Beruflich Dokumente
Kultur Dokumente
No Question
6 What is AD
10 What is DNS
11 What is IPCONFIG command?
15 What is “Bootloader”?
16 Why we require Host File & What is path of Host File in Windows
17 What is VLAN ?
22 Port No DNS,DHCP,HTTP,Telnet
23 What is telnet
24 what is SLA
25 What is DLP
A user can log on to the network but has no internet connection? Explain what
27 could be the problem
31 What is Firewall
32 What is Incident
35 User not able to acess one site other sites are working
Answer
On the Home tab, in the New group, click New Items, point to More
Items, and then click Outlook Data File
The Domain Name System (DNS) is a hierarchical distributed naming
system for computers, services, or any resource connected to the
Internet or a private network. It associates various information with
domain names assigned to each of the participating entities. Most
prominently, it translates more readily memorized domain names to the
numerical IP addresses needed for the purpose of locating and
identifying computer services and devices with the underlying network
protocols
Ipconfig. Displays all current TCP/IP network configuration values and refreshes
Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS)
settings. Used without parameters, ipconfig displays the IP address, subnet
mask, and default gateway for all adapters.
traceroute is a computer network diagnostic tool for displaying the route (path)
and measuring transit delays of packets across an Internet Protocol (IP)
network. The history of the route is recorded as the round-trip times of the
packets received from each successive host (remote node) in the route (path);
the sum of the mean times in each hop indicates the total time spent to
establish the connection. Traceroute proceeds unless all (three) sent packets
are lost more than twice, then the connection is lost and the route cannot be
evaluated
Bootloader is a piece of code that runs before any operating system is running.
Bootloader are used to boot other operating systems, usually each operating
system has a set of bootloaders specific for it.
Host files are the files used by Microsoft TCP/IP for windows. It shows the
mapping of the IP address with its corresponding Host name. It helps to access
any web site or web page easily. Mapping the IP addresses with their Host
names also help to resolve DNS issues.
%c%windows%\System32\drivers\etc\hosts
A client operating system is generally a single user operating system where only
1 user can be actively using the computer at any one time. A server operating
system is a multi-user operating system where it is optimized for multiple user
access at the same time sharing all of the resources. Audio services may be
limited and the video experience is not very important as many servers do not
have dedicated monitors or keyboards (operate headless)
Port No DNS-Port No. 53,DHCP- Port No. 67,HTTP - Port No. 80,Telnet - Port 23
Data loss prevention (DLP) is a strategy for making sure that end users do not
send sensitive or critical information outside the corporate network. The term
is also used to describe software products that help a network administrator
control what data end users can transfer
Click Start->Run, type cmd and press Enter. Type ipconfig /release at the prompt
window, press Enter, it will release the current IP configuration. Type ipconfig
/renew at the prompt window, press Enter, wait for a while, the DHCP server
will assign a new IP address for your computer.
1 -First check weather the user account has appropriate membership on the
domain to access internet 2- check the proxy settings of the web browser
1- Press Keyboard Numlock if Led Blinks check the power & other connection 2-
If there is Beep Check the system internal connections & RAM
1-may not remember the id or password right.2- the password might have
expired 3-computer might not be added to the n/w domain 4- Network
Disconnected
a firewall is a network security system that controls the incoming and outgoing
network traffic based on applied rule set. A firewall establishes a barrier
between a trusted, secure internal network and another network (e.g., the
Internet) that is assumed not to be secure and trusted.