Sie sind auf Seite 1von 18

Possible Interview Questions

1. What is ADS?
Active Directory Services. A Directory Service is a network service that stores information
about network resources and makes the resources accessible to users and applications. Directory
services provide a consistent way to name, describe, locate, access, manage and secure information
about these resources.
2. How do you backup ADS?
Click "START MENU", point to "PROGRAMS", point to "Accessories", point to "System tools" and
then click "Backup"
Click the "Backup" wizard icon to open the Backup wizard.
You backup the system state data on a local computer in one of the following three ways:

Data"

a. In the "Backup Wizard" on the "What to Backup" page, click "Only Backup the System State

b. In the backup wizard, on the "Items to Backup" page, expand "My computer" and then select
the "System State"
check box.
c. In the Backup dialog box, on the "Backup" tab, expand "My Computer" and then select the
"System State" check box.
Note: For full backup, on the backup wizard, on the "What to Backup" Page, select "Back up everything on my computer".

3. What is the Database file (a place where the User, machine and other objects are stored) for
ADS? Name the file. What is the maximum scalability size of this Database file?
The default location for the Database file and log files is Systemroot\Ntds. The name of the
file is NTDS.DIT. It has been tested for 6 million users and the file size grew to 64.8 GB.
4. How do you go into "Active Directory Safe Mode"?
Restart the computer and Press F8. Select Active Directory Safe Mode. Remember, U have to
type in the Directory Services Restore Mode Administrator Password, which U would have assigned
during installing ADS.
5. What is LDAP?
"Lightweight Directory Access Protocol". It is used to query and update Active Directory. It
specifies that an Active Directory object can be represented by a series of domain components, OUs,
and common names, which creates an LDAP naming path within Active Directory.
-1-

Possible Interview Questions


6. What is the port number thru which the LDAP communicates?
LDAP communicates through a port 389.
7. How do U configure "Outlook Express" to communicate with "LDAP"?
Go to Tools/Accounts/Active Directory Services and then include the ADS name or IP.
8. How do U configure Netscape Mail Client to communicate with "LDAP"?
9. What is "SNMP"?
It is Simple Network Management Protocol.
10. What are the differences between NT and 2K?
a.
b.
c.
d.
e.
f.
g.
h.
i.

Support for Plug n Play device.


Supports FAT32
In NT a member server cannot be upgraded to domain controller, where as in 2000 we can use
DCPROMO to upgrade from member server to domain controller.
Quota Management support
Organizational Unit setup within a domain.
Intro to Active Directory support and eliminating the need for making the server to be a file
server.
IIS server is part of the operating system by default.
Terminal Services are introduced in Win2K
2000 works with KEBROS security policy.

11. What is Proxy server?


This is Internet Protocol Manager Software. It acts like an information packet redirector between server
and client on request.
12. Which layer of OSI does the Proxy Server come into?
Layer 4 (Transport)
13. What is IP Spoofing and how is that done?
Changing the IP address with the user defined IP.
14. What is IP sniffing?
Matching IP values in a Firewall IP table index.
-2-

Possible Interview Questions


15. What is the difference between Proxy and Firewall?
The difference between proxy and firewall is, the proxy redirects packets and firewall scrutinizes
packets.
16. What is the maximum distance, to which an UTP Cat5 cable can be drawn?
Its 108 meters if switches are used. If a HUB is used, the cable can be drawn till 70-80 meters only. To
extend the cable more than the maximum distance, Repeaters are used.
17. How does a Machine during Boot up register with the Network?
Through MAC [Media Access Control] address of the NIC [Network Interface Card].
18. What is the difference between "Switch" and "HUB"?
Hub is a multiplexed port-switching device whereas Switch is the antonym of Hub.
19. What is Manageable and Unmanageable Switch? Differentiate.
20. What are the Uses of BIOS Flashing?
It is used to reinstall BIOS in Flash ROM and is done to identify any hardware changes.
21. How many USB peripherals can be connected with the System?
There are even N numbers of USB ports available but 8 max for a micro controller inside the system
board or add-on card.
22. What is the latest USB version?
The latest version on USB is 3.0. Earlier it was 2.0
23. What are the advantages of USB?
Plug and Play
24. Expansion of ISA. If it is Internet Services and Accelerator, how does that accelerate the
Internet Service? Justify.
Internet Services and Accelerator Server. It accelerates by Caching and Site Indexing.
25. In which layer (OSI) does the firewall and Proxy server work?
Proxy server in 4th layer (Transport) and Firewall in 3rd layer (Network)
-3-

