Sie sind auf Seite 1von 10

0Windows Server Questions  

1.What are the Features of windows2003?


ACTIVE DIRECTORY
Easier Deployment and Management
ADMT version 2.0—migrates password from NT4 to 2000 to 20003 or from 2000 to 2003
Domain Rename--- supports changing Domain Name System and/or NetBios name
Schema Redefine--- Allows deactivation of attributes and class definitions in the Active
directory schema
AD/AM--- Active directory in application mode is a new capability of AD that addresses
certain deployment scenarios related to directory enabled applications
Group Policy Improvements----introduced GPMC tool to manage group policy
UI—Enhanced User Interface

What are the Difference between NT & 2000?


NT SAM database is a flat database. Where as in windows 2000 active directory database is
a hierarchical database.
In windows NT only PDC is having writable copy of SAM database but the BDC is only read
only database. In case of Windows 2000 both DC and ADC is having write copy of the
database
Windows NT will not support FAT32 file system. Windows 2000 supports FAT32
Default authentication protocol in NT is NTLM (NT LAN manager). In windows 2000 default
authentication protocol is Kerberos V5.
Windows 2000 depends and Integrated with DNS. NT user Netbios names
Active Directory can be backed up easily with System state data

3.What Difference between 2000 & 2003?


Application Server mode is introduced in windows 2003
Possible to configure stub zones in windows 2003 DNS
Volume shadow copy services is introduced
Windows 2003 gives an option to replicate DNS data b/w all DNS servers in forest or All
DNS servers in the domain.
Refer Question 1 for all Enhancements

4.What Difference between PDC & BDC?


PDC contains a write copy of SAM database where as BDC contains read only copy of SAM
database. It is not possible to reset a password or create objects with out PDC in Windows
NT.

5.What are Difference between DC & ADC?


There is no difference between in DC and ADC both contains write copy of AD. Both can also
handles FSMO roles (If transfers from DC to ADC). It is just for identification. Functionality
wise there is no difference.

6.What is DNS & WINS


DNS is a Domain Naming System, which resolves Host names to IP addresses. It uses fully
qualified domain names. DNS is a Internet standard used to resolve host names
WINS is a Windows Internet Name Service, which resolves Netbios names to IP Address.
This is proprietary for Windows
7.How may Types of DNS Servers
Primary DNS
Secondary DNS
Active Directory Integrated DNS
Forwarder
Caching only DNS

8.If DHCP is not available what happens to the client ?


Client will not get IP and it cannot be participated in network . If client already got the IP and
having lease duration it use the IP till the lease duration expires.

9.what are the different types of trust relationships ?


Implicit Trusts
Explicit Trusts—NT to Win2k or Forest to Forest

10. What is the process of assigning IP address by DHCP service?


There are four stages in assigning IP address to a host by DHCP server.
1) DHCP discover
2) DHCP offer
3) DHCP request
4) DHCP Acknowledge

DHCP Discover:

When ever client has to obtain an IP address from a DHCP server it will broadcast a
message called “DHCP discover” , which contains destination address 255.255.255.255 and
source IP address as 0.0.0.0 and its MAC address.
DHCP offer:

The DHCP server on the network will respond to DHCP discover by sending a DHCP
offer message to the client requesting an IP address.
DHCP request:

The client after receiving offer message will send a “DHCP request” message asking
the DHCP server to confirm the IP address it has offered to it through DHCP offer message.
DHCP Acknowledge:

DHCP server will respond to the “DHCP request” message by sending acknowledge
message through which it confirms the IP address to other machine

11.Difference between FAT,NTFS & NTFSVersion5 ?


NTFS Version 5 features
Encryption is possible
We can enable Disk Quotas
File compression is possible
Sparse files
Indexing Service
NTFS change journal
In FAT file system we can apply only share level security. File level protection is not
possible. In NTFS we can apply both share level as well as file level security
NTFS supports large partition sizes than FAT file systems
NTFS supports long file names than FAT file systems
12.What are the port numbers for FTP, Telnet, HTTP, DNS ?
FTP-21, Telnet – 23, HTTP-80, DNS-53, Kerberos-88, LDAP-389

13.what are the different types of profiles in 2000 ?


Local Profiles
Roaming profiles
Mandatory Profiles

14.what is the database files used for Active Directory ?


The key AD database files—edb.log, ntds.dit, res1.log, res2.log, and edb.chk—all of which
reside in \%systemroot%\ntds on a domain controller (DC) by default. During AD
installation, Dcpromo lets you specify alternative locations for these log files and database
files
NTDS.DIT

15.What is the location of AD Database ?


%System root%/NTDS/NTDS.DIT

16.What is the authentication protocol used in NT ?


