volume containing Active Directory files get even close to being full. File fragmentation is a big performance thief, and fragmentation increases exponentially as free space diminishes. Also, you may run into problems as you run out of drive space with online database defragmentation (compaction). This can cause Active Directory to stop working if the indexes cannot be rebuilt. Temp.edb. This is a scratch pad used to store information about in-progress transactions and to hold pages pulled out of Ntds.dit during compaction. Schema.ini. This file is used to initialize the Ntds.dit during the initial promotion of a domain controller. It is not used after that has been accomplished. What is Operation Master Roles.? http://www.windowsnetworking.com/kbase/WindowsTips/Windows2000/AdminTips/ActiveDirector y/Windows2000DomainControllerOperationsMasterRoles.html 5 FSMO roles. http://www.windowsnetworking.com/articles_tutorials/Managing-Active-Directory-FSMORoles.html 2. If I have 2 servers one at Mumbai and one at U.K on which server u will place the Global Catalog? 3. Can Win NT and win 2K work in mixed mode? 4. Which dialer you are using in your company? http://www.databasesystemscorp.com/ 5. Why we get disturbance in IPLC?

6. Broadcast is in which range of IP range? Class A B C D E Leftmost bits Start address Finish address 0xxx 0.0.0.0 127.255.255.255 10xx 128.0.0.0 191.255.255.255 110x 192.0.0.0 223.255.255.255 1110 224.0.0.0 239.255.255.255 1111 240.0.0.0 255.255.255.255

IP Address Class E and Limited Broadcast The IPv4 networking standard defines Class E addresses as reserved, meaning that they should not be used on IP networks. Some research organizations use Class E addresses for experimental purposes. However, nodes that try to use these addresses on the Internet will be unable to communicate properly. A special type of IP address is the limited broadcast address 255.255.255.255. A broadcast involves delivering a message from one sender to many recipients. Senders direct an IP broadcast to 255.255.255.255 to indicate all other nodes on the local network (LAN) should pick up that message. This broadcast is 'limited' in that it does not reach every node on the Internet, only nodes on the LAN. Technically, IP reserves the entire range of addresses from 255.0.0.0 through 255.255.255.255 for broadcast, and this range should not be considered part of the normal Class E range. IP Address Class D and Multicast The IPv4 networking standard defines Class D addresses as reserved for multicast. Multicast is a mechanism for defining groups of nodes and sending IP messages to that group rather than to every node on the LAN (broadcast) or just one other node (unicast). Multicast is mainly used on research networks. As with Class E, Class D addresses should not be used by ordinary nodes on the Internet. 7. How many IP u can give on 1 LAN card? 8. Whats the difference between Router & switch? 9. Can i give the IP starting from 163? In my LAN? If yes then Why? If no Then Why? 10. What is Domain Controller on Active Directory Services? 11. Name atleast 5 services on Active directory Services? 12. What are hidden shares? 13. What is SCHEMA in active directory database? 14. Name the file where database is store in Active directory Services? 15. What is REGEDIT? 16. Port Numbers for the following:1) HTTP

2) DNS 3) POP3 4) SMTP 5) TCP/IP 6) FTP 7) DHCP Exchange 5.5 1. Experience with Exchange 5.5:2. Name at least 5 services on an Exchange 5.5 server. 3. What is the latest Service Pack for Exchange 5.5 server? 4. What files are usually located in the MDBDATA directory on an Exchange 5.5 server? 5. What is the difference between Priv.edb and Pub.edb? 6. Where is the directory information stored in Exchange 2000? 7. How many times do you need to run forest prep in a single Active Directory forest that contains 4 domains? 8. What is the Active Directory Connector (ADC)? 9. What is the Recipient Update Service (RUS)? 10. What are the features of Exchange 2000 and Exchange 5.5? 11. What are the differences between exchange 5.5 and Exchange 2k? 12. What do you understand by an Exchange Server? 13. Describe Mail Flow in an exchange Server. 14. Describe Exchange Structure. Exchange 5.5 1) What are the core services? Explain the order of starting the services. 2) Explain the hierarchy of exchange Admin program 3) What are the two versions of exchange 5.5 and compare them. 4) What is the component of exchange called where mails and public data is stored 5) What is latest SP for Exchange 5.5? 6) What are information store and directory database files and locations? 7) What is custom recipient mailbox? 8) What is the size of transaction log file? 9) Differences between Sequential and circular logging? Where do you enable it? 10) Which service is responsible for server-to-server communication? 11) What is MTA used for?

12) What is GAL? 13) What are different ways of connecting sites? Highlight differences between X.400 and Site Connector. 14) What are different mails clients supported by Exchange 5.5? 15) What is IMC used for? 16) What is an X.400 and X.500 STANDARD? 17) What is IPM message format? Exchange 2000 1) What are the core services for Exchange 2000? 2) Explain the hierarchy of exchange management console program 3) Different versions of Exchange 2000 4) Latest SP for exchange 2000 4) How many storage groups and stores are supported in exchange 2000? 5) What is RUS? Which service is responsible for the RUS? 6) What is recipient polices, email policy and Mailbox manager policy 7) What are DN, RDN UPN and SMTP naming formats? 8) What is System policy? 9) What are the different ways to apply mailbox restriction on certain mailboxes? 10) What is mapi and non-mapi tree? 11) What is edb.chk file used for? 12) What are eseutil /d, eseutil /p eseutil /g used for? 13) What is restore.env file? 14) What is dsacess and bootstrap? 15) What is mailbox enabled and mail enabled user

http://www.hitech-solutions.com/FAQ/faqcomp(1)/ntfaq_05JUN99.html 1) What are different file systems win Windows NT based Systems

Answer: Windows NT Version 3.1, version 3.5, version 3.51 all supported FAT and NTFS partitions, as well as supporting HPFS (High Performance File system), the native file system of IBM's OS/2. Windows NT 4.0 supports FAT and NTFS, but support for HPFS was removed. Windows NT 4.0 was perceived as having one major weakness, and that was lack of support for FAT 32. Support for FAT 32 under Windows NT is possible through the use of third-party drivers 2) Difference between FAT 16, Fat 32 and NTFS file systems Answer: Differences between FAT Systems System Bytes per Cluster within File Allocation Table Cluster limit FAT12 1.5 Fewer than 4087 clusters. FAT16 2 Between 4087 and 65526 clusters, inclusive. FAT32 4 between 65526 and 268,435,456 clusters, inclusive. FAT32 FAT32 is an enhanced version of the FAT file system that can be used on drives from 512 megabytes (MB) to 2 TB in size. The partition size limit is approximately 128GB. FAT and FAT32 offer compatibility with operating systems other than Windows 2000 and Windows XP. FAT32 can be accessed by Win95B (OSR2, OSR2.1), Win95C (OSR2.5), Win98, Win98SE, WinME, Win2K and WinXP. It cannot be accessed by DOS (prior to version 7.0), Windows 3.x and Windows NT 4.0 (without the use of third party utilities). The majority of systems are formatted with FAT32 as the default. NTFS NTFS (New Technologies File System) has all of the basic capabilities of FAT, and it provides the following advantages over the FAT and FAT 32 file systems: File security. Access rights can be assigned to files and directories, allowing users full access, partial access or no access at all to data on your hard disk. Disk compression. File and directory compression can be performed directly without the need for third party utilities, saving space, while allowing for transparent access and operation to the user. Support for large hard disks, with a theoretical limit of 16 ExaBytes, and up to 2 TeraBytes (TB). NTFS supports Unicode, and natively supports long file names. Disk quotas can be assigned, limiting the amount of disk space users can access on a partition. 3) What is a Domain and Workgroup? Highlight advantages and disadvantages. Work groups use Peer to Peer networking. A domain uses a File/Server network. A file Server network requires a dedicated server, a server OS like Windows 2000 Server or Windows 2003. It is more expensive and requires more skill and knowledge to set up, but it is more secure and there is more control over who can do what on the network. A peer to Peer Network is easier to set up, does not require a dedicated server and can be run with any version of Windows. However it is not as secure. You log onto a domain server you need Windows XP Prof or Windows 98. Windows XP Home cannot connect to a domain server but can connect to a domain server as a Workgroup computer in Peer to Peer mode 4) Difference between Winnt4.0 Domain and Win2k ADS domain Model. Answer: 5) What is the NT Boot Process? Or what is the Winnt systems boot sequence Firstly the files required for NT to boot are