Possible Interview Questions


26. How will you tune your server for Performance and Optimization?
By altering the Virtual memory size appropriately and including directory and file caching if the server
is a 2000 server with ADS service.
This can be the basic method but there are many other methods too but this is what primarily
required.
27.What is the use of creating Multiple Domains in a single Network? In which case will it be
Useful and effective?
a. Yes, incase there are too many user logon services used and in the event of server failure more than
one server is always safe for one domain. It also helps in distributing server load amongst member
servers.
Assume this case, a User object takes 1024(1 KB) Bytes of memory space and a computer object takes
(0.5 KB) which is stored in SAM and in turn is stored in the virtual memory. Assume there are 10,000
users and all the users have an individual computer, then the size increases to 15MB, if the number of
users and computer is around 1 million, imagine the size of memory it needs in all the domain
controllers, this is one of the reasons to create multiple domains in a single network with transitive
trusts.
b. Replication Problem due to poor bandwidth If the domains are in different geographical locations
and they have to replicate each other they obviously eat up the WAN Bandwidth.
c.Dont Trust the Branch office If the DC in the Branch office is not secured in a room, then the
valuable information replicated from the entire enterprise will be prone to hacking.
28. How do you manage Multiple Domains in a single Network?
By using Active Directory Services.
29. Can all the types and brands of BIOS be flashed?
No only those BIOS bearing the type Flash ROM can be flashed.
30. How will U give a connection to a machine if the distance of the machine from the server is
more than the maximum allowed distance of the Cable? Here the cable is UTP Cat5 type cable.
Using repeaters at the beginning of max length.
31. What are Server naming methods? Specifically like domain prefixing.
Using a DNS naming type like username@domain.com
-4-

Possible Interview Questions


32. Difference between Domain Component and Organization Units.
Domain as a hole is called as Domain Component. Organization Units are other objects present in the
Domain. The departments, Users, Computers and Groups come under OU. Various OUs makes
Domain Component.
33. What are Organization Units and what are the uses of it?
Organization Units are container objects that you use to organize objects within a domain. OUs are
used to give rights to a particular person or group over a group of users or computers or other objects.
Eg. Lets assume the Graphics department have costly printers and they have to be accessed only by
them and not by others and also the staff of Graphics department can give access to printer to whom
ever they want to give then the printers should be included in the OU and the staff will have the admin
rights over the OU but not for the entire domain.
34. In what condition do you go into Safe mode with Network and without Network Support?
When taking backup, during the event when there is a RAID failure.
35. What are the various Backup services available in 2000?
The various types of Backup services are:
a. Backup Everything
b. Backup Selected files, drives or network data
c. Only backup System Data.
36. What are the types of Backup available in windows 2000?
The various types of Backups are:
a. Copy Backup
b. Daily Backup
c. Differential Backup
d. Incremental Backup
e. Normal Backup
The explanations are:
a. Copy Backup
A Copy Backup, copies all selected files but does not mark each file as having been backed up (in
other words, the archive attribute is not cleared). Copying is useful if you want to back up files
between normal and incremental backups because copying does not affect these other backup
operations
b. Daily Backup
-5-