NTLM (NT LAN Manager)

17.What is subnetting and supernetting ?


Subnetting is the process of borrowing bits from the host portion of an address to provide
bits for identifying additional sub-networks
Supernetting merges several smaller blocks of IP addresses (networks) that are continuous
into one larger block of addresses. Borrowing network bits to combine several smaller
networks into one larger network does supernetting

18.what is the use of terminal services ?


Terminal services can be used as Remote Administration mode to administer remotely as
well as Application Server Mode to run the application in one server and users can login to
that server to user that application.

19.what is the protocol used for terminal services ?


RDP

20.what is the port number for RDP ?


3389

21.How do you convert a drive from FAT/FAT32 to NTFS from the command line?
convert c: /fs:ntfs

Explain APIPA.
Auto Private IP Addressing (APIPA) takes effect on Windows 2000 Professional computers if
no DHCP server can be contacted. APIPA assigns the computer an IP address within the
range of 169.254.0.0 through 169.254.255.254 with a subnet mask of 255.255.0.0.
15.How does Internet Connection Sharing work on Windows 2000?
Internet Connection Sharing (ICS) uses the DHCP Allocator service to assign dynamic IP
addresses to clients on the LAN within the range of 192.168.0.2 through 192.168.0.254. In
addition, the DNS Proxy service becomes enabled when you implement ICS.

Describe how the DHCP lease is obtained.


It’s a four-step process consisting of
(a) IP request
(b) IP offer
(C) IP selection
(d) acknowledgement.

17. We’ve installed a new Windows-based DHCP server, however, the users do not
seem to be getting DHCP leases off of it.
The server must be authorized first with the Active Directory.

18.How can you force the client to give up the dhcp lease if you have access to the
client PC?
ipconfig /release
What is a MAC address?
MAC [media acess ctrl]is a machines Physical address, The internet is addressed based on a
logical addressing approach. Say, when the packet reaches say the bridge connection a
LAN, the question is..how does it identify, which computer it needs to send the packet to.
For this it uses the concept of ARP, Address Resolution Protocol, which it uses over time to
build up a table mapping from the Logical addresses to the Physical addresses. Each
computer is identified using its MAC/Physical address ( u can use the ipconfig -all option to
get ur MAC address).

3. What is MTU?
The MTU is the “Maximum Transmission Unit” used by the TCP protocol. TCP stands for
Transmission Control Prototcol. The MTU determines the size of packets used by TCP for
each transmission of data. Too large of an MTU size may mean retransmissions if the packet
encounters a router along its route that can’t handle that large a packet. Too small of an
MTU size means relatively more overhead and more acknowledgements that have to be sent
and handled. The MTU is rated in “octets” or groups of 8 bits. The so-called “official”
internet standard MTU is 576, but the standard rating for ethernet is an MTU of 1500.

4. Difference Between. Switch , Hub, Router..


Hub:
1.it is a layer1 device. used to connect various machine on Lan.
2.It forwards broadcast by default.
3.It supports one collision domain and one broadcast domain.
4.it works on Bus topology resulting less speed.

Switch:
1. A layer2 device.
2. Forward broadcast first time only.
3. one broadcast domain & collision domains depends on no. of ports.
4.It is based on Star Topology giving 100mbps to every pc on Lan.

Router:
1. Does not Broadcast by default.
2. breaks up Broadcast domain.
3. Also called Layer3 switch.

5. VPN.....
VPN(Virtual Private Network )… these are basically the logical networks on the physical
line… you can have many VPN over same line..
Need of VPN arises when your company need to increase the network but don’t want to buy
any more switches.. take an eg. your dept. your room is packed with employees and ur
company need to add 4 more persons to ur deptt. what will they do.. the solution is to
create VPN’s…you can configure the switch ports in other deptts. and create a specific VLAN
of ur deptt. So that the persons can sit there and access to the required pcs.
 
6. ARP & RARP.....
      Stands for Address Resolution Protocol…whenever a request is sent by a node on one
network to the node on another network the Physical address(MAC) is required and for this
the IP address need to be flow over the network..whenever a router with that network (IP)
gets the msg. the required MAC address is sent through the network this process of
converting the IP address to MAC address is Called ARP..and the reverse thats the
convertion of the Mac address to the IP address is called RARP ( Reverse Address Resolution
Protocol)
 

7. What is the difference between layer 2 and layer 3 in the OSI model?
Layer 2 is responsible for switching data whereas Layer 3 is responsible for routing the data.
Layer3: With information gathered from user, Internet protocol make one IP packet with
source IP and Destination IP and other relevant information. It can then route packet
through router to the destination.
Layer2: Soon after it receives IP packet from layer 3, it encapsulate it with frame header
(ATM header in case of ATM technology) and send it out for switching. In case of Ethernet it
will send data to MAC address there by it can reach to exact destination. 

