1. Describe how the DHCP lease is obtained.
It’s a four-step process consisting of (a) IP request, (b) IP offer, (c) IP selection and (d) acknowledgement.
2. I can’t seem to access the Internet, don’t have any access to the corporate network and on ipconfig my address is 169.254.*.*. What happened?
The 169.254.*.* netmask is assigned to Windows machines running 98/2000/XP if the DHCP server is not available. The name for the technology is APIPA (Automatic Private Internet Protocol Addressing).
3. We’ve installed a new Windows-based DHCP server, however, the users do not seem to be getting DHCP leases off of it.
The server must be authorized first with the Active Directory.
4. How can you force the client to give up the DHCP lease if you have access to the client PC?
ipconfig /release
5. What authentication options do Windows 2000 Servers have for remote clients?
PAP, SPAP, CHAP, MS-CHAP and EAP.
6. What is data link layer in the OSI reference model responsible for? Data link layer is located above the physical layer, but below the network layer.
Taking raw data bits and packaging them into frames. The network layer will be responsible for addressing the frames, while the physical layer is responsible for retrieving and sending raw data bits.
7. What is binding order?
The order by which the network protocols are used for client-server communications. The most frequently used protocols should be at the top.
8. What is LMHOSTS file?
It’s a file stored on a host machine that is used to resolve NetBIOS to specific IP addresses.
9. What’s the difference between forward lookup and reverse lookup in DNS?
Forward lookup is name-to-address; the reverse lookup is address-to-name.
10. How can you recover a file encrypted using EFS?
Monday, June 13, 2011
Wednesday, December 30, 2009
Technical Interview Questions
1) What is an IP address?
An identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods.
Each number can be zero to 255. For example, 1.160.10.240 could be an IP address. Within an isolated network, you can assign IP addresses at random as long as each one is unique.
However, connecting a private network to the Internet requires using registered IP addresses (called Internet addresses) to avoid duplicates.
The four numbers in an IP address are used in different ways to identify a particular network and a host on that network. Four regional Internet registries -- ARIN, RIPE NCC, LACNIC and APNIC -- assign Internet addresses from the following three classes.
Ø Class A - supports 16 million hosts on each of 126 networks
Ø Class B - supports 65,000 hosts on each of 16,000 networks
Ø Class C - supports 254 hosts on each of 2 million networks
The number of unassigned Internet addresses is running out, so a new classless scheme called CIDR is gradually replacing the system based on classes A, B, and C and is tied to adoption of IPv6.
2)What is a subnet mask?
A subnet mask allows you to identify which part of an IP address is reserved for the network, and which part is available for host use.
v Class A = 255.0.0.0
v Class B = 255.255.0.0
v Class C = 255.255.255.0
An IP address has two components, the network address and the host address. A subnet mask separates the IP address into the network and host addresses (). Subnetting further divides the host part of an IP address into a subnet and host address (). It is called a subnet mask because it is used to identify network address of an IP address by perfoming bitwise AND operation on the netmask.
3)What is ARP?
ARP is the Address Resolution Protocol.
The ARP protocol maps addresses between the Data Link Layer and the Network Layer of the OSI Model.
The Data Link layer of TCP/IP networks utilizes MAC addresses; the Network Layer of TCP/IP networks utilizes IP addresses.
ARP and RARP
The ARP protocol is used to map IP addresses to MAC addresses.
RARP, the Reverse ARP Protocol, is used to map MAC addresses to IP addresses.
4) What is ARP Cache Poisoning?
ARP stands for Address Resolution Protocol. Every computer in a LAN has 2 identifiers: IP and MAC address. IP is either entered by the user or dynamically allocated by a server. But the MAC address is unique for any Ethernet card. For example, if you have 2 ethernet cards, one for wired and the other for WiFi, you have 2 MAC addresses on your machine. The MAC address is a hardware code for your ethernet card. The communications between computers is done on the IP level. Means that if you want to send a file to a computer, you need to know the other computer IP. Now, ARP is the protocol that matches every IP with a certain MAC address in ARP table that is saved on your switch in your LAN. ARP cache poisoning is changing this ARP table on the switch. For Normal case, when a machine tries to connect to another machine. The first machine goes to the ARP table with the other machine IP, the ARP table provide the MAC address for the other machine and the communication starts. But if someone plays with the table, the first machine goes with the IP and the ARP table will provide a faulty MAC address to a 3rd machine who wants to intrude through your communication. This Kind of attach is known as "Man in the Middle".
5) What is the ANDing process?
Anding is a process in which we AND "IP address" with "subnet mask" to get Network ID.
6) What is a default gateway? What happens if I don't have one?
A Default gateway is a node (a router) on a TCP/IP Network that serves as an access point to another network.a default geteway is used by a host when the ip's packet destination address belongs to someplace outside the local subnet,
7) Can a workstation computer be configured to browse the Internet and yet NOT have a default gateway?
If we are using public ip address, we can browse the internet. If it is having an intranet address a gateway is needed as a router or firewall to communicate with internet.
8) What is a subnet?
A subnet is a logical organization of network address ranges used to separate hosts and network devices from each other to serve a design purpose. In many cases, subnets are created to serve as physical or geographical separations similar to those found between rooms, floors, buildings, or cities.
Most modern subnet definitions are created according to 3 main factors. These include:
Ø The number of hosts that needs to exist on the subnet now and in the future;
Ø The necessary security controls between networks; and
Ø The performance required for communications between hosts.
9) What is APIPA?
Short for Automatic Private IP Addressing, a feature of later Windows operating systems. With APIPA, DHCP clients can automatically self-configure an IP address and subnet mask when a DHCP server isn't available. When a DHCP client boots up, it first looks for a DHCP server in order to obtain an IP address and subnet mask. If the client is unable to find the information, it uses APIPA to automatically configure itself with an IP address from a range that has been reserved especially for Microsoft. The IP address range is 169.254.0.1 through 169.254.255.254. The client also configures itself with a default class B subnet mask of 255.255.0.0. A client uses the self-configured IP address until a DHCP server becomes available.
The APIPA service also checks regularly for the presence of a DHCP server (every five minutes, according to Microsoft). If it detects a DHCP server on the network, APIPA stops, and the DHCP server replaces the APIPA networking addresses with dynamically assigned addresses.
APIPA is meant for nonrouted small business environments, usually less than 25 clients.
10) What is an RFC? Name a few if possible (not necessarily the numbers, just the ideas behind them)
An RFC is a Request For Comment, for the discussion and development of new protocols and techniques for use on the Internet. It is run by the IETF.
11) What is CIDR?