Ntldr - This is a hidden, read-only system file that loads the operating system Boot.ini - This is read-only system file, used to build the Boot Loader Operating System Selection menu on Intel x86-based computers Bootsect.dos - This is a hidden file loaded by Ntldr if another operating system is selected Ntdetect.com - This is a hidden, read-only system file used to examine the hardware available and to build a hardware list. Ntbootdd.sys - This file is only used by systems that boot from a SCSI disk. The common Boot sequence files are Ntoskrnl.exe - The Windows NT kernel System - This file is a collection of system configuration settings Device drivers - These are files that support various device drivers Hal.dll - Hardware Abstraction Layer software The boot sequence is as follows 1. Power on self test (POST) routines is run 2. Master Boot Record is loaded into memory, and the program is run 3. The Boot Sector from Active Partition is loaded into Memory 4. Ntldr is loaded and initialized from the boot sector 5. Change the processor from real mode to 32-bit flat memory mode 6. Ntldr starts the appropriate minifile system drivers. Minifile system drivers are built into Ntldr and can read FAT or NTFS 7. Ntldr reads the Boot.ini file 8. Ntldr loads the operating system selected, on of two things happen * If Windows NT is selected, Ntldr runs Ntdetect.com * For other operating system, Ntldr loads and runs Bootsect.dos and passes control to it. The Windows NT process ends here 9. Ntdetect.com scans the computer hardware and sends the list to Ntldr for inclusion in HKEY_LOCAL_MACHINE\HARDWARE 10. Ntldr then loads Ntoskrnl.exe, Hal.dll and the system hive 11. Ntldr scans the System hive and loads the device drivers configured to start at boot time 12. Ntldr passes control to Ntoskrnl.exe, at which point the boot process ends and the load phases begin 6) What is encryption? The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text. There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption. 7) What is VPN? Short for virtual private network, a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. 8) What is DHCP? DHCP (Dynamic Host Configuration Protocol) is a communications protocol that lets network administrators centrally manage and automate the assignment of Internet Protocol (IP) addresses in

an organization's network. Using the Internet Protocol, each machine that can connect to the Internet needs a unique IP address, which is assigned when an Internet connection is created for a specific computer. Without DHCP, the IP address must be entered manually at each computer in an organization and a new IP address must be entered each time a computer moves to a new location on the network. DHCP lets a network administrator supervise and distribute IP addresses from a central point and automatically sends a new IP address when a computer is plugged into a different place in the network. DHCP uses the concept of a "lease" or amount of time that a given IP address will be valid for a computer. The lease time can vary depending on how long a user is likely to require the Internet connection at a particular location. It's especially useful in education and other environments where users change frequently. Using very short leases, DHCP can dynamically reconfigure networks in which there are more computers than there are available IP addresses. The protocol also supports static addresses for computers that need a permanent IP address, such as Web servers. DHCP is an extension of an earlier network IP management protocol, Bootstrap Protocol (BOOTP). DHCP is a more advanced protocol, but both configuration management protocols are commonly used and DHCP can handle BOOTP client requests. Some organizations use both protocols, but understanding how and when to use them in the same organization is important. Some operating systems, including Windows NT/2000, come with DHCP servers. A DHCP or BOOTP client is a program that is located in (and perhaps downloaded to) each computer so that it can be configured. 9. What are the FSMO roles in Windows 2000? A. in Windows 2000 all domain controllers are equal and through a process known as multi-master replication changes are replicated to all domain controllers in the domain. However in keeping with George Orwell's Animal Farm some Domain Controllers are more equal than others. Multi-master replication resolves conflicts however in some situations it is better to stop the conflict before it happens and to this end there are five difference Flexible Single Master of Operations (FSMO) roles (formally known as Floating Single Master of Operations as the roles were originally going to be dynamically changeable) each managing an aspect of the domain/forest. These roles can be moved between domain controllers but not dynamically, they must be manually moved in the same manner as a BDC has to be manually promoted to a PDC. There are two types of roles, some are per domain, and some are per forest. Only a domain controller in the domain can hold a domain specific FSMO role, any domain controller in the forest can hold a forest FSMO role. Domain controllers cannot hold FSMO roles in other domains/forests. These roles are assigned in different GUI ways or using the NTDSUTIL utility 10. What are the 3 naming context in which ADS is divided? Domain Naming Contexts LDAP permits breaking up a directory into separate naming contexts. Managing the interfaces between these naming contexts can get a little tricky, though. To get maximum performance, it is often necessary to generate local caches containing references to objects in other naming contexts. Riding herd on these external reference caches to make sure they reflect the most current information takes some doing. Microsoft chose to avoid many of the complexities involved with naming contexts by eliminating the ability to create ad hoc naming contexts. As an Active Directory administrator, you have only two places where you can create a naming context At a domain boundary By creating a special Application naming context (a new feature in Windows Server 2003)

Active Directory forest showing naming contexts. The Application naming context has only limited utility (it is currently used only to support DNS), so the only real option to break apart a big DIT is to create separate domains. In addition to the Domain naming context, each Active Directory implementation contains two other naming contexts: Configuration and Schema. Every domain controller in the forest gets a replica of these two naming contexts. The Schema replica is read-only except for the domain controller selected as the Schema Operations Master. Schema Naming Contexts The Schema naming context holds ClassSchema and AttributeSchema objects that represent the various classes and attributes in Active Directory. If this sounds like a circular definition, it's meant to be. Unlike some directory services that load the schema in a separate file, the Active Directory schema is completely self-referential. Every domain controller in a forest hosts a read-only copy of the Schema naming context. Only one domain controller, the Schema Role Master, can make changes to the schema. The Schema container object is an instance of the Directory Management Domain (DMD) class. This is a holdover from Exchange, which uses X.500 terminology to define the information store. Because the Schema object represents a naming context boundary, it also contains replication control attributes similar to those in the Configuration object and the Domain-DNS object. If you search through the objects in the Schema container, you'll come across a special object called Aggregate. This lone instance of the LDAP SubSchema class has attributes called AttributeTypes and ObjectClasses that lists the names of all classes and attributes in Active Directory. LDAP clients query for the contents of this object to discover the structure of the directory. This helps them formulate queries. Application Naming Contexts A new feature in Windows Server 2003 is the ability to create additional naming contexts that can be placed on specific domain controllers. Microsoft uses this feature to store DNS resource records for Active Directory Integrated zones. You elect to Active Directory Integrate a zone using the Properties of the zone in the DNS console. The General tab displays the zone type. Click Change to open the Change Zone Type window that lists your options. DNS zone propertiesChange Zone Type window showing Active Directory Integration option. If you elect to integrate a zone into Active Directory, the resource records are copied from the existing text-based zone file into Active Directory as discrete DNSzone objects. In Windows 2000, these objects are stored in a Microsoft DNS container in cn=System, dc=<domain>, dc=<root>. This gave limited flexibility to administrators who wanted to deploy Active Directory Integrated DNS in large, multidomain forests. The application naming contexts added by Windows Server 2003 gives this additional flexibility. 11. When your Active Directory Integrate a zone on a DNS domain controller running Windows Server 2003, the domain controller creates two additional naming contexts: DomainDNSZones. A replica of this naming context is placed on domain controllers running the DNS service. Each domain gets a separate DomainDNSZones NC. ForestDNSZones. A replica of this naming context is placed on domain controllers running DNS throughout the forest.