Possible Interview Questions


A Daily Backup, copies all selected files that have been modified the day the daily backup is
performed. The backed-up files are not marked as having been backed up (in other words, the
archive attribute is not cleared).
c. Differential Backup
A Differential Backup, copies files created or changed since the last normal or incremental
backup. It does not mark files as having been backed up (in other words, the archive attribute is
not cleared). If you are performing a combination of normal and differential backups, restoring
files and folders requires that you have the last normal as well as the last differential backup.
d. Incremental Backup
An incremental Backup backs up only those files created or changed since the last normal or
incremental backup. It marks files as having been backed up (in other words, the archive
attribute is cleared). If you use a combination of normal and incremental backups, you will need
to have the last normal backup set as well as all incremental backup sets in order to restore your
data.
e. Normal Backup
A normal backup copies all selected files and marks each file as having been backed up (in other
words, the archive attribute is cleared). With normal backups, you need only the most recent
copy of the backup file or tape to restore all of the files. You usually perform a normal backup
the first time you create a backup set.
37. How do you configure MMC to your desired setup?
Type CMD in RUN command and then type MMC. In the console menu click New. A new console
window is opened and again in the same Console menu. Then click the ADD/Remove Snap-in and
you can add your desired snap-in.
38. What is the procedure to create "Unattended Installation File"? Explain it descriptively.
Installing Setup Manager
Setup Manager isnt installed by defaultheres how to get it.
a. Insert the Windows 2000 Server CD into your computers CD drive.
b. Open the folder named Support and, inside that, another folder named Tools.
c. In Support\Tools, youll see a file named deploy.cab. Double-click it to open it.
d. Select all of the files in deploy.cab, right-click, and choose Copy.
e. Create a directory named DepTools on your computers hard disk. Right-click the DepTools folder
and choose Paste.
f. Open the DepTools folder and double-click the Setupmgr.exe icon.
Double Click the Setup Manager..
a. Select Create a new answer file.
-6-

Possible Interview Questions


b. Select Windows 2000 Unattended Installation
c. Select Windows 2000 Server or Professional
d. Select Level of user interaction during setup so obviously Fully Automatic
39. What is the Use of "Network Analyzer Utility" in Windows?
40. What type of Packets can be analyzed in "Network Analyzer Utility"?
41. What are the various types of LOG?
Open Event Viewer from Control Panel\Administrative Tools.
a. Application Log
b. Security Log
c. System Log
42. What is the difference between "Regedit.exe" and "Regedt32.exe"?
The differences are:
a. Regedt32.exe is 32-bit application and Regedit.exe is 16-bit application.
b. Can set security for registry keys in Regedt32.exe
c. Regedit.exe is solely used for its searching capabilities.
43. What is the minimum number of hard disk required to install a "RAID"?
Three numbers of hard disks are required to install RAID
44. What is the tool available in windows to remotely manage and administer client machines?
MMC Microsoft Management Console
45. What are Terminal Services and what type of application (DOS, 16 bit or 32 bit) can only be
executed in the Terminal Servers?
Terminal Services makes your Windows 2000 system a multi user computer, in many ways combining
the best of the PC and the mainframe.
You can use lower-end hardware and thus break that upgrade cycle, you can more easily keep people
from misconfiguring their computers, you can run computer applications in environments that are
computer-unfriendly and you can install applications in a central location rather than on each client
PC. Even if you dont want an application server, Terminal Services in Remote Administration mode
allows you to manipulate the server from another console, which can be handy.
46. What is SYSVOL?
-7-

Possible Interview Questions


A shared directory, that stores the server copy of the domains public files, which are replicated among
all domain controllers in the domain.
47. What is the default trust relationship between Windows 2000 domains?
"Two-way, Transitive Trust" It is a combination of "Two-Way" trust and "Transitive Trust".
a.
"Transitive Trust" means that the trust relationship extends to one domain is
automatically extended to all other domains that trust that domain.
b.
"Two-Way" trust means that there is two trust paths going in opposite directions between
two domains.
The advantage of this "Two-Way, Transitive Trust" in windows 2000 domains is that there is
complete trust between all domains in an active Directory Domain hierarchy. Trees linked by trust
relationships form a forest.
48. What is forest?

A Forest is a one or more tree. The trees in a forest do not share a contiguous namespace.
However, the trees in a forest share a common schema and global catalog.
49. Does DNS is required before Active Directory is installed?

Yes. To search a Printer in Active Directory, a computer running windows 2000 first must locate
a domain controller or Global Catalog Server to process the query. The DNS database stores
information about which computers perform these roles.
50. What is the minimum space required to install Active Directory?

Minimum of 250 MB is required and 50MB more for the Active Directory database transaction
log files. So as a whole, it comes to 300 MB.
51. What are WINS and DNS? Differentiate.

