You are on page 1of 49

Windows DNS Server Interview Questions

What is the main purpose of a DNS server?DNS servers are used to resolve FQDN
hostnames into IP addresses and vice versa.
What is the port no of dns ?
53.
What is a Forward Lookup?
Resolving Host Names to IP Addresses
What is Reverse Lookup?
Resolving IP Addresses to Host Names
What is a Resource Record?
It is a record provides the information about the resources available in the N/W
infrastructure.
What are the diff. DNS Roles?
Standard Primary, Standard Secondary, & AD Integrated.
What is a Zone?
Zone is a sub tree of DNS database.
Secure services in your network require reverse name resolution to make it more
difficult to launch successful attacks against the services. To set this up, you
configure a reverse lookup zone and proceed to add records. Which record types
do you need to create?
PTR Records
SOA records must be included in every zone. What are they used for?SOA records
contain a TTL value, used by default in all resource records in the zone. SOA records contain
the e-mail address of the person who is responsible for maintaining the zone. SOA records
contain the current serial number of the zone, which is used in zone transfers.
By default, if the name is not found in the cache or local hosts file, what is the first
step the client takes to resolve the FQDN name into an IP address?
Performs a recursive search through the primary DNS server based on the network interface
configuration
What is primary, Secondary, stub & AD Integrated Zone?
Primary Zone: - zone which is saved as normal text file with filename (.dns) in DBS folder.
Maintains a read, write copy of zone database.
Secondary Zone: - maintains a read only copy of zone database on another DNS server.
Provides fault tolerance and load balancing by acting as backup server to primary server.
Stub zone: - contains a copy of name server and SOA records used for reducing the DNS
search orders. Provides fault tolerance and load balancing.

How do you manually create SRV records in DNS?


This is on windows server go to run ---dnsmgmt.msc rightclick on the zone you want to add
srv record to and choose "other new record" and choose service location(srv).
What is the main purpose of SRV records ?
SRV records are used in locating hosts that provide certain network services.
Before installing your first domain controller in the network, you installed a DNS
server and created a zone, naming it as you would name your AD domain.
However, after the installation of the domain controller, you are unable to locate
infrastructure SRV records anywhere in the zone. What is the most likely cause of
this failure ?
The zone you created was not configured to allow dynamic updates. The local interface on
the DNS server was not configured to allow dynamic updates.
Which of the following conditions must be satisfied to configure dynamic DNS
updates for legacy clients ?
The zone to be used for dynamic updates must be configured to allow dynamic updates. The
DHCP server must support, and be configured to allow, dynamic updates for legacy clients.
At some point during the name resolution process, the requesting party received
authoritative reply. Which further actions are likely to be taken after this reply ?
After receiving the authoritative reply, the resolution process is effectively over.
Name 3 benefits of using AD-integrated zones.
Active Directory integrated DNS enables Active Directory storage and replication of DNS
zone databases. Windows 2000 DNS server, the DNS server that is included with Windows
2000 Server, accommodates storing zone data in Active Directory.
When you configure a computer as a DNS server, zones are usually stored as text files on
name servers that is, all of the zones required by DNS are stored in a text file on the server
computer.
These text files must be synchronized among DNS name servers by using a system that
requires a separate replication topology and schedule called a zone transfer However, if you
use Active Directory integrated DNS when you configure a domain controller as a DNS name
server, zone data is stored as an Active Directory object and is replicated as part of domain
replication.
What are the benefits of using Windows 2003 DNS when using AD-integrated
zones?
If your DNS topology includes Active Directory, use Active Directory integrated zones. Active
Directory integrated zones enable you to store zone data in the Active Directory
database.Zone information about any primary DNS server within an Active Directory
integrated zone is always replicated.
Because DNS replication is single-master, a primary DNS server in a standard primary DNS
zone can be a single point of failure. In an Active Directory integrated zone, a primary DNS
server cannot be a single point of failure because Active Directory uses multimaster
replication.

Updates that are made to any domain controller are replicated to all domain controllers and
the zone information about any primary DNS server within an Active Directory integrated
zone is always replicated.
Active Directory integrated zones: Enable you to secure zones by using secure dynamic
update.
Provide increased fault tolerance. Every Active Directory integrated zone can be replicated
to all domain controllers within the Active Directory domain or forest. All DNS servers
running on these domain controllers can act as primary servers for the zone and accept
dynamic updates.
Enable replication that propagates changed data only, compresses replicated data, and
reduces network traffic. If you have an Active Directory infrastructure, you can only use
Active Directory integrated zones on Active Directory domain controllers. If you are using
Active Directory integrated zones, you must decide whether or not to store Active Directory
integrated zones in the application directory partition.
You can combine Active Directory integrated zones and file-based zones in the same design.
For example, if the DNS server that is authoritative for the private root zone is running on
an operating system other than Windows Server 2003 or Windows 2000, it cannot act as an
Active Directory domain controller. Therefore, you must use file-based zones on that server.
However, you can delegate this zone to any domain controller running either Windows
Server 2003 or Windows 2000.
You installed a new AD domain and the new (and first) DC has not registered its
SRV records in DNS. Name a few possible causes.
The machine cannot be configured with DNS client her own .
The DNS service cannot be run.
What are the benefits and scenarios of using Stub zones?
Understanding stub zones
A stub zone is a copy of a zone that contains only those resource records necessary to
identify the authoritative Domain Name System (DNS) servers for that zone.
A stub zone is used to resolve names between separate DNS namespaces. This type of
resolution may be necessary when a corporate merger requires that the DNS servers for two
separate DNS namespaces resolve names for clients in both namespaces.
A stub zone consists of:
The start of authority (SOA) resource record, name server (NS) resource records, and the
glue A resource records for the delegated zone. The IP address of one or more master
servers that can be used to update the stub zone. The master servers for a stub zone are
one or more DNS servers authoritative for the child zone, usually the DNS server hosting
the primary zone for the delegated domain name.
Use stub zones to:

Keep delegated zone information current.


By updating a stub zone for one of its child zones regularly, the DNS server hosting both the
parent zone and the stub zone will maintain a current list of authoritative DNS servers for
the child zone.

Improve name resolution.


Stub zones enable a DNS server to perform recursion using the stub zone's list of name
servers without needing to query the Internet or internal root server for the DNS
namespace.

Simplify DNS administration.


By using stub zones throughout your DNS infrastructure, you can distribute a list of the
authoritative DNS servers for a zone without using secondary zones. However, stub zones
do not serve the same purpose as secondary zones and are not an alternative when
considering redundancy and load sharing.
There are two lists of DNS servers involved in the loading and maintenance of a stub zone:

The list of master servers from which the DNS server loads and updates a stub zone. A
master server may be a primary or secondary DNS server for the zone. In both cases, it will
have a complete list of the DNS servers for the zone.

The list of the authoritative DNS servers for a zone. This list is contained in the stub zone
using name server (NS) resource records. When a DNS server loads a stub zone, such as
widgets.example.com, it queries the master servers, which can be in different locations, for
the necessary resource records of the authoritative servers for the zone
widgets.example.com. The list of master servers may contain a single server or multiple
servers and can be changed anytime.
What is the "in-addr.arpa" zone used for?
In a Domain Name System (DNS) environment, it is common for a user or an application to
request a Reverse Lookup of a host name, given the IP address. This article explains this
process. The following is quoted from RFC 1035: "The Internet uses a special domain to
support gateway location and Internet address to host mapping. Other classes may employ
a similar strategy in other domains. The intent of this domain is to provide a guaranteed
method to perform host address to host name mapping, and to facilitate queries to locate all
gateways on a particular network on the Internet.
"The domain begins at IN-ADDR.ARPA and has a substructure which follows the Internet
addressing structure. "Domain names in the IN-ADDR.ARPA domain are defined to have up
to four labels in addition to the IN-ADDR.ARPA suffix. Each label represents one octet of an
Internet address, and is expressed as a character string for a decimal value in the range 0255 (with leading zeros omitted except in the case of a zero octet which is represented by a
single zero).
"Host addresses are represented by domain names that have all four labels specified."
Reverse Lookup files use the structure specified in RFC 1035.
For example, if you have a network which is 150.10.0.0, then the Reverse Lookup file for
this network would be 10.150.IN-ADDR.ARPA. Any hosts with IP addresses in the
150.10.0.0 network will have a PTR (or 'Pointer') entry in 10.150.IN- ADDR.ARPA
referencing the host name for that IP address. A single IN- ADDR.ARPA file may contain
entries for hosts in many domains. Consider the following scenario. There is a Reverse
Lookup file 10.150.IN-ADDR.ARPA with the following contents: Exp : 1.20 IN PTR
WS1.ACME.COM.
What does a zone consist of & why do we require a zone?
Zone consists of resource records and we require zone for representing sites.

What is Caching Only Server?


When we install 2000 & 2003 server it is configured as caching only server where it
maintains the frequently accessed sites information and again when we access the same
site for next time it is obtain from cached information instead of going to the actual site.
What is forwarder?
When one DNS server can?t receive the query it can be forwarded to another DNS once
configured as forwarder.
What is secondary DNS Server?
It is backup for primary DNS where it maintains a read only copy of DNS database.
How to enable Dynamic updates in DNS?
StartProgramAdmin toolsDNS Zone properties.
What are the properties of DNS server?
INTERFACES, FORWARDERS, ADVANCED, ROUTINGS, SECURITY, MONITORING, LOGGING,
DEBUG LOGGING.
Properties of a Zone?
General, SOA, NAMESERVER, WINS, Security, and ZONE Transfer.
What is scavenging?
Finding and deleting unwanted records.
What are SRV records?
SRV are the service records, there are 6 service records. They are useful for locating the
services.
What are the types of SRV records?
MSDCS:Contains DCs information.
TCP:Contains Global Catalog, Kerberos & LDAP information.
UDP:Contains Sites information.
Sites:Contains Sites information.
Domain DNS Zone:Conations domain?s DNS specific information.
Forest DNS zone:Contains Forest?s Specific Information.
Where does a Host File Reside?
c:\windows\system32\drivers\etc.
What is SOA?
Start of Authority: useful when a zone starts. Provides the zone startup information.
What is a query?
A request made by the DNS client to provide the name server information.
What are the diff. types of Queries?
Recursion, iteration.
Tools for troubleshooting DNS?
DNS Console, NSLOOKUP, DNSCMD, IPCONFIG, Logs.
What is WINS server? where we use WINS server? difference between DNS and
WINS?

