Вы находитесь на странице: 1из 15

A) Tell me something about yourself.

Tell about your eductaion, place you belong to, some struggle in life which shows that you have positive attitude and will to fight the odds.

1) What is Active Directory? A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments. For example we can create, manage and administor users, computers and printers in the network from active directory.

2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS? What are A records and mx records? DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request. Forward lookup: Converting names to IP address is called forward lookup. Reverse lookup: Resolving IP address to names is called reverse lookup. 'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of which DNS can find out the IP address of a name. 'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is also found in DNS.

3) What id DHCP? Why it is used? What are scopes and super scopes? DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy. Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network. Superscope: When we combine two or more scopes together its called super scope.

4) What are the types of LAN cables used? What is a cross cable? Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can support 1Gbps of speed.Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.

5) What is the difference between a normal LAN cable and cross cable? What could be

the maximum length of the LAN cable? The way the paired wires are connected to the connector (RJ45) is different in cross cable and normal LAN cable. The theoritical length is 100 meters but after 80 meters you may see drop in speed.

6) What would you use to connect two computers without using switches? Cross cable.

7) What is IPCONFIG command? Why it is used? IPCONFIG command is used to display the IP information assigned to a computer. Fromthe output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer.

8) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available? When DHCP server is not available the Windows client computer assignes an automatic IP address to itself so that it can communicate with the network cmputers. This ip address is called APIPA. ITs in the range of 169.254.X.X. APIPA stands for Automatic private IP addressing.

9) What is a DOMAIN? What is the difference between a domain and a workgroup? Domain is created when we install Active Directory. ITs a security boundary which is used to manage computers inside the boundary. Domain can be used to centrally administor computers and we can govern them using commo policies called group policies. We can't do the same with workgroup.

10) Do you know how to configure outlook 2000 and outlook 2003 for a user? Please visit the link below to find out how to configure outlook 2000 and outlook 2003.http://www.it.cmich.edu/quickguides/qg_outlook2003_server.asp

11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express? PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express useds odb file.

12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it? BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot

the computer is "LAst known good configuration". If this doesn't work than boot the computer in safe mode. If it boots up than the problemis with one of the devices or drivers.

13) What is RIS? What is Imaging/ghosting? RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or iamging/ghosting because installing OS everytime using a CD can be a very time consuming task. So to save that time we can go for RIS/Ghosting/imaging.

14) What is VPN and how to configure it? VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the resources like mail and files in the LAN. VPN can be configured using the stepsmentioned in the KB: http://support.microsoft.com/kb/305550

15) Your computer slowly drops out of network. A reboot of the computer fixes the problem. What to do to resolve this issue? Update the network card driver.

16) Your system is infected with Virus? How to recover the data? Install another system. Install the OS with the latets patches, Antivirus with latest updates. Connect the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system.

17) How to join a system to the domain? What type of user can add a system to the domain? Please visit the article below and read "Adding the Workstation to the Domain"http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/dire ctory/activedirectory/stepbystep/domxppro.mspx

18) What is the difference between a switch and a hub? Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.

19) What is a router? Why we use it? Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across but it uses the routing protocols to do so.

20) What are manageable and non manageable switches? Switches which can be administered are called manageable switches. For example we can create VLAN for on such switch. On no manageable switches we can't do so. IT Helpdesk Questions Technical Questions 1. What is NIC? A network card, network adapter or NIC (network interface controller) is a piece of computer hardware designed to allow computers to communicate over a computer network

2. What is USB? Universal Serial Bus (USB) is a serial bus standard to interface devices. Devices like Modem, Mouse, Keyboard etc can be connected.

3. Dialup vs. Broadband A broadband connection (ADSL) provides high-speed Internet access over a standard phone line. The advantage of a broadband connection over a standard dialup service, is that Broadband is considerably faster, and is "always-on", meaning that once you"re logged on, your PC is online until the PC is turned off again. Broadband offer high-speed Internet access and allows telephone calls and a permanent Internet connection to share a single phone line simultaneously whereas in Dialup connection either Internet connection or telephone call can made at given time.