WINS is Windows Internet Name Service. DNS is Domain Naming Service. WINS helps
Windows NT Client and Servers to locate DC. NetBIOS looks for its name resolution from a WINS
server. DNS helps applications like web browser and email clients to located web and mail servers.
Winsock looks for its name resolution from a DNS server. PING is a Winsock command.
52. How do you configure RAS?

Click the Routing and Remote Access icon in the Administrative Tools in the Start
Menu/Programs. RAS Wizard is opened and in that wizard, select the Remote Access Server Radio
button.
-8-

Possible Interview Questions


53. How will you grant permission to Dial-in User?

Go to MMC (User and Computer snap-in). Navigate to the user you want to grant permission,
and right click, select the properties. Select the Dial-in Tab.
54. How will you configure DHCP?

In the Add/Remove Programs, click Add/Remove windows component, select the Networking
Services, Click NEXT and select DHCP and click Install.
Now DHCP is installed. To configure DHCP, go to Start/Programs/Administrative Tools/DHCP and
click DHCP. DHCP consoles opens and click Action/Authorize, Click the computer to host DHCP
Server and click OK.
Now to create a scope, right click the server icon and choose New Scope. Now you give the scope of IP
addresses you want to assign to the clients.
55. How will you assign static IP for servers in your network?

In the New Scope wizard after assigning scope of IP addresses for the clients, you get an option for
Exclude Address Range.
56. How will you automate or schedule a Backup?

In the Backup Utility screen, click the Schedule jobs tab. Then Click Add Job and continue the
procedure. After scheduling the job, you can configure it to your desired time and frequency.
57. How will you find the MAC (Media Access Control) address?

In the CMD, type, net config Workstation or net config server. The Hex value inside the ( ) is the
one.
58. What are the classes of IP available and what are the range?

There are 3 classes but actually 5 in number:


a.
b.
c.
d.
e.
f.

Class A [0-126]
Reserved Loop Back Address [127]
Class B [128-191]
Class C [192-223]
Reserved Multicast Addresses [224-239]
Reserved Experimental Addresses [240-255]

59. What are the non routable IP address ranges?

-9-

Possible Interview Questions


They are:
a. 10.0.0.0 10.255.255.255
b. 172.16.0.0 172.31.255.255.
c. 192.168.0.0 192.168.255.255
60. Name some important ports .

The important port numbers are:


a. DNS
b. Kerberos
c. POP3
d. RPC
e. NetBios naming service f. LDAP
g. ADS Global Catalog
h. PPTP
i. SMTP
j. IMAP
k. SSL
l. HTTP
m.Telnet
n.FTP
-

53
88
110
135
137
389
3268
1723
25
115
443
80
23
21

61. Assume a default DNS Server for all the clients is 10.0.0.20, which is specified in the DHCP server and
in one of the clients the default DNS Server for that client is 10.0.0.30. Which machine does that client
contact for DNS Service? Why?

It contacts the 10.0.0.30 DNS Server. The rule is, anything configured on the client overrides anything
that DHCP server suggests.
62. What is Superscope in DHCP?

When you have more than one subnet in your network, the DHCP server is configured using
Superscope to lease IP addresses for both the subnets.
To configure Superscope, right click on the server and select Superscope and enter both the scopes
63. Where do you specify a Default Gateway? What is a Default Gateway?

In a network, the default gateway is specified in the DHCP server. The Default Gateway is nothing but a
machine or a router, which acts as a middleman for the clients to communicate between various or two
different networks.
64. What are the items does this DHCP provide?

The services items that DHCP provide are:

- 10 -

Possible Interview Questions


1. Default Gateway
2. Domain Name
3. DNS Server
4. WINS Server
65. What is Rouge Detection in DHCP?

Rouge Detection is a process where by the DHCP Server seeks to find unauthorized DHCP Servers.

66. How will you enable DHCP to assign IP addresses for windows NT,98 and other older versions?

Right click in the server, click Properties and in the DNS tab, Select Enable Updates for DNS clients
that do not support dynamic update
67. How do you find the IP address assigned for a client in the clients machine?

In the command prompt, type IPConfig /all and for 95 machines, type WINIPCFG. To release an
assigned IP type IPCONFIG /RELEASE and then type IPCONFIG /RENEW.
68. What is NACK?