WINS is windows internet name service used to resolve the NetBIOS(computer name)name
to IP address.This is proprietary for Windows.You can use in LAN.DNS is a Domain Naming
System, which resolves Host names to IP addresses. It uses fully qualified domain names.
DNS is an Internet standard used to resolve host names.
What is new in Windows Server 2003 regarding the DNS management?
When DC promotion occurs with an existing forest, the Active Directory Installation Wizard
contacts an existing DC to update the directory and replicate from the DC the required
portions of the directory.
If the wizard fails to locate a DC, it performs debugging and reports what caused the failure
and how to fix the problem. In order to be located on a network, every DC must register in
DNS DC locator DNS records. The Active Directory Installation Wizard verifies a proper
configuration of the DNS infrastructure. All DNS configuration debugging and reporting
activity is done with the Active Directory Installation Wizard.
SOA records must be included in every zone. What are they used for?
SOA records contain a TTL value, used by default in all resource records in the zone. SOA
records contain the e-mail address of the person who is responsible for maintaining the
zone. SOA records contain the current serial number of the zone, which is used in zone
transfers.
By default, if the name is not found in the cache or local hosts file, what is the first step the
client takes to resolve the FQDN name into an IP address? Performs a recursive search
through the primary DNS server based on the network interface configuration.
How do I clear the DNS cache on the DNS server?
Go to cmd prompt and type ipconfig /flushdns .
What is the main purpose of SRV records?
SRV records are used in locating hosts that provide certain network services.
What is the "." zone in my forward lookup zone?
This setting designates the Windows 2000 or Windows Server 2003 DNS server to be a root
hint server and is usually deleted. If you do not delete this setting, you may not be able to
perform external name resolution to the root hint servers on the Internet.
Do I need to configure forwarders in DNS?
No. By default, Windows 2000 DNS uses the root hint servers on the Internet; however, you
can configure forwarders to send DNS queries directly to your ISP's DNS server or other
DNS servers. Most of the time, when you configure forwarders, DNS performance and
efficiency increases, but this configuration can also introduce a point of failure if the
forwarding DNS server is experiencing problems.
The root hint server can provide a level of redundancy in exchange for slightly increased
DNS traffic on your Internet connection. Windows Server 2003 DNS will query root hints
servers if it cannot query the forwarders.
Should I point the other Windows 2000-based and Windows Server 2003-based
computers on my LAN to my ISP's DNS servers?
No. If a Windows 2000-based or Windows Server 2003-based server or workstation does
not find the domain controller in DNS, you may experience issues joining the domain or
logging on to the domain. A Windows 2000-based or Windows Server 2003-based

computer's preferred DNS setting should point to the Windows 2000 or Windows Server
2003 domain controller running DNS.
If you are using DHCP, make sure that you view scope option #15 for the correct DNS
server settings for your LAN.
Do I need to point computers that are running Windows NT 4.0 or Microsoft
Windows 95, Microsoft Windows 98, or Microsoft Windows 98 Second Edition to
the Windows 2000 or Windows Server 2003 DNS server?
Legacy operating systems continue to use NetBIOS for name resolution to find a domain
controller; however it is recommended that you point all computers to the Windows 2000 or
Windows Server 2003 DNS server for name resolution.
What if my Windows 2000 or Windows Server 2003 DNS server is behind a proxy
server or firewall?
If you are able to query the ISP's DNS servers from behind the proxy server or firewall,
Windows 2000 and Windows Server 2003 DNS server is able to query the root hint servers.
UDP and TCP Port 53 should be open on the proxy server or firewall.
What should I do if the domain controller points to itself for DNS, but the SRV
records still do not appear in the zone?
Check for a disjointed namespace, and then run Netdiag.exe /fix.
You must install Support Tools from the Windows 2000 Server or Windows Server 2003 CDROM to run Netdiag.exe.
How do I set up DNS for a child domain?
To set up DNS for a child domain, create a delegation record on the parent DNS server for
the child DNS server. Create a secondary zone on the child DNS server that transfers the
parent zone from the parent DNS server.
Note Windows Server 2003 has additional types of zones, such as Stub Zones and forestlevel integrated Active Directory zones, that may be a better fit for your environment. Set
the child domain controller to point to itself first. As soon as an additional domain controller
is available, set the child domain controller to point to this domain controller in the child
domain as its secondary.

Are you looking for a job as a system administrator? Or are you thinking about leaving your
current position for a new job as a system administrator with a new company in a Microsoft
multi-user computing environment?
If you answered yes to either of those questions, then this article is for you! Any of the
described technologies and questions below may be asked of you during an interview.
A system administrator is responsible for managing a multi-user computing environment,
such as a local area network (LAN). The responsibilities of the system administrator typically
include installing and configuring system hardware and software, establishing and managing
user accounts, upgrading software and performing backup and recovery tasks.
The main responsibilities performed by a system administrator are:

* Active Directory management (adding and configuring new workstations and setting up
user accounts to provide authorizations)
* Installing and updating system software
* OS patching/upgrades
* Preventing the spread of viruses and malicious programs
* Allocating mass storage space
* Reviewing system logs
* System security management
* Creating a backup and recovery policy
* Performance monitoring and optimization
Before facing any interview for a system administrator position, make sure that you have
enough knowledge on these technologies:
Basic Network Concepts:
* Data communication and transmission techniques
* Fundamentals of OSI and TCP/IP model
* IP address classes
* IP subnetting
* IPv6 fundamentals
* Basics of switching
Microsoft Server Functionalities:
* Active Directory Domain Controller (Read only DC , Child DC)
* Active Directory Domain Services
* DHCP Server
* DNS
* File and print server
* Database storage server
* Windows Deployment Services (WDS)
* Group Policy management
* Registry management
* Hyper V
* Schedule tasks (Backup, AD DS Backup)

* High Availability Features (Failover Clustering, Network Load Balancing)


Top Interview Questions for a System Administrator (Microsoft) Position:
All of the questions below are very common and must be prepared for before facing any
interview for a System-Server Administrator position.

Differences b/w Conditional Forwarding and Stub Zones.


Ans:- Both do the same thing like forwarding the requests to appropriate name servers
who are authoritative for the domains in the queries. However, there is difference in
both, Stub Zone are Dynamic and Conditional forwarder are static.
Conditional Forwarding

Where you want DNS clients in separate networks to

resolve each others names without having to query DNS servers on the Internet, such
as in the case of a company merger, you should configure the DNS servers in each
network to forward queries for names in the other network. DNS servers in one network
will forward names for clients in the other network to a specific DNS server that will
build up a large cache of information about the other network. When forwarding in this
way, you create a direct point of contact between two networks DNS servers, reducing
the need for recursion.
Stub Zone- Stub-Zones are dynamic -A stub zone is like a secondary zone in that it
obtains its resource records from other name servers (one or more master name
servers). A stub zone is also read-only like a secondary zone, so administrators cant
manually add, remove, or modify resource records on it. But the differences end here,
as stub zones are quite different from secondary zones in a couple of significant
ways.First, while secondary zones contain copies of all the resource records in the
corresponding zone on the master name server, stub zones contain only three kinds of
resource records:

A copy of the SOA record for the zone.

Copies of NS records for all name servers authoritative for the zone.

Copies of A records for all name servers authoritative for the zone.

2) How AD Replication Works ?


Ans:- http://technet.microsoft.com/en-us/library/cc772726(v=ws.10).aspx

3) How DNS is important in AD replication?


Ans:- Once DC gets its replication Partner Hostname then it queries DNS for IP Address.
Also, _MSDCS zone is required for Domain Controller Locator that enables the client to
locate the DC.
For complete details
http://technet.microsoft.com/en-us/library/cc759550(WS.10).aspx
4) Ports Required for Domain Controllers to communicate.
Ans:- http://yourcomputer.in/list-port-numbers-windows/

5) What is GPT and GPC?


Ans:- A GPO (Group Policy Object) is a collection of Group Policy settings, it consists of
GPC and GPT.
GPC (Group Policy Container) contains the information of property of GPO like
Security Filtering, GPO Status, GPO GUID etc.
GPT (Group Policy Template) contains the data of GPO in Sysvol folder that can be
checked after the configuration of the GPO that what settings have been configured to
the client.
6) What is new in Microsoft Clustering 2008?
Ans:- http://yourcomputer.in/whats-new-windows-server-2008-cluster/
7) What is Majority Node Set?
Ans:- A majority node set is a single quorum resource, from a server cluster
perspective; however, the data is actually stored on multiple disks across the cluster.
Each cluster node stores the configuration on a local disk it can have access to when it
starts up. By default, the location is pointed to %systemroot%\cluster\ResourceGUID

Further Explained :- http://yourcomputer.in/windows-cluster-interview-questions-andanswers/


If the configuration of the cluster changes, that change is replicated across the different
disks
8) What is NLB?
Ans:- NLB (Network Load Balance) is a Microsoft implementation of clustering and load
balancing that is intended to provide high availability and high reliability, as well as high
scalability.
http://technet.microsoft.com/en-us/library/cc779570(v=ws.10).aspx
9) Difference Between Unicast and Multicast
Ans:-

Unicast
Unicast is a one-to one connection between the client and the server. Unicast uses IP
delivery methods such as Transmission Control Protocol (TCP) and User Datagram
Protocol (UDP), which are session-based protocols. When a Windows Media Player client
connects using unicast to a Windows Media server, that client has a direct relationship
to the server. Each unicast client that connects to the server takes up additional
bandwidth. For example, if you have 10 clients all playing 100-kilobits per second
(Kbps) streams, those clients as a group are taking up 1,000 Kbps. If you have only
one client playing the 100 Kbps stream, only 100 Kbps is being used.

Multicast
Multicast is a true broadcast. The multicast source relies on multicast-enabled routers
to forward the packets to all client subnets that have clients listening. There is no direct
relationship between the clients and Windows Media server. The Windows Media server
generates an .nsc (NetShow channel) file when the multicast station is first created.
Typically, the .nsc file is delivered to the client from a Web server. This file contains
information that the Windows Media Player needs to listen for the multicast. This is
similar to tuning into a station on a radio. Each client that listens to the multicast adds

no additional overhead on the server. In fact, the server sends out only one stream per
multicast station. The same load is experienced on the server whether only one client
or 1,000 clients are listening
http://support.microsoft.com/kb/291786
10) What is new in Windows 2008 AD?
Ans:Read-Only Domain Controllers
Fine-Grained Password Policies
Restartable Active Directory Service
Backup and Recovery
SYSVOL Replication with DFS-R
Auditing Improvements
UI Improvements
11) How to configure RODC to replicate password of users?
Ans:- You can add users in the PASSWORD REPLICATION POLICY tab of RODC
computer properties
12) What is the issue we face while recovering AD from VMware snapshot?
13) Difference between Authoritative and Non-authoritative restore in AD?
Ans:- http://yourcomputer.in/authoritative-vs-non-authoritative-restoration-of-activedirectory
14) What is new in Authoritative restoration in windows 2008?
15) What is new in Windows Cluster 2008?