When you elect to Active Directory Integrate a zone, a new entry called Replication is added to the General tab in the zone Properties window. Click the Change button next to this entry to open the Change Zone Replication Scope window This window gives you the following replication options: All DNS servers in the forest. If you select this option, the zone records are placed in the ForestDNSZones naming context. This is the broadest scope and involves the most replication traffic. All DNS servers in the domain. This option places the resource records in the DomainDNSZones naming context for the domain of the DNS server. For instance, if you create stub zone on a DNS server in Company.com that points at Branch.Company.com, the records in the stub zone would be placed in cn=DomainDNSZones,dc=Company,dc=com. All domain controllers in the domain. This option places the zone records in the Domain naming context under cn=MicrosoftDNS,cn=System,dc=<domain>,dc=<root>. This is the same container used by Windows 2000, so select this option when you have Windows 2000 DNS server hosting Active Directory Integrated zones. All domain controllers specified in the scope of the application directory partition. This option permits you to select a specific application naming context. If you have a single domain, there is nothing to be gained by using the separate naming context to store DNS records. Select the All domain controllers in the domain option. If you have a multidomain forest, use the All DNS servers in the domain option when you want to limit the scope of replication to a particular domain. This is typical for most domain-based zones. All domain controllers in a forest need SRV and CNAME records from the zone representing the forest root domain. Under normal circumstances, DNS servers in the other domains would obtain these records recursively from the DNS servers in the root domain. You can speed this process up a little by setting the replication scope of the root domain to All DNS servers in the forest. If this seems like too many records to replicate globally, you can create a new zone just for the resource records that require forest-wide scope. These records are stored in the forest root zone under _msdcs. For example, if the forest root domain were Company.com, you could create a new zone called _msdcs.company.com. The records would be extracted from the company.com zone and placed in this new zone. Set the replication scope for the _msdcs.company.com zone to All DNS servers in the forest. Configuration Naming Context The Configuration naming context holds information about parameters that control the services that support Active Directory. Every domain controller in a forest hosts a read/write copy of the Configuration naming context. It holds eight top-level containers. Here is a brief description of their purpose and content. Display Specifiers This container holds objects that alter the viewable attributes for other object classes. This is called shadowing. For example, the User-Display object shadows the User class. Display Specifiers provide localization and context menu functions. Localization is the task of producing foreign language versions of an application. Rather than translate the contents of each attribute for each AD object into French, Italian, German, Spanish, Cyrillic, Kanji, Szechwan, Arabic, Korean, Hebrew, Thai, and so on, the system looks to see which country code was used during installation and filters the output through the appropriate Display Specifier. Display Specifiers also define separate context menus, property pages, and icons based on whether or not the user accessing the object has administrator privileges. For example, when you right-click an object, the flyout menu that appears comes from a context menu associated with that object class. The Display Specifier filters the menu to display only those items you are permitted to perform.

Sorting Through Display Specifiers When you view the contents of the DisplaySpecifiers container in Active Directory, you'll see a container with a number. This is the code page for the National Language Group in hex. The United States English code page is number 1033, which corresponds to 409 hex. The code pages for FIGS countries are French, 1036; Italian, 1040; German, 1031; and Spanish, 1034. Extended Rights Directory objects are also Windows security objects. This makes it possible to assign permissions to the object itself as well as any of the properties associated with the object. A User object can have many properties. Selecting precisely which properties to assign access rights to get a particular result can get tedious. Extended Rights control access to objects by consolidating sets of property permissions into a single entity. For example, an extended right called Membership grants the ability to modify the membership of a single group, selected groups, every group in a container, or every group in a container and its subordinate containers. Like the Display Specifiers mentioned previously, each Extended Rights object is associated with a structural object that it controls. For example, the Personal-Information and Public-Information objects are associated with both User and Contact classes. There are over 50 Extended Rights objects covering a wide assortment of management operations, such as changing passwords, changing domain configurations, resetting user lockouts, and managing BackOffice services. Lost and Found Config This container holds objects that get orphaned during database replication. For instance, if a container is deleted during the same replication cycle that an object was created in the container, the object is sent to Lost and Found. Both the Domain and Configuration naming contexts have a Lost and Found container. The Schema naming context does not need one because Schema objects can never be deleted. See Chapter 7, Managing Active Directory Replication, for more information. 12. What is DNS? What are the 6Record in DNS? Domain Name Server (or system) An Internet service that translates domain names into IP addresses. DNS records have a binary or wire-format which is used in queries and responses and a text format which is used in a zone files and is described in this chapter In Active Directory, what are the differences between universal, global, and domain local groups? Note: The following information is intended for registered local support providers (LSPs) at Indiana University. Should you have questions regarding the information in this document, contact LSP Services at lsps@iu.edu. 13. Group scopes allow you to use groups in different ways to assign permissions. The scope of a group determines from where in the network you are able to assign permissions to the group. The three group scopes are domain local, global, and universal. Domain local groups Domain local security groups are most often used to assign permissions for access to resources. You can assign these permissions only in the same domain where you create the domain local group. Members from any domain may be added to a domain local group. The domain local scope can contain user accounts, universal groups, and global groups from any domain. In addition, the scope can both contain and be a member of domain local groups from the same domain.

Global groups Global security groups are most often used to organize users who share similar network access requirements. Members can only be added from the domain in which the global group was created. A global group can be used to assign permissions for access to resources in any domain. The global scope can contain user accounts and global groups from the same domain, and can be a member of universal and domain local groups in any domain. Note: Groups created in the Active Directory at Indiana University should be global groups. Since there is a single ADS domain at IU, this is the most appropriate group to use. Universal groups Universal security groups are most often used to assign permissions to related resources in multiple domains. Members from any domain may be added. Also, you can use a universal group to assign permissions for access to resources in any domain. Universal security groups are not available in mixed mode. The full feature set of Windows 2000 and later Microsoft NT-based operating systems is only available in native mode. The universal scope can contain user accounts, universal groups, and global groups from any domain. The scope can be a member of domain local or universal groups in any domain. Note: Though it is possible to create universal groups in the Active Directory at IU, it is unnecessary since the ADS at IU is a single domain. Global groups are preferable because they utilize fewer resources. 14. What is Sysvol used for? Sysvol is typically used to house scripts and group policies, which are stored on each DC on an NT file system (NTFS) partition and replicated to all Dc in the same domain using FRS replication mechanism. 15. What are net bios and FQDN name resolution methods? WINS (Windows Internet Name Service) servers are used to dynamically map a unique NetBIOS name to the appropriate IP address, maintaining a flat database of these entries. If a WINS server is not available, a static file (LMHOSTS) can be created to manually create the resolution database. If neither of the previous options provide proper mapping, then Windows-based machines are capable of resolving NetBIOS through broadcasts across their local network segment. Once a system resolves a NetBIOS name, it stores this information in its NetBIOS name cache, for faster resolution for future requests. Microsoft's more recent offerings, those of the Windows 2000 and Windows XP families, utilize host names as part of a FQDN (Fully-Qualified Domain Name) to resolve IP addresses. The FQDN consists of a host name, followed by domain identification. Youve most likely observed these names using Internet URLs (i.e. <www.microsoft.com>), where www identifies a computer on the microsoft.com domain. In Windows 2000/XP, the host name is the same as the computer name. On older operating systems, the host name can be entered during TCP/IP configuration but it is recommended that the host name match the computer name, to reduce confusion 16. What is MAC address and IP address? The MAC address is a unique value associated with a network adapter. MAC addresses are also known as hardware addresses or physical addresses. They uniquely identify an adapter on a LAN. MAC addresses are 12-digit hexadecimal numbers (48 bits in length). By convention, MAC addresses are usually written in one of the following two formats: MM:MM:MM:SS:SS:SS MM-MM-MM-SS-SS-SS