4. LAN and WAN A local area network is a computer network covering a small geographic area, like a home, office, or group of buildings Wide Area Network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries). Or, less formally, a network that uses routers and public communications links

5. Microsoft Access Microsoft Office Access, previously known as Microsoft Access, is a relational database

management system from Microsoft.

6. What is RAS? Remote Access Services (RAS) refers to any combination of hardware and software to enable the remote access to tools or information that typically reside on a network of IT devices.

7. Difference between Client Mail and Web Mail? Email clients download your emails onto your computer. Using a specialized email program such as Outlook Express or Apple Mail has the advantage of giving you complete control over your email; every email you receive is placed on your computer and you can keep as many large file attachments as you want. Checking your email through our webmail is similar to using Hotmail or Yahoo! Mail. You never actually copy your messages to your computer; in fact, you are looking at them through your web browser on somebody else"s computer. When you are not online, you are not able to see your email.

8. RAM and ROM random access memory, a type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. RAM is the most common type of memory found in computers and other devices, such as printers. Pronounced rahm, acronym for read-only memory, computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only be read. Unlike main memory (RAM), ROM retains its contents even when the computer is turned off. ROM is referred to as being nonvolatile, whereas RAM is volatile.

9. Spamguard Spam Guard is an Outlook add-in that filters email that arrives in your inbox. If the sender of any message cannot be identified then the message is moved into a spam quarantine folder. Messages deposited in the spam quarantine folder can be inspected and either deleted or approved at your leisure.

10. Firewall and Antivirus A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are

frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. Antivirus is a software program which helps protect a computer against being infected by a virus.

11. DNS Short for Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they"re easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4.

12. IPConfig IPConfig is a command line tool used to control the network connections on Windows NT/2000/XP machines. There are three main commands: "all", "release", and "renew". IPConfig displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, IPConfig displays the IP address, subnet mask, and default gateway for all adapters.

13. Trace route Trace route is the program that shows you the route over the network between two systems, listing all the intermediate routers a connection must pass through to get to its destination. It can help you determine why your connections to a given server might be poor, and can often help you figure out where exactly the problem is. It also shows you how systems are connected to each other, letting you see how your ISP connects to the Internet as well as how the target system is connected.

Please find the technical questions: 1) What is IP Address ? 2) What are the layers of network ? 3) What are the different types of network ?

4) What is networking ? 5) What is the difference between OSI and TCP/IP Model ? 6) What is TCP/IP ? 7) What is HTTP? 8) What is Protocol ? 9) What is communication medium ? 10) What is PORT ? 11) What is SOCKET ? 12) What is the difference between PORT and SOCKET? 13) What is wireless networking ? 14) What is topology ? 15) What are the different types of topology ? 16) What is the size of IP Address? 17) What is FTP ? 18) What is SMTP ? 19) What are the different types of protocol ? 20) What is Dial-Up connection ? 21) What is Broad Band Connection? 22) What is the difference between Dial-up and broad band connection? 23) What IEEE standard for wireless networking? Ans: 802.11g 24) What is IEEE standard ? Ans: Institute of electrical and electronic engineer.They develop standard for networking

L2

1. How to check AD configured properly?Ans: Check NTDS and SYSVOL shared folder at %systemroot%windows\. 2. How to transfer global catalog to another domain?Ans: We can not transfer the global catalog; we can only remove the global catalog from one server and enable other server as a global catalog. 3. How to configure global catalog server?Ans: Go to Active directory site and services and expand till your desire servers NTDS settings and then right click; property and check mark the Global catalog check box. 4. What are the fsmo roles and it gets down what will impact? Ans: Flexible Single Master Operation, There are five roles. Domain Naming Master (Forest wide role) Schema Master (Forest wide role) PDC Emulator (Domain wide role) RID Master (Domain wide role) Infrastructure Master (Domain wide role) 5. What is the RID pool?Ans: RID Master provides the RID (Relative Identifier) pool to Domain controller of the Domain. When an object is create in a domain, a Unique SID (Security ID) is assigned to it which consisting of a RID (Unique ID) and a SID (Common ID for all Object), A RID pool contain 500 RIDs. 6. How to check FSMO roles running on which server? Ans: By using DCdiag /test:Knowsofroleholders /v command. ii) Type Netdom query fsmo 7. How to transfer FSMO role one domain controller to another domain controller command prompt and GUI?Ans: Go to Start->Run->dsa.msc go the property of users and computers and transfer the RID, PDC, and Infrastructure roles. Go to Start Run->go to the property of the active directory domain and trust and transfer the Domain naming master role For transferring schema master role, first we have to register the schema master by using regsvr32 schmgmt.dll command in run. Than Go start Run MMCAdd Active directory schema and transfer the schema master role. 8. What is AD data base file and log file where it stored is and what is the use of log file?