Ans:- http://yourcomputer.in/whats-new-windows-server-2008-cluster/
16) What is Strict Replication?
Ans:Strict Replication is a mechanism developed by Microsoft developers for Active Directory
Replication. If a domain controller has the Strict Replication enabled then that domain
controller will not get Lingering Objects from a domain controller which was isolated
for more than the TombStone Life Time. TSL is 180 days by default on a Forest created
with Windows Server 2003 SP1. A domain controller shouldnt be outof sync for more
than this period. Lingering Objects may appear on other domain controllers if
replication happens with the outdated domain controllers. These domain controllers will
not replicate with the outdated domain controllers if you have set the below mentioned
registry key.You must set the following registry setting on all the domain controllers to
enable the Strict Replication:
KEY

Name: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Param
eters

Registry Entry: Strict Replication Consistency

Value: 1 (enabled), 0 (disabled)

Type: REG_DWORD

17) What is Super Scope in DHCP?


Ans:A superscope is an administrative feature of Dynamic Host Configuration Protocol
(DHCP) servers running Windows Server 2008 that you can create and manage by
using the DHCP Microsoft Management Console (MMC) snap-in. By using a superscope,
you can group multiple scopes as a single administrative entity. With this feature, a
DHCP server can:

Support DHCP clients on a single physical network segment (such as a single


Ethernet LAN segment) where multiple logical IP networks are used. When more

than one logical IP network is used on each physical subnet or network, such
configurations are often called multinets.
Support remote DHCP clients located on the far side of DHCP and BOOTP relay

agents (where the network on the far side of the relay agent uses multinets).
In multinet configurations, you can use DHCP superscopes to group and activate
individual scope ranges of IP addresses used on your network. In this way, the DHCP
server can activate and provide leases from more than one scope to clients on a single
physical network.
Superscopes can resolve specific types of DHCP deployment issues for multinets,
including situations in which:
The available address pool for a currently active scope is nearly depleted, and

more computers need to be added to the network. The original scope includes the
full addressable range for a single IP network of a specified address class. You
need to use another range of IP addresses to extend the address space for the
same physical network segment.
Clients must be migrated over time to a new scope (such as to renumber the

current IP network from an address range used in an existing active scope to a


new scope that contains another range of IP addresses).
You want to use two DHCP servers on the same physical network segment to

manage separate logical IP networks.


18) What is the requirement to configure Full memory Dump in windows?
Ans:To generate a complete memory dump file:
1.

Click Start > right-click Computer and select Properties in the menu.

2.

Click Advanced > Settings > Startup and Recovery > Settings > Write
debugging information > Complete memory dump.

3.

Click OK twice.

19) Which DNS record is required for Replication?

Ans:- Host A records of replication partners (Domain Controllers), Srv Records to find
out the Domain Controllers GUID in _msdcs zone (DC Locator)
20) Tools to analyze Memory Dump?
Ans:Windows Debugger (WinDbg.exe) tool
Dumpchk,exe
21) Tools to troubleshoot Group Policy issues?
Ans:- You can use AD inbuilt features to troubleshoot group policy issue like RSOP.msc
or can run RSOP by selecting users in Active Directory users and computers, gpresult
-v, gpt.ini in sysvol under Group Policy GUID folder can be checked to find out the GPO
settings configured
22) What AD parameters can be added to enable the Monitoring for AD?
23) How to troubleshoot AD replication issues?
Ans:- It can be troubleshooted by repmon command that generates the error result in
eventvwr. DNS can be checked between two destination. Network/Firewall issue
24) Booting sequence in windows 2008?
Heres the brief description of Windows Server 2008 Boot process.
1.

System is powered on

2.

The CMOS loads the BIOS and then runs POST

3.

Looks for the MBR on the bootable device

4.

Through the MBR the boot sector is located and the BOOTMGR is loaded

5.

BOOTMGR looks for active partition

6.

BOOTMGR reads the BCD file from the \boot directory on the active partition

7.

The BCD (boot configuration database) contains various configuration


parameters( this information was previously stored in the boot.ini)

8.

BOOTMGR transfer control to the Windows Loader (winload.exe) or


winresume.exe in case the system was hibernated.

9.

Winloader loads drivers that are set to start at boot and then transfers the
control to the windows kernel.

25) How to edit Schema in AD?


Ans:- Firstly, schmmgmt.dll has to be register. Then ADSIEdit tool can be used to edit
schema.
26) Difference between Windows 2003 & Windows 2008 boot process
Ans:Windows 2003 Boot Process:
1.POST
2.The MBR reads the boot sector which is the first sector of the active partition.
3.Ntldr looks path of os from boot.ini
4.Ntldr to run ntdedetect.com to get information about installed hardware.
5.Ntldr reads the registry files then select a hardware profile, control set and loads
device
drivers.
6.After that Ntoskrnl.exe takes over and starts winlogon.exe which starts lsass.exe
Windows Server 2008 Boot process.
1.

System is powered on

2.

The CMOS loads the BIOS and then runs POST

3.

Looks for the MBR on the bootable device

4.

Through the MBR the boot sector is located and the BOOTMGR is loaded

5.

BOOTMGR looks for active partition

6.

BOOTMGR reads the BCD file from the \boot directory on the active partition

7.

The BCD (boot configuration database) contains various configuration


parameters( this information was previously stored in the boot.ini)

8.

BOOTMGR transfer control to the Windows Loader (winload.exe) or


winresume.exe in case the system was hibernated.

9.

Winloader loads drivers that are set to start at boot and then transfers the
control to the windows kernel.

27) Name of utilities that is being used to check multipathing


Ans:- FCInfo utility or Storage Explorer (windows 2008) can be used to check the same.
For complete details: http://yourcomputer.in/how-to-check-wwn-on-windows-server/
28) How to create Host A record remotely?
Ans:- dnscmd command can be used for creating a Resource Record on DNS server.
Below is the command:

dnscmd [<ServerName>] /recordadd <ZoneName> <NodeName> <RRType> <RRData>

29) What is glue record?


Ans:Name servers in delegations are identified by name, rather than by IP address. This
means that a resolving name server must issue another DNS request to find out the IP
address of the server to which it has been referred. If the name given in the delegation
is a subdomain of the domain for which the delegation is being provided, there is
a circular dependency. In this case the name server providing the delegation must also
provide one or more IP addresses for the authoritative name server mentioned in the
delegation. This information is called glue. The delegating name server provides this
glue in the form of records in the additional section of the DNS response, and provides
the delegation in the answer section of the response.
For example, if the authoritative name server for example.org is ns1.example.org, a
computer trying to resolve www.example.org first resolves ns1.example.org. Since ns1

is contained in example.org, this requires resolving example.org first, which presents a


circular dependency. To break the dependency, the name server for the top level
domain org includes glue along with the delegation for example.org. The glue records
are address records that provide IP addresses for ns1.example.org. The resolver uses
one or more of these IP addresses to query one of the domains authoritative servers,
which allows it to complete the DNS query.
30) What is Loopback Group Policy?
Ans:- Group Policy applies to the user or computer in a manner that depends on where
both the user and the computer objects are located in Active Directory. However, in
some cases, users may need policy applied to them based on the location of the
computer object alone. You can use the Group Policy loopback feature to apply Group
Policy Objects (GPOs) that depend only on which computer the user logs on to.

Q: What is Active Directory?


A: Active Directory provides a centralised control for network administration and security.
Server computers configured with Active Directory are known as domain controllers. Active
Directory stores all information and settings for a deployment in a central database, and
allows administrators to assign policies and deploy and update software.
Q: What is a Domain?
A: A domain is defined as a logical group of network objects (computers, users, devices)
that share the same Active Directory database. A tree can have multiple domains.
Q: What is Domain Controller?
A: A domain controller (DC) or network domain controller is a Windows-based computer
system that is used for storing user account data in a central database. It is the centrepiece
of the Windows Active Directory service that authenticates users, stores user account
information and enforces security policy for a Windows domain.
A domain controller allows system administrators to grant or deny users access to system
resources, such as printers, documents, folders, network locations, etc., via a single
username and password.
Q: What is Group Policy?
A: Group Policy allows you to implement specific configurations for users and computers.
Group Policy settings are contained in Group Policy objects (GPOs), which are linked to the
following Active Directory service containers: sites, domains, or organizational units (OUs).
Q: What are GPOs (Group Policy Objects)?

A: A Group Policy Object (GPO) is a collection of settings that control the working
environment of user accounts and computer accounts. GPOs define registry-based policies,
security options, software installation and maintenance options, script options, and folder
redirection options.
There are two kinds of Group Policy objects:
* Local Group Policy objects are stored on individual computers.
* Nonlocal Group Policy objects, which are stored on a domain controller, are available only
in an Active Directory environment.
Q: What is LDAP?
A: LDAP (Light-Weight Directory Access Protocol) determines how an object in an Active
Directory should be named. LDAP is the industry standard directory access protocol, making
Active Directory widely accessible to management and query applications. Active Directory
supports LDAPv2 and LDAPv3.
Q: Where is the AD database stored?
A: The AD database is stored in C:\Windows\NTDS\NTDS.DIT.
Q: What is the SYSVOL folder?
A: The SYSVOL folder stores the server copy of the domains public files that must be
shared for common access and replication throughout a domain.
All AD databases are stored in a SYSVOL folder and its only created in an NTFS partition.
The Active Directory Database is stored in the %SYSTEM ROOT%NDTS folder.
Q: What is Garbage collection?
A: Garbage collection is the online defragmentation of the Active Directory which happens
every 12 hours.
Q: When do we use WDS?
A: Windows Deployment Services is a server role used to deploy Windows operating
systems remotely. WDS is mainly used for network-based OS installations to set up new
computers.
Q: What is DNS and which port number is used by DNS?
A: The Domain Name System (DNS) is used to resolve human-readable hostnames like
www.intenseschool.com into machine-readable IP addresses like 69.143.201.22.
DNS servers use UDP port 53 but DNS queries can also use TCP port 53 if the former is not
accepted.
Q: What are main Email Servers and which are their ports?
A: Email servers can be of two types:
Incoming Mail Server (POP3, IMAP, HTTP)

