windows interview questions and answers

27
 Wintel Interview Questions and Answers  1) Diferences b/w Conditional Fo rwarding and Stub Zones. Ans:- Both do the same thing like forwarding the requests to appropriate name servers who are authoritative for the domains in the queries. However, there is dierence in both, tub !one are "#namic and $onditional forwarder are static. Conditional Forwarding % &here #ou want "' clients in separate networks to resolve each others( names without having to quer# "' servers on the )nternet, such as in the case of a compan# merger, #ou should con*gure the "' servers in each network to forward queries for names in the other network. "' servers in one network will forward names for clients in the other network to a speci*c "' server that will build up a large cache of information about the other network. &hen forwarding in this wa#, #ou create a direct point of contact between two networks( "' servers, reducing the need for recursion. Stub Zone- tub-!ones are d#namic -A stub +one is like a secondar# +one in that it obtains its resource records from other name servers one or more master name servers. A stub +one is also read-onl# like a secondar# +one, so administrators can(t manuall# add, remove, or modif# resource records on it. But the dierences end here, as stub +ones are quite dierent from secondar# +ones in a couple of signi*cant wa#s.irst, while secondar# +ones contain copies of all the resource records in the corresponding +one on the master name server, stub +ones contain onl# three kinds of resource records: A cop# of the /A record for the +one. $opies of ' records for all name servers authoritative for the +one. $opies of A records for all name servers authoritative for the +one. ) !ow AD "e#lication Wor$s % Ans:- http:00technet.microsoft.com0en-us0librar#0cc112123v4ws.56.asp7 &) !ow D'S is i(#ortant in AD re#lication% Ans:- /nce "$ gets its replication 8artner Hostname then it queries "' for )8 Address. Also, 9"$ +one is required for "omain $ontroller ;ocator that enables the client to locate the "$. or complete details http:00technet.microsoft.com0en-us0librar#0cc1<=<<6&.56.asp7 ) *orts "e+uired ,or Do(ain Controllers to co((unicate.

Upload: mahadevi-biradar

Post on 08-Oct-2015

32 views

Category:

Documents


1 download

DESCRIPTION

Windows Interview Questions and Answers

TRANSCRIPT

Wintel Interview Questions and Answers1) Differences b/w Conditional Forwarding and Stub Zones.Ans:- Both do the same thing like forwarding the requests to appropriate name servers who are authoritative for the domains in the queries. However, there is difference in both, Stub Zone are Dynamic and Conditional forwarder are static.Conditional Forwarding Where you want DNS clients in separate networks to resolve each others names without having to query DNS servers on the Internet, such as in the case of a company merger, you should configure the DNS servers in each network to forward queries for names in the other network. DNS servers in one network will forward names for clients in the other network to a specific DNS server that will build up a large cache of information about the other network. When forwarding in this way, you create a direct point of contact between two networks DNS servers, reducing the need for recursion.Stub Zone-Stub-Zones are dynamic -A stub zone is like a secondary zone in that it obtains its resource records from other name servers (one or more master name servers). A stub zone is also read-only like a secondary zone, so administrators cant manually add, remove, or modify resource records on it. But the differences end here, as stub zones are quite different from secondary zones in a couple of significant ways.First, while secondary zones contain copies of all the resource records in the corresponding zone on the master name server, stub zones contain only three kinds of resource records: A copy of the SOA record for the zone. Copies of NS records for all name servers authoritative for the zone. Copies of A records for all name servers authoritative for the zone.2) How AD Replication Works ?Ans:-http://technet.microsoft.com/en-us/library/cc772726(v=ws.10).aspx3) How DNS is important in AD replication?Ans:- Once DC gets its replication Partner Hostname then it queries DNS for IP Address. Also, _MSDCS zone is required for Domain Controller Locator that enables the client to locate the DC.For complete detailshttp://technet.microsoft.com/en-us/library/cc759550(WS.10).aspx4) Ports Required for Domain Controllers to communicate.Ans:-http://yourcomputer.in/list-port-numbers-windows/