Assume your PC has four day IP lease, and you reboot two days into its lease, then the PC doesnt
blindly ask for an IP address to the DHCP server but it would ask the DHCP server for the particular IP
address. If the DHCP server were still up then it would give that IP. If the server has its lease
information wiped up due to some disaster, then it will either give the same IP or send a negative
acknowledgement. This negative acknowledgement is called as NACK
69. What do you need for a client A to communicate with a DHCP Server B in two different subnets?

The router between subnets A and B must be RFC 1542 compliant or it should support Bootp
forwarding.
70. What is DHCP relay agent?

A DHCP relay agent is a computer that spends a bit of its CPU power listening for DHCP client
broadcasts [The broadcast made by a DHCP client computer when it searches for a DHCP server to get
an IP address]. The DHCP relay agent knows that theres no DHCP server on the subnet [because you
told it], but the relay agent knows where there is a DHCP server on another subnet [because you told
it.] The DHCP relay agent then takes the broadcast and converts it into a directed, point-to-point
communication straight to the DHCP server.
71. How do you create a relay agent?

- 11 -

Possible Interview Questions


In the RRAS, select the server and open the IP Routing Object and one of the options is DHCP relay
agent. Right click and select the properties. Enter the IP address of DHCP server and you have to
enable the agent by right clicking the DHCP relay agent and choose New Interface, choose Local Area
Connection
72. How much time does a WINS server register a clients name?

By default, it registers for 6 days. The minimum time is 40minutes. WINS client send name refresh
request to its WINS server after one eighth of its name register.
73. How much time does a DHCP server leases IP to its client and how often is that renewed?

You can specify the time a DHCP server can lease IP to a client. But the client renews the IP after 50%
of its leased time is over. If an IP is leases forever, then it renews once the client reboots.
74. How do you install WINS server?

The installation process is like DHCP server. It must be installed only in the server and not in
workstations.
75. How many characters can DNS names have?

The maximum number of characters a DNS name [a computer name in DNS network] can have is 255.
The name can have quads [my.client.check.com]. Quad period can have a maximum of 65 characters.
Primary dns-Rewritable records
Secondary dns Readonly records
Stubzone- Same as secondary
ADS integrated Rewritable records
Cache DNS temporary dns record
76. What are forward and reverse lookup zones?

The process of converting a hostname to IP address is called as Forward Name Resolution. The process
of converting an IP address into Hostname is called Reverse Name Resolution.
77. What is DNS Zones?

The range of Internet addresses that this DNS server will be concerned.
Take this example, the YAHOO website has a DNS Server called http://www.yahoo.com, if you want
to access the mail server of yahoo website, there is another DNS server called http://mail.yahoo.com,
and again it has got lots of other DNS servers like http://shopping.yahoo.com,
http://briefcase.Yahoo.com and http://auction.yahoo.com. When you type the URL for mail server,
the query reaches the main DNS Server http://www.yahoo.com and that DNS server has got some
delegate name resolution for all the other sub domains. So it tells the query to contact any of the other
DNS servers and not to ask it after that. This subset of domains for which new
- 12 -

Possible Interview Questions


http://www.yahoo.com DNS Servers are authoritative is called as DNS Zones. The example of DNS
zone
is
http://briefcase.yahoo.com/lostwarriorram
or
http://my.lostwarriorram.personals.yahoo.com.
77. A. What are the types of records in DNS?

The records:
a. A record
b. MX record
c. SRV record
d. SOA record
e. PTR record
f. C canonical name
g. NS record
77. B. Mention the default location for etc Winnt\system32\drivers\etc
78. What are rules in Outlook Express?

Rules are specific actions to take place without any human interaction. Rules can be set by clicking
Tools/Message Rules/Mail. The Rules can be set for Mail and News.
79. Where can you Block Mail IDs?

Go to Tools/Message Rules/Blocked Sender List


80. How do you create an account in Outlook Express?

Go to Tools/accounts. U can setup mail, news and active directory accounts.


81. How do you put the email address automatically when you send a reply to a mail?

Go to Tools/Options/send. You have a check box, which says Automatically put people I reply in
the Address Book
82. What is Stationery in Outlook Express?