The incoming mail server is the server associated with an email address account. There
cannot be more than one incoming mail server for an email account. In order to download
your emails, you must have the correct settings configured in your email client program.
Outgoing Mail Server (SMTP)
Most outgoing mail servers use SMTP (Simple Mail Transfer Protocol) for sending emails. The
outgoing mail server can belong to your ISP or to the server where you setup your email
account.
The main email ports are:
* POP3 port 110
* IMAP port 143
* SMTP port 25
* HTTP port 80
* Secure SMTP (SSMTP) port 465
* Secure IMAP (IMAP4-SSL) port 585
* IMAP4 over SSL (IMAPS) port 993
* Secure POP3 (SSL-POP) port 995
Q: What do Forests, Trees, and Domains mean?
A: Forests, trees, and domains are the logical divisions in an Active Directory network.
A domain is defined as a logical group of network objects (computers, users, devices) that
share the same active directory database.
A tree is a collection of one or more domains and domain trees in a contiguous namespace
linked in a transitive trust hierarchy.
At the top of the structure is the forest. A forest is a collection of trees that share a common
global catalog, directory schema, logical structure, and directory configuration. The forest
represents the security boundary within which users, computers, groups, and other objects
are accessible.
Q: Why do we use DHCP?
A: Dynamic Host Configuration Protocol assigns dynamic IP addresses to network devices
allowing them to have a different IP address each time they are connected to the network.
Q: What are Lingering Objects?
A: A lingering object is a deleted AD object that still remains on the restored domain
controller in its local copy of Active Directory. They can occur when changes are made to
directories after system backups are created.
When restoring a backup file, Active Directory generally requires that the backup file be no
more than 180 days old. This can happen if, after the backup was made, the object was
deleted on another DC more than 180 days ago.

Q: How can we remove Lingering Objects?


A: Windows Server 2003 and 2008 have the ability to manually remove lingering objects
using the console utility command REPADMIN.EXE.
Q: Why should you not restore a DC that was backed up 6 months ago?
A: When restoring a backup file, Active Directory generally requires that the backup file be
no more than 180 days old. If you attempt to restore a backup that is expired, you may
face problems due to lingering objects.
Q: How do you backup AD?
A: Backing up Active Directory is essential to maintain the proper health of the AD
database.
How to check AD configured properly?Ans: Check NTDS and SYSVOL shared folder at
%systemroot%windows\.
2. How to transfer global catalog to another domain?Ans: We can not transfer the
global catalog; we can only remove the global catalog from one server and enable other
server as a global catalog.
3. How to configure global catalog server?Ans: Go to Active directory site and services
and expand till your desire servers NTDS settings and then right click; property and check
mark the Global catalog check box.
4. What are the fsmo roles and it gets down what will impact?
Ans: Flexible Single Master Operation, There are five roles.
Domain Naming Master (Forest wide role)
Schema Master (Forest wide role)
PDC Emulator (Domain wide role)
RID Master (Domain wide role)
Infrastructure Master (Domain wide role)
5. What is the RID pool?Ans: RID Master provides the RID (Relative Identifier) pool to
Domain controller of the Domain. When an object is create in a domain, a Unique SID
(Security ID) is assigned to it which consisting of a RID (Unique ID) and a SID (Common ID
for all Object), A RID pool contain 500 RIDs.
6. How to check FSMO roles running on which server?
Ans: By using DCdiag /test:Knowsofroleholders /v command.
ii) Type Netdom query fsmo
7. How to transfer FSMO role one domain controller to another domain controller
command prompt and GUI?Ans: Go to Start->Run->dsa.msc go the property of users
and computers and transfer the RID, PDC, and Infrastructure roles.
Go to Start Run->go to the property of the active directory domain and trust and transfer
the Domain naming master role
For transferring schema master role, first we have to register the schema master by using
regsvr32 schmgmt.dll command in run. Than Go start Run MMCAdd Active directory

schema and transfer the schema master role.


8. What is AD data base file and log file where it stored is and what is the use of
log file?
Ans: AD Data base is NTDS.DIT and its location is %system root%\windows\NTDS\ntds.dit.
AD Log files are EDB.log ,EDB.chk and REG.log and the location of there files are %system
root%\windows\NTDS\ntds.dit.
9. How to recover corrupted AD data base file?
Ans: Its described very well in the article available here.
10. Is it possible to rename domain name in windows 2003?Ans: Yes, We can
rename the domain name in windows 2003.
11. What are the two types of replication?
Ans: Inter-site replication, Intra-site replication.
12. What are the protocols used in replication?
Ans: RPC and SMTP. Predominantly RPC is used. SMTP is not used as its not recommended
for replication of Domain Partition.
Replication conflict is managed using a method described here. Read the full article several
times and you would be happy that you got to know something very important.
13. What is default time for replication?
Ans: KCC (Knowledge Consistency Checker) is the algorithm and the two protocols used are
RPC over IP and SMTP over IP. They replicate in every 15 min.
14. What is the difference between the two types of replication i.e. intrasite and
intersite?
Intersite replication is for replication with in the site and Intra-site replication is for the
replication between the sites.
15. What are replication partition and tell about partition?
Ans: FSMO role Partition
Schema CN=Schema,CN=configuration, DC=
Domain Naming Master CN=configuration,DC=
PDC DC=
RID DC=
Infrastructure DC=
Replication partitions are.
Schema Partition
Configuration Partition
Domain Partition
Application Partition
16. Is application partition available in windows 2003?
Ans: Yes, Windows 2003 contains application partition, mainly application partition contains
the application information like: DNS

17. What is the DNS?


Ans: Domain Naming System.
Used to resolve the host name (FQDN) name to IP Address and Vice Versa
18. What are types of DNS and zones?
(i)Primary DNS zone
(ii)Secondary DNS zone
(iii)Active directory integrated zone
(IV)Stub zone
To know more about DNS please read the blog http://dnsfunda.blogspot.com

19. What is the Start of Authority (SOA) record and is its use?
Ans: It contains information like the server name where the file was created (Primary DNS
Server name), it Maintains the serial number and increments it after every change in the
DNS Zone, stores Refresh interval and Retry interval time, maintains TTL of the records as
well. Read this article for more details.
@

IN SOA

nameserver.place.dom. postmaster.place.dom. (
1

; serial number

3600

; refresh

600

; retry

[1h]
[10m]

86400

; expire

3600 )

; min TTL

[1d]
[1h]

20. What are records available in dns?


Ans: Address records, Host Records, MX Records, and CNAME records.
21. Explain about SRV, MX and CNAME records?
ANS: SRV records point a client to the servers which are hosting a service. For example
Active Directory Service. MX record points to the client to servers hosting mail service. MX
stands for Mail Exchanger. CNAME record is a alias record for a name that already exists.
Suppose there were two servers and both of them consolidated into one, in that case one
name becomes useless. But any application dependent on unused name has to work, in that
case we create an alias record which is the unused name pointing to the name in use. Hence
the application keeps functioning.
22. Where DNS file stored and data base of DNS?
Ans: %SYSTEMROOT%\Windows\System32\DNS
23. How do I configure DHCP Server and steps?
ANS: If you have already installed DHCP on the server then follow the steps mentioned in
this Trainsignal Article.

24. How to reserve IP address?Ans: We can assign a particular IP address to the MAC
address of a machine using IP reservation in DHCP.
25. Why do we need two or more subnets?ANS: To segment or restrict/localize one
type of traffic to one segment or subnet of the network.
26. If we have two different subnets then how do I configure it in single DHCP
server?
ANS: Two different scopes are created for two subnets.
27. What is the use of relay agent?
A router drops the DHCP packet as its a broadcast packet. When we enable the relay agent
option on the router it then lets the DHCP Broadcast packets pass through. Hence the relay
agent helps in sending it over to the destined subnet.
28. What is the group policy?
Ans: It is way to provide the desirable predefined environment to all users in an Active
Directory environment and it is centrally manageable.
29. My requirement is to need disable USB port, how will you do?
Through Group policy.
30. How to take a backup of group policy?
Ans: We can use GPMC (Group Policy Management Console), right click on the GPO and
select backup and take backup on destination folder
31. You are an administrator and my requirement is to configure active directory
for four different locations. How will you plan it?
Ans: Depending on the requirement I' ll configure one parent domain and three child
domains, or One domain with four sites, or four different domains (least preferred).
32. What are the two modes a terminal server works in?
ANS: User mode and applciation mode.
33. What is the default security group, groups give explanations?
Ans:
34. You are maintaining remote servers that you can take remote but you cant
ping them, how to troubleshoot?
35. What is use of Kerberos protocol?
Ans: Kerberos protocol is an authentication protocol. When we login in an Active Directory
environment its the protocol that is used to authenticate us.
36. What is the version Kerberos protocol?
Ans: We are using Kerberos V 5.0.
37. What is the authentication protocol in Windows NT?
Ans: Windows NT supported two kinds of challenge/response authentication:

LanManager (LM) challenge/response


Windows NT challenge/response (also known as NTLM challenge/response)
38. What are RAID levels?
Ans: Main RAID levels are RAID-0, RAID-1, RAID-5 and RAID-10.
39. Which RAID you will recommend and why?
Ans: RAID-1 for O.S - mirroring
RAID-5 for DATA partition- Stripe set with parity.
40. What are the different RAID1 and RAID 5?RAID-1:- In RAID-1 two hard disk are
there and the data on one is mirrored to another. So even if one fails other one is there with
the same data for service continuity.
RAID-5: We can use minimum three hard disk and maximum depend upon RAID controller
card, Data written on disk in stripes with distributed parity set.

41. What are the Different between and disk mirroring and disk duplexing?
Ans:
Disk Mirroring: Disk mirroring (also known as RAID-1) is the practice of duplicating data in
separate volumes on two hard disks to make storage more fault-tolerant. Mirroring provides
data protection in the case of disk failure, because data is constantly updated to both disks.
However, since the separate disks rely upon a common controller, access to both copies of
data is threatened if the controller fails.
Disk Duplexing: Disk duplexing is a variation of disk mirroring in which each of multiple
storage disks has its own SCSI controller. Disk duplexing overcomes this problem; the use
of redundant controllers enables continued data access as long as one of the controllers
continues to function.
Since the controllers for each disk are different, one of the disks keeps working even if the
other disk fails or one of the disk controller fails. So it gives us the luxury to plan for the
downtime based on our convinience. Another benefit of disk duplexing is increased
throughput. Using a technique known as a split seek, whichever disk can deliver the
requested data more quickly responds. Multiple requests may also be split between the
disks for simultaneous processing.