5) What is GPT and GPC?Ans:- A GPO (Group Policy Object) is a collection of Group Policy settings, it consists of GPC and GPT.GPC (Group Policy Container) contains the information of property of GPO like Security Filtering, GPO Status, GPO GUID etc.GPT (Group Policy Template) contains the data of GPO in Sysvol folder that can be checked after the configuration of the GPO that what settings have been configured to the client.6) What is new in Microsoft Clustering 2008?Ans:-http://yourcomputer.in/whats-new-windows-server-2008-cluster/7) What is Majority Node Set?Ans:-A majority node set is a single quorum resource, from a server cluster perspective; however, the data is actually stored on multiple disks across the cluster. Each cluster node stores the configuration on a local disk it can have access to when it starts up. By default, the location is pointed to %systemroot%\cluster\ResourceGUIDFurther Explained :-http://yourcomputer.in/windows-cluster-interview-questions-and-answers/If the configuration of the cluster changes, that change is replicated across the different disks8) What is NLB?Ans:- NLB (Network Load Balance)is aMicrosoftimplementation ofclusteringandload balancingthat is intended to provide high availability and high reliability, as well as high scalability.http://technet.microsoft.com/en-us/library/cc779570(v=ws.10).aspx9) Difference Between Unicast and MulticastAns:-UnicastUnicast is a one-to one connection between the client and the server. Unicast uses IP delivery methods such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), which are session-based protocols. When a Windows Media Player client connects using unicast to a Windows Media server, that client has a direct relationship to the server. Each unicast client that connects to the server takes up additional bandwidth. For example, if you have 10 clients all playing 100-kilobits per second (Kbps) streams, those clients as a group are taking up 1,000 Kbps. If you have only one client playing the 100 Kbps stream, only 100 Kbps is being used.MulticastMulticast is a true broadcast. The multicast source relies on multicast-enabled routers to forward the packets to all client subnets that have clients listening. There is no direct relationship between the clients and Windows Media server. The Windows Media server generates an .nsc (NetShow channel) file when the multicast station is first created. Typically, the .nsc file is delivered to the client from a Web server. This file contains information that the Windows Media Player needs to listen for the multicast. This is similar to tuning into a station on a radio. Each client that listens to the multicast adds no additional overhead on the server. In fact, the server sends out only one stream per multicast station. The same load is experienced on the server whether only one client or 1,000 clients are listeninghttp://support.microsoft.com/kb/29178610) What is new in Windows 2008 AD?Ans:-Read-Only Domain ControllersFine-Grained Password PoliciesRestartable Active Directory ServiceBackup and RecoverySYSVOL Replication with DFS-RAuditing ImprovementsUI Improvements11) How to configure RODC to replicate password of users?Ans:- You can add users in the PASSWORD REPLICATION POLICY tab of RODC computer properties12) What is the issue we face while recovering AD from VMware snapshot?13) Difference between Authoritative and Non-authoritative restore in AD?Ans:-http://yourcomputer.in/authoritative-vs-non-authoritative-restoration-of-active-directory14) What is new in Authoritative restoration in windows 2008?15) What is new in Windows Cluster 2008?Ans:- http://yourcomputer.in/whats-new-windows-server-2008-cluster/16) What is Strict Replication?Ans:-Strict Replication is a mechanism developed by Microsoft developers for Active Directory Replication. If a domain controller has the Strict Replication enabled then that domain controller will not get Lingering Objects from a domain controller which was isolated for more than the TombStone Life Time. TSL is 180 days by default on a Forest created with Windows Server 2003 SP1. A domain controller shouldnt be outof sync for more than this period. Lingering Objects may appear on other domain controllers if replication happens with the outdated domain controllers. These domain controllers will not replicate with the outdated domain controllers if you have set the below mentioned registry key.You must set the following registry setting on all the domain controllers to enable the Strict Replication: KEY Name:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters Registry Entry:Strict Replication Consistency Value:1 (enabled), 0 (disabled) Type:REG_DWORD17) What is Super Scope in DHCP?Ans:-Asuperscopeis an administrative feature of Dynamic Host Configuration Protocol (DHCP) servers running Windows Server2008 that you can create and manage by using the DHCP Microsoft Management Console (MMC) snap-in. By using a superscope, you can group multiple scopes as a single administrative entity. With this feature, a DHCP server can: Support DHCP clients on a single physical network segment (such as a single Ethernet LAN segment) where multiple logical IP networks are used. When more than one logical IP network is used on each physical subnet or network, such configurations are often calledmultinets. Support remote DHCP clients located on the far side of DHCP and BOOTP relay agents (where the network on the far side of the relay agent uses multinets).In multinet configurations, you can use DHCP superscopes to group and activate individual scope ranges of IP addresses used on your network. In this way, the DHCP server can activate and provide leases from more than one scope to clients on a single physical network.Superscopes can resolve specific types of DHCP deployment issues for multinets, including situations in which: The available address pool for a currently active scope is nearly depleted, and more computers need to be added to the network. The original scope includes the full addressable range for a single IP network of a specified address class. You