Ans: AD Data base is NTDS.DIT and its location is %system root%\windows\NTDS\ntds.dit. AD Log files are EDB.log ,EDB.chk and REG.log and the location of there files are %system root%\windows\NTDS\ntds.dit. 9. How to recover corrupted AD data base file? Ans: Its described very well in the article available here. 10. Is it possible to rename domain name in windows 2003?Ans: Yes, We can rename the domain name in windows 2003. 11. What are the two types of replication? Ans: Inter-site replication, Intra-site replication. 12. What are the protocols used in replication? Ans: RPC and SMTP. Predominantly RPC is used. SMTP is not used as its not recommended for replication of Domain Partition. Replication conflict is managed using a method described here. Read the full article several times and you would be happy that you got to know something very important. 13. What is default time for replication? Ans: KCC (Knowledge Consistency Checker) is the algorithm and the two protocols used are RPC over IP and SMTP over IP. They replicate in every 15 min. 14. What is the difference between the two types of replication i.e. intrasite and intersite? Intersite replication is for replication with in the site and Intra-site replication is for the replication between the sites. 15. What are replication partition and tell about partition? Ans: FSMO role Partition Schema CN=Schema,CN=configuration, DC= Domain Naming Master CN=configuration,DC= PDC DC= RID DC= Infrastructure DC= Replication partitions are. Schema Partition Configuration Partition Domain Partition Application Partition 16. Is application partition available in windows 2003? Ans: Yes, Windows 2003 contains application partition, mainly application partition contains the application information like: DNS

17. What is the DNS? Ans: Domain Naming System. Used to resolve the host name (FQDN) name to IP Address and Vice Versa 18. What are types of DNS and zones? (i)Primary DNS zone (ii)Secondary DNS zone (iii)Active directory integrated zone (IV)Stub zone To know more about DNS please read the blog http://dnsfunda.blogspot.com

19. What is the Start of Authority (SOA) record and is its use? Ans: It contains information like the server name where the file was created (Primary DNS Server name), it Maintains the serial number and increments it after every change in the DNS Zone, stores Refresh interval and Retry interval time, maintains TTL of the records as well. Read this article for more details.
@ IN SOA nameserver.place.dom. 1 3600 600 86400 3600 ) postmaster.place.dom. ( ; serial number ; refresh [1h] ; retry [10m] ; expire [1d] ; min TTL [1h]

20. What are records available in dns? Ans: Address records, Host Records, MX Records, and CNAME records. 21. Explain about SRV, MX and CNAME records? ANS: SRV records point a client to the servers which are hosting a service. For example Active Directory Service. MX record points to the client to servers hosting mail service. MX stands for Mail Exchanger. CNAME record is a alias record for a name that already exists. Suppose there were two servers and both of them consolidated into one, in that case one name becomes useless. But any application dependent on unused name has to work, in that case we create an alias record which is the unused name pointing to the name in use. Hence the application keeps functioning. 22. Where DNS file stored and data base of DNS? Ans: %SYSTEMROOT%\Windows\System32\DNS 23. How do I configure DHCP Server and steps? ANS: If you have already installed DHCP on the server then follow the steps mentioned in this Trainsignal Article. 24. How to reserve IP address?Ans: We can assign a particular IP address to the MAC address of