IP Address  

Definition:
This is based on Internet Protocol Version 4. Internet Protocol Version 6 (IPv6) for a
description of the newer 128-bit IP address.

An IP address is a 32-bit number that identifies each sender or receiver of information that
is sent in packets across the Internet. When you request an HTML page or send e-mail, the
Internet Protocol part of TCP/IP includes your IP address in the message (actually, in each
of the packets if more than one is required) and sends it to the IP address that is obtained
by looking up the domain name in the Uniform Resource Locator you requested or in the e-
mail address you're sending a note to. At the other end, the recipient can see the IP address
of the Web page requestor or the e-mail sender and can respond by sending another
message using the IP address it received.

IP Address Classes and Their Formats:


Since networks are vary in size, there are four different address or classes to consider when
applying to NIC for a network number:
Class A addresses - for large networks with many devices.
Class B addresses - for medium sized networks.
Class C addresses - for small networks (fewer than 256 devices).
Class D addresses - multicast addresses

IP Address Range:

Class A --- 1 -126 (00000001-01111110) 127.0.0.1 is a Loopback address.


Class B --- 128-191 (10000000-10111111)
Class C --- 192-223 (11000000-11011111)
Class D --- 224-239 (11100000-11101111)
Class E --- 240-255 (11110000-11111111)
Private IP Address:

Class A -- 10.0.0.0 to 10.255.255.255


Class B -- 172.16.0.0 to 172.31.255.255
Class C -- 192.168.0.0 to 192.168.255.255

Static and Dynamic IP:


Each device in an IP network is either assigned a permanent address (static IP) by the
network administrator or is assigned a temporary address (dynamic IP) via DHCP software.
Routers, firewalls and proxy servers use static addresses as do most servers and printers
that serve multiple users. Client machines may use static or dynamic IP addresses. The IP
address assigned to your service by your cable or DSL Internet provider is typically dynamic
IP. In routers and operating systems, the default configuration for clients is dynamic IP.

what is WORKGROUP?  

In computer networking, a workgroup is a collection of computers on a local area network


(LAN) that share common resources and responsibilities. Workgroups provide easy sharing
of files, printers and other network resources. Being a peer-to-peer (P2P) network design,
each workgroup computer may both share and access resources if configured to do so.

The Microsoft Windows family of operating systems supports assigning of computers to


named workgroups. Macintosh networks offer a similiar capability through the use of
AppleTalk zones. The Open Source software package Samba allows Unix and Linux systems
to join existing Windows workgroups.

Workgroups are designed for small LANs in homes, schools, and small businesses. A
Windows Workgroup, for example, functions best with 15 or fewer computers. As the
number of computers in a workgroup grows, workgroup LANs eventually become too
difficult to administer and should be replaced with alternative solutions like domains or
other client/server approaches.

Differance between DNS & WINS  

DNS refers to the Domain Name System -- a widely used service in networks all over the
world. DNS was created to serve the Internet Network, but also our LAN (Local Area
Network).

WINS, on the other hand, refers to Windows Internet Naming Service created by Microsoft
and was used in the older Windows NT4 networks as the services provided by the domain,
were heavily depended on it.

Today, WINS servers are not that common except in specific applications and network
conditions where they must exist. Because the majority of networks use DNS these days,
Windows 2000 and 2003 have migrated away from WINS and use DNS mainly. While both
services do identical jobs, that is, translate domains and hostnames into IP addresses, DNS
has become the number one standard for name resolution and it surely won't change for a
long time!

Use of Global catalogue


Contains partial replica of all objects in the entire forest
Contains universal groups
Validates user principle names (UPN) when you are creating. This checks that any UPN
exists with this name or not in the entire forest.

Explain the activities of each role?


1) Schema Master:
It will govern the Active Directory to all the Domain Controllers in a forest.
2) Domain Naming Master:
Maintains the unique Domain Naming System in a forest to avoid duplication.
3) RID master:
It assigns unique ID to every user account. (Domain + RID)
4) PDC Emulator:
If PDC is upgraded to windows 2000 it will send data to BDC’s on the network.
(Replication of user Database)
If the user password is not matching in a particular Domain, then it will contact PDC
emulator of first Domain Controller (Master Domain controller)
5) Infrastructure Master:
Maintains the infrastructure group proper files on the master Domain controller.

What is FSMO?
Flexible Single Master Operations

Note: The above five roles are called FSMO roles.

What is Fully Qualified Domain Name?