42. What is the dynamic disk?Dynamic disks provide the ability to create volumes that
span multiple disks (spanned and striped volumes) and the ability to create fault-tolerant
volumes (mirrored and RAID-5 volumes).Dynamic disks offer greater flexibility for volume
management because they use a database to track information about dynamic volumes on
the disk and about other dynamic disks in the computer. Because each dynamic disk in a
computer stores a replica of the dynamic disk database, for example, a corrupted dynamic
disk database can repair one dynamic disk by using the database on another dynamic disk.
Dynamic disks are a separate form of volume management that allows volumes to have
noncontiguous extents on one or more physical disks. Dynamic disks and volumes rely on

the Logical Disk Manager (LDM) and Virtual Disk Service (VDS) and their associated
features. These features enable you to perform tasks such as converting basic disks into
dynamic disks, and creating fault-tolerant volumes. To encourage the use of dynamic disks,
multi-partition volume support was removed from basic disks, and is now exclusively
supported on dynamic disks.
The following operations can be performed only on dynamic disks:
1) Create and delete simple, spanned, striped, mirrored, and RAID-5 volumes.
2) Extend a simple or spanned volume.
3) Remove a mirror from a mirrored volume or break the mirrored volume into two
volumes.
4) Repair mirrored or RAID-5 volumes.
5) Reactivate a missing or offline disk.

43. What is disk striping?


Ans: Disk striping is the technique of spreading data over multiple disks. The data to be
stored is divided into blocks and spread across several partitions on various hard disk. Disk
striping is used with or without equivalence. Disk striping helps in improving the
performance of the disk.

44. What are the backup types?


Ans:
(i) Normal or full Backup
(ii) Deferential Backup
(iii)Incremental Backup
(iv)Copy backup
(v)Daily Backup
45. Which type backup reset archive bits?
Ans: The bit which has check mark on the folder whose backup has been done using normal
backup method.
46. What is the use of DFS?
Ans: Distributed File System, It is used for the fault tolerance because it makes the
duplicate copy of every DFS root. Not only that the domain login process as well uses DFS
to find out the nearest DC to login.
47. Do you know about FRS?
Ans: File Replication Services.
Example: Replication of SYSVOL folder.
48. What are difference between TCP and UDP protocol?
Ans: TCP is a connection orientated protocol while UDP is not a connection orientated
protocol.
49. What is different between HUB and Switch?Ans: HUB broadcast the data packet

but Switches multicast the data packet into the network which reduces the collision of data
packets.
50. Which layer of OSI model does the Router works in?
Ans: One layer Three (Network layer)
51. You are going to migrate the domain how to plan?
Ans: The answer is here.
52. For project requirement you going to share 20 folders what is the step you will
take?
53. What is the need of a VLAN?Ans: To divide/restrict the traffic into one segment of the
network.
54. What kind of privilege is required to transfer FSMO roles?
Ans. logged-on user should be a member of the Enterprise Administrators group to transfer
Schema master or Domain naming master roles, or a member of the Domain Administrators
group of the domain where the PDC emulator, RID master and the Infrastructure master
roles are being transferred.
55. Write down the command line to transfer all the FSMO roles to other server?
Ans: Click Start, click Run, type ntdsutil in the Open box, and then click OK
Type roles, and then press ENTER.
Type connections, and then press ENTER.
Type connect to server servername, and then press ENTER, where servername is the name
of the domain controller that you want to assign the FSMO role to.
At the server connections prompt, type q, and then press ENTER.
Type transfer role, where role is the role that you want to transfer. For example,
To transfer the RID master role, type transfer schema master
To transfer the RID master role, type transfer domain naming master
To transfer the RID master role, type transfer rid master
To transfer the RID master role, type transfer pdc
To transfer the RID master role, type transfer infrastructure master
7. At the fsmo maintenance prompt, type q, and then press ENTER to gain access to the
ntdsutil prompt.
56. Write down the command line to seize all the FSMO roles to a server?Ans:
Click Start, click Run, type ntdsutil in the Open box, and then click OK
Type roles, and then press ENTER.
Type connections, and then press ENTER.
Type connect to server servername, and then press ENTER, where servername is the name
of the domain controller that you want to assign the FSMO role to.
At the server connections prompt, type q, and then press ENTER.
Type seize role, where role is the role that you want to seize. For example,
To seize the RID master role, type seize schema master
To seize the RID master role, type seize domain naming master
To seize the RID master role, type seize rid master
To seize the RID master role, type seize pdc
To seize the RID master role, type seize infrastructure master.

7. At the fsmo maintenance prompt, type q, and then press ENTER to gain access to the
ntdsutil prompt.
57. Command for removing active directory?
Ans: dcpromo /forceremoval
58. How to test whether a domain controller is also a global catalog server:
Click Start, point to Programs, point to Administrative Tools, and then click Active Directory
Sites and Services.
Double-click Sites in the left pane, and then locate the appropriate site or click Default-firstsite-name if no other sites are available.
Open the Servers folder, and then click the domain controller.
In the domain controller's folder, double-click NTDS Settings.
On the Action menu, click Properties.
Describe how the DHCP lease is obtained.
Its a four-step process consisting of (a) IP request, (b) IP offer, IP selection and
(d) acknowledgement.

I cant seem to access the Internet, dont have any access to the corporate
network and on ipconfig my address is 169.254.*.*. What happened?
The 169.254.*.* netmask is assigned to Windows machines running 98/2000/XP if the
DHCP server is not available. The name for the technology is APIPA (Automatic Private
Internet Protocol Addressing).

Weve installed a new Windows-based DHCP server, however, the users do not
seem to be getting DHCP leases off of it.
The server must be authorized first with the Active Directory.

How can you force the client to give up the dhcp lease if you have access to the
client PC?
ipconfig /release

What authentication options do Windows 2000 Servers have for remote clients?
PAP, SPAP, CHAP, MS-CHAP and EAP.

What are the networking protocol options for the Windows clients if for some
reason you do not want to use TCP/IP?
NWLink (Novell), NetBEUI, AppleTalk (Apple).

What is binding order?


The order by which the network protocols are used for client-server communications. The
most frequently used protocols should be at the top.

How do cryptography-based keys ensure the validity of data transferred across the
network?
Each IP packet is assigned a checksum, so if the checksums do not match on both
receiving and transmitting ends, the data was modified or corrupted.

Should we deploy IPSEC-based security or certificate-based security?


They are really two different technologies. IPSec secures the TCP/IP
communication and protects the integrity of the packets. Certificate-based security
ensures the validity of authenticated clients and servers.

What is LMHOSTS file?


Its a file stored on a host machine that is used to resolve NetBIOS to specific IP
addresses.

Whats the difference between forward lookup and reverse lookup in DNS?
Forward lookup is name-to-address, the reverse lookup is address-to-name.

How can you recover a file encrypted using EFS?


Use the domain recovery agent.

What is the Difference between Windows 2003 standard Enterprise, Premium,


Data center and Web Edition?
WEB EDITION:
To position windows server 2003 more competitively against other web servers, Microsoft
has released a stripped-down-yet-impressive edition of windows server 2003 designed

specially for web services. the feature set and licensing allows customers easy deployment
of web pages, web sites, web applications and web services.
Web Edition supports 2GB of RAM and a two-way symmetric multiprocessor(SMP). It
provides unlimited anonymous web connections but only 10 inbound server message
block(SMB) connections, which should be more than enough for content
publishing. The server cannot be an internet gateway, DHCP or fax server. Although you can
remotely administer the server with Remote Desktop, the server can not be a terminal
server in the traditional sense. The server can belong to a domain, but cannot be a domain
controller. The included version of the microsoft SQL server database Engine can
support as many as 25 concurrent connections.

How do you recover an object in Active Directory, which is accidentally deleted by


you, with no backup?
Using ntdsutil.exe command,we can restored the AD objects.

What is the Logical / Physical Structures of the AD Environment?


physical structure:
Forest, Site, Domain, DC
logical structure:
Schema partition, configuration partition, domain partition and application
partition

How to change the windows xp product key if wrongly installed with other product
key but you have original product key? What you will do to Make your os as
Genuine?
Some third party software are available for this function or reinstall this system

If 512mb Ram is there what will be the minimum and maximum Virtual memory
for the system?
To workout the total virtual memory (page file) required for windows XP you should take the
amount of ram in the system and + 25% (512MB + 25% (128MB) = 640MB total virtual
memory. by setting both the min and max to 640MB you can increase the performances of
the operating system.

What is LDAP?

LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and
other programs use to look up information from a server.

What is the SYSVOL folder?


The Sysvol folder on a Windows domain controller is used to replicate file-based data
among domain controllers. Because junctions are used within the Sysvol folder structure,
Windows NT file system (NTFS) version 5.0 is required on domain controllers throughout
a Windows distributed file system (DFS) forest.

What are application partitions? When do we use them?


Application Directory Partition is a partition space in Active Directory which an
application can use to store that application specific data. This partition is then replicated
only to some specific domain controllers.The application directory partition can contain
any type of data except security principles (users, computers, groups).

How do we Backup Active Directory?


Backing up Active Directory is essential to maintain an Active Directory database. You can
back up Active Directory by using the Graphical User Interface (GUI) and
command-line tools that the Windows Server 2003 family provides.You frequently
backup the system state data on domain controllers so that you can restore the most
current data. By establishing a regular backup schedule, you have a better chance of
recovering data when necessary.To ensure a good backup includes at least the system state
data and contents of the system disk, you must be aware of the tombstone lifetime. By
default, the tombstone is 60 days. Any backup older than 60 days is not a good backup.
Plan to backup at least two domain controllers in each domain, one of at least one backup to
enable an authoritative restore of the data when necessary.

How do we restore AD?


You cant restore Active Directory (AD) to a domain controller (DC) while the
Directory Service (DS) is running. To restore AD, perform the following steps.
Reboot the computer.
The computer will boot into a special safe mode and wont start the DS. Be aware that
during this time the machine wont act as a DC and wont perform functions such as
authentication.
1. Start NT Backup.
2. Select the Restore tab.
3. Select the backup media, and select System State.
4. Click Start Restore.

5. Click OK in the confirmation dialog box.


After you restore the backup, reboot the computer and start in normal mode to use the
restored information. The computer might hang after the restore completes; Ive
experienced a 30-minute wait on some machines.

What are GPOs?


Group Policy gives you administrative control over users and computers in your network.
By using Group Policy, you can define the state of a users work environment once, and
then rely on Windows Server 2003 to continually force the Group Policy settings that you
apply across an entire organization or to specific groups of users and computers.