The first half of a MAC address contains the ID number of the adapter manufacturer. These IDs are regulated by an Internet standards body (see sidebar). The second half of a MAC address represents the serial number assigned to the adapter by the manufacturer. In the example, 00:A0:C9:14:C8:29 The prefix 00A0C9 Indicates the manufacturer is Intel Corporation. IP Address 32-bit address assigned to hosts using TCP/IP. An IP address belongs to one of five classes (A, B, C, D, or E) and is written as 4 octets separated by periods (dotted decimal format). Each address consists of a network number, an optional subnetwork number, and a host number. The network and subnetwork numbers together are used for routing, and the host number is used to address an individual host within the network or subnetwork. A subnet mask is used to extract network and subnetwork information from the IP address. CIDR provides a new way of representing IP addresses and subnet masks. Also called an Internet address. 17. Explain the zone types in DNS of W2K When configuring your DNS server, you must be familiar with the following Concepts: 1. Forward lookup zone - A forward lookup zone is simply a way to resolve host names to IP addresses. 2. Reverse lookup zone - A reverse lookup zone allows a DNS server to discover the DNS name of the host. Basically, it is the exact opposite of a forward lookup zone. A reverse lookup zone is not required, but it is easy to configure and will allow for your Windows 2000 Server to have full DNS functionality. 3. Zone types: A. Active Directory (AD) Integrated - AD Integrated stores the database information in AD and allows for secure updates to the database file. This option will appear only if AD is configured. If it is configured and you select this option, AD will store and replicate your zone files. B. Standard Primary - A Standard Primary zone stores the database in a text file. This text file can be shared with other DNS servers that store their information in a text file. C. Standard Secondary. - A Standard Secondary zone simply creates a copy of the existing database from another DNS server. 18. What are the core services for Exchange 2000? IIS, NNTP, and SMTP services are the core service of exchange 2000 19. Explain the hierarchy of exchange management console program The root of an Exchange environment is an organization. It's the starting point for the Exchange hierarchy. The boundaries of the Exchange organization define the boundaries of your Exchange environment. Under the organization node you'll find the key components that make up the organization. These components include: Global Settings Recipients Administrative groups (which can contain Servers, Tools, and Folders) Routing groups 20. Latest SP for exchange 2000 Exchange 2000 Server post-Service Pack 3 update rollup 21. How many storage groups and stores are supported in exchange 2000 The recommendation for database capacity planning on non-clustered Exchange 2000 Servers is a maximum of four storage groups that contain a maximum of five databases for each storage group. This results in a maximum of 20 databases for each Exchange 2000 server.

22. What is RUS? Which service is responsible for the RUS? The Recipient Update Service The Recipient Update Service (RUS) is a very important component in your Exchange installation, it is RUS that is responsible for updating address lists and email addresses in your Active Directory. 23. What is mailbox enabled and mail enabled user Mailbox enabled user - Standard email account in Exchange 2003. A regular Active Directory user with a full MAPI mailbox. (90% of all email accounts are this type.) Mail-enabled user - Tricky one. An Active Directory account with an email address, but no mailbox in your Exchange Organization. I call this the contractor object. Their email is delivered, not to your exchange mailstore, but to their external account, e.g. hotmail or gmail. 24. What is MTA used for? Components of Exchange When you look at Exchange and study its components, you find they number only four. 1. The first is an information store or message store. The store holds individual user messages and has an access control list (ACL) engine associated with them. Similar to RFC-compliant IMAP servers, namespace differs according to whether the stores belong to individual users or whether the folders are public. Microsoft uses an Access database for storing message stores. The limitation of Microsoft's Jet Engine technology and the Access MDB file prevents vertical scalability. 2. Secondly, Exchange has a directory. Microsoft structured their Exchange directory with object classes and attributes. The Exchange directory structure resembles the RFC-compliant LDAP protocol. However, Microsoft added Object Classes and changed the attribute names within those and other classes. 3. Next, Exchange has a mail transfer agent or MTA. Microsoft's MTA appears similar to the MTA used in an earlier product called Microsoft Mail 3.5. The Microsoft Mail MTA requires connectors or gateways, which rewrite their proprietary mail headers to those that comply with foreign systems, such as Lotus Notes, X-400 and RFC 822 internet mail standards. Unlike sendmail and similar internet MTAs, Exchange's MTA lacks configuration options. 4. Finally, Exchange has a component called a system attendant. The attendant handles every action taken within Exchange, from sending and receiving e-mail to filling requests for addresses from the Exchange directory. In many ways the system attendant resembles an attempt to provide interprocess communication (IPC), which Microsoft's operating systems lack 25. What is port for GC? 3268 port number for GC uses LDAP

Windows 2000 1. Name 3 differences between Windows 2000 Standard and Windows 2000 Advanced Server. 2. In reference to Windows 2000 DNS, what are resource records -better known as SRV records?

3. What is the current service pack for Windows 2000? Service Pack 4 4. Where would I go in Windows 2000 to find out more information in reference to a service not starting? 5. Active Directory Services: - What is Active Directory? What is Active directory Database? 6. What is Operation Master Roles.? 5 FSMO roles. 7. If I have 2 servers one at Mumbai & one at U.K on which server u will place the Global Catalog? 8. Can Win NT & win 2K work in mixed mode? Yes 9. Which dialer you are using in your company? 10. Why we get disturbance in IPLC? An IPLC (international private leased circuit) is a point-to-point private line used by an organization to communicate between offices that are geographically dispersed throughout the world. An IPLC can be used for Internet access, business data exchange, video conferencing, and any other form of telecommunication. 11. Broadcast is in which range of IP range? 12. How many IP u can give on 1 LAN card? 13. Whats the difference between Router & Switch? 14. Can I give the IP starting from 163 in my LAN? If yes then Why? If no Then Why? 15. What is Domain Controller on Active Directory Services? 16. Name at least 5 services on Active directory Services? 17. What are hidden shares? 18. What is SCHEMA in active directory database? Schema is a set of Rules of Classes of Objects and their attributes that are stored in Active Directory. 19. Name the file where database is store in Active directory Services? NTDS.DAT 20. What is REGEDIT? http://support.microsoft.com/default.aspx?scid=kb;en-us;141377 Regedit.exe is included with Windows NT 4.0 and Windows 2000 primarily for its search capability. You can use Regedit.exe to make changes in the Windows NT 4.0 and Windows 2000 registry, but you cannot use it to view or edit all functions or data types on Windows NT 4.0 and Windows 2000. 21. Port Numbers for the following:HTTP DNS POP3 SMTP