Hostname.domainname.com (this is also referred as computer name)

What is Kerberos?
It is an authentication service developed at the Massachusetts Institute of Technology.
Kerberos uses encryption to prevent intruders from discovering passwords and gaining
unauthorized access to files.

What is a default gateway?

    The exit-point from one network and entry-way into another network, often the router of
the network.

3.) What is DHCP?

    DHCP is a protocol which is designe for Automatic Give the IP Address to DHCP client..
DHCP Assine the IP Address for few days Lease & capture the clients MAC address.. It is
Updated version of BootP…

4.) What is LDAP used for?

    LDAP is a set of protocol used for providing access to information directories.

What is Global Catalogue?


This is a database on one or more domain controllers. Each copy of the database contains a replica of every
object in the Active Directory but with a limited number of each object's attributes.

Use of Global catalogue


Contains partial replica of all objects in the entire forest
Contains universal groups
Validates user principle names (UPN) when you are creating. This checks that any UPN exists with this name
or not in the entire forest.
What is a forest?

Collection of one or more domain trees that do not form a contiguous namespace. Forests allow
organizations to group divisions that operate independently but still need to communicate with one another.

All trees in a forest share common Schema, configuration partitions and Global Catalog. All trees in a give
forest trust each other with two way transitive trust relations.
What is a Domain?
A group of computers that are part of a network and shares a common directory and security polices. In
Windows 2000 a domain is a security boundary and permissions that are granted in one domain are not
carried over to other domains

5 :: What are the differences between a domain and a workgroup?


In a domain, one or more computer can be a server to manage the network. On the other hand in a
workgroup all computers are peers having no control on each other. In a domain, user doesn’t need an
account to logon on a specific computer if an account is available on the domain. In a work group user
needs to have an account for every computer.
In a domain, Computers can be on different local networks. In a work group all computers needs to be a
part of the same local network

78 :: Describe the concept of Subneting.


Subneting is a process of breaking the network into smaller units. These units care called as subnets.
Here a subnet could be several machines in a single LAN. Networks using IP can create sub networks of
logical addresses. With every IP address there some of the bits in the machine can be used to identify a
specific subnet. The IP address then contains three parts: the network number, the subnet number, and
the machine number

79 :: Explain the advantages of using Subneting.


Advantages of using Subneting:-

* Easier network management and trouble shooting


* Routing table’s size is reduced which means faster network transfers
* Solves network congestion problems:- Since the complete network is divided into smaller networks
* Network addresses can be decentralized e.g. the administrator of the network can monitor the subnet

97 :: What is the difference between public and private IP?


A public IP address allows equipment accessible to everyone on the internet. A private IP address is for
private use within the network and allows many more PCs to be connected. If you are using a private IP
and wants VOIP, you need to change to a public IP address.

120 :: What is protocol?


It is a set of rules to communicate between computers. Alternatively, the language the computer speaks
to communicate between none to node said to be protocol

Active Directory is a hierarchical collection of network resources that can contain users, computers, printers, and
other Active Directories. Active Directory Services (ADS) allow administrators to handle and maintain all network
resources from a single location. Active Directory is a feature in Windows 2000, XP, and Vista, and is not available
to Windows 95, Windows 98, Windows Me, Windows NT 4.0, Mac OS, Mac OS X, or Unix client software.

ADS replaced the legacy Windows NT 4.0 domain controllers on the Indiana University Bloomington and IUPUI
campuses. UITS retired the IUB and IUPUI NT Domains at the end of 2001.

Active Directory

The Windows-based directory service. Active Directory stores information about objects on a network and makes
this information available to users and network administrators. Active Directory gives network users access to
permitted resources anywhere on the network using a single logon process. It provides network administrators
with an intuitive, hierarchical view of the network and a single point of administration for all network objects.
Proxy server

A firewall component that manages Internet traffic to and from a local area network (LAN) and that can provide
other features, such as document caching and access control. A proxy server can improve performance by
supplying frequently requested data, such as a popular Web page, and it can filter and discard requests that the
owner does not consider appropriate, such as requests for unauthorized access to proprietary files.

Bandwidth

The data transfer capacity of a transmission medium. In digital communications, the transfer capacity expressed in
bits per second (bps) or megabits per second (Mbps). For example, Ethernet accommodates a bandwidth of
10,000,000 bps or 10 Mbps. In analog communications, the difference between the highest and lowest frequencies
in a specific range. For example, an analog telephone line accommodates a bandwidth of 3,000 hertz (Hz), the
difference between the lowest (300 Hz) and highest (3,300 Hz) frequencies that it can carry.

Das könnte Ihnen auch gefallen