Beruflich Dokumente
Kultur Dokumente
Storage Spaces Direct Both Windows 8 and Windows Server 2012 shipped with
Storage Spaces, which provides similar functionality to RAID but in software. Windows
Server 2012 R2 added the ability to build a highly available storage cluster based on the
same Storage Spaces technology and Microsoft clustering. The one big requirement for
this high-availability cluster is making all storage accessible to participating nodes
through an external JBOD array. The JBOD array must also contain SAS drives for their
multi-initiator support. A minimum of four nodes must be available to create a cluster
with Storage Spaces Direct.
ReFS as primary file system The Resilient File System (ReFS) is another feature
that was introduced with Windows 8 and Windows Server 2012. ReFS brings many
advantages to the NTFS on-disk format. Microsoft has elevated both the usefulness and
the importance of ReFS in Windows Server 2016 TP2 by making it the preferred file
system for Hyper-V workloads.
Hyper-V rolling upgrades Windows Server 2016 supports rolling cluster upgrades
from Windows Server 2012 R2, meaning you can perform these upgrades without taking
down the cluster or migrating to new hardware.
Hyper-V hot add NICs and memory Previous versions of Hyper-V did not allow
you to add a network interface or more memory to a running virtual machine. Because
downtime. Microsoft now allows you to make some critical machine configuration
changes without taking the virtual machine offline. The two most important changes
involve networking and memory.
Networking enhancements
Storage QoS updates Windows Server 2012 R2, making it possible to place limits on
the amount of IO that individual VMs could consume. Windows Server 2016 allows you
to centrally manage Storage QoS policies for groups of virtual machines and enforce
those policies at the cluster level.
PowerShell updates Windows Server 2016 will see a significant number of new
PowerShell cmdlets focused on specific functionality. You can even use PowerShell
commands to check each new release to see the differences.
Question. What Are the Roles Of System Administrator?
Answer: The role of System Administrator differs in the organization. The three main
task of a System Admin is Installing, Supporting and maintaining servers & computers.
Install patches & OS Updates
Review system logs access administration
Access administration for users
Disaster recovery planning
Creating and Restoring system backups
Comply with password requirements
Access control
System audit logging
Question. What Is the Different Version of Windows Server?
Answer: The following are the different version of windows servers:
DIT
Log
Che
log and Res2.log
All the Active Directory changes are not written directly to the NTDS.DIT database file.
They are first written to EDB.Log and thereon from the log file to the database.
EDB.Che is used to tracking the updates to the database it acts as an update log file to
check what operations are performed to the database.
NTDS.DIT: This is the Active Directory database and contains all the AD objects. The
default location is %system root%nrdsnrds.dit, this database is based upon the Jet
database.
EDB.Log: This file is to track the transactions on the database, when EDB.Log is full it
gets renamed to EDB Num.log where a num is a number starting from 1 like EDB1.log
EDB.Che: This file is used to check for the data that is not yet written to a database. This
file has the starting point to the data can be recovered during failures.
Res1.log and Res2.log: Res stands for reserved transaction file which provides the
transaction log file enough time to shut down if the disk runs out of space.
Question. Explain in windows DNS server what is Primary, Secondary and Stub zone?
Primary Zone: In the primary zone, the file is saved as a text file with extension being
(.dns)
Secondary Zone: This is a backup for the primary server which acts as load balancing
and also provides fault tolerance. This is usually read-only file which is placed in
another DNS server
Stub Zone: This consists of the name server and SOA records which help in reducing the
DNS search orders
Question. what is RAID in Windows Server
RAID storage uses multiple disks in order to provide fault tolerance, to improve overall
performance, and to increase storage capacity in a system. This is in contrast with older
storage devices that used only a single disk drive to store data.
RAID allows you to store the same data redundantly (in multiple paces) in a balanced
way to improve overall performance.
Question. Active Directory real time issues and solutions
Active Directory real time issues
Group Policy (GPO) real time issues
Printer, User Profile and Account lockout
Question. What Is VOIP.
VOIP - Short for Voice Over Internet Protocol, a category of hardware and software that
enables people to use the Internet as the transmission medium for telephone calls by
sending voice data in packets using IP rather than by traditional circuit transmissions.