TCP/IP FTP DHCP 22. What are the core services for Exchange 2000? 23. Explain the hierarchy of exchange management console program 24. Different versions of Exchange 2000 25. Latest SP for exchange 2000 26. How many storage groups and stores are supported in exchange 2000? 27. What is RUS? Which service is responsible for the RUS? 28. What is recipient polices, email policy and Mailbox manager policy 29. what are DN, RDN UPN and SMTP naming formats? 30. What is System policy? 31. What are the different ways to apply mailbox restriction on certain mailboxes? 32. What is mapi and non-mapi tree? 33. What is edb.chk file used for? 34. What are eseutil /d, eseutil /p eseutil /g used for? 35. What is restore.env file? 36. What is dsacess and bootstrap? 37. What is mailbox enabled and mail enabled user Exchange 5.5 1. Name at least 5 services on an Exchange 5.5 server. 2. What is the latest Service Pack for Exchange 5.5 server? 3. What files are usually located in the MDBDATA directory on an Exchange 5.5 server? 4. what is the difference between Priv.edb and Pub.edb? 5. Where is the directory information stored in Exchange 2000? 6. How many times do you need to run forest prep in a single Active Directory forest that contains 4 domains? 7. What is the Active Directory Connector (ADC)? 8. What is the Recipient Update Service (RUS)? 9. What are the features of Exchange 2000 and Exchange 5.5? 10. What are the differences between exchange 5.5 and Exchange 2k? 11. What do you understand by an Exchange Server? 12. Describe Mail Flow in an exchange Server. 13. Describe Exchange Structure. 14. What are the core services? Explain the order of starting the services. 15. Explain the hierarchy of exchange Admin program 16. What are the two versions of exchange 5.5 and compare them. 17. What is the component of exchange called where mails and public data is stored

18. What is latest SP for Exchange 5.5? 19. What are information store and directory database files and locations? 20. What is custom recipient mailbox? 21. What is the size of transaction log file? 22. Differences between Sequential and circular logging? Where do you enable it? 23. Which service is responsible for server-to-server communication? 24. What is MTA used for? 25. What is GAL? 26. What are different ways of connecting sites? Highlight differences between X.400 and Site Connector. 27. What are different mails clients supported by Exchange 5.5? 28. What is IMC used for? 29. What is an X.400 and X.500 standard? 30. What is IPM message format?

Definitions 1. What is a GC? A GC is a Global Catalog Server. A GC holds a full set of attributes for the domain in which it resides and a subset of attributes for all objects in the Active Directory Forest.

2. What is DDNS and why do I need it? Dynamic DNS (described in RFC 2136) allows servers to dynamically update and create records in DNS. Dynamic DNS is used by the Exchange server to create server records and other entries used by the Exchange Servers for things like message routing. In a simple Exchange organization, DDNS is not strictly necessary, but makes administration much easier. 3. What is a border server? A border server is an Exchange server that communicates with external servers. In a single server organization, your server is by default a border server. In a multi-server configuration, you may have one or more dedicated servers that communicate directly or indirectly with foreign servers and then pass the mail to other internal Exchange servers. 4. What is a mixed mode Exchange environment? An Exchange environment, which contains Exchange 2003 or Exchange 2000 and Exchange 5.5 servers. 5. What is forestprep? Forestprep extends the AD schema to include Exchange specific information. Additional information can be found on the Microsoft Exchange Server Site. 6. What is domainprep? Domainprep creates the groups and permissions necessary for Exchange servers to read and modify user attributes. Additional information can be found on the Microsoft Exchange Server Site. 7. What is a DC? A DC is a Windows 2000 Domain Controller that holds active directory for a domain (used for things like user authentication). 8. How does an Exchange 5.5 site compare to an Exchange 2000 Routing Group or Administrative Group? In a mixed mode Exchange environment the Exchange 2000 Administrative Group and Routing Group correspond to the Exchange 5.5 site. In a native Exchange 2000 environment, the Administrative Group is a group of Exchange objects sharing a common set of permissions and routing groups define how those servers communicate with one another. A single Administrative Group can contain several Routing Groups. Example: Your North American Exchange servers might be grouped in a single Administrative Group, but subdivided into several Routing Groups to optimize interserver communication. An Administrative Group contains zero or more Routing Groups. Installation 1. Whats changed in Exchange 2000 compared to previous versions of Exchange? Lots of things have changed with Exchange 2000. Microsoft has written quite a bit about the new features which can be found on the Microsoft Exchange 2000 - Server Features Overview Site. The following are a few articles from this site: Enhanced Platform for Messaging and Collaboration Microsoft Web Storage System Collaboration and Applications Anytime, Anywhere Communication Microsoft Exchange 2000 Server Datasheet. Some highlights include: SMTP is now the primary method for intra-server communication in a pure Exchange 2000 environment. Integration with Active Directory. Support for multiple information stores. Enhanced Outlook Web Access

2. What do I need in order to install Exchange 2000? A partial list includes: DNS (preferably DDNS) Active Directory Permissions to update the Schema Hardware sufficient to run Exchange 2000 Windows 2000 SP1 applied to all DCs, GC, and all (future) E2K servers. 3. I'm running Exchange 4.0 and would like to upgrade to Exchange 2000. Can I upgrade directly? No. The only supported upgrade path is from Exchange 5.5 SP3 or later. You would need to first upgrade your Exchange 4.0 server to at least Exchange 5.5 SP3 and then upgrade to Exchange 2000. Another option is to exmerge out your current users and exmerge them into an Exchange 2000 server. 4. Can I install Exchange 2000 on Windows NT 4.0 or without using Active Directory? No 5. Can I rename or move the default groups created by Exchange during domainprep and forestprep? Only if you want to horribly break your Exchange installation. 6. How do I configure a Front End/ Back End topology? There is an excellent white paper on the subject available from Microsoft "Exchange 2000 Front-end and Back-end Topology". 7. What are the minimum hardware requirements for Exchange 2000? The minimum practical hardware requirements in our experience are 1.25 times the disk space one would allocate under Exchange 5.5, 256MB RAM (512MB minimum if the Exchange server also serves any other function) and the fastest processor(s) you can afford. 8. Am I better off with one really fast processor or two somewhat slower processors? You're better off with two really fast processors. But, with all other things being equal, two processors are better than one with Exchange 2000. In most instances, a 2-processor machine would be preferable. 9. Can I have multiple Exchange 2000 organizations in a single forest? No. Only a single E2K organization can exist within a single forest. Delegation of administration within the organization can be accomplished using OUs in AD and Administrative/ Routing Groups in the Exchange system manager. 10. Can an Exchange 2000 organization span multiple forests? No. All domains in a forest share a common schema and the Exchange organization exists within this configuration-naming context. The GC, which provides the Global Address List is populated only with items within the forest. 11. How can I merge multiple directories to create a unified Exchange organization? Microsoft's Meta-Directory Services (MMS) Compaq's LDAP Directory Synchronization Utility CPS Systems' SimpleSync ADSI (code, code code) 12. Can I upgrade from the evaluation edition of Exchange 2000 Enterprise Server to the RTM standard version of Exchange 2000 Server? No this is technically a downgrade from enterprise to standard. You can only upgrade the evaluation version of Exchange 2000 Enterprise to Exchange 2000 Enterprise RTM.