CIDR (Classless Inter-Domain Routing, sometimes known as supernetting) is a way to allocate and specify the Internet addresses used in inter-domain routing more flexibly than with the original system of Internet Protocol (IP) address classes. As a result, the number of available Internet addresses has been greatly increased. CIDR is now the routing system used by virtually all gateway hosts on the Internet's backbone network. The Internet's regulating authorities now expect every Internet service provider (ISP) to use it for routing.
12)You have the following Network ID: 192.115.103.64/27. What is the IP range for your network?
13) You have the following Network ID: 131.112.0.0. You need at least 500 hosts per network. How many networks can you create? What subnet mask will you use?
14) You need to view at network traffic. What will you use? Name a few tools
15) How do I know the path that a packet takes to the destination?
use "tracert" command-line
An identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods.
Each number can be zero to 255. For example, 1.160.10.240 could be an IP address. Within an isolated network, you can assign IP addresses at random as long as each one is unique.
However, connecting a private network to the Internet requires using registered IP addresses (called Internet addresses) to avoid duplicates.
The four numbers in an IP address are used in different ways to identify a particular network and a host on that network. Four regional Internet registries -- ARIN, RIPE NCC, LACNIC and APNIC -- assign Internet addresses from the following three classes.
Ø Class A - supports 16 million hosts on each of 126 networks
Ø Class B - supports 65,000 hosts on each of 16,000 networks
Ø Class C - supports 254 hosts on each of 2 million networks
The number of unassigned Internet addresses is running out, so a new classless scheme called CIDR is gradually replacing the system based on classes A, B, and C and is tied to adoption of IPv6.
2)What is a subnet mask?
A subnet mask allows you to identify which part of an IP address is reserved for the network, and which part is available for host use.
v Class A = 255.0.0.0
v Class B = 255.255.0.0
v Class C = 255.255.255.0
An IP address has two components, the network address and the host address. A subnet mask separates the IP address into the network and host addresses (
3)What is ARP?
ARP is the Address Resolution Protocol.
The ARP protocol maps addresses between the Data Link Layer and the Network Layer of the OSI Model.
The Data Link layer of TCP/IP networks utilizes MAC addresses; the Network Layer of TCP/IP networks utilizes IP addresses.
ARP and RARP
The ARP protocol is used to map IP addresses to MAC addresses.
RARP, the Reverse ARP Protocol, is used to map MAC addresses to IP addresses.
4) What is ARP Cache Poisoning?
ARP stands for Address Resolution Protocol. Every computer in a LAN has 2 identifiers: IP and MAC address. IP is either entered by the user or dynamically allocated by a server. But the MAC address is unique for any Ethernet card. For example, if you have 2 ethernet cards, one for wired and the other for WiFi, you have 2 MAC addresses on your machine. The MAC address is a hardware code for your ethernet card. The communications between computers is done on the IP level. Means that if you want to send a file to a computer, you need to know the other computer IP. Now, ARP is the protocol that matches every IP with a certain MAC address in ARP table that is saved on your switch in your LAN. ARP cache poisoning is changing this ARP table on the switch. For Normal case, when a machine tries to connect to another machine. The first machine goes to the ARP table with the other machine IP, the ARP table provide the MAC address for the other machine and the communication starts. But if someone plays with the table, the first machine goes with the IP and the ARP table will provide a faulty MAC address to a 3rd machine who wants to intrude through your communication. This Kind of attach is known as "Man in the Middle".
5) What is the ANDing process?
Anding is a process in which we AND "IP address" with "subnet mask" to get Network ID.
6) What is a default gateway? What happens if I don't have one?
A Default gateway is a node (a router) on a TCP/IP Network that serves as an access point to another network.a default geteway is used by a host when the ip's packet destination address belongs to someplace outside the local subnet,
7) Can a workstation computer be configured to browse the Internet and yet NOT have a default gateway?
If we are using public ip address, we can browse the internet. If it is having an intranet address a gateway is needed as a router or firewall to communicate with internet.
8) What is a subnet?
A subnet is a logical organization of network address ranges used to separate hosts and network devices from each other to serve a design purpose. In many cases, subnets are created to serve as physical or geographical separations similar to those found between rooms, floors, buildings, or cities.
Most modern subnet definitions are created according to 3 main factors. These include:
Ø The number of hosts that needs to exist on the subnet now and in the future;
Ø The necessary security controls between networks; and
Ø The performance required for communications between hosts.
9) What is APIPA?
Short for Automatic Private IP Addressing, a feature of later Windows operating systems. With APIPA, DHCP clients can automatically self-configure an IP address and subnet mask when a DHCP server isn't available. When a DHCP client boots up, it first looks for a DHCP server in order to obtain an IP address and subnet mask. If the client is unable to find the information, it uses APIPA to automatically configure itself with an IP address from a range that has been reserved especially for Microsoft. The IP address range is 169.254.0.1 through 169.254.255.254. The client also configures itself with a default class B subnet mask of 255.255.0.0. A client uses the self-configured IP address until a DHCP server becomes available.
The APIPA service also checks regularly for the presence of a DHCP server (every five minutes, according to Microsoft). If it detects a DHCP server on the network, APIPA stops, and the DHCP server replaces the APIPA networking addresses with dynamically assigned addresses.
APIPA is meant for nonrouted small business environments, usually less than 25 clients.
10) What is an RFC? Name a few if possible (not necessarily the numbers, just the ideas behind them)
An RFC is a Request For Comment, for the discussion and development of new protocols and techniques for use on the Internet. It is run by the IETF.
11) What is CIDR?
CIDR (Classless Inter-Domain Routing, sometimes known as supernetting) is a way to allocate and specify the Internet addresses used in inter-domain routing more flexibly than with the original system of Internet Protocol (IP) address classes. As a result, the number of available Internet addresses has been greatly increased. CIDR is now the routing system used by virtually all gateway hosts on the Internet's backbone network. The Internet's regulating authorities now expect every Internet service provider (ISP) to use it for routing.
12)You have the following Network ID: 192.115.103.64/27. What is the IP range for your network?
13) You have the following Network ID: 131.112.0.0. You need at least 500 hosts per network. How many networks can you create? What subnet mask will you use?