What domain services are necessary for you to deploy the Windows Deployment
Services on your network?
Windows Deployment Services requires that a DHCP server and a DNS server be installed in
the domain

What is the difference between a basic and dynamic drive in


theWindowsServer2008environment?
A basic disk embraces the MS-DOS disk structure; a basic disk can be divided into partitions
(simple volumes).
Dynamic disks consist of a single partition that can be divided into any number of volumes.
Dynamic disks also support Windows Server 2008 RAID implementations.

What is the main purpose of a DNS server?


DNS servers are used to resolve FQDN hostnames into IP addresses and vice versa

Commonly Used DNS Records?


A-Records (Host address)
CNAME-Records (Canonical name for an alias)
MX-Records (Mail exchange)
NS-Records (Authoritative name server)
PTR-Records (domain name pointer)
SOA-Records (Start of authority)

What does Active Directory mean?

A: The active Directory means a service that identifies and handles resources, making them
visible for different groups or members that are authorized. It has the role of an object
store. The Active directory sees as objects workstations, people, servers devices or
documents and they all have their own characteristics and access control list or ACL.

2.Q: What is the meaning of Global Catalog?


A: A Global Catalog is something that each domain has, and it is used for authenticating the
user on the network, on windows 2000 network logons were protected from failures by
assigning a Global Catalog to every site.

3.Q: What is the use for DHCP?


A: DHCP is used for the DHCP servers, personal computers can get their configuration from
a DHCP server on an IP configuration. The server knows nothing about the personal
computers until they make a request for information. Usually the most common information
sent is IP address and DHCP is used to make a large network administration easier.

4.Q: What does a Super Scope do in DHCP?


A: The Super Scope gives the DHCP server the possibility to have leases to multiple clients
on the same physical network. The leases come from multiple scopes. All scopes must be
defined using DHCP manager before the Super Scope creation and they are named member
scopes. The DHCP problems can be resolved by the Super Scope in different ways like the
following:
a) on a physical network like a LAN network where multiple logical IP networks exist Super
Scope is very useful here. These types of networks are also named multinets.
b) there is also need for a Super Scope when the address pool for the current scope
becomes empty and there is a need for new computers on the physical network.
c) when clients have to move on another scope.
d) when DHCP clients from the other side of the relay agents (BOOTP) or the network has
many logical subnets.
e) when standard networks are limited to leasing addresses for the clients.
5.Q: How can we switch the roles in an Active Directory?
A: Switching or transferring roles in an Active Directory can be made with the use of
Ntdsutil.exe.

6.Q: What is the purpose of a Stub zone DNS?


A: The copy of a zone that has only the needed resources for finding the authoritative DNS
servers in that specific zone (DNS= Domain Name Servers) is called a Stub zone. It also

resolves names for DNS namespaces, thing required when names must be resolved from
two different DNS namespaces. The Stub zone contains: the master servers IP that is used
for updating the Stub zone and the SOA (Start of Authority), the NS (name server) and the
glue A delegated zone records.

5.Q: What main file is used for Active Directory backup and how it is made?
A: Active Directory backup is made using NTbackup utility. The backup is made once with
the system state and they are restored also together because they depend on each other.
The system state has different components like:
a)

The registry

b)

Boot files or startup files (files required by the operating system to start).

c)

The component services

d) The system volume or the SYSVOL folder this is a folder that contains files that are
shared on a domain.
e)

The Active Directory

6.Q: Does a windows administrator have to be critical?


A: Yes and I can explain how. A system administrator is responsible for an entire network
which means he/she must take care of multiple things in the same time which is not an
easy task. In order to achieve this, an administrator must have high organization skills and
a high technical knowledge and he/she must prevent the problems from happening so that
he/she wont have to be forced to fix them.

Complicated Windows System Administrator Interview Questions

7.Q: In what way is forward lookup zone different from the reverse lookup zone in
NDS?
A: There is one difference between these two: the forward lookup means name to IP and
reverse lookup means IP to name.

8.Q: As a system administrator can you make backup and recovery of data?
A: This is a responsibility that any system administrator must have assume as a basic skill.
Of course there are many types of backup that can be made but all must be known for a
successful career.

9.Q: What is the meaning of DHCP and what is the port used by it to work?

A: DHCP or Dynamic Host Configuration Protocol has the ability to assign an IP


automatically, this is done in fact by the server and has a number range. When the system
starts an IP is assigned automatically. The DHCP server has port number 68, while the client
has 67.

10.Q: Can you ensure an updated system all the time and perform market
research?
A: Staying up-to-date is another strong point of a professional administrator, technology
evolves and we must keep up with the flow, otherwise we cant do our job in a professional
way. Market research is the key to an up-to date work.

11.Q: Is it possible for a computer to be able to browse the internet without


having a default gateway?
A: Yes it is as long as we use a public IP address. The gateway is required as a router or
firewall when using an intranet address.

12.Q: What are the advantages or disadvantages of using DHCP?


A: The advantage is that the DHCP server configures all IPs automatically and the
disadvantage is that when you receive a new IP address the machine name remains the
same because of its association with the IP. Its not a real problem but when somebody tries
to access the machine by its name it become one.

13.Q: Are you familiar with monitoring?


A: Yes, monitoring is a base activity of a system administrator, he/she manages all the
access rights and the server space, security of the user accounts is one of the most
important things here. Also an administrator must make sure that the users activity doesnt
affect in any way the integrity of the server.

14.Q: How can we create a SRV record in DNS?


A: To do this we must open the DNS then we must select the abc.local domain the right
click and we must go to Other New Records and the SRV ( choose location).

15.Q: In how much time are the security changes applied on the domain
controllers?
A: Including policies for personal and public lockout, the changes apply immediately. The
changes also include passwords and LSA or Local Security Authority.

16.Q: What do you do if a an end user states that a file is gone?


A: Files are deleted constantly by end users but the backup can restore them. Anyhow
before using the backup we must check if the user didnt move the file by mistake in
another place.

Senior level Windows System Administrator Interview Questions

17.Q: Where is the storage place of the environmental settings and documents
from the roaming profile?
A: These documents and settings are deposited locally until the users log off, when they are
moved into the shared folder from the server so the log on at a fresh system may take a
while because of this.

18.Q: What are the classes that we can find in the Active Directory of Windows
Server 2003?
A: We can find:
a) the abstract class which can be made to look like a template and create other
templates, no matter if they are abstract, auxiliary or structural.
b) the structural class is the important type of class that is made from multiple abstract
classes or an existing structural class. They are the only ones that can make Active
Directory objects.
c) the auxiliary class is used as a replace for many attributes of a structural class, it is a
list of attributes.
d) The 88 class is used for objects classes that were defined before 1993 and it is not a
common class, it doesnt use abstract, structural or auxiliary classes.

19.Q: When is a good time for creating a forest?


A: Certain companies that have different bases require different trees and separate
namespaces. And unique names sometimes give birth to different identities of DNS. Also
companies are sometimes acquired and get under other influences but the continuity must
be preserved for the names.

20.Q: Can you explain to us about you experience in the past regarding windows
administration?
A: I have ten years of experience in this field, I was passionate about computers since
childhood and I installed many operating systems at home and inside organizations
including these versions of windows: 95, 98, 98 SE, NT, Millenium, 2000, 2003 Server, XP,

Seven, Vista. I also managed these systems and performed maintenance, I worked with
different applications from the windows environment.

21.Q: How can you handle a situation in which for instance if you have an
application that is not running on Windows 2003 because its older?
A: In this situation the application has to be started in the compatibility mode with a
previously windows operating system. This is made by right clicking the application icon and
choosing another Windows from the compatibility menu.

22.Q: What is the meaning of Repadmin.exe from Windows Server 2008?


A: Repadmin.exe means Replication Diagnostics Tool and helps for the diagnostic of domain
controllers in the Windows system. This tool is used by administrators to see the replication
topology from the perspective of every domain controller. The active Directory forest can
also be supervised by Repadmin.exe and replication problems can be tracked.

23.Q: What difference can we find in the usage of CSVDE versus LDIFDE?
A: CSVDE and LDIFDE are both commands and are used for importing and exporting objects
but they are different in the way that CSVDE uses the format CSV (Comma Separated
Value) which is an Excel file for files and LDIFDE uses LDIF (LDAP Data Interchange Format)
file type which can be viewed with a simple text editor. LDIFDE can be also used for editing
or deleting objects unlike CSVDE.

24.Q: What big differences exist between these two operating systems: Windows
2000 and Windows XP?
A: Windows 2000 has more capabilities than Windows XP especially regarding features like
DHCP, Terminal Services or DNS. It has all the advantages for server usage. Windows 2000
is a little more professional than XP, but they are both coming with different versions for
every user taste. While XP has Home version, Professional or Enterprise, Windows 2000 has
Professional and Server editions. The Home version of XP comes with minimal features
because the target clients are beginners.

25.Q: What are the things that make Unix different from Windows?
A: The code loading runtime of Unix is different from the one that Windows has. We must
become aware of how the system exactly works before we make a dynamically loading
module. Unix has the shared objects with the .so extension that encapsulate lines of code
that the programs will use and the functions names. These function names become the
references of those functions in the memory of the program when the file is combined with
the program. In Windows the .dll file (dynamic-link library file) doesnt have references and
the code of the files does not link to the memory of the program but they get through a
lookup table which points to data or functions. Unix has just one type of library file, with the

.a extension and the code of many object file is contained within with the .o extension.
When the link is created for a shared object file the definition of the identifier may not be
found, so the object code from the library will be included.