need to use another range of IP addresses to extend the address space for the same physical network segment. Clients must be migrated over time to a new scope (such as to renumber the current IP network from an address range used in an existing active scope to a new scope that contains another range of IP addresses). You want to use two DHCP servers on the same physical network segment to manage separate logical IP networks.18) What is the requirement to configure Full memory Dump in windows?Ans:-To generate a complete memory dump file:1. ClickStart> right-clickComputerand selectPropertiesin the menu.2. ClickAdvanced > Settings > Startup and Recovery > Settings > Write debugging information > Complete memory dump.3. ClickOKtwice.19) Which DNS record is required for Replication?Ans:- Host A records of replication partners (Domain Controllers), Srv Records to find out the Domain Controllers GUID in _msdcs zone (DC Locator)20) Tools to analyze Memory Dump?Ans:-Windows Debugger (WinDbg.exe) toolDumpchk,exe21) Tools to troubleshoot Group Policy issues?Ans:- You can use AD inbuilt features to troubleshoot group policy issue like RSOP.msc or can run RSOP by selecting users in Active Directory users and computers, gpresult -v, gpt.ini in sysvol under Group Policy GUID folder can be checked to find out the GPO settings configured22) What AD parameters can be added to enable the Monitoring for AD?23) How to troubleshoot AD replication issues?Ans:- It can be troubleshooted by repmon command that generates the error result in eventvwr. DNS can be checked between two destination. Network/Firewall issue24) Booting sequence in windows 2008?Heres the brief description of Windows Server 2008 Boot process.1. System is powered on2. The CMOS loads the BIOS and then runs POST3. Looks for the MBR on the bootable device4. Through the MBR the boot sector is located and the BOOTMGR is loaded5. BOOTMGR looks for active partition6. BOOTMGR reads the BCD file from the \boot directory on the active partition7. The BCD (boot configuration database) contains various configuration parameters( this information was previously stored in the boot.ini)8. BOOTMGR transfer control to the Windows Loader (winload.exe) or winresume.exe in case the system was hibernated.9. Winloader loads drivers that are set to start at boot and then transfers the control to the windows kernel.25) How to edit Schema in AD?Ans:- Firstly,schmmgmt.dll has to be register. Then ADSIEdit tool can be used to edit schema.26) Difference between Windows 2003 & Windows 2008 boot processAns:-Windows 2003 Boot Process:1.POST2.The MBR reads the boot sector which is the first sector of the active partition.3.Ntldr looks path of os from boot.ini4.Ntldr to run ntdedetect.com to get information about installed hardware.5.Ntldr reads the registry files then select a hardware profile, control set and loads devicedrivers.6.After that Ntoskrnl.exe takes over and starts winlogon.exe which starts lsass.exeWindows Server 2008 Boot process.1. System is powered on2. The CMOS loads the BIOS and then runs POST3. Looks for the MBR on the bootable device4. Through the MBR the boot sector is located and the BOOTMGR is loaded5. BOOTMGR looks for active partition6. BOOTMGR reads the BCD file from the \boot directory on the active partition7. The BCD (boot configuration database) contains various configuration parameters( this information was previously stored in the boot.ini)8. BOOTMGR transfer control to the Windows Loader (winload.exe) or winresume.exe in case the system was hibernated.9. Winloader loads drivers that are set to start at boot and then transfers the control to the windows kernel.27) Name of utilities that is being used to check multipathingAns:- FCInfo utility or Storage Explorer (windows 2008) can be used to check the same.For complete details:http://yourcomputer.in/how-to-check-wwn-on-windows-server/28) How to create Host A record remotely?Ans:- dnscmd command can be used for creating a Resource Record on DNS server. Below is the command:dnscmd [] /recordadd 29) What is glue record?Ans:-Name servers in delegations are identified by name, rather than by IP address. This means that a resolving name server must issue another DNS request to find out the IP address of the server to which it has been referred. If the name given in the delegation is a subdomain of the domain for which the delegation is being provided, there is acircular dependency. In this case the name server providing the delegation must also provide one or more IP addresses for the authoritative name server mentioned in the delegation. This information is calledglue. The delegating name server provides this glue in the form of records in theadditional sectionof the DNS response, and provides the delegation in theanswer sectionof the response.For example, if theauthoritative name serverfor example.org is ns1.example.org, a computer trying to resolve www.example.org first resolves ns1.example.org. Since ns1 is contained in example.org, this requires resolving example.org first, which presents a circular dependency. To break the dependency, the name server for thetop level domainorg includes glue along with the delegation for example.org. The glue records are address records that provide IP addresses for ns1.example.org. The resolver uses one or more of these IP addresses to query one of the domains authoritative servers, which allows it to complete the DNS query.30) What is Loopback Group Policy?Ans:-Group Policy applies to the user or computer in a manner that depends on where both the user and the computer objects are located in Active Directory. However, in some cases, users may need policy applied to them based on the location of the computer object alone. You can use the Group Policy loopback feature to apply Group Policy Objects (GPOs) that depend only on which computer the user logs on to.31)Difference between Windows 2003 and Windows 2008Ans:-http://yourcomputer.in/difference-between-windows-2003-and-2008/32) TCP/UDP ports used in Windows?Ans:-http://yourcomputer.in/list-port-numbers-windows/