14) You need to view at network traffic. What will you use? Name a few tools
15) How do I know the path that a packet takes to the destination?
use "tracert" command-line
Difference between windows 2000 server and windows 2003 server
Difference between windows 2000 server and windows 2003 server
1. Domain rename is not possible in windows 20002.In w 2003 server inbuilt firewall is there.3. windows 2k - IIS 5 and windows 2k3 - II64.Windows 2k - IE 5 and Windows 2k3 - IE65. Terminal service are enhanced in win2k36.Windows 2k doesn't have 64 bit version7. DNS Stub zone has introduced in win2k3.8. Shadow copying has introduced.9. Schema version has changed from ver.13 to ver.30.10.Win2000 Supports 4-node clustering and 2003 supports 8-node clustering. 11Win 2003 has High HCL Support (Hardware Compatibility List) issued by Microsoft.12.Code name of 2000 is Win NT 5.0 and Code name of 2003 is Win NT 5.113.In 2000 we can create 1 million users and in 2003 we can create 1 billion users.14.Win2003 has Improved Print management compared to 2000 server.15.Win2003 has telnet sessions available.16.Win2000 supports IPV4 whereas 2003 supports IPV4 and IPV6.17In Win 2000 server we can apply 620 group policies but in 2003 we can apply nearly 720 so Win2003 server is more secure than win 2000 server.18.Win2000 doesn’t support Dot net whereas 2003 Supports Microsoft .NET 2.0 19.In 2000 it supports of 8 processors and 64 GB RAM (In 2000 Advance Server) whereas in 2003 supports up to 64 processors and max of 512GB RAM.20.Win2000 has Server and Advance Server editions whereas 2003 has Standard, Enterprise, Datacenter and Web server Editions. 21.Win2000 has basic concept of DFS (Distributed File systems) with defined oots whereas 2003 has Enhanced DFS support with multiple roots.22.In 2000 there is complexality in administering Complex networks whereas 2003 is easy administration in all & Complex networks.23.In 2003 we have concept of Volume shadow copy service which is used to create hard disk snap shot which is used in Disaster recovery and 2000 doesn’t have this service. 24.In 2000 we don’t have end user policy management, whereas in 2003 we have a End user policy management which is done in GPMC (Group policy management console).25In 2000 we have cross domain trust relation ship and 2003 we have Cross forest trust relationship. 26.2003 has service called ADFS (Active Directory Federation Services) which is used to communicate between branches with safe authentication. 27.In 2003 their is improved storage management using service File Server Resource Manager (FSRM).28.2003 has service called Windows Share point Services (It is an integrated portfolio of collaboration and communication services designed to connect people, information, processes, and systems both within and beyond the organizational firewall). 29.When installing terminal services for win2000 u r prompted to select application server functions or administrative functions sets can be installed sequently on one server but it performs only one function at one time. But in 2003 still distinguishes between application and administrative services but installation and management are now consolidated.Win2000 ADS :-1.Only one million object can be created.2.Universal group membership is not present.3. Between parent and child, there is no built in trust .It is called as non-transitive trust.4. There is only three AD partition, Domain partition, configuration partition, schema partition.5. In Win 2000 server we can apply 620 group policies .6. but 2k only Emergency Repair Disk(ERD) is there.
Win2003 ADS :-1.2 Million object can be created .2.Between parent and child, there is built in trust .It is called as transitive trust.3. Same partitions are there in 2003, but one additional partition called Application directory partition is present.4. but in 2003 we can apply nearly 720 so Win2003 server is more secure than win 2000 Server.5. Automated System Recovery(ASR) is there.
Windows Server2000 Administration Questions
1.Explain hidden shares.
Hidden or administrative shares are share names with a dollar sign ($) appended to their names. Administrative shares are usually created automatically for the root of each drive letter. They do not display in the network browse list.
2.How do the permissions work in Windows 2000?
What permissions does folder inherit from the parent? When you combine NTFS permissions based on users and their group memberships, the least restrictive permissions take precedence. However, explicit Deny entries always override Allow entries.
3.Why can’t I encrypt a compressed file on Windows 2000?
You can either compress it or encrypt it, but not both.
4.If I rename an account, what must I do to make sure the renamed account has the same permissions as the original one? Nothing, it’s all maintained automatically.
5.What’s the most powerful group on a Windows system? Administrators.
6.What are the accessibility features in Windows 2000?
Sticky Keys, Filter Keys Narrator, Magnifier, and On-Screen Keyboard.
7.Why can’t I get to the Fax Service Management console?
You can only see it if a fax had been installed.
8.What do I need to ensure before deploying an application via a Group Policy?
Make sure it’s either an MSI file, or contains a ZAP file for Group Policy.
9.How do you configure mandatory profiles? Ans: Rename ntuser.dat to ntuser.man
10.How to get multiple displays to work in Windows 2000?
Multiple displays have to use peripheral connection interface (PCI) or Accelerated Graphics Port (AGP) port devices to work properly with Windows 2000.
11.What’s a maximum number of processors Win2k supports? Ans:2
12.I had some NTFS volumes under my Windows NT installation. What happened to NTFS after Win 2k installation?
It got upgraded to NTFS 5.
13.How do you convert a drive from FAT/FAT32 to NTFS from the command line? Ans: convert c: /fs:ntfs
14. Explain APIPA.
Auto Private IP Addressing (APIPA) takes effect on Windows 2000 Professional computers if no DHCP server can be contacted. APIPA assigns the computer an IP address within the range of 169.254.0.0 through 169.254.255.254 with a subnet mask of 255.255.0.0.
15.How does Internet Connection Sharing work on Windows 2000?
Internet Connection Sharing (ICS) uses the DHCP Allocator service to assign dynamic IP addresses to clients on the LAN within the range of 192.168.0.2 through 192.168.0.254. In addition, the DNS Proxy service becomes enabled when you implement ICS.
16What is Active Directory schema?
The Active Directory schema contains formal definitions of every object class that can be created in an Active Directory forest it also contains formal definitions of every attribute that can exist in an Active Directory object.Active Directory stores and retrieves information from a wide variety of applications and services.
16.What is Global Catalog Server?
A global catalog server is a domain controller it is a master searchable database that contains information about every object in every domain in a forest. The global catalog contains a complete replica of all objects in Active Directory for its host domain, and contains a partial replica of all objects in Active Directory for every other domain in the forest. It have two important functions:1)•Provides group membership information during logon and authentication 2)•Helps users locate resources in Active Directory
17.What is the ntds.tit file default size? Ans: 40 MB
18.Describe how the DHCP lease is obtained.
It’s a four-step process consisting of (a) IP request (b) IP offer(C) IP selection (d) acknowledgement.
19. We’ve installed a new Windows-based DHCP server, however, the users do not seem to be getting DHCP leases off of it.
The server must be authorized first with the Active Directory.
20.How can you force the client to give up the dhcp lease if you have access to the client PC? Ans: ipconfig /release
21. What authentication options do Windows 2000 Servers have for remote clients? Ans: PAP, SPAP, CHAP, MS-CHAP and EAP.
22. What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP/IP?
NWLink (Novell), NetBEUI, AppleTalk (Apple).
23. What is data link layer in the OSI reference model responsible for?
Data link layer is located above the physical layer, but below the network layer. Taking raw data bits and packaging them into frames. The network layer will be responsible for addressing the frames, while the physical layer is reponsible for retrieving and sending raw data bits.