13. How can you tell how many days remain until the evaluation copy of Exchange 2000 Server expires? The Exchange Server Setup Progress Log includes the date on which the Exchange server was installed. Take the difference between that date and today's date and subtract it from 120 to determine how many days remain in your evaluation. 14. My evaluation version has expired! Are my databases toast? No. Install a full version of Exchange 2000 Enterprise and you can continue to use your existing databases. 15. I plan to run Exchange in a hosted environment, where can I find information on how to configure my Exchange server to host multiple companies? Microsoft Service Providers 16. What ports does Exchange use? A partial list of the ports your Exchange server might use is included below. If you're asking this question because you'd like to configure your firewall to allow users to connect using Outlook from the internet, we HIGHLY recommend you consider using VPN instead. (Do you really want to expose your GC to the possibility of attack from a 16 year old script kiddie?) 25 SMTP 53 DNS 80 HTTP 88 Kerberos 102 X.400 110 POP3 119 NNTP 135 RPC 137 - NetBIOS Session Service 139 - NetBIOS Name Service 143 IMAP4 379 LDAP (SRS) 389 LDAP 443 HTTP (SSL) 445 - NetBIOS over TCP 465 SMTP (SSL) 563 NNTP (SSL) 636 LDAP (SSL) 691 LSA 993 IMAP4 (SSL) 994 IRC (SSL) 995 POP3 (SSL) 1503 T.120 1720 H.323 1731 Audio conferencing 1863 - MSN IM 3268 GC 3269 GC (SSL) 6667 IRC/IRCX 689 - 6900 - MSN IM File transfer 6901 - MSN IM Voice 7801 - 7825 - MSN IM Voice Additional information on Exchange ports and connecting through a firewall is included below. Remember, VPN is your friend.

17. How do I add additional SMTP domains? Setting Up SMTP Domains for Inbound and Relay E-Mail in Exchange 2000 Server - Q260973 How to Receive Messages for Two SMTP Domains Using Exchange 2000 - Q289833 18. How do I uninstall Exchange 2000? MS Knowledge Base Articles: Q260378 Q273478 Q264309 19. Exchange Group Policy Notes, what should I do? A: Do Not delete the Default Domain Policy or Default Domain Controller Policy in your Active Directory. The Exchange domain prep operation targets a policy with GUID 6AC1786C-016F-11D2-945F00C04fB984F9 for its operations. If it doesn't find it, domain prep will fail.

20. Can I use Exchange 2000's OWA to access a mailbox on an Exchange 5.5 server? No. The enhanced OWA is built directly into the store technology and only a mailbox residing on an Exchange 2000 server can be accessed using the enhanced OWA interface. Nice try, though. 21. Can I use Exchange 5.5's OWA to access a mailbox on an Exchange 2000 server? Yes. 22. How do I remove the ADC after moving all of my users to an Exchange 2000 server? First, you need to use the Exchange 5.5 Admin program to delete the directory replication connectors (Org | Site | Configuration | Connections). Once you have deleted the connections, you need to be logged on with an account with Schema Admin privileges to delete the ADC connector. 23. How many Global Catalog servers should I deploy? There is no hard and fast rule in this regard. Some potential guidelines include: 1. At least 1 per routing group 2. One for every 4 Exchange servers in a routing group 3. One (or more) for each physical location 24. How do I stop users from going to booked marked /LOGON.ASP page after conversion to 2000 OWA? After converting from Exchange 5.5 OWA to 2000 OWA, all the users had book marked the URL of mail.company.com/exchange/logon.asp, since in 5.5 OWA it automatically would pull the user from the root URL into a logon page (since it used ASP) but now the user only sees the same base URL of mail.company.com/exchange. So once the users used the book mark or in some cases the "autocomplete" feature in IE they would be pulled to a dead address. But... since you can't really edit the M:\ drive the /EXCHANGE points to you couldn't build a ASP page to do a response.redirect in ASP. Go into the front-end server that is hosting your OWA. Start up IIS admin and locate the /Exchange virtual directory Right click on the /Exchange directory and using the "wizard" create a new virtual directory called logon.asp. When it prompts where the content is located just put something like c:\inetpub\wwwroot Once the virtual root has been created, right click it, select properties then select the tab labeled "Virtual Directory" Select the "A redirection to a URL" and then in the "Redirect to" URL enter /exchange/ What happens is when the user hits the virtual root of /exchange/logon.asp it pulls the user back to only /exchange 25. What is TCP/IP port for GC.

3268 port number for GC Administration & Maintenance 1. How can I prevent a user from sending and receiving Internet mail? Follow the steps outlined below: 1. Create a group called Internal Only. 2. Create a recipient policy that gives them a fake SMTP address. I.e. @fake.domain. Leave the X400 address alone so they can receive internal mail. 3. Drill down through Routing Groups > Group Name > Connectors > SMTP internet connector(s), choose its properties. Choose the Delivery Restrictions tab, and under "reject", add this group. Do this for each connector. 4. Follow the steps in KB277872, regarding Connector Restrictions. [Now they can't use the SMTP connector(s) to send external mail] 2. I created a user in AD Users and Computers, but in the Exchange system manager it doesn't appear under Mailbox Store | Mailboxes. What did I do wrong? Probably nothing. A mailbox will not appear under Mailbox Store | Mailboxes until either someone has logged into the mailbox or the mailbox has received a mail message. Some administrators send a welcome message to a mailbox shortly after it has been created, which would cause it to appear. 3. Is Single Instance Storage maintained when moving users between servers | storage groups | databases? Yes 4. In my native E2K organization is there any requirement for RPC connectivity between servers? In order to move users between servers, RPC connectivity is required. 5. How can I archive messages sent or received by my users? 1. Messages can be archived on a per store basis by enabling the option on the general properties tab of the Mailbox Store in the Exchange System Manager. 2. Use an event sink (either write your own or use the simple one provided by Microsoft and described in "XGEN: How to Install and Use the Exchange Server Archive Sink" - Q254767 3. Use a 3rd party message archival tool. 6. Why when I try to add an additional mailbox store do I receive the following error? This storage group already contains the maximum number of stores allowed. ID no: c1034a7a You are running the standard version of Exchange 2000 which is limited to a single 16GB private information store. 7. Is there any way to append a text message to all out bound email for Exchange 2000? Since there is no longer an IMC/IMS in Exchange 2000, the IMCEXT.DLL no longer applies. To prepend or append text to email messages you will need to write an Event Sink. Basic documentation can be found in the Exchange SDK or on MSDN. 8. I created a secondary Public Folder Hierarchy, but only the original public folder hierarchy appears in Outlook. Current versions of Outlook only support a single public folder hierarchy. Secondary Public Folder hierarchies can be accessed with the web. 9. What is the difference between 'receive as' and 'send as' ? 'Receive as' allows a user object to open a mailbox. 'Send as' allows a user to send out a mail message as the mailbox that has been opened. 10. How do I restrict a user or domain from sending mail to my users ?