Question. What is loop back
loopback is a method used to perform transmission tests of the lines at the switching
center. Loopback is a communication channel with only one endpoint. TCP/IP networks
specify a loopback that allows client software to communicate with server software on
the same computer. users can specify an IP address, usually 127.0.0.1, which will point
back to the computer's TCP/IP network configuration. The range of addresses for
loopback functionality is the range of 127.0.0.0 to 127.255.255.255.
Question. Differentiate between FIREWALL/ANTIVIRUS.
Antivirus: The prime job of an anivirus is protect your system from computer viruses.
Your computer may be standalone or part of network or connected to Internet you need
an antivirus program. It actively monitors when you are using your system for any virus
threat from different sources. if it found one it tries to clean or quarantine the virus
ultimately keeping your system and data safe.
Firewall:
Firewall is in other hand a program which protects your system from
outsider/intruder/hacker attacks. These attacks may not be virus type. In some cases
hackers can take control of your system remotely and steal your data or important
information from system. If your system is directly connected to internet or a large
network than you can install a software firewall in your PC to protect your self from
unauthorized access. Firewall is available either in software or in hardware form. For a
single PC you may need a software firewall while a large corporate implements hardware
firewall to protect all of their systems from such attacks.
Question. Difference b/w sata and IDE.
IDE and SATA are different types of interfaces to connect storage devices (like hard
drives) to a computer's system bus. SATA stands for Serial Advanced Technology
Attachment (or Serial ATA) and IDE is also called Parallel ATA or PATA. SATA is the
newer standard and SATA drives are faster than PATA (IDE) drives. For many years
ATA provided the most common and the least expensive interface for this application.
But by the beginning of 2007, SATA had largely replaced IDE in all new systems.
Question. Main Difference Between Windows server 2012R2 and 2012
1) New Server Manager: Create, Manage Server Groups
2) Hyper-V Replication : The Hyper-V Replica feature allows you to replicate a virtual
machine from one location to another with Hyper-V and a network connection—and
without any shared storage required. This is a big deal in the Microsoft world for
disaster recovery, high availability and more. VMware does this, too, but the vendor
charges new licensees extra for the capability.
Discover: A client broadcasts DHCP Discover message when it comes alive on the
network.
Offer: When a DHCP server receives the DHCP Discover message from the client, it
reserves an I P address for the client and sends a DHCP Offer message to the client
offering the reserved IP address.
Request: The client receives the DHCP offer message and broadcasts a DHCP request
message to show its consent to accept the offered IP address.
Acknowledge: When the DHCP server receives the DHCP Request message from the
client, it sends a DHCP Ack packet to the client. At this point the IP configuration
process is complete.
What is DHCP Scope? A range of IP address that the DHCP server can assign to
clients that are on one subnet.
What protocol and port does DHCP use? UDP protocol and 67 port in client and
68 port in server.
How to Backup and Restore DHCP in Windows Server 2012R2
In Windows Server 2012R2, backup of DHCP database and settings has gotten simpler.
You may want to back up your DHCP server from time to time to prepare for disaster
recovery scenarios or when migrating DHCP server role to a new hardware.
First the computer looks up the destination host. If it exists in local DNS cache, it uses
that information. Otherwise, DNS querying is performed until the IP address is found.
Then, your browser opens a TCP connection to the destination host and sends the
request according to HTTP 1.1 (or might use HTTP 1.0, but normal browsers don't do it
any more).
The server looks up the required resource (if it exists) and responds using HTTP
protocol, sends the data to the client (=your browser)
The browser then uses HTML parser to re-create document structure which is later
presented to you on screen. If it finds references to external resources, such as pictures,
css files, javascript files, these are is delivered the same way as the HTML document
itself.
When a computer or other device connects to a network, the DHCP client software sends a broadcast query
requesting the necessary information. The DHCP server manages a pool of IP addresses and information about client
configuration parameters such as default gateway, domain name, the name servers, and time servers.
DHCP process goes through 4 stages while assigning an IP address to the client. These stages are often abbreviated as
DORA for discovery, offer, request, and acknowledgement.
Windows Server 2012 Schema version is 56 and Windows Server 2012 R2 is 69, schema
will be updated while doing Forest preparation/installing Windows Server 2012 R2
Command to check the replication to all the DC’s (through this we can check Active
Directory Health)
Repadmin /replsum /bysrc /bydest /sort:delta
You can also save the command output to text file, by using the below command
Repadmin /replsum /bysrc /bydest /sort:delta >>c:replication_report.txt