24.What is binding order?
The order by which the network protocols are used for client-server communications. The most frequently used protocols should be at the top.
25.How do cryptography-based keys ensure the validity of data transferred across the network?
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
26.Should we deploy IPSEC-based security or certificate-based security?
They are really two different technologies. IPSec secures the TCP/IP communication and protects the integrity of the packets. Certificate-based security ensures the validity of authenticated clients and servers.
27.What is LMHOSTS file?
It’s a file stored on a host machine that is used to resolve NetBIOS to specific IP addresses.
28.What’s the difference between forward lookup and reverse lookup in DNS?
Forward lookup is name-to-address, the reverse lookup is address-to-name.
29.How can you recover a file encrypted using EFS?
Use the domain recovery agent.
Windows Server 2003 Interview Questions
1. How do you double-boot a Win 2003 server box? The Boot.ini file is set as read-only, system, and hidden to prevent unwanted editing. To change the Boot.ini timeout and default settings, use the System option in Control Panel from the Advanced tab and select Startup2.What do you do if earlier application doesn’t run on Windows Server 2003?When an application that ran on an earlier legacy version of Windows cannot be loaded during the setup function or if it later malfunctions, you must run the compatibility mode function. This is accomplished by right-clicking the application or setup program and selecting Properties –> Compatibility –> selecting the previously supported operating system.3.If you uninstall Windows Server 2003, which operating systems can you revert to?Win ME, Win 98, 2000, XP. Note, however, that you cannot upgrade from ME and 98 to Windows Server 20034.How do you get to Internet Firewall settings?Start –> Control Panel –> Network and Internet Connections –> Network Connections5.What is Active Directory? Active Directory is a network-based object store and service that locates and manages resources, and makes these resources available to authorized users and groups. An underlying principle of the Active Directory is that everything is considered an object—people, servers, workstations, printers, documents, and devices. Each object has certain attributes and its own security access control list (ACL).6.Where are the Windows NT Primary Domain Controller (PDC) and its Backup Domain Controller (BDC) in Server 2003?The Active Directory replaces them. Now all domain controllers share a multimaster peer-to-peer read and write relationship that hosts copies of the Active Directory.7.How long does it take for security changes to be replicated among the domain controllers? Security-related modifications are replicated within a site immediately. These changes include account and individual user lockout policies, changes to password policies, changes to computer account passwords, and modifications to the Local Security Authority (LSA).8.What’s new in Windows Server 2003 regarding the DNS management?When DC promotion occurs with an existing forest, the Active Directory Installation Wizard contacts an existing DC to update the directory and replicate from the DC the required portions of the directory. If the wizard fails to locate a DC, it performs debugging and reports what caused the failure and how to fix the problem. In order to be located on a network, every DC must register in DNS DC locator DNS records. The Active Directory Installation Wizard verifies a proper configuration of the DNS infrastructure. All DNS configuration debugging and reporting activity is done with the Active Directory Installation Wizard.9.When should you create a forest?Organizations that operate on radically different bases may require separate trees with distinct namespaces. Unique trade or brand names often give rise to separate DNS identities. Organizations merge or are acquired and naming continuity is desired. Organizations form partnerships and joint ventures. While access to common resources is desired, a separately defined tree can enforce more direct administrative and security restrictions.10.How can you authenticate between forests?Four types of authentication are used across forests: (1) Kerberos and NTLM network logon for remote access to a server in another forest(2) Kerberos and NTLM interactive logon for physical logon outside the user’s home forest(3) Kerberos delegation to N-tier application in another forest(4) user principal name (UPN) credentials.11.What snap-in administrative tools are available for Active Directory?Active Directory Domains and Trusts Manager, Active Directory Sites and Services Manager, Active Directory Users and Group Manager, Active Directory Replication (optional, available from the Resource Kit), Active Directory Schema Manager (optional, available from adminpack)12.What types of classes exist in Windows Server 2003 Active Directory? Structural class. The structural class is important to the system administrator in that it is the only type from which new Active Directory objects are created. Structural classes are developed from either the modification of an existing structural type or the use of one or more abstract classes.Abstract class. Abstract classes are so named because they take the form of templates that actually create other templates (abstracts) and structural and auxiliary classes. Think of abstract classes as frameworks for the defining objects.Auxiliary class. The auxiliary class is a list of attributes. Rather than apply numerous attributes when creating a structural class, it provides a streamlined alternative by applying a combination of attributes with a single include action.88 class. The 88 class includes object classes defined prior to 1993, when the 1988 X.500 specification was adopted. This type does not use the structural, abstract, and auxiliary definitions, nor is it in common use for the development of objects in Windows Server 2003 environments.13.How do you delete a lingering object? Windows Server 2003 provides a command called Repadmin that provides the ability to delete lingering objects in the Active Directory. 14.What is Global Catalog?The Global Catalog authenticates network user logons and fields inquiries about objects across a forest or tree. Every domain has at least one GC that is hosted on a domain controller. In Windows 2000, there was typically one GC on every site in order to prevent user logon failures across the network.15.How is user account security established in Windows Server 2003?When an account is created, it is given a unique access number known as a security identifier (SID). Every group to which the user belongs has an associated SID. The user and related group SIDs together form the user account’s security token, which determines access levels to objects throughout the system and network. SIDs from the security token are mapped to the access control list (ACL) of any object the user attempts to access.16.If I delete a user and then create a new account with the same username and password, would the SID and permissions stay the same? No. If you delete a user account and attempt to recreate it with the same user name and password, the SID will be different. 17.What do you do with secure sign-ons in an organization with many roaming users?Credential Management feature of Windows Server 2003 provides a consistent single sign-on experience for users. This can be useful for roaming users who move between computer systems. The Credential Management feature provides a secure store of user credentials that includes passwords and X.509 certificates.18.Anything special you should do when adding a user that has a Mac?"Save password as encrypted clear text" must be selected on User Properties Account Tab Options, since the Macs only store their passwords that way.19.What remote access options does Windows Server 2003 support?Dial-in, VPN, dial-in with callback.20.Where are the documents and settings for the roaming profile stored? All the documents and environmental settings for the roaming user are stored locally on the system, and, when the user logs off, all changes to the locally stored profile are copied to the shared server folder. Therefore, the first time a roaming user logs on to a new system the logon process may take some time, depending on how large his profile folder is.21.Where are the settings for all the users stored on a given machine? Ans: C:\Document and Settings\All Users22.What languages can you use for log-on scripts? JavaScript, VBScript, DOS batch files (.com, .bat, or even .exe)