a machine using IP reservation in DHCP. 25. Why do we need two or more subnets?ANS: To segment or restrict/localize one type of traffic to one segment or subnet of the network. 26. If we have two different subnets then how do I configure it in single DHCP server? ANS: Two different scopes are created for two subnets. 27. What is the use of relay agent? A router drops the DHCP packet as its a broadcast packet. When we enable the relay agent option on the router it then lets the DHCP Broadcast packets pass through. Hence the relay agent helps in sending it over to the destined subnet. 28. What is the group policy? Ans: It is way to provide the desirable predefined environment to all users in an Active Directory environment and it is centrally manageable. 29. My requirement is to need disable USB port, how will you do? Through Group policy. 30. How to take a backup of group policy? Ans: We can use GPMC (Group Policy Management Console), right click on the GPO and select backup and take backup on destination folder 31. You are an administrator and my requirement is to configure active directory for four different locations. How will you plan it? Ans: Depending on the requirement I' ll configure one parent domain and three child domains, or One domain with four sites, or four different domains (least preferred). 32. What are the two modes a terminal server works in? ANS: User mode and applciation mode. 33. What is the default security group, groups give explanations? Ans: 34. You are maintaining remote servers that you can take remote but you cant ping them, how to troubleshoot? 35. What is use of Kerberos protocol? Ans: Kerberos protocol is an authentication protocol. When we login in an Active Directory environment its the protocol that is used to authenticate us. 36. What is the version Kerberos protocol? Ans: We are using Kerberos V 5.0.

37. What is the authentication protocol in Windows NT? Ans: Windows NT supported two kinds of challenge/response authentication: LanManager (LM) challenge/response Windows NT challenge/response (also known as NTLM challenge/response) 38. What are RAID levels? Ans: Main RAID levels are RAID-0, RAID-1, RAID-5 and RAID-10. 39. Which RAID you will recommend and why? Ans: RAID-1 for O.S - mirroring RAID-5 for DATA partition- Stripe set with parity. 40. What are the different RAID1 and RAID 5?RAID-1:- In RAID-1 two hard disk are there and the data on one is mirrored to another. So even if one fails other one is there with the same data for service continuity. RAID-5: We can use minimum three hard disk and maximum depend upon RAID controller card, Data written on disk in stripes with distributed parity set.

41. What are the Different between and disk mirroring and disk duplexing? Ans: Disk Mirroring: Disk mirroring (also known as RAID-1) is the practice of duplicating data in separate volumes on two hard disks to make storage more fault-tolerant. Mirroring provides data protection in the case of disk failure, because data is constantly updated to both disks. However, since the separate disks rely upon a common controller, access to both copies of data is threatened if the controller fails. Disk Duplexing: Disk duplexing is a variation of disk mirroring in which each of multiple storage disks has its own SCSI controller. Disk duplexing overcomes this problem; the use of redundant controllers enables continued data access as long as one of the controllers continues to function. Since the controllers for each disk are different, one of the disks keeps working even if the other disk fails or one of the disk controller fails. So it gives us the luxury to plan for the downtime based on our convinience. Another benefit of disk duplexing is increased throughput. Using a technique known as a split seek, whichever disk can deliver the requested data more quickly responds. Multiple requests may also be split between the disks for simultaneous processing.

42. What is the dynamic disk?Dynamic disks provide the ability to create volumes that span multiple disks (spanned and striped volumes) and the ability to create fault-tolerant volumes (mirrored and RAID-5 volumes).Dynamic disks offer greater flexibility for volume management because they use a database to track information about dynamic volumes on the disk and about other dynamic disks in the computer. Because each dynamic disk in a computer stores a replica of the dynamic disk database, for example, a corrupted dynamic disk database can repair one dynamic disk by using the database on another dynamic disk.

Dynamic disks are a separate form of volume management that allows volumes to have noncontiguous extents on one or more physical disks. Dynamic disks and volumes rely on the Logical Disk Manager (LDM) and Virtual Disk Service (VDS) and their associated features. These features enable you to perform tasks such as converting basic disks into dynamic disks, and creating fault-tolerant volumes. To encourage the use of dynamic disks, multi-partition volume support was removed from basic disks, and is now exclusively supported on dynamic disks. The following operations can be performed only on dynamic disks: 1) Create and delete simple, spanned, striped, mirrored, and RAID-5 volumes. 2) Extend a simple or spanned volume. 3) Remove a mirror from a mirrored volume or break the mirrored volume into two volumes. 4) Repair mirrored or RAID-5 volumes. 5) Reactivate a missing or offline disk.