33) Types of RAIDAns:-http://yourcomputer.in/what-is-raid-configuration-in-windows/

Top Interview Questions for a System Administrator (Microsoft) Position:All of the questions below are very common and must be prepared for before facing any interview for a System-Server Administrator position.Q: What is Active Directory?A: Active Directory provides a centralised control for network administration and security. Server computers configured with Active Directory are known as domain controllers. Active Directory stores all information and settings for a deployment in a central database, and allows administrators to assign policies and deploy and update software.Q: What is a Domain?A: A domain is defined as a logical group of network objects (computers, users, devices) that share the same Active Directory database. A tree can have multiple domains.Q: What is Domain Controller?A: A domain controller (DC) or network domain controller is a Windows-based computer system that is used for storing user account data in a central database. It is the centrepiece of the Windows Active Directory service that authenticates users, stores user account information and enforces security policy for a Windows domain.A domain controller allows system administrators to grant or deny users access to system resources, such as printers, documents, folders, network locations, etc., via a single username and password.Q: What is Group Policy?A: Group Policy allows you to implement specific configurations for users and computers. Group Policy settings are contained in Group Policy objects (GPOs), which are linked to the following Active Directory service containers: sites, domains, or organizational units (OUs).Q: What are GPOs (Group Policy Objects)?A: A Group Policy Object (GPO) is a collection of settings that control the working environment of user accounts and computer accounts. GPOs define registry-based policies, security options, software installation and maintenance options, script options, and folder redirection options.There are two kinds of Group Policy objects: * Local Group Policy objects are stored on individual computers. * Nonlocal Group Policy objects, which are stored on a domain controller, are available only in an Active Directory environment.Q: What is LDAP?A: LDAP (Light-Weight Directory Access Protocol) determines how an object in an Active Directory should be named. LDAP is the industry standard directory access protocol, making Active Directory widely accessible to management and query applications. Active Directory supports LDAPv2 and LDAPv3.Q: Where is the AD database stored?A: The AD database is stored in C:\Windows\NTDS\NTDS.DIT.Q: What is the SYSVOL folder?A: The SYSVOL folder stores the server copy of the domains public files that must be shared for common access and replication throughout a domain.All AD databases are stored in a SYSVOL folder and its only created in an NTFS partition. The Active Directory Database is stored in the %SYSTEM ROOT%NDTS folder.Q: What is Garbage collection?A: Garbage collection is the online defragmentation of the Active Directory which happens every 12 hours.Q: When do we use WDS?A: Windows Deployment Services is a server role used to deploy Windows operating systems remotely. WDS is mainly used for network-based OS installations to set up new computers.Q: What is DNS and which port number is used by DNS?A: The Domain Name System (DNS) is used to resolve human-readable hostnames like www.intenseschool.com into machine-readable IP addresses like 69.143.201.22.DNS servers use UDP port 53 but DNS queries can also use TCP port 53 if the former is not accepted.Q: What are main Email Servers and which are their ports?A: Email servers can be of two types:Incoming Mail Server (POP3, IMAP, HTTP)The incoming mail server is the server associated with an email address account. There cannot be more than one incoming mail server for an email account. In order to download your emails, you must have the correct settings configured in your email client program.Outgoing Mail Server (SMTP)Most outgoing mail servers use SMTP (Simple Mail Transfer Protocol) for sending emails. The outgoing mail server can belong to your ISP or to the server where you setup your email account.The main email ports are: * POP3 port 110 * IMAP port 143 * SMTP port 25 * HTTP port 80 * Secure SMTP (SSMTP) port 465 * Secure IMAP (IMAP4-SSL) port 585 * IMAP4 over SSL (IMAPS) port 993 * Secure POP3 (SSL-POP) port 995Q: What do Forests, Trees, and Domains mean?A: Forests, trees, and domains are the logical divisions in an Active Directory network.A domain is defined as a logical group of network objects (computers, users, devices) that share the same active directory database.A tree is a collection of one or more domains and domain trees in a contiguous namespace linked in a transitive trust hierarchy.At the top of the structure is the forest. A forest is a collection of trees that share a common global catalog, directory schema, logical structure, and directory configuration. The forest represents the security boundary within which users, computers, groups, and other objects are accessible.Q: Why do we use DHCP?A: Dynamic Host Configuration Protocol assigns dynamic IP addresses to network devices allowing them to have a different IP address each time they are connected to the network.Q: What are Lingering Objects?A: A lingering object is a deleted AD object that still remains on the restored domain controller in its local copy of Active Directory. They can occur when changes are made to directories after system backups are created.When restoring a backup file, Active Directory generally requires that the backup file be no more than 180 days old. This can happen if, after the backup was made, the object was deleted on another DC more than 180 days ago.Q: How can we remove Lingering Objects?A: Windows Server 2003 and 2008 have the ability to manually remove lingering objects using the console utility command REPADMIN.EXE.Q: Why should you not restore a DC that was backed up 6 months ago?A: When restoring a backup file, Active Directory generally requires that the backup file be no more than 180 days old. If you attempt to restore a backup that is expired, you may face problems due to lingering objects.Q: How do you backup AD?A: Backing up Active Directory is essential to maintain the proper health of the AD database.Windows Server 2003You can backup Active Directory by using the NTBACKUP tool that comes built-in with Windows Server 2003 or use any 3rd-party tool that supports this feature.Windows Server 2008In Server 2008, there isnt an option to backup the System State data through the normal backup utility. We need to use the command line to backup Active Directory.1. Open up your command prompt by clicking Start, typing cmd and then hit Enter.2. In your command prompt, type wbadmin start systemstatebackup -backuptarget:e: and press Enter.---------------------------========================================-----------------------------------Windows admin interview questionsDescribe how the DHCP lease is obtained.Its a four-step process consisting of (a) IP request, (b) IP offer, IP selection and (d) acknowledgement.I cant seem to access the Internet, dont have any access to the corporate network and on ipconfig my address is 169.254.*.*. What happened?The 169.254.*.* netmask is assigned to Windows machines running 98/2000/XP if the DHCP server is not available. The name for the technology is APIPA (Automatic Private Internet Protocol Addressing).Weve installed a new Windows-based DHCP server, however, the users do not seem to be getting DHCP leases off of it.The server must be authorized first with the Active Directory.How can you force the client to give up the dhcp lease if you have access to the client PC?ipconfig /releaseWhat authentication options do Windows 2000 Servers have for remote clients? PAP, SPAP, CHAP, MS-CHAP and EAP.What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP/IP? NWLink (Novell), NetBEUI, AppleTalk (Apple).What is binding order?The order by which the network protocols are used for client-server communications. The most frequently used protocols should be at the top.How do cryptography-based keys ensure the validity of data transferred across the network?Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.Should we deploy IPSEC-based security or certificate-based security? They are really two different technologies. IPSec secures the TCP/IP communication and protects the integrity of the packets. Certificate-based security ensures the validity of authenticated clients and servers.What is LMHOSTS file?Its a file stored on a host machine that is used to resolve NetBIOS to specific IP addresses.Whats the difference between forward lookup and reverse lookup in DNS?Forward lookup is name-to-address, the reverse lookup is address-to-name.How can you recover a file encrypted using EFS?Use the domain recovery agent.What is the Difference between Windows 2003 standard Enterprise, Premium, Data center and Web Edition?WEB EDITION:To position windows server 2003 more competitively against other web servers, Microsoft has released a stripped-down-yet-impressive edition of windows server 2003 designed specially for web services. the feature set and licensing allows customers easy deployment of web pages, web sites, web applications and web services.Web Edition supports 2GB of RAM and a two-way symmetric multiprocessor(SMP). It provides unlimited anonymous web connections but only 10 inbound server message block(SMB) connections, which should be more than enough for contentpublishing. The server cannot be an internet gateway, DHCP or fax server. Although you can remotely administer the server with Remote Desktop, the server can not be a terminalserver in the traditional sense. The server can belong to a domain, but cannot be a domain controller. The included version of the microsoft SQL server database Engine can support as many as 25 concurrent connections.How do you recover an object in Active Directory, which is accidentally deleted by you, with no backup?Using ntdsutil.exe command,we can restored the AD objects.What is the Logical / Physical Structures of the AD Environment?physical structure:Forest, Site, Domain, DClogical structure:Schema partition, configuration partition, domain partition and application partitionHow to change the windows xp product key if wrongly installed with other product key but you have originalproduct key? What you will do to Make your os as Genuine?Some third party software are available for this function or reinstall this systemIf 512mb Ram is there what will be the minimum and maximum Virtual memory for the system?To workout the total virtual memory (page file) required for windows XP you should take the amount of ram in the system and + 25% (512MB + 25% (128MB) = 640MB total virtual memory. by setting both the min and max to 640MB you can increase the performances of the operating system.What is LDAP?LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to look up information from a server.What is the SYSVOL folder?The Sysvol folder on a Windows domain controller is used to replicate file-based data among domain controllers. Because junctions are used within the Sysvol folder structure, Windows NT file system (NTFS) version 5.0 is required on domain controllers throughout a Windows distributed file system (DFS) forest.What are application partitions? When do we use them?Application Directory Partition is a partition space in Active Directory which an application can use to store that application specific data. This partition is then replicated only to some specific domain controllers.The application directory partition can contain any type of data except security principles (users, computers, groups).How do we Backup Active Directory?Backing up Active Directory is essential to maintain an Active Directory database. You can back up Active Directory by using the Graphical User Interface (GUI) and command-line tools that the Windows Server 2003 family provides.You frequently backup the system state data on domain controllers so that you can restore the most current data. By establishing a regular backup schedule, you have a better chance of recovering data when necessary.To ensure a good backup includes at least the system state data and contents of the system disk, you must be aware of the tombstone lifetime. By default, the tombstone is 60 days. Any backup older than 60 days is not a good backup. Plan to backup at least two domain controllers in each domain, one of at least one backup to enable an authoritative restore of the data when necessary.How do we restore AD?You cant restore Active Directory (AD) to a domain controller (DC) while the Directory Service (DS) is running. To restore AD, perform the following steps.Reboot the computer.The computer will boot into a special safe mode and wont start the DS. Be aware that during this time the machine wont act as a DC and wont perform functions such as authentication.1. Start NT Backup.2. Select the Restore tab.3. Select the backup media, and select System State.4. Click Start Restore.5. Click OK in the confirmation dialog box.After you restore the backup, reboot the computer and start in normal mode to use the restored information. The computer might hang after the restore completes; Ive experienced a 30-minute wait on some machines.What are GPOs?Group Policy gives you administrative control over users and computers in your network. By using Group Policy, you can define the state of a users work environment once, and then rely on Windows Server 2003 to continually force the Group Policy settings that you apply across an entire organization or to specific groups of users and computers.What domain services are necessary for you to deploy the Windows Deployment Services on yournetwork?Windows Deployment Services requires that a DHCP server and a DNS server be installed in the domainWhat is the difference between a basic and dynamic drive in theWindowsServer2008environment?A basic disk embraces the MS-DOS disk structure; a basic disk can be divided into partitions (simple volumes).Dynamic disks consist of a single partition that can be divided into any number of volumes. Dynamic disks also support Windows Server 2008 RAID implementations.What is the main purpose of a DNS server?DNS servers are used to resolve FQDN hostnames into IP addresses and vice versaCommonly Used DNS Records?A-Records (Host address)CNAME-Records (Canonical name for an alias)MX-Records (Mail exchange)NS-Records (Authoritative name server)PTR-Records (domain name pointer)SOA-Records (Start of authority)------------------------------------------\\\\\\\\\\\\\\\\\\\-------------------\\\\\\\\\\\\\\\\\\\\\\\-----------------------------------------------------------Whats the difference between NTFS & FAT?NTFS is the current file system used by Windows Operating System. It provides security for local user as well as for domain users. It offers features like security permissions (to limit other users' access to folders), quotas (so one user can't fill up the disk), shadowing (backing up) and many other features that help Windows. On the other hand, FAT32 is the older Microsoft file system, primarily used by the Windows 9X line and Window could be installed on a FAT32 partition up to XP. In comparison, FAT32 offers none of what was mentioned above, and also has a maximum FILE (not folder) size of 4GB, which is kind of small these days, especially in regards to HD video.Why cannot you restore a DC that was backed up 4 months ago? When restoring a backup file, Active Directory generally requires that the backup file be no more than 180 days old. The lifetime of backed up file is either 60 or 120 days. If attempt to you restore a backup that is expired, you may encounter problems because of lingering objects.