Windows Server Questions
1.What are the Features of windows2003?ACTIVE DIRECTORYEasier Deployment and ManagementADMT version 2.0—migrates password from NT4 to 2000 to 20003 or from 2000 to 2003Domain Rename--- supports changing Domain Name System and/or NetBios nameSchema Redefine--- Allows deactivation of attributes and class definitions in the Active directory schemaAD/AM--- Active directory in application mode is a new capability of AD that addresses certain deployment scenarios related to directory enabled applicationsGroup Policy Improvements----introduced GPMC tool to manage group policyUI—Enhanced User InterfaceGrater SecurityCross-forest AuthenticationCross-forest AuthorizationCross-certification EnhancementsIAS and Cross-forest authenticationCredential ManagerSoftware Restriction PoliciesImproved Performance and DependabilityEasier logon for remote officesGroup Membership replication enhancementsApplication Directory PartitionsInstall Replica from mediaDependability Improvements--- updated Inter-Site Topology Generator (ISTG) that scales better by supporting forests with a greater number of sites than Windows 2000.FILE AND PRINT SERVICESVolume shadow copy serviceNTFS journaling file systemEFSImproved CHDSK PerformanceEnhanced DFS and FRSShadow copy of shared foldersEnhanced folder redirectionRemote document sharing (WEBDAV)IISFault-tolerant process architecture----- The IIS 6.0 fault-tolerant process architecture isolates Web sites and applications into self-contained units called application poolsHealth Monitoring---- IIS 6.0 periodically checks the status of an application pool with automatic restart on failure of the Web sites and applications within that application pool, increasing application availability. IIS 6.0 protects the server, and other applications, by automatically disabling Web sites and applications that fail too often within a short amount of timeAutomatic Process Recycling--- IIS 6.0 automatically stops and restarts faulty Web sites and applications based on a flexible set of criteria, including CPU utilization and memory consumption, while queuing requestsRapid-fail Protection---- If an application fails too often within a short amount of time, IIS 6.0 will automatically disable it and return a "503 Service Unavailable" error message to any new or queued requests to the applicationEdit-While-Running2.What are the Difference between NT & 2000? NT SAM database is a flat database. Where as in windows 2000 active directory database is a hierarchical database. In windows NT only PDC is having writable copy of SAM database but the BDC is only read only database. In case of Windows 2000 both DC and ADC is having write copy of the database Windows NT will not support FAT32 file system. Windows 2000 supports FAT32 Default authentication protocol in NT is NTLM (NT LAN manager). In windows 2000 default authentication protocol is Kerberos V5. Windows 2000 depends and Integrated with DNS. NT user Netbios namesActive Directory can be backed up easily with System state data
3.What Difference between 2000 & 2003? Application Server mode is introduced in windows 2003 Possible to configure stub zones in windows 2003 DNS Volume shadow copy services is introducedWindows 2003 gives an option to replicate DNS data b/w all DNS servers in forest or All DNS servers in the domain. Refer Question 1 for all Enhancements
4.What Difference between PDC & BDC? PDC contains a write copy of SAM database where as BDC contains read only copy of SAM database. It is not possible to reset a password or create objects with out PDC in Windows NT.
5.What are Difference between DC & ADC? There is no difference between in DC and ADC both contains write copy of AD. Both can also handles FSMO roles (If transfers from DC to ADC). It is just for identification. Functionality wise there is no difference. 6.What is DNS & WINS DNS is a Domain Naming System, which resolves Host names to IP addresses. It uses fully qualified domain names. DNS is a Internet standard used to resolve host namesWINS is a Windows Internet Name Service, which resolves Netbios names to IP Address. This is proprietary for Windows
7.How may Types of DNS Servers Primary DNS Secondary DNSActive Directory Integrated DNSForwarderCaching only DNS
8.If DHCP is not available what happens to the client ?Client will not get IP and it cannot be participated in network . If client already got the IP and having lease duration it use the IP till the lease duration expires.
9.what are the different types of trust relationships ?Implicit TrustsExplicit Trusts—NT to Win2k or Forest to Forest
10.what is the process of DHCP for getting the IP address to the client ?There is a four way negotiation process b/w client and serverDHCP Discover (Initiated by client)DHCP Offer (Initiated by server)DHCP Select (Initiated by client)DHCP Acknowledgment (Initiated by Server)DHCP Negative Acknowledgment (Initiated by server if any issues after DHCP offer)
11.Difference between FAT,NTFS & NTFSVersion5 ?NTFS Version 5 featuresEncryption is possibleWe can enable Disk QuotasFile compression is possibleSparse filesIndexing ServiceNTFS change journal In FAT file system we can apply only share level security. File level protection is not possible. In NTFS we can apply both share level as well as file level securityNTFS supports large partition sizes than FAT file systemsNTFS supports long file names than FAT file systems
12.What are the port numbers for FTP, Telnet, HTTP, DNS ?FTP-21, Telnet – 23, HTTP-80, DNS-53, Kerberos-88, LDAP-389
13.what are the different types of profiles in 2000 ?Local Profiles ; Roaming profiles ; Mandatory Profiles
14.what is the database files used for Active Directory ? ?The key AD database files—edb.log, ntds.dit, res1.log, res2.log, and edb.chk—all of which reside in \%systemroot%\ntds on a domain controller (DC) by default. During AD installation, Dcpromo lets you specify alternative locations for these log files and database files NTDS.DIT
15.What is the location of AD Database ? %System root%/NTDS/NTDS>DIT
16.What is the authentication protocol used in NT ? NTLM (NT LAN Manager)
17.What is subnetting and supernetting ? Subnetting is the process of borrowing bits from the host portion of an address to provide bits for identifying additional sub-networks Supernetting merges several smaller blocks of IP addresses (networks) that are continuous into one larger block of addresses. Borrowing network bits to combine several smaller networks into one larger network does supernetting
18.what is the use of terminal services ?Terminal services can be used as Remote Administration mode to administer remotely as well as Application Server Mode to run the application in one server and users can login to that server to user that application.
19.what is the protocol used for terminal services ? RDP
20.what is the port number for RDP ? 3389
Difference between FAT and NTFS
NTFS
1.allows access local to w2k,w2k3,XP,win NT4 with SP4 & later may get access for some file.2.Maximum size of partition is 2 Terabytes & more.3.Maximum File size is up to 16TB.4.File & folder Encryption is possible only in NTFS.
FAT 32
1.Fat 32 Allows access to win 95,98,win millenium,win2k,xp on local partition.2.Maximum size of partition is up to 2 TB.3.Maximum File size is up to 4 GB.4.File & folder Encryption is not possible.