First, add the address or domain you wish to filter to the Filtering Tab of the Message Delivery Global Settings. Next, you need to apply the filter to the SMTP virtual server you wish to filter. (Administrative Group | Server | Protocols | SMTP | <SMTP Virtual Server> | Properties | Advanced | <select the IP address for which you wish to enable filtering> | Edit | Apply Filter). Normally, you would only want to apply message filtering to the border SMTP servers (servers that communicate directly with External servers). 11. I've created more than one address list. Which list will users see for their GAL? The following criteria are used when determining what a client will see for the Global Address List. Which Address List do you have permissions to see? Which Address List contains your mailbox object as an entry? If your mailbox appears as an object in more than one address list: Which of the remaining Address Lists contains more entries? 12. How do I control the format of the addresses before the @ sign in a recipient policy? You can use the following variables: %g Given Name, %s Surname, %i initials in the recipient policy. Examples: User: Tommy Lee Jones Domain: company.com %g.%s@company.com = Tommy.Jones@company.com %1g%s@company.com = TJones@company.com %g%2s@comapny.com = TommyJo@company.com Less commonly used variables include, %m (alias) and %d (display name). 13. How do I make Exchange automatically send a welcome message to all newly created users? There is nothing in the product that will do this. You can create a WELCOME.MSG that you deploy with Outlook, but that only applies the first time Outlook is opened after creating a new profile. Otherwise, you could script mailbox creation and send a message at the end of the script. 14. How do I determine what version of Outlook applies to a build or version number? http://www.cdolive.com/build.htm 15. How do I add a disclaimer to outgoing SMTP messages in Visual Basic/Visual Basic Script? You can do it, however, see there are limitations. It reliably works only on a border server, which can be either a Windows 2000 or 2003 SMTP Server with or without Exchange 2000/2003 installed. For more information, see KB317327 and KB317680 16. How can you tell the exact version of Exchange you are running? Here is a list of build numbers for Exchange 2000/2003: Exchange 2000 4417.5 = Exchange 2000 RTM 4712.7 = Exchange 2000 SP1 5762.4 = Exchange 2000 SP2 6249.4 = Exchange 2000 SP3 6396.1 = Exchange 2000 Post-SP3 Super Roll-up 63xx/64xx = Exchange 2000 Post-SP3 Hotfixes Exchange 2003 6728.12 = Exchange 2003 Beta 1 6803.8 = Exchange 2003 Beta 2 6851.10 = Exchange 2003 Release Candidate 0 6895.5 = Exchange 2003 Release Candidate 1 (Candidate) 17. How do I add a disclaimer to outgoing SMTP messages in Visual Basic?

How To: Add a Disclaimer to Outgoing SMTP Messages in Visual Basic KB317327 18. Resource / Conference room scheduling Outlook 2003 offers basic resource booking functionality through Direct Booking. For more information refer to Direct Booking of Resource Without a Delegate Account There are 3rd party products such as Exchange Resource Manager and AutoAccept Sink for Exchange that will automatically accept/decline meeting requests for conference rooms and other resources. 19. Why do the storage quota settings not take effect immediately? This problem has been fixed in AN Microsoft Exchange 2000 Server Post-Service Pack 3 MDB patch. For more information see KB327378 20. How do I limit which Outlook client versions can access my server? You need to create the Disable MAPI Clients registry value to disable MAPI client access. For more information, see KB288894 21. How do I limit the maximum amount of messages the SMTP queue can hold? You have to use the MaxMessageObjects registry key. For more information, see KB258748 22. How do I strip the attachment from an NDR? You can do this through a registry entry. But there are two drawbacks. Once this is done, the details that are necessary to display the notification in the preview pane are stripped, and the originator of the message cannot use the Send Again option. For more information, see KB308303 23. How do I disable OWA for a single user in Exchange 2000/2003? In Active Directory Users and Computers (Advanced Features view) open the properties for the user object and choose Exchange Advanced | Protocol Settings | HTTP | Settings | and uncheck the 'Enable for mailbox' check box. 24. How do I make OWA work properly with Extended Characters? Beginning in Exchange 2000, messages with extended characters are encoded with UTF-8, by default. For more information see KB273615 and KB281745 25. Under Exchange 5.5 I couldn't restore a single mailbox without 3rd party products. With Exchange 2000, is it any easier to restore a single mailbox or back up a single mailbox? Yes and no. Under Exchange 2000, a mailbox is not deleted immediately when an NT account is deleted. It can be reattached to a new user object following the steps described in the Microsoft Knowledge Base article "XADM: How to Recover a Deleted Mailbox in Exchange 2000" - Q274343. There is no built in mechanism for backing up a single Exchange mailbox. This would still require a 3rd party brick level backup utility. 26. Can I back up the M: drive using NT Backup or another backup application? You can, but you will be sad. Do NOT back up the M: drive of an Exchange 2000 server. It can result in messages and attachments being inaccessible via the Outlook client. 27. What tools are used to administer Exchange 2000? 1. Active Directory Users & Computers - Used to create users, distribution groups and contacts. 2. Exchange System Manager - Used to manage the Exchange Server, create address lists, recipient policies, etc... 28. In Exchange 5.5 I could have multiple mailboxes associated with a single user account. How do I do that in Exchange 2000? Exchange 2000 requires a user object for each mailbox. You can create a disabled user object, associate a mailbox with it, and then grant another user object 'receive as' and 'send as' permissions to that mailbox.

29. Can I administer an Exchange 5.5 server using the Exchange 2000 administration program? Can I administer an Exchange 2000 server using the Exchange 5.5 Admin program? Can I manage an Exchange 2000 server using AD Sites and Servers? Unless you are following specific steps in a Microsoft KB article which specifies using a specific tool to perform a specific task you should NOT use anything other than the standard tool shipped with a product to administer it. So, you should NOT use the Exchange 5.5 Administrator program to administer Exchange 2000 servers, you should NOT use the Exchange 2000 System Manager to administer Exchange 5.5 servers and you should NOT use the AD Sites and Servers tool to Administer Exchange 2000 servers. 30. What do the event IDs mean in the message tracking log? They are listed in Table 3. "Exchange 2000 message events" in the MSDN article titled "Building Management Components for Microsoft Exchange 2000 Server". 31. How can I enable/disable an attribute used by the Outlook client for ambiguous name resolution? 1."Registry Modification Required to Allow Write Operations to Schema" - Q216060 2."Setting an Attribute's search Flags Property to Be Indexed for ANR" - Q243311. 32. What are eseutil /d, eseutil /p, eseutil /g used for? Defragmentation: ESEUTIL /d <database name> [Options] Recovery: ESEUTIL /r [Options] Integrity: ESEUTIL /g <database name> [Options] File Dump: ESEUTIL /m [mode-modifier] <filename>. Repair: ESEUTIL /p <database name> [Options] Restore: ESEUTIL /c [mode-modifier] <path name> [Options] 33. What is mailbox enabled and mail enabled user? -Mailbox-Enabled User- is a user that has an Exchange 2000 mailbox and e-mail address. -Mail-Enabled User- is a user that has a Windows 2000 authentication account, and an External email address associated with it. 34. Tell me the mail flow in exchange? The mail sender transmits emails via the SMTP protocol directly to your POP3 mailbox at your provider. POPcon periodically connects to your POP3 and IMAP mailboxes, downloads the email using the POP3 or IMAP protocol and stores the messages in temporary files. After downloading emails from all your POP3/IMAP mailboxes, POPcon connects to your Exchange Server and sends the previously downloaded emails via the SMTP protocol directly to your Exchange users. 35. What is restore.env file? -Restore.env is a file created automatically during a normal Exchange 2003 restore. -Restore.env plays no part in a soft recovery -This is just a temporary environmental file holding path information about the data. -Its purpose is to help Exchange 2003 restore process find its files and match them with the Corresponding email stores. 36. What is dsaccess? DSAccess is an internal process in Microsoft Exchange 2000 server and in Microsoft Exchange Server 2003 that is used for accessing and for storing directory information. 37. Difference between WINS and DNS DNS: The Domain Naming Service is a system of mapping NAMES to IP addresses and vice versa WINS: Windows Internet Naming Service is a protocol, similar as DNS, used by Computer name (NetBIOS name) to IP address.