1. What is the Difference Between DNS & WINS Servers?


Domain Name System (DNS) :
1. It resolves Hostnames to IP addresses and vice versa
2. It supports Hierarchical Structure for host names
3. Host name up to 64 Characters (FQDN is up to 255 characters)
4. It works with Windows and Unix
5. DNS works with only TCP/IP protocol
6. DNS is static in NT 4.0 and Dynamic in 2000 onwards
Windows Internet Name Service (WINS) :
1. It resolves NetBIOS names to IP addresses and vice versa
2. It supports Flat structure for NetBIOS names
3. Host name is up to 15 characters (16th character indicates service)
4. Works with only Windows
5. Works with only TCP/IP Protocol
6. It supports the Dynamic updation of the database

2. What is the Difference Between Disk Duplexing & Disk Mirroring?


Disk Mirroring :Disk mirroring uses only one disk controller. In RAID1, or disk mirroring, one
drive in the array acts as a "mirror" drive, backing up all the data on the primary drive onthe-fly.
Disk Duplexing : It uses additional disk controller. Duplexing adds another disk controller. So
in case one controller fails, the other can pick up without any interruption in service.
Mirroring Data is copied from on-disk controller (channel) to two disk drivers. If one drive
fails, the other is still operational.
Duplexing Data is duplicated over two disk channels and stored on two drives. This
method extends fault tolerance to the controller.
Server duplexing This method provides fault tolerance by duplicating the entire file server.
If one server fails, the other provides continuous service to users. For example, Novell's
System Fault Tolerance provides server duplexing.
Replication A strategy of duplicating critical files and directories from a server at one
location to a server at another location to make that information more accessible to users at
the remote location and also to provide redundancy and backup. See "Redundancy" and
"Replication."
Clustering A cluster is a group of servers that share access to the same resources and
service clients equally. Should one of the servers go down, the others take up the
processing load. Clustered servers may access the same disk systems, which may be
mirrored or in a RAID configuration. See "Clustering."
Mirror site A mirror site is a duplicate data center, located at another site, that contains
duplicate systems and data. The duplicate data center should go into operation as the

primary site if the master data center site fails for any reason. Companies running missioncritical applications will often create mirrored sites. See "Data Center Design."
3. How many types of Backups are available?
Backups are 5 Types:
1. Normal or Full
2. Daily
3. Copy
4. Incremental
5. Differential

4. What is the Difference Between Differential Backup & Incremental Backup?


Incremental Backup resets the Archieve bits
Differential Backup doesnt reset the Archieve bits
5. Tell about the DHCP functionality?

DHCP client sends special broadcast packet to DHCP Discover Message


Nearest DHCP server responds by sending DHCP offer message
DHCP client sends a DHCP request message
DHCP ACK message broadcasts by DHCP server
DHCP client configures its TCP/IP stack by using address it accepted from the server.

6. Difference between Hub & Switch?


HUB:
Hub is a Layer 1 (L1) Device
It works on shared Bandwidth
It have One Broadcast domain & One collision domain
It sends the packets to every active port in the HUB, so traffic is more.
Useful in small network Environment
Switch:
It is a Layer 2 (L2) Device.
It have one Broadcast domain.
It have many collision domains (Every port have its own collision domain)
It sends the packets to only to the destination IP by learning the Destination IP. So traffic
is less compared to Hub.
Useful in Medium & Large networks.

7. We have 3 Hard disks with capacity of 2GB, 5GB and 4GB. If I implemented
RAID 5, How much space available for User ?
RAID5 takes the minimum disk space as basic so it takes 2GB from every disk so 6GB is
total disk available. In that 2GB is for Parity. So totally 4GB is available for User.

8. What is the Booting process of Windows 2000?


1. NTLDR runs and then calls NTDETECT.COM, it checks the computers hardware attributes
(Type of vedio, hard disk, ports, memory and so on)
2.Based on the results of the search, NTDETECT compiles a list of hardware. This
information is placed in the Registry under the appropriate hardware keys.
3.NTLDR reads an ASCII text file BOOT.INI to determine which other OS are on the hard
disk. (This file created during setup, is located in the root directory of the boot partition.
4.After the countdown period ends, the default OS in loaded
5.NT starts the booting process by loading the low level drivers and services
6. The GUI and higher drivers load, and NT logon security screen appears.
9. What is the Role of NTDETECT file?
NTDETECT.COM checks the computers hardware attributes (Type of vedio, hard disk,
ports, memory and so on)
10. Which options are available in Windows Security Logon window?

Lock Computer,
Logoff,
Shutdown,
Change Password,
Task Manager,
Cancel

11. What is hosts and lmhosts files explain?


Hosts file used for DNS to resolve Hostnames to IP Address and Vice Versa
LMHOSTS file is used for WINS to resolve NetBIOS names to IP Address and Vice Versa
12. What h mode indicates in WINS?
In DHCP 4 Modes are available to resolve NetBIOS names to IP Address.
1. B-Node (Broadcast) :
2. P-Node (Peer-to-Peer):
3. M-Node (Mixed):
4. H-Node (Hybrid):

13. User locked the system and forget password. If we reset the password can the
user able to logon immediately?
It is not possible in NT 4. Even if u change the password, user should restart the system.
It is possible in 2003 server. There is no need to restart the PC
14. Basic difference between between PDC and BDC?

Primary Domain Controller (PDC):


1. A single member computer of an NT Domain that is running Windows NT server.
2. This maintains the SAM database for the Domains (R/W SAM Database)
3. It Authenticates the logon users.
4. It updates the SAM database in BDC
Backup Domain Controller (BDC):
1. A member computer of an NT Domain that shares the load of user security
2. This machine has to run windows NT server and maintains a copy of SAM database.
3. The SAM database in BDC is Read only. It gets updated from PDC.
3. Whenever PDC is down, We can promote the BDC as a PDC.
SAM: A protected sub system that operates and maintains the security accounts manager
database
Security Accounts Manager (SAM) Database: the database that contains the user accounts,
Passwords, and other settings for each user
15. Can we create users in BDC?
Yes. We can create the users in BDC, Whenever users are created in BDC immediately the
changes are updated in PDC
16. What is EIGRP and IGRP?
Interior Gateway Routing Protocol (IGRP):
Cisco Proprietary protocol.
Distance Vector protocol
Metric is Bandwidth of Delay
Administrative distance 100
Classful Routing protocol
Periodic Routing protocol (sends entire routing table to the neighbour router for every 90
secs)
Does not supporting Subnetting
Minimum HOP count 100 ( can go upto 255)
Slow convergence
Used for medium sized networks
Uses AS numbers (1-65535)
Enhanced Interior Gateway Routing Protocol (EIGRP):
Ciscos proprietary protocol
Advance distance vector protocol
Hybrid protocols (distance vector + link state)
Metric is 5 Factors (Bandwidth, Delay, Reliability, Load Maximum, Transmission Unit)
Works on basis of AS numbers
AD Value 90 internal, 170 external
It supports triggered update (whenever change in topology that particular information will
sent)

Supports subnetting
Classless routing protocol
It supports multiple network layer protocol
It uses DUAL (Diffusion Update Algorithm) to select the best path
Route is represented by D symbol
It keeps 3 routing tables (Topology table, Neighbour table, Routing table)
Auto summarization by default, but manual summarization is also possible.

17. What is RIP explain?


Routing Information Protocol (RIP):
It is a standard protocol
Distance Vector protocol
Metric is HOP count
Administrative distance 120
RIP Ver 1.0 does not supports subnetting, It is a Classfull routing protocol
Periodic routing updates (sends entire routing table for every 30 secs)
Does not supports subnetting
Uses broadcast address 255.255.255.255 to send the updates
Maximum HOP count is 15
Slow convergence
Used for small inter networks
RIP V 2.0 suports subnetting, It is a classless routing protocol, It sends updates through
multicast address 224.0.0.9
18. What is difference between Router and Switch?
Router:
It is a Layer 3 (L3) device
It breaks broadcast + collision domains
It forwards the packets to other networks
Switch:
It is a Layer 2 (L2) device
By default all the ports are in one broadcast domain
It breaks the Collision domain (Every port have its own collision domain)
It does not have WAN ports
Only used in LAN environment

19. What is difference between L2 & L3 Switch?


L2 switch is used only for Switching
L2 switch have one broadcast domain and breaks the Collision domain
Static & Dynamic VLANs possible, but inter VLAN communication not possible
L3 switch is used for switching & routing purpose
L3 switch breaks the Broadcast domain & Collision domain
Static & Dynamic VLAN;s possible, Inter VLAN communication possible (Router)

L3 switch can be used in LAN environment for fast throughput

20. What shows net use?


NET USE displays the present connected Mapped drives in the system
21. How can u map a folder by using Command Prompt?
NET USE Z: \\ap-ftpsrv\drivers
22. What is ADS and what are the Functions of ADS?

ADS is a Directory service which stores all the information in a central location.
It provides the network accessibility to users, applications and administrators.
In ADS everything is stored as an Object. It contains Class Objects and Attribute Objects
All identical objects comes under one class ex. All users comes under User class
Attributes are the properties of the Object ex. For user full name, logon name etc

Simplifies Management:
Eliminates redundant management tasks. Provides a single-point of management for
Windows user accounts, clients, servers, and applications as well as the ability to
synchronize with existing directories.
Reduces trips to the desktop. Automatically distributes software to users based on their
role in the company, reducing or eliminating multiple trips that system administrators need
to make for software installation and configuration.
Better maximizes IT resources. Securely delegates administrative functions to all levels of
an organization.
Lowers total cost of ownership (TCO). Simplifies the management and use of file and print
services by making network resources easier to find, configure, and use.
Strengthens Security:
It improves password security and management. By providing single sign-on to network
resources with integrated, high-powered security services that are transparent to end
users.
It ensures desktop functionality. By locking-down desktop configurations and preventing
access to specific client machine operations, such as software installation or registry editing,
based on the role of the end user.
It speeds e-business deployment. By providing built-in support for secure Internetstandard protocols and authentication mechanisms such as Kerberos, public key
infrastructure (PKI) and lightweight directory access protocol (LDAP) over secure sockets
layer (SSL).
It tightly controls security. By setting access control privileges on directory objects and
the individual data elements that make them up.
Extends Interoperability:
Takes advantage of existing investments and ensures flexibility. Standards-based
interfaces to all features make use of investments and ensure flexibility for future

applications and infrastructure.