1. Domain rename is not possible in windows 20002.In w 2003 server inbuilt firewall is there.3. windows 2k - IIS 5 and windows 2k3 - II64.Windows 2k - IE 5 and Windows 2k3 - IE65. Terminal service are enhanced in win2k36.Windows 2k doesn't have 64 bit version7. DNS Stub zone has introduced in win2k3.8. Shadow copying has introduced.9. Schema version has changed from ver.13 to ver.30.10.Win2000 Supports 4-node clustering and 2003 supports 8-node clustering. 11Win 2003 has High HCL Support (Hardware Compatibility List) issued by Microsoft.12.Code name of 2000 is Win NT 5.0 and Code name of 2003 is Win NT 5.113.In 2000 we can create 1 million users and in 2003 we can create 1 billion users.14.Win2003 has Improved Print management compared to 2000 server.15.Win2003 has telnet sessions available.16.Win2000 supports IPV4 whereas 2003 supports IPV4 and IPV6.17In Win 2000 server we can apply 620 group policies but in 2003 we can apply nearly 720 so Win2003 server is more secure than win 2000 server.18.Win2000 doesn’t support Dot net whereas 2003 Supports Microsoft .NET 2.0 19.In 2000 it supports of 8 processors and 64 GB RAM (In 2000 Advance Server) whereas in 2003 supports up to 64 processors and max of 512GB RAM.20.Win2000 has Server and Advance Server editions whereas 2003 has Standard, Enterprise, Datacenter and Web server Editions. 21.Win2000 has basic concept of DFS (Distributed File systems) with defined oots whereas 2003 has Enhanced DFS support with multiple roots.22.In 2000 there is complexality in administering Complex networks whereas 2003 is easy administration in all & Complex networks.23.In 2003 we have concept of Volume shadow copy service which is used to create hard disk snap shot which is used in Disaster recovery and 2000 doesn’t have this service. 24.In 2000 we don’t have end user policy management, whereas in 2003 we have a End user policy management which is done in GPMC (Group policy management console).25In 2000 we have cross domain trust relation ship and 2003 we have Cross forest trust relationship. 26.2003 has service called ADFS (Active Directory Federation Services) which is used to communicate between branches with safe authentication. 27.In 2003 their is improved storage management using service File Server Resource Manager (FSRM).28.2003 has service called Windows Share point Services (It is an integrated portfolio of collaboration and communication services designed to connect people, information, processes, and systems both within and beyond the organizational firewall). 29.When installing terminal services for win2000 u r prompted to select application server functions or administrative functions sets can be installed sequently on one server but it performs only one function at one time. But in 2003 still distinguishes between application and administrative services but installation and management are now consolidated.Win2000 ADS :-1.Only one million object can be created.2.Universal group membership is not present.3. Between parent and child, there is no built in trust .It is called as non-transitive trust.4. There is only three AD partition, Domain partition, configuration partition, schema partition.5. In Win 2000 server we can apply 620 group policies .6. but 2k only Emergency Repair Disk(ERD) is there.
Win2003 ADS :-1.2 Million object can be created .2.Between parent and child, there is built in trust .It is called as transitive trust.3. Same partitions are there in 2003, but one additional partition called Application directory partition is present.4. but in 2003 we can apply nearly 720 so Win2003 server is more secure than win 2000 Server.5. Automated System Recovery(ASR) is there.
Windows Server2000 Administration Questions
1.Explain hidden shares.
Hidden or administrative shares are share names with a dollar sign ($) appended to their names. Administrative shares are usually created automatically for the root of each drive letter. They do not display in the network browse list.
2.How do the permissions work in Windows 2000?
What permissions does folder inherit from the parent? When you combine NTFS permissions based on users and their group memberships, the least restrictive permissions take precedence. However, explicit Deny entries always override Allow entries.
3.Why can’t I encrypt a compressed file on Windows 2000?
You can either compress it or encrypt it, but not both.
4.If I rename an account, what must I do to make sure the renamed account has the same permissions as the original one? Nothing, it’s all maintained automatically.
5.What’s the most powerful group on a Windows system? Administrators.
6.What are the accessibility features in Windows 2000?
Sticky Keys, Filter Keys Narrator, Magnifier, and On-Screen Keyboard.
7.Why can’t I get to the Fax Service Management console?
You can only see it if a fax had been installed.
8.What do I need to ensure before deploying an application via a Group Policy?
Make sure it’s either an MSI file, or contains a ZAP file for Group Policy.
9.How do you configure mandatory profiles? Ans: Rename ntuser.dat to ntuser.man
10.How to get multiple displays to work in Windows 2000?
Multiple displays have to use peripheral connection interface (PCI) or Accelerated Graphics Port (AGP) port devices to work properly with Windows 2000.
11.What’s a maximum number of processors Win2k supports? Ans:2
12.I had some NTFS volumes under my Windows NT installation. What happened to NTFS after Win 2k installation?
It got upgraded to NTFS 5.
13.How do you convert a drive from FAT/FAT32 to NTFS from the command line? Ans: convert c: /fs:ntfs
14. Explain APIPA.
Auto Private IP Addressing (APIPA) takes effect on Windows 2000 Professional computers if no DHCP server can be contacted. APIPA assigns the computer an IP address within the range of 169.254.0.0 through 169.254.255.254 with a subnet mask of 255.255.0.0.
15.How does Internet Connection Sharing work on Windows 2000?
Internet Connection Sharing (ICS) uses the DHCP Allocator service to assign dynamic IP addresses to clients on the LAN within the range of 192.168.0.2 through 192.168.0.254. In addition, the DNS Proxy service becomes enabled when you implement ICS.
16What is Active Directory schema?
The Active Directory schema contains formal definitions of every object class that can be created in an Active Directory forest it also contains formal definitions of every attribute that can exist in an Active Directory object.Active Directory stores and retrieves information from a wide variety of applications and services.
16.What is Global Catalog Server?
A global catalog server is a domain controller it is a master searchable database that contains information about every object in every domain in a forest. The global catalog contains a complete replica of all objects in Active Directory for its host domain, and contains a partial replica of all objects in Active Directory for every other domain in the forest. It have two important functions:1)•Provides group membership information during logon and authentication 2)•Helps users locate resources in Active Directory
17.What is the ntds.tit file default size? Ans: 40 MB
18.Describe how the DHCP lease is obtained.
It’s a four-step process consisting of (a) IP request (b) IP offer(C) IP selection (d) acknowledgement.
19. We’ve installed a new Windows-based DHCP server, however, the users do not seem to be getting DHCP leases off of it.
The server must be authorized first with the Active Directory.
20.How can you force the client to give up the dhcp lease if you have access to the client PC? Ans: ipconfig /release
21. What authentication options do Windows 2000 Servers have for remote clients? Ans: PAP, SPAP, CHAP, MS-CHAP and EAP.
22. What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP/IP?
NWLink (Novell), NetBEUI, AppleTalk (Apple).