Stationery is an option used to design our default background, font and margins for our outgoing
messages. This is where U can include the company Logo and other details, which is default for all of
your outgoing mails. To configure or create new Stationery, go to tools/options/compose/Stationery
83. Where do you find the Stationery HTML files?

You find it in root/program files/common files/Microsoft shared/Stationery folder.


84. How do you include Signature in Outlook express?

- 13 -

Possible Interview Questions


Signatures are added for each and every account. To configure or create new signature, go to
Tools/options/signatures. A text file can also be directed to act as a signature.
85. What is the default message-storing folder?

C:\Documents and Settings\Administrator\Local Settings\Application Data\Identities\{6BED77710804-4A54-9B16-B35A905BB493}\Microsoft\Outlook Express.


86. What is the backup file of outlook express?

Folder.dbx. The default extension is .dbx.


87. How do you find the log files of your clients from the Server?

In the Event Viewer click action and select the computer. You can configure to log all the events of the
clients in your server itself.
88. There are two Projects, Project A and Project B, which have users A1-A10 and B1 B10 respectively.
There are Project Managers MA and MB. Now the projects team can grow depending on the demand.
Design a group policy, which will meet the growing needs of the project.

89. During the process one user from Project A will quit a job and you will delete his account from the
server. After 6 months again he joins and he will be required the same permission what he had earlier.
Explain briefly which is the easiest way to assign permission for this user.
90. What are the required necessary files for an NT System to boot? Explain the NT booting procedure.

The necessary files are


a. Boot.ini
b. NTDetect
c. NTDLR
91. You have a class C network 192.168.100.x 255.255.255.0. Design a subnet to have 4 subnets. Mention
what is the subnet mask? What is the Range of IPs in each subnet?

255.255.255.0 - 255.255.255.30
255.255.255.30 - 255.255.255.60
255.255.255.90 - 255.255.255.120
255.255.255.120 - 255.255.255.120
92. What is FAT and NTFS? What are the major difference between FAT and NTFS? Write down different
levels of security in windows.

NTFS each file is given an extended attribute on file permission.


- 14 -

Possible Interview Questions


FAT does not have that file permission.
FAT can be accessed by floppy
NTFS cannot.
Share, user, group and domain levels of security.
93. What is the maximum HDD size will NT4.0 support? How can you access the remaining amount of disk
space if the HDD size is more than the NT supported size?

4096 in FAT, 8GB in NTFS.


60 GB with servicepack upgrade, 1 terabyte.
94. What are the necessary services required to access the computer in a LAN? What will happen if server
service is not started and how will you fix this?

RPC, Directory service, network service, client for windows network, tcp/ip or netbeui.
95. Explain briefly the trusting and trusted relationship. How do you establish the trust relationship
between two different servers?

96. List the steps followed to add a workstation to an existing domain/domain Controller.

97. What is the default network adapter you will install if your NIC is not detected during OS installation?
What is the default IRQ(s) of it?

NE2000 adapter. 3, 4, 7, 11 is the default IRQ.


98. What is NetBEUI? Why is this required and what are the drawbacks of this protocol?

NetBEUI is a simple Protocol. NetBEUI protocol does not route. The routers between subnets will not
pass NetBEUI protocol
99. What are the different types of Proxy servers?
100. What is the protocol used by Network Printers? What are the services that need to be installed for
the same?

Printer services
101. How many IDE and SCSI hard disks can be installed in a PIV Machine?

2 IDE disks , 4 for E-IDE and 8 SCSI disks and dependant on the type of adapter for external SCSI
disks.
- 15 -

Possible Interview Questions


102. What is SDRAM?

It is Synchronize Dynamic Random Access Memory. It detects the ECC (Error Correcting Code) and this
SDRAM corrects them automatically.
103. Does Remote Installation Services [RIS] support installation on windows 2000 server?

No, It supports only windows 2000 professional. To make it support windows 2000 server remote
installation,
104. What is UDF? Where is it used?

