Вы находитесь на странице: 1из 28

February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

Windows Server 2003 Active Directory and


Security questions
 What’s the difference between local, global and universal groups? Domain local groups
assign access permissions to global domain groups for local domain resources. Global groups
provide access to resources in other trusted domains. Universal groups grant access to resources
in all trusted domains.
 I am trying to create a new universal user group. Why can’t I? Universal groups are
allowed only in native-mode Windows Server 2003 environments. Native mode requires that all
domain controllers be promoted to Windows Server 2003 Active Directory.
 What is LSDOU? It’s group policy inheritance model, where the policies are applied to
Local machines, Sites, Domains and Organizational Units.
 Why doesn’t LSDOU work under Windows NT? If the NTConfig.pol file exist, it has the
highest priority among the numerous policies.
 Where are group policies stored? %SystemRoot%System32\GroupPolicy
 What is GPT and GPC? Group policy template and group policy container.
 Where is GPT stored? %SystemRoot%\SYSVOL\sysvol\domainname\Policies\GUID
 You change the group policies, and now the computer and user settings are in conflict.
Which one has the highest priority? The computer settings take priority.
 You want to set up remote installation procedure, but do not want the user to gain
access over it. What do you do? gponame–> User Configuration–> Windows Settings–>
Remote Installation Services–> Choice Options is your friend.
 What’s contained in administrative template conf.adm? Microsoft NetMeeting policies
 How can you restrict running certain applications on a machine? Via group policy,
security settings for the group, then Software Restriction Policies.
 You need to automatically install an app, but MSI file is not available. What do you do?
A .zap text file can be used to add applications using the Software Installer, rather than the
Windows Installer.
 What’s the difference between Software Installer and Windows Installer? The former
has fewer privileges and will probably require user intervention. Plus, it uses .zap files.
 What can be restricted on Windows Server 2003 that wasn’t there in previous
products? Group Policy in Windows Server 2003 determines a users right to modify network
and dial-up TCP/IP properties. Users may be selectively restricted from modifying their IP
address and other network configuration parameters.
 How frequently is the client policy refreshed? 90 minutes give or take.
 Where is secedit? It’s now gpupdate.
 You want to create a new group policy but do not wish to inherit. Make sure you check
Block inheritance among the options when creating the policy.
 What is "tattooing" the Registry? The user can view and modify user preferences that are
not stored in maintained portions of the Registry. If the group policy is removed or changed, the
user preference will persist in the Registry.
 How do you fight tattooing in NT/2000 installations? You can’t.
 How do you fight tattooing in 2003 installations? User Configuration - Administrative
Templates - System - Group Policy - enable - Enforce Show Policies Only.

Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 1


questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

 What does IntelliMirror do? It helps to reconcile desktop settings, applications, and stored
files for users, particularly those who move between workstations or those who must periodically
work offline.
 What’s the major difference between FAT and NTFS on a local machine? FAT and
FAT32 provide no security over locally logged-on users. Only native NTFS provides extensive
permission control on both remote and local files.
 How do FAT and NTFS differ in approach to user shares? They don’t, both have support
for sharing.
 Explan the List Folder Contents permission on the folder in NTFS. Same as Read &
Execute, but not inherited by files within a folder. However, newly created subfolders will
inherit this permission.
 I have a file to which the user has access, but he has no folder permission to read it. Can
he access it? It is possible for a user to navigate to a file for which he does not have folder
permission. This involves simply knowing the path of the file object. Even if the user can’t drill
down the file/folder tree using My Computer, he can still gain access to the file using the
Universal Naming Convention (UNC). The best way to start would be to type the full path of a
file into Run… window.
 For a user in several groups, are Allow permissions restrictive or permissive?
Permissive, if at least one group has Allow permission for the file/folder, user will have the same
permission.
 For a user in several groups, are Deny permissions restrictive or permissive? Restrictive,
if at least one group has Deny permission for the file/folder, user will be denied access,
regardless of other group permissions.
 What hidden shares exist on Windows Server 2003 installation? Admin$, Drive$, IPC$,
NETLOGON, print$ and SYSVOL.
 What’s the difference between standalone and fault-tolerant DFS (Distributed File
System) installations? The standalone server stores the Dfs directory tree structure or topology
locally. Thus, if a shared folder is inaccessible or if the Dfs root server is down, users are left
with no link to the shared resources. A fault-tolerant root node stores the Dfs topology in the
Active Directory, which is replicated to other domain controllers. Thus, redundant root nodes
may include multiple connections to the same data residing in different shared folders.
 We’re using the DFS fault-tolerant installation, but cannot access it from a Win98 box.
Use the UNC path, not client, only 2000 and 2003 clients can access Server 2003 fault-tolerant
shares.
 Where exactly do fault-tolerant DFS shares store information in Active Directory? In
Partition Knowledge Table, which is then replicated to other domain controllers.
 Can you use Start->Search with DFS shares? Yes.
 What problems can you have with DFS installed? Two users opening the redundant copies
of the file at the same time, with no file-locking involved in DFS, changing the contents and then
saving. Only one file will be propagated through DFS.
 I run Microsoft Cluster Server and cannot install fault-tolerant DFS. Yeah, you can’t.
Install a standalone one.
 Is Kerberos encryption symmetric or asymmetric? Symmetric.
 How does Windows 2003 Server try to prevent a middle-man attack on encrypted line?
Time stamp is attached to the initial client request, encrypted with the shared key.

Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 2


questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

 What hashing algorithms are used in Windows 2003 Server? RSA Data Security’s
Message Digest 5 (MD5), produces a 128-bit hash, and the Secure Hash Algorithm 1 (SHA-1),
produces a 160-bit hash.
 What third-party certificate exchange protocols are used by Windows 2003 Server?
Windows Server 2003 uses the industry standard PKCS-10 certificate request and PKCS-7
certificate response to exchange CA certificates with third-party certificate authorities.
 What’s the number of permitted unsuccessful logons on Administrator account?
Unlimited. Remember, though, that it’s the Administrator account, not any account that’s part of
the Administrators group.
 If hashing is one-way function and Windows Server uses hashing for storing passwords,
how is it possible to attack the password lists, specifically the ones using NTLMv1? A
cracker would launch a dictionary attack by hashing every imaginable term used for password
and then compare the hashes.
 What’s the difference between guest accounts in Server 2003 and other editions? More
restrictive in Windows Server 2003.
 How many passwords by default are remembered when you check "Enforce Password
History Remembered"? User’s last 6 passwords.

Windows Server 2003 IIS and Scripting


interview questions
 What is presentation layer responsible for in the OSI model? The presentation layer
establishes the data format prior to passing it along to the network application’s interface.
TCP/IP networks perform this task at the application layer.
 Does Windows Server 2003 support IPv6? Yes, run ipv6.exe from command line to
disable it.
 Can Windows Server 2003 function as a bridge? Yes, and it’s a new feature for the 2003
product. You can combine several networks and devices connected via several adapters by
enabling IP routing.
 What’s the difference between the basic disk and dynamic disk? The basic type contains
partitions, extended partitions, logical drivers, and an assortment of static volumes; the dynamic
type does not use partitions but dynamically manages volumes and provides advanced storage
options
 What’s a media pool? It is any compilation of