Consolidates management of multiple application directories. Using open interfaces,
connectors, and synchronization mechanisms, organizations can consolidate directories
including Novell's NDS, LDAP, ERP, e-mail, and other mission-critical applications.
Allows organizations to deploy directory-enabled networking. Network devices from
leading vendors such as Cisco and 3COM can use the directory to let administrators assign
quality of service and allocate network bandwidth to users based on their role in the
company.
Allows organizations to develop and deploy directory-enabled applications. Using the fully
extensible directory architecture, developers can build applications that deliver functionality
tailored to the needs of the end user.
23. What are the 4 Partitions of the ADS, explain?
Naming Contexts and Directory Partitions:
Each domain controller in an Active Directory forest includes directory partitions. Directory
partitions are also known as naming contexts. A directory partition is a contiguous portion of
the overall directory that has independent replication scope and scheduling data. By default,
the Active Directory for an enterprise contains the following partitions:
Schema Partition: Schema holds information on the definition of objects within the
network. The schema partition contains the classSchema and attributeSchema objects that
define the types of objects that can exist in the Active Directory forest. Every domain
controller in the forest has a replica of the same schema partition.
Defines rules for object creation and modification for all objects in the forest. Replicated to
all domain controllers in the forest. Replicated to all domain controllers in the forest, it is
known as an enterprise partition.
Configuration Partition: Configuration partition holds information relating to the forest
structure. The configuration partition contains replication topology and other configuration
data that must be replicated throughout the forest. Every domain controller in the forest has
a replica of the same configuration partition.
Information about the forest directory structure is defined including trees, domains, domain
trust relationships, and sites (TCP/IP subnet group). Replicated to all domain controllers in
the forest, it is known as an enterprise partition.
Domain Partition: The domain partition contains the directory objects, such as users and
computers, associated with the local domain. A domain can have multiple domain controllers
and a forest can have multiple domains. Each domain controller stores a full replica of the
domain partition for its local domain, but does not store replicas of the domain partitions for
other domains.
Has complete information about all domain objects (Objects that are part of the domain
including OUs, groups, users and others). Replicated only to domain controllers in the same
domain.
Application Directory Partitions: The application directory partition provides the capability
of hosting dynamic data in Active Directory, thus allowing ADSI/LDAP access to it, without
significantly impacting network performance. Dynamic data typically changes more
frequently than the replication latency involved in propagating the change to all replicas of
the data. In Windows 2000, the support for dynamic data is limited. Storing dynamic data in
a domain partition can be complicated. The data is replicated to all domain controllers in the
domain, which is often unnecessary and can result in inconsistent data due to replication

latency. This can adversely impact network performance.

24. What are the requirements to install ADS?

An NTFS partition with enough free space (1 GB)


An Administrator's username and password
The correct operating system version
A NIC
Properly configured TCP/IP (IP address, subnet mask and - optional - default gateway)
A network connection (to a hub or to another computer via a crossover cable)
An operational DNS server (which can be installed on the DC itself)
A Domain name that you want to use
The Windows 2000 or Windows Server 2003 CD media (or at least the i386 folder)

4. Which protocol is used behind the ADS?


Light Weight Directory Access Protocol (LDAP) is used

25. What is the difference between LDAP and DAP?


Lightweight Directory Access Protocol:
LDAP is a communication protocol designed for use on TCP/IP networks. LDAP defines how a
directory client can access a directory server and how the client can perform directory
operations and share directory data. LDAP standards are established by working groups of
the Internet Engineering Task Force (IETF). Active Directory implements the LDAP attribute
draft specifications and the IETF standards for LDAP versions 2 and 3.
As its name implies, LDAP is designed as an efficient method for accessing directory services
without the complexity of other directory service protocols. Because LDAP defines what
operations can be performed to query and modify information in a directory and how
information in a directory can be securely accessed, you can use LDAP to find or enumerate
directory objects and to query or administer Active Directory.

26. What is Schema and Global Catalog Server explain?


Schema: The Schema is a Blue Print of Active Directory. It contains rules for object
instantiation (representation) the schema governs the structure and content of Active
Directory with structure and content rules. Because everything in Active Directory is stored
in objects, the schema is implemented as a number of objects. There is one object for each
class in the schema (classSchema objects) and one for each attribute (attributeSchema
objects). However, there are no objects for the syntaxes; they are hard-coded into Active
Directory. This means that classes and attributes can be created and modified, but syntaxes
cannot.
Global Catalog: The Global catalog is the central repository of information about objects in a
tree or forest, as shown in Figure (D) By default, a global catalog is created automatically
on the initial domain controller in the forest, known as the global catalog server. It stores a
full replica of all object attributes in the directory for its host domain and a partial replica for
all object attributes contained in the directory of every domain in the forest. The partial

replica stores attributes most frequently used in search operations (such as a user's first
and last names, logon name, and so on). Object attributes replicated to the global catalog
inherit the same permissions as in source domains, ensuring that data in the global catalog
is secure.
The global catalog performs two key directory roles:
It enables network logon by providing universal group membership information to a
domain controller when a logon process is initiated.
It enables finding directory information regardless of which domain in the forest actually
contains the data.

27. If the Laptop is not displaying when u boot it, what is solution?
Check for the Power Loose connections
Remove Laptop battery and put it again and connect the power cable
Wait for 2 minutes and Start the Laptop.
28. If the system performance is slow, how can u speed it?

Remove Temp Files & Quarantine Files


Execute the Disk Defragmentation tool
Check for Viruses and scanned the system
Check the services and deletes the unnecessary services.
Check the Virtual Memory settings

29. How u r upgraded Anti Virus from Corporate Edition 9 to 10?


For client upgradations, by using Symantec System Center Console.
We push the anti virus into Client.
Requirements IE 5.5 or above and 100MB space
30. What is the difference between DNS & WINS?
Domain Name System (DNS) :
1. It resolves Hostnames to IP addresses and vice versa
2. It supports Hierarchical Structure for host names
3. Host name up to 64 Characters (FQDN is up to 255 characters)
4. It works with Windows and Unix
5. DNS works with only TCP/IP protocol
6. DNS is static in NT 4.0 and Dynamic in 2000 onwards
Windows Internet Name Service (WINS) :
1. It resolves NetBIOS names to IP addresses and vice versa
2. It supports Flat structure for NetBIOS names
3. Host name is up to 15 characters (16th character indicates service)
4. Works with only Windows
5. Works with only TCP/IP Protocol
5. It supports the Dynamic updation of the database

31. If u r connected to the Internet which is used DNS or WINS?


DNS is used. Because it is having the Hierarchical structure.
32. If u install DNS at the time of promoting the Workstation as DC. Is it creates
any more records?
Yes, If u install DNS at the time of DCPROMO. The DNS contains the active directory
integrated zones. It wont have the Text zone files. It stores the zone information in the
Active Directory database (NTDS.NIT) file.
33. What is the use of DHCP Server explain the process?

DHCP client sends special broadcast packet to DHCP Discover Message


Nearest DHCP server responds by sending DHCP offer message
DHCP client sends a DHCP request message
DHCP ACK message broadcasts by DHCP server
DHCP client configures its TCP/IP stack by using address it accepted from the server.

34. If 2 DHCP servers are available, from which server the client takes IP?
The client machine typically repeats the discover message several times to make sure it
hears from all the servers, then eventually chooses the "best" server, where what is "best"
is up to the client. It may mean that the addresses the DHCP server has available offer the
longest lease time. Or the client might prefer a server that provides WINS servers over one
that doesn't
35. What are the FSMO Roles (Master Operations) and explain?

Windows 2000 Single-Master Model:


To prevent conflicting updates in Windows 2000, the Active Directory performs updates to
certain objects in a single-master fashion. In a single-master model, only one DC in the
entire directory is allowed to process updates. This is similar to the role given to a primary
domain controller (PDC) in earlier versions of Windows (such as Microsoft Windows NT 3.51
and 4.0), in which the PDC is responsible for processing all updates in a given domain.
The Windows 2000 Active Directory extends the single-master model found in earlier
versions of Windows to include multiple roles, and the ability to transfer roles to any domain
controller (DC) in the enterprise. Because an Active Directory role is not bound to a single
DC, it is referred to as a Flexible Single Master Operation (FSMO) role. Currently in Windows
2000 there are five FSMO roles:
Schema Master:
This DC is the only one that can process updates to the directory schema
It controls all originating updates to the schema
It contains master list of object classes and attributes that are used to create all active
directory objects such as users, computers and printers.
The schema updates are replicated to all Domain Controllers in the Forest.

Only schema admins group can make modifications to the schema


Domain Naming Master:
It controls the addition or Removal of domains in the Forest
It is responsible to ensuring that the domain names are UNIQUE.
It manages the naming of sites to ensure that a duplicate sites are not created.
It must also be running as a Global Catalog Server for querying objects in AD.
PDC Emulator:
It acts as a PDC to supports NT BDCs and pre windows 2000 based client computers
Updates password changes from pre windows 2000 based client computers
Minimizes replication latency for password changes for 2000 based client computers
Manages the Time synchronization
Preventing the possibilities of overwriting GPOs
Relative Identifier (RID) Master:
It allocates blocks of RIDs to each domain controller in the Domain
Prevents Object duplication if objects move from one Domain Controller to other.
Object SID = Domain SID + RID
It is UNIQUE for each object in AD.
We cant create the objects if the RID Master Fails.
Infrastructure Master:
It is responsible to updating group membership data for groups that have members that
move between two or more domains
Updates references to Objects and Group membership from other domains.
The infrastructure master is responsible for managing group and user references.

36. Where is ADS existed physically?


C:/WINNT/NTDS
Files in Active Directory:
1) NTDS.DIT (Directory database file stores all the AD objects in the Domain Controller)
2) EDB*.LOG (Each transaction is recorded in one or more log files. Each file contains 10MB
of space)
3) EDB.CHK (Checkpoint file used by AD engine to track the data not yet written to the
Active Directory database file)
4) RES1.LOG & RES2.LOG (If all disk space is used. Then AD uses this 20MB space for log
files)
37. What is the use of SYSVOL folder?
The SYSVOL share contains W2K software distribution files, scripts, and ADM templates as
well as the Group Policy Template. An NT administrator would consider Sys vol to be W2K's
version of NETLOGON. Replication in W2K is handled by the File Replication Service to keep
the SYSVOL share synched between W2K domain controllers. In fact, W2K creates the
NETLOGON share for down-level clients, Win9x and Windows NT, under the SYSVOL

structure.
38. Where is Group Policy located physically? What is the use of GPO?
C:/Winnt/SYSVOL/sysvol/ap.ttsl.com/policies

We can restrict the Users Desktop environments by using Group Policies.


We can create GPOs to Sites, Domains and OUs.
All the GPOs applied based on the Computer / User
The precedence order for processing GPOs are LSDOU.
By using GPOs We can deploy the applications to Clients

39. How can u deploy the applications or patches in clients?


By using Windows Server Update Services (WSUS 2.0) (for small Organizations)
or
System Management Server (SMS) 2003 (for Medium/Big Organizations)
40. How can the client OS updates automatically with latest security updates?
If we have the internet. Select Windows Update option
It will updates SP, Security Patches and IE and others
41. Tell about the GHOST?
It is a Symantec Disk Cloning Utility
We can Clone Disk to Disk or Partition to Partition
42. How can you see the performance of CPU and Memory?
Go to Task Manager and see the Performance tab
43. What is RAID and explain all Levels?

RAID
RAID
RAID
RAID
RAID

is for Fault tolerance and Performance


0 to RAID 6 & RAID 10 & RAID 01 are available
0 for striped set
1 for Disk Mirroring
5 for Parity

You might also like