What is VLAN?VLAN Stand for Virtual Local Area Network. It is a logical grouping of network users and resources connected to administratively defined ports on a switch.Uses of VLAN are as follows:-1. It is secured connection.2. It reduces cost for any network.3. It increases flexibility.4. On a network, sensitive data may be broadcast. In such cases, it provides security only those users who have access to the data.4. It creates separate broadcast domain.

What is the use of Global Catalog?A Global Catalog is something that each domain has, and it is used for authenticating the user on the network, on windows 2000 network logons were protected from failures by assigning a Global Catalog to every site. It stores a copy of all Active Directory objects in a forest. The global catalog stores a full copy of all objects in the directory for its host domain and a partial copy of all objects for all other domains in the forest.What is role of active directory?Active directory is a domain controller which is use to authenticate and administrate the group of computer, user, server etc. The active Directory means a service that identifies and handles resources, making them visible for different groups or members that are authorized. All the policies and security will be applicable on the client machine which one is join the domain and all this policies and security is defined in active directory.

What is binding order?The order by which the network protocols are used for client-server communications. The most frequently used protocols should be at the top.What do I do to look at the RID allocation table for a Domain Controller?Go to Command prompt and typeC:\>dcdiag /test:ridmanager /s: /vHere dcname is the name of our Domain Controller.What is the role of Proxy Server? A proxy server is a computer that acts as an intermediary between a local network and a larger-scale network such as the Internet. Proxy servers provide increased performance and security. In some cases, they monitor employees' use of outside resources. A proxy server is associated with or part of a gateway server that separates the enterprise network from the outside network and a firewall server that protects the enterprise network from outside intrusion.What is CIDR?CIDR stands for classless inter domain routing. It was developed in the 1990s as a standard scheme for routing network traffic across the Internet. It helps in preventing the wasting of IP address and nowadays we are facing the shortage of the IP address. So this CIDR helps to prevent the waste of IP address. CIDR notation is a syntax of specifying IP addresses and their associated routing prefix. It appends a slash character to the address and the decimal number of leading bits of the routing prefix, e.g., 192.168.1.0/24What is the role of DHCP?Dynamic Host Configuration Protocol (DHCP) is used for the DHCP servers, automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. The server knows nothing about the personal computers until they make a request for information. Usually the most common information sent is IP address and DHCP is used to make a large network administration easier. DHCP is also useful if an administrator wants to change the IP addresses of a large number of systems. Instead of reconfiguring all the systems, he can just edit one DHCP configuration file on the server for the new set of IP addresses.What is the SYSVOL folder?Sysvol is an important component of Active Directory. The Sysvol folder stores the servers copy of the domains public files. The Sysvol folder is shared on an NTFS volume on all the domain controllers in a particular domain. The term SYSVOL refers to a set of files and folders that reside on the local hard disk of each domain controller in a domain and that are replicated by the File Replication service (FRS). Sysvol is used to deliver the policy and logon scripts to domain members.What is difference between Frond end & Back End Server?A back end server is a computer resource that has not been exposed to the internet. For this the computing resource does not directly communicate with the internet user. It can also be described as a server whose main role is to store and retrieve all email messages. On the other hand, a frontend server is a computer resource that has exposed to the internet.What are the role Unicast, Multicast and Broadcast?Unicast is a kind of transmission in which data is sent from one host to another host. Unicast transmission is one-to-one communications.Unicast -> A transmission to a single port.Multicast is different from Unicast. Its a transmission where data can be sent to more host. Where information is sent to multiple receiver.On the other hand, In Broadcast data is sent by one host but received by all the hosted connected with it.Windows Questions and Answers:1 :: What is the Difference between Windows 2003 standard Enterprise, Premium, Data center and Web Edition? WEB EDITION:

To position windows server 2003 more competitively against other web servers, Microsoft has released astripped-down-yet-impressive edition of windows server 2003 designed specially for web services. the feature set and licensing allows customers easy deployment of web pages, web sites, web applications and web services.Web Edition supports 2GB of RAM and a two-way symmetric multiprocessor(SMP). It provides unlimited anonymous web connections but only 10 inbound server message block(SMB) connections, which should be more than enough for contentpublishing. The server cannot be an internet gateway, DHCP or fax server. Although you can remotely administer the server with Remote Desktop, the server can not be a terminalserver in the traditional sense. The server can belong to a domain, but cannot be a domain controller. The included version of the microsoft SQL server database Engine can support as many as 25 concurrent connections. Is This Answer Correct?74 Yes4 NoPost Your Answer 2 :: How do you recover an object in Active Directory, which is accidentally deleted by you, with no backup? Using ntdsutil.exe command,we can restored the AD objects. Is This Answer Correct?108 Yes4 NoPost Your Answer 3 :: What is the Logical / Physical Structures of the AD Environment? physical structure:Forest, Site, Domain, DC

logical structure:Schema partition, configuration partition, domain partition and application partition Is This Answer Correct?73 Yes7 NoPost Your Answer 4 :: How to change the windows xp product key if wrongly installed with other product key but you have originalproduct key? What you will do to Make your os as Genuine? Some third party software are available for this function or reinstall this system Is This Answer Correct?55 Yes6 NoPost Your Answer 5 :: If 512mb Ram is there what will be the minimum and maximum Virtual memory for the system? To workout the total virtual memory (page file) required for windows XP you should take the amount of ram in the system and + 25% (512MB + 25% (128MB) = 640MB total virtual memory. by setting both the min and max to 640MB you can increase the performances of the operating system. Is This Answer Correct?36 Yes5 NoPost Your Answer 6 :: Ntfldr.exe is missing in win xp os what will you do? Boot from windows xp cd and go to recovery console modegive the administrator passwordc:windows>prompt will comecome out from windows with the help of commandc:windows>cd ..c:>

go to cd prompt d:d:>cd i386d:i386>copy ntldr c: enter

d:i386>copy ntdetect.com c: enter

restart u r computer

problem fix Is This Answer Correct?30 Yes0 NoPost Your Answer 7 :: What is LDAP? LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to look up information from a server. Is This Answer Correct?33 Yes4 NoPost Your Answer 8 :: What is the SYSVOL folder? The Sysvol folder on a Windows domain controller is used to replicate file-based data among domain controllers. Because junctions are used within the Sysvol folder structure, Windows NT file system (NTFS) version 5.0 is required on domain controllers throughout a Windows distributed file system (DFS) forest. Is This Answer Correct?18 Yes2 NoPost Your Answer 9 :: What are application partitions? When do we use them? Application Directory Partition is a partition space in Active Directory which an application can use to store that application specific data. This partition is then replicated only to some specific domain controllers.

The application directory partition can contain any type of data except security principles (users, computers, groups). Is This Answer Correct?15 Yes1 NoPost Your Answer 10 :: What is the KCC? With in a Site, a Windows server 2003 service known as the KCC automatically generates a topology for replication among the domain controllers in the domain using a ring structure.Th Kcc is a built in process that runs on all domain controllers.

The KCC analyzes the replication topology within a site every 15 minute to ensure that it still works. If you add or remove a domain controller from the network or a site, the KCC reconfigures the topology to relect the change. Server Roles and FeaturesWindows Server 2012: Server Roles and FeaturesThe newest version of Windows Server has new and enhanced features that greatly simplify a server administrators job making it easier and more efficient. Planning is the most logical step in the process of installing and configuring your network for Windows Server 2012.Any administrator realizes the value in knowing the capabilities, server roles, features, versions, and licensing information of the server. So that the server can be put to the best possible use to allow for making the network to be more efficient and allow users to be more productive within the organization.The role that a server performs is a primary duty, service, or technology that the server provides for an organization. Windows Server 2012 provides several primary sever roles.