43. What is disk striping? Ans: Disk striping is the technique of spreading data over multiple disks. The data to be stored is divided into blocks and spread across several partitions on various hard disk. Disk striping is used with or without equivalence. Disk striping helps in improving the performance of the disk.

44. What are the backup types? Ans: (i) Normal or full Backup (ii) Deferential Backup (iii)Incremental Backup (iv)Copy backup (v)Daily Backup 45. Which type backup reset archive bits? Ans: The bit which has check mark on the folder whose backup has been done using normal backup method. 46. What is the use of DFS? Ans: Distributed File System, It is used for the fault tolerance because it makes the duplicate copy of every DFS root. Not only that the domain login process as well uses DFS to find out the nearest DC to login. 47. Do you know about FRS? Ans: File Replication Services. Example: Replication of SYSVOL folder. 48. What are difference between TCP and UDP protocol? Ans: TCP is a connection orientated protocol while UDP is not a connection orientated protocol.

49. What is different between HUB and Switch?Ans: HUB broadcast the data packet but Switches multicast the data packet into the network which reduces the collision of data packets. 50. Which layer of OSI model does the Router works in? Ans: One layer Three (Network layer) 51. You are going to migrate the domain how to plan? Ans: The answer is here. 52. For project requirement you going to share 20 folders what is the step you will take? 53. What is the need of a VLAN?Ans: To divide/restrict the traffic into one segment of the network. 54. What kind of privilege is required to transfer FSMO roles? Ans. logged-on user should be a member of the Enterprise Administrators group to transfer Schema master or Domain naming master roles, or a member of the Domain Administrators group of the domain where the PDC emulator, RID master and the Infrastructure master roles are being transferred. 55. Write down the command line to transfer all the FSMO roles to other server? Ans: Click Start, click Run, type ntdsutil in the Open box, and then click OK Type roles, and then press ENTER. Type connections, and then press ENTER. Type connect to server servername, and then press ENTER, where servername is the name of the domain controller that you want to assign the FSMO role to. At the server connections prompt, type q, and then press ENTER. Type transfer role, where role is the role that you want to transfer. For example, To transfer the RID master role, type transfer schema master To transfer the RID master role, type transfer domain naming master To transfer the RID master role, type transfer rid master To transfer the RID master role, type transfer pdc To transfer the RID master role, type transfer infrastructure master 7. At the fsmo maintenance prompt, type q, and then press ENTER to gain access to the ntdsutil prompt. 56. Write down the command line to seize all the FSMO roles to a server?Ans: Click Start, click Run, type ntdsutil in the Open box, and then click OK Type roles, and then press ENTER. Type connections, and then press ENTER. Type connect to server servername, and then press ENTER, where servername is the name of the domain controller that you want to assign the FSMO role to. At the server connections prompt, type q, and then press ENTER. Type seize role, where role is the role that you want to seize. For example, To seize the RID master role, type seize schema master To seize the RID master role, type seize domain naming master To seize the RID master role, type seize rid master

To seize the RID master role, type seize pdc To seize the RID master role, type seize infrastructure master. 7. At the fsmo maintenance prompt, type q, and then press ENTER to gain access to the ntdsutil prompt. 57. Command for removing active directory? Ans: dcpromo /forceremoval 58. How to test whether a domain controller is also a global catalog server: Click Start, point to Programs, point to Administrative Tools, and then click Active Directory Sites and Services. Double-click Sites in the left pane, and then locate the appropriate site or click Default-first-site-name if no other sites are available. Open the Servers folder, and then click the domain controller. In the domain controller's folder, double-click NTDS Settings. On the Action menu, click Properties. On the General tab, view the Global Catalog check box to see if it is selected.

To know about Microsoft clustering service (MSCS) please visit this pageTo know about Microsoft Netwrok load balancing (WLBS) please visit this page.

Вам также может понравиться