UDF is uniqueness database file. It is used during unattended installation. There are circumstances
where the computer name and some specific information may be unique and these cannot be included
in the common Answer text file. So a Unattend.UDF is created and the file contains the unique
information about the computers will be stored.
The file looks like this.
;SetupMgrTag
[UniqueIds]
BS01=UserData
BS02=UserData
BS03=UserData
BS04=UserData
BS05=UserData
[BS01:UserData]
ComputerName=BS01
[BS02:UserData]
ComputerName=BS02
[BS03:UserData]
ComputerName=BS03
[BS04:UserData]
ComputerName=BS04
[BS05:UserData]
ComputerName=BS05
Computers Names, which are unique, are specified as BS01 BS05. To perform a unattended
installation in Computer called BS03, we have to type the following command in the winnt32.exe
command.
The command line command is
F:\I386\winnt32 /unattend:c:\w2k\setup\unattend.txt /udf:BS03, c:\w2k\setup\unattend.udf
- 16 -

Possible Interview Questions


Where unattend.txt is the common unattended file which contains common information for all the
computers in the organization and the Unattend.UDF is the file which contains the unique information
about the respective computers.

105. What are the limitations of Exchange 2000 server over Exchange 2000 Enterprise Server?

a.
b.
c.
d.
e.

Information storage limitation of 16GB


One database per server
Clustering is not available
Front end/back end is not available
Chat is not available

106. What is NATing?

The process of connecting Non-routable network with Public network is called as NATing.
107. Does Win2K Professional supports NATing?

No, Only Win2KServer supports NATing. Win2k Pro supports only ICS(Internet Connection Sharing).
108. What is Internet Connection Sharing(ICS)?

The Process of sharing one internet connection with dozens of computers is called as ICS. For example,
at a browsing center, only one internet connection (DSL, ISDN) is available and so one routable IP is
available for the entire BC. Now that will be assigned to a win2K pro or server. Now enable ICS in that
machine. In the clients, in the TCP/IP settings, click Obtain IP automatically. Restart the Clients and
vola internet is available in all the machines.
109. How do U enable ICS?

To enable ICS, right-click the one thats attached to the Internet and choose Properties/Sharing tab,
check the box labeled Enable Internet Connection Sharing for This Connection, click OK. No news
hereyou just read how to do that. After a brief delay, ICS will start working. The NIC attached to the
private network now has the static IP address 192.168.0.1. Your Internet-attached computer now runs
a simple kind of DHCP server that hands out IP addresses in the private network range of 192.168.0.0
through 192.168.0.255. Set the computers on the internal network to look to DHCP for their IP
addresses and reboot them, and they will get addresses on the 192.168.0.0 network and will look to the
192.168.0.1 system as their default gateway. Try a ping from any system on the internal network and
youll see that network now has Internet connectivity.
110. How do U enable NATing in windows 2000 server?

Open RRAS console and select the server which should NAT. Now right click the server and select
Configure Routing and Remote Access which starts the RRAS wizard. In the wizard choose
Manual server configuration and end it. Now come back to the RRAS console and right click on
- 17 -

Possible Interview Questions


the server, choose Properties. Choose the Local Area Network Routing only radio button and
uncheck the RRAS checkbox. In the left Pane, Under the Server object U will find IP Routing. Open it
and right click on the General menu, and coose new routing protocol. Select the NAT. Now in the
left pane under IP Routing, U will find a new menu called NAT. Now right click and select
properties. A dialog box opens and select the tab, Assign Address. Now check that Automatically
assign IP address using DHCP and enter the scope range value with subnet mask. Now click that
EXCLUDE button and enter the IP which U have assigned for the present server. Now again in the left
pane under IP Routing, U will find a new menu called NAT. Now right click and choose new
interface. Now u have to select the NIC which host internal computers and repeat the last step to
select the NIC which hosts internet connection.
111. Difference between 2000 and 2003?
2000

a. 32 bit support
b. ADS 1.0
c. IIS 5.0
d. IPv5
e. Not support ipsec over NAT
f. Terminal service
g. Manually install DOT net frame work
h. Not support in ADS application mode
i. Refresh security policy Secedit

- 18 -

2003

64 bit support
ADS 1.1
IIS 6.0
IPv6
support ipsec over NAT
RDP 5.0
DOT net frame work default with OS
support in ADS application mode
Refresh security policy Gpudate

Das könnte Ihnen auch gefallen