38. Types of DNS records. -Address Records (A): point a hostname to an IP address. -Canonical Name Record (CNAME): allows a node to be address using more than one hostname. -Mail Exchange Records: Used for message routing where there are multiple mail exchange hosts. -NameServer Records (NS): Shows the authorative DNS for the zone. An SOA record or start of authority (SOA) specifies the DNS server providing authoritative information about an internet domain. 39. Types of DNS Zone Forward Lookup zone: Name to IP address map Reverse Lookup zone: IP address to name map Standard Primary zone: A master copy of forward or reverse lookup zone Standard Secondary zone: Stores the copy of zone obtained from standard primary zone. AD integrated zone: A copy of standard/ primary or Active Directory zone. The IP address and computer name is stored in Active Directory and replicated to all local domain controllers. DNS information is not replicated to domain controllers outside the domain.

1. 2. 3. 4. 5. 6. 7. 8.

What is a GPO ,Explain their order in GPO? Name FSMO roles and explain 1 in Detail Ports used with Active Directory Type Of Backups differential , Normal Restore Option while using Backup Explain DNS & DNS Zones Zone files How would you convert DC to Global Catalog Server?

9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30.

OSI layers Explain Replication in AD Differentiate Domain Controller and Member Server What is a Site? Differentiate NT Domain and AD Differentiate Domain & Workgroup Partitions in Active Directory Define Router. Switch. Hub What is Active Directory? Where is Database of AD stored Explain DNS Records Domain Controller Identifications What is adprep? What is recursive and iterative in DNS? Four folders available in DNS What is Kerberos and port used? Three entries of DNS record What is GC? What is extranet? Difference between layer 2 and layer 3 switch? How to apply group policies for 15 users? 1 full back next 4 differential backup, system crash, which tape would require to restore? On which server can I install DHCP? Win2k server Domain/member, Win2k advance server Domain/member? 31. How to restore system state backup? 32. Use of commands a) nbtstat b) Nslookup c) Net d) Ping e) Dcpromo f) Telnet g) LDAP h) imap i) RPC

Exchange 5.5 Experience with Exchange 5.5:Name at least 5 services on an Exchange 5.5 server. MsExchangeSystem Attendant MsexchangeDirectory Service

MsexchangeMTA service Msexchange Information Store Service. Msexchange IMC Service what is the latest Service Pack for Exchange 5.5 server? SP4 what files are usually located in the MDBDATA directory on an Exchange 5.5 server Priv.edb, Pub.edb and Transaction Log Files. What is the difference between Priv.edb and Pub.edb? Mailbox Data are Stored in Priv.edb & Public Folder Information are stored in Pub.edb Where is the directory information stored in Exchange 2000? Active Directory. How many times do you need to run forest prep in a single Active Directory forest that contains 4 domains? One Time what is the Active Directory Connector (ADC)? Service which Synchronizes Exchange 5.5 Directory with Active Directory what is the Recipient Update Service (RUS)? Responisble for Stammping Email Address and User Attributes. What are the features of Exchange 2000 and Exchange 5.5? Exchange 2000 Multiple Storage Groups. What are the differences between exchange 5.5 and Exchange 2k.? Exchange 5.5 has it's Own Directory. Exchange 2000 uses Active Directory. Exchange 2000 Support Multiple Storage Groups. What do you understand by an Exchange Server? Messaging Server. Describe Mail Flow in an exchange Server. No idea Describe Exchange Structure. Organization, Site, Server.

Exchange 5.5 1) what are the core services? Explain the order of starting the services. MsExchangeSystem Attendant MsexchangeDirectory Service MsexchangeMTA service Msexchange Information Store Service.

2) Explain the hierarchy of exchange Admin program 3) What are the two versions of exchange 5.5 and compare them. Standard & Enterprise. Standard supports only 16 Gb Database Limit. Enterprise Unlimited Database Limit 4) What is the component of exchange called where mails and public data is stored Mails = Priv.edb Public = Pub.edb 5) What is latest SP for Exchange 5.5? Sp4 6) what is information store and directory database files and locations Priv.edb + Pub.edb Inforation Stores. Location = C:\exchsrvr\mdbdata Dir.edb Directory Database Location = C:\exchsrvr\dsadata 7) what is custom recipient mailbox Contacts. 8) What is the size of transaction log file 5mb 9) Difference between Sequential and circular logging. Where do you enable it? Right Click Server Properties Database Tab. 10) Which service is responsible for server-to-server communication? MTA 11) what is MTA used for? Transfer of Message Between servers. 12) What is GAL Global Address List 13) what are different ways of connecting sites? Highlight differences between X.400 and Site Connector. Site Connector and X.400 14) what are different mails clients supported by Exchange 5.5? Outlook 15) what is IMC used for? External mail Transfer 16) what are X.400 and X.500 standards 17) What is IPM message format

Exchange 2000 1) What are the core services for Exchange 2000 MsExchangeSystem Attendant MsexchangeMTA service Msexchange Information Store Service. 2) Explain the hierarchy of exchange management console program Org, Administrative Groups, Servers. 3) Different versions of Exchange 2000 Standard & Enterprise 4) Latest SP for exchange 2000 Sp3 4) How many storage groups and stores are supported in exchange 2000 4 5) What is RUS? Which service is responsible for the RUS? Stammping email address 6) What is recipient polices, email policy and Mailbox manager policy Gives syntax of email address to be stammped by RUS. Manager Policy to delete mails from Mailboxes 7) What are DN, RDN UPN and SMTP naming formats? 8) What is System policy? Mailbox management 9) What are the different ways to apply mailbox restriction on certain mailboxes? Users Properties from AD, Mailbox rights from Mailbox store Properties 10) What is mapi and non-mapi tree? 11) What is edb.chk file used for? which log file was last commited to database 12) What is eseutil /d, eseutil /p eseutil /g used for? /d = Deframentation /p = Hard recovery Repair /g = to check the integreity of database. 13) What is restore.env file? Patch file Details 14) What is dsacess and boostrap? 15) what is mailbox enabled and mail enabled user Mailbox enabled has mailbox in Exchange Mail enabled user doesn't have Mailbox on Exchange

Exchange Mid term exam during training. 1. Explain Message Journaling & how to set up this? 2. Scenario Sunday: Full Backup, Monday: Differential, Tuesday: Incremental, Wednesday: Server Crash, What are the tapes that I need on Thursday? 3. If I update RUS which attribute is set to True & If I rebuild RUS which Attribute is set to True? 4. How many subfolders should I see under Schedule + Free busy system folder? 5. Value of Attribute sitefolderserver will correspond to which value?

6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20.

How will I delete mails from Mailbox using Exmerge? How to troubleshoot RUS issues? How to check the database integrity? Can I delete the Domain and Enterprise RUS & recreate it? List the criteria to add mailbox stores in RSG. Explain the steps that we would take to troubleshoot public folder replication between exchange 2000 & Exchange 2003 server. Explain Dial Tone Recovery How to troubleshoot DSAccess How to recover a deleted mailbox in Pure Exchange 2000 Environment, how would the procedure change if I have an Exchange 2003 server installed as well in it? What is the Syntax to be used for soft recovery? What would happen if I move Exchange Domain servers & Exchange Enterprise Servers to a Different OU from their Default container (Users)? What do I do if I get error pertaining to permission when I use Exmerge (explicit)? List the steps to take to upgrade an Exchange 2000 Cluster to Exchange 2003 Cluster. What would policy test do? What would I need to do if I want to stamp few users with a specific email address?

Das könnte Ihnen auch gefallen