Windows Server 2012 Server Roles

Active Directory Certificate Services (ADCS) enables Windows Server 2012 to provide certificates to clients and servers.Active Directory Domain Services (ADDS) configures server to host Active Directory database, and to use this database to authenticate users to logon to the network and authorize their use of resources.Active Directory Federation Services (ADFS) enables a Windows Server 2012 sever to use login information for a variety of severs and services so that a single login provides users with access to all resources.Active Directory Lightweight Directory Services (ADLDS) used to setup a small version of Active Directory database for the purpose of Active Directory integrated applications.Active Directory Rights Management Services (ADRMS) enables Active Directory to exchange information with AD RMS- compatible software. Enabling an additional layer of security that content owners can use to protect their documents. Content owners can specifically set permissions that controls who can open, modify, forward or print each document.Application Server a server on which you have installed an server application such as Microsoft SQL Server or Microsoft Exchange Server.DHCP Server enables a Windows server to automatically lease IP addresses to different clients such as computers and printers instead of requiring you to manually configure each devices IP address settings.DNS Server configures a Windows server to provide name resolution services the process by which a computer finds a computers IP address based on a provide computer name.FAX Server a fax server sends and receives faxes for multiple users. When it receives faxes, a fax server forwards those faxes to the relevant users mailbox.File and Storage Services a server service, used to manage access to files on the server. Also used to implement Distributed File Services (DFS) and access to network storage.Hyper-V Hyper V service is installed and configured to support the implementation of virtual machines.Print and Document Services enables you to centrally manage printers and scanners, as well as their queues on the network.Network Policy and Access Services enables you to secure remote access to the network, meeting requirements that all remote users authenticate to the server running Network Policy and Access Services before gaining access to the corporate network.Remote Access - enables users to connect to the network remotely without requiring virtual private network (VPN) connections.Remote Desktop Services enables a Windows server to provide access to virtual desktops, session-based desktops, and applications that encompass Remote App.Volume Activation Services configures a Windows server to automate the process of tracking volume license keys and their activation. The service can also be used to implement Key Management Services (KMS) host or Active Directory-based license activation for domain members.Web Server (IIS) enables the setup of a Windows server as a web server.Windows Deployment Services (WDS) a service used to install and configure Windows operating systems across the network.Windows Server Update Services (WSUS) enables automated deployment of updates for Microsoft products such as Windows and Microsoft Office.

Windows Server 2012 Features

Windows BitLocker Drive Encryption enable or disable encryption at the disk or volume level. Enables encryption at the Windows startup environment.Failover Clustering used to set up server clusters, increasing the reliability of you your servers by providing back up servers.Group Policy Management an administrative console used to implement Group Policy on an organizations network.Ink and Handwriting Services enables the network to support input via pens, and recognition of handwriting and math equations.Internet Printing Client configure support for user to connect and print to local printers or Internet printers using the Internet Printing Protocol (IPP).Network Load Balancing (NLB) used to balance the user workload across multiple servers running a stateless application. Stateless applications respond independently to each client request, making it possible for multiple servers to balance the client requests.Remote Assistance enables support to clients that send invitations, by providing remote assistance you can access the client desktop as if you were sitting at the actual computer.Remote Server Administration Tools enables remote management of servers running Windows Server 2008 R2 and Windows Server 2012. It is also possible to manage Windows Server 2003 servers as long as you connect to them through a server running either Windows Server 2008 R2 or Windows Server 2012.Simple Mail Transfer Protocol use to configure a server to send email messages.Telnet Client, Telnet Server enables setup of server to support uses connecting and accessing files using the Telnet Protocol. The Telnet Client is used to connect to Telnet servers.Windows PowerShell- provides a command-line interface for running commands or scripts to perform administrative tasks.Windows Server Backup use to backup a Windows server and if necessary to restore a backup after a server failure.Windows System Resource Manager(WSRM) - enables the configuration of the allocation of both a servers CPU and RAM resources.Wireless Local Area Network Service (LAN) configure the wireless LAN service to enable a server to communicate using a wireless network adapter.Windows on Windows (WoW) 64 Support Windows Server 2012 64-Bit servers use this feature to allow 32-Bit applications to run.

New Features Added to Windows Server 2012

Command auto-completion a feature that displays clickable lists of cmdlets as you type in Windows PowerShell. Lists include matching cmdlets, parameters, parameter values, files, folders.Enhanced storage Windows Server 2012 includes features that enable the operating system to support large disk workloads on virtual machines. Also included is a new virtual hard disk format (VHDX) which improves performance, support for Virtual Fibre Channel enabling virtual machines to communicate with Fibre Channel Storage Area Networks (SANs); The ability to implement 4-KB disk sectors on Hyper-V virtual disk for improved capacity and reliability; and support for Offloaded Data Transfer (ODX), enabling the virtual machine host to focus CPU time on the application and rely on the SAN to manage reading and writing to disk.Features on Demand Choosing this feature during installation prevents Setup from copying all operating system source files to the servers disk. The advantage is it eliminates the use of disk space for storage of resource files. To install a feature or role you use Features on Demand to install features and roles by obtaining source files and resources stored in a remote location, Windows update, or the installation media. The disadvantage of implementation is that you must provide the source files whenever you want to install a feature or sever role.IP Address Management (IPAM) Server enables central management of both DHCP and DNS servers. Can also be used to discover, monitor, and audit DHCP and DNS servers.New Cmdlets new cmdlets for configuring and managing Active Directory replication and replication topology.Resilient File System (ReFS) included in Windows Server 2012 is this new file system provides enhanced reliability, better data integrity, and compatibility with existing APIs and file system filters.Revised Task Manager The new Task Manager includes a new Processes Tab, enabling you to identify the processes that are consuming server resources.User interface you are prompted during installation whether you want to install a Server Core installation, a Minimal Server Interface, a server with a graphical user interface (GUI), or full desktop experience interface. After installing a server different options can be chosen by using PowerShell cmdlets.Windows BrancheCache - a bandwidth optimization technology designed to optimize the traffic on a wide area network (WAN). BranchCache optimizes performance by caching content from a headquarters office and storing it locally on the BranchCache Server.