23. What is data link layer in the OSI reference model responsible for?
Data link layer is located above the physical layer, but below the network layer. Taking raw data bits and packaging them into frames. The network layer will be responsible for addressing the frames, while the physical layer is reponsible for retrieving and sending raw data bits.
24.What is binding order?
The order by which the network protocols are used for client-server communications. The most frequently used protocols should be at the top.
25.How do cryptography-based keys ensure the validity of data transferred across the network?
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
26.Should we deploy IPSEC-based security or certificate-based security?
They are really two different technologies. IPSec secures the TCP/IP communication and protects the integrity of the packets. Certificate-based security ensures the validity of authenticated clients and servers.
27.What is LMHOSTS file?
It’s a file stored on a host machine that is used to resolve NetBIOS to specific IP addresses.
28.What’s the difference between forward lookup and reverse lookup in DNS?
Forward lookup is name-to-address, the reverse lookup is address-to-name.
29.How can you recover a file encrypted using EFS?
Use the domain recovery agent.
Windows Server 2003 Interview Questions
1. How do you double-boot a Win 2003 server box? The Boot.ini file is set as read-only, system, and hidden to prevent unwanted editing. To change the Boot.ini timeout and default settings, use the System option in Control Panel from the Advanced tab and select Startup2.What do you do if earlier application doesn’t run on Windows Server 2003?When an application that ran on an earlier legacy version of Windows cannot be loaded during the setup function or if it later malfunctions, you must run the compatibility mode function. This is accomplished by right-clicking the application or setup program and selecting Properties –> Compatibility –> selecting the previously supported operating system.3.If you uninstall Windows Server 2003, which operating systems can you revert to?Win ME, Win 98, 2000, XP. Note, however, that you cannot upgrade from ME and 98 to Windows Server 20034.How do you get to Internet Firewall settings?Start –> Control Panel –> Network and Internet Connections –> Network Connections5.What is Active Directory? Active Directory is a network-based object store and service that locates and manages resources, and makes these resources available to authorized users and groups. An underlying principle of the Active Directory is that everything is considered an object—people, servers, workstations, printers, documents, and devices. Each object has certain attributes and its own security access control list (ACL).6.Where are the Windows NT Primary Domain Controller (PDC) and its Backup Domain Controller (BDC) in Server 2003?The Active Directory replaces them. Now all domain controllers share a multimaster peer-to-peer read and write relationship that hosts copies of the Active Directory.7.How long does it take for security changes to be replicated among the domain controllers? Security-related modifications are replicated within a site immediately. These changes include account and individual user lockout policies, changes to password policies, changes to computer account passwords, and modifications to the Local Security Authority (LSA).8.What’s new in Windows Server 2003 regarding the DNS management?When DC promotion occurs with an existing forest, the Active Directory Installation Wizard contacts an existing DC to update the directory and replicate from the DC the required portions of the directory. If the wizard fails to locate a DC, it performs debugging and reports what caused the failure and how to fix the problem. In order to be located on a network, every DC must register in DNS DC locator DNS records. The Active Directory Installation Wizard verifies a proper configuration of the DNS infrastructure. All DNS configuration debugging and reporting activity is done with the Active Directory Installation Wizard.9.When should you create a forest?Organizations that operate on radically different bases may require separate trees with distinct namespaces. Unique trade or brand names often give rise to separate DNS identities. Organizations merge or are acquired and naming continuity is desired. Organizations form partnerships and joint ventures. While access to common resources is desired, a separately defined tree can enforce more direct administrative and security restrictions.10.How can you authenticate between forests?Four types of authentication are used across forests: (1) Kerberos and NTLM network logon for remote access to a server in another forest(2) Kerberos and NTLM interactive logon for physical logon outside the user’s home forest(3) Kerberos delegation to N-tier application in another forest(4) user principal name (UPN) credentials.11.What snap-in administrative tools are available for Active Directory?Active Directory Domains and Trusts Manager, Active Directory Sites and Services Manager, Active Directory Users and Group Manager, Active Directory Replication (optional, available from the Resource Kit), Active Directory Schema Manager (optional, available from adminpack)12.What types of classes exist in Windows Server 2003 Active Directory? Structural class. The structural class is important to the system administrator in that it is the only type from which new Active Directory objects are created. Structural classes are developed from either the modification of an existing structural type or the use of one or more abstract classes.Abstract class. Abstract classes are so named because they take the form of templates that actually create other templates (abstracts) and structural and auxiliary classes. Think of abstract classes as frameworks for the defining objects.Auxiliary class. The auxiliary class is a list of attributes. Rather than apply numerous attributes when creating a structural class, it provides a streamlined alternative by applying a combination of attributes with a single include action.88 class. The 88 class includes object classes defined prior to 1993, when the 1988 X.500 specification was adopted. This type does not use the structural, abstract, and auxiliary definitions, nor is it in common use for the development of objects in Windows Server 2003 environments.13.How do you delete a lingering object? Windows Server 2003 provides a command called Repadmin that provides the ability to delete lingering objects in the Active Directory. 14.What is Global Catalog?The Global Catalog authenticates network user logons and fields inquiries about objects across a forest or tree. Every domain has at least one GC that is hosted on a domain controller. In Windows 2000, there was typically one GC on every site in order to prevent user logon failures across the network.15.How is user account security established in Windows Server 2003?When an account is created, it is given a unique access number known as a security identifier (SID). Every group to which the user belongs has an associated SID. The user and related group SIDs together form the user account’s security token, which determines access levels to objects throughout the system and network. SIDs from the security token are mapped to the access control list (ACL) of any object the user attempts to access.16.If I delete a user and then create a new account with the same username and password, would the SID and permissions stay the same? No. If you delete a user account and attempt to recreate it with the same user name and password, the SID will be different. 17.What do you do with secure sign-ons in an organization with many roaming users?Credential Management feature of Windows Server 2003 provides a consistent single sign-on experience for users. This can be useful for roaming users who move between computer systems. The Credential Management feature provides a secure store of user credentials that includes passwords and X.509 certificates.18.Anything special you should do when adding a user that has a Mac?"Save password as encrypted clear text" must be selected on User Properties Account Tab Options, since the Macs only store their passwords that way.19.What remote access options does Windows Server 2003 support?Dial-in, VPN, dial-in with callback.20.Where are the documents and settings for the roaming profile stored? All the documents and environmental settings for the roaming user are stored locally on the system, and, when the user logs off, all changes to the locally stored profile are copied to the shared server folder. Therefore, the first time a roaming user logs on to a new system the logon process may take some time, depending on how large his profile folder is.21.Where are the settings for all the users stored on a given machine? Ans: C:\Document and Settings\All Users22.What languages can you use for log-on scripts? JavaScript, VBScript, DOS batch files (.com, .bat, or even .exe)
Windows Server Questions
1.What are the Features of windows2003?ACTIVE DIRECTORYEasier Deployment and ManagementADMT version 2.0—migrates password from NT4 to 2000 to 20003 or from 2000 to 2003Domain Rename--- supports changing Domain Name System and/or NetBios nameSchema Redefine--- Allows deactivation of attributes and class definitions in the Active directory schemaAD/AM--- Active directory in application mode is a new capability of AD that addresses certain deployment scenarios related to directory enabled applicationsGroup Policy Improvements----introduced GPMC tool to manage group policyUI—Enhanced User InterfaceGrater SecurityCross-forest AuthenticationCross-forest AuthorizationCross-certification EnhancementsIAS and Cross-forest authenticationCredential ManagerSoftware Restriction PoliciesImproved Performance and DependabilityEasier logon for remote officesGroup Membership replication enhancementsApplication Directory PartitionsInstall Replica from mediaDependability Improvements--- updated Inter-Site Topology Generator (ISTG) that scales better by supporting forests with a greater number of sites than Windows 2000.FILE AND PRINT SERVICESVolume shadow copy serviceNTFS journaling file systemEFSImproved CHDSK PerformanceEnhanced DFS and FRSShadow copy of shared foldersEnhanced folder redirectionRemote document sharing (WEBDAV)IISFault-tolerant process architecture----- The IIS 6.0 fault-tolerant process architecture isolates Web sites and applications into self-contained units called application poolsHealth Monitoring---- IIS 6.0 periodically checks the status of an application pool with automatic restart on failure of the Web sites and applications within that application pool, increasing application availability. IIS 6.0 protects the server, and other applications, by automatically disabling Web sites and applications that fail too often within a short amount of timeAutomatic Process Recycling--- IIS 6.0 automatically stops and restarts faulty Web sites and applications based on a flexible set of criteria, including CPU utilization and memory consumption, while queuing requestsRapid-fail Protection---- If an application fails too often within a short amount of time, IIS 6.0 will automatically disable it and return a "503 Service Unavailable" error message to any new or queued requests to the applicationEdit-While-Running2.What are the Difference between NT & 2000? NT SAM database is a flat database. Where as in windows 2000 active directory database is a hierarchical database. In windows NT only PDC is having writable copy of SAM database but the BDC is only read only database. In case of Windows 2000 both DC and ADC is having write copy of the database Windows NT will not support FAT32 file system. Windows 2000 supports FAT32 Default authentication protocol in NT is NTLM (NT LAN manager). In windows 2000 default authentication protocol is Kerberos V5. Windows 2000 depends and Integrated with DNS. NT user Netbios namesActive Directory can be backed up easily with System state data
3.What Difference between 2000 & 2003? Application Server mode is introduced in windows 2003 Possible to configure stub zones in windows 2003 DNS Volume shadow copy services is introducedWindows 2003 gives an option to replicate DNS data b/w all DNS servers in forest or All DNS servers in the domain. Refer Question 1 for all Enhancements
4.What Difference between PDC & BDC? PDC contains a write copy of SAM database where as BDC contains read only copy of SAM database. It is not possible to reset a password or create objects with out PDC in Windows NT.
5.What are Difference between DC & ADC? There is no difference between in DC and ADC both contains write copy of AD. Both can also handles FSMO roles (If transfers from DC to ADC). It is just for identification. Functionality wise there is no difference. 6.What is DNS & WINS DNS is a Domain Naming System, which resolves Host names to IP addresses. It uses fully qualified domain names. DNS is a Internet standard used to resolve host namesWINS is a Windows Internet Name Service, which resolves Netbios names to IP Address. This is proprietary for Windows
7.How may Types of DNS Servers Primary DNS Secondary DNSActive Directory Integrated DNSForwarderCaching only DNS
8.If DHCP is not available what happens to the client ?Client will not get IP and it cannot be participated in network . If client already got the IP and having lease duration it use the IP till the lease duration expires.
9.what are the different types of trust relationships ?Implicit TrustsExplicit Trusts—NT to Win2k or Forest to Forest
10.what is the process of DHCP for getting the IP address to the client ?There is a four way negotiation process b/w client and serverDHCP Discover (Initiated by client)DHCP Offer (Initiated by server)DHCP Select (Initiated by client)DHCP Acknowledgment (Initiated by Server)DHCP Negative Acknowledgment (Initiated by server if any issues after DHCP offer)
11.Difference between FAT,NTFS & NTFSVersion5 ?NTFS Version 5 featuresEncryption is possibleWe can enable Disk QuotasFile compression is possibleSparse filesIndexing ServiceNTFS change journal In FAT file system we can apply only share level security. File level protection is not possible. In NTFS we can apply both share level as well as file level securityNTFS supports large partition sizes than FAT file systemsNTFS supports long file names than FAT file systems
12.What are the port numbers for FTP, Telnet, HTTP, DNS ?FTP-21, Telnet – 23, HTTP-80, DNS-53, Kerberos-88, LDAP-389
13.what are the different types of profiles in 2000 ?Local Profiles ; Roaming profiles ; Mandatory Profiles
14.what is the database files used for Active Directory ? ?The key AD database files—edb.log, ntds.dit, res1.log, res2.log, and edb.chk—all of which reside in \%systemroot%\ntds on a domain controller (DC) by default. During AD installation, Dcpromo lets you specify alternative locations for these log files and database files NTDS.DIT
15.What is the location of AD Database ? %System root%/NTDS/NTDS>DIT
16.What is the authentication protocol used in NT ? NTLM (NT LAN Manager)
17.What is subnetting and supernetting ? Subnetting is the process of borrowing bits from the host portion of an address to provide bits for identifying additional sub-networks Supernetting merges several smaller blocks of IP addresses (networks) that are continuous into one larger block of addresses. Borrowing network bits to combine several smaller networks into one larger network does supernetting
18.what is the use of terminal services ?Terminal services can be used as Remote Administration mode to administer remotely as well as Application Server Mode to run the application in one server and users can login to that server to user that application.
19.what is the protocol used for terminal services ? RDP
20.what is the port number for RDP ? 3389
Difference between FAT and NTFS
NTFS
1.allows access local to w2k,w2k3,XP,win NT4 with SP4 & later may get access for some file.2.Maximum size of partition is 2 Terabytes & more.3.Maximum File size is up to 16TB.4.File & folder Encryption is possible only in NTFS.
FAT 32
1.Fat 32 Allows access to win 95,98,win millenium,win2k,xp on local partition.2.Maximum size of partition is up to 2 TB.3.Maximum File size is up to 4 GB.4.File & folder Encryption is not possible.
Subscribe to:
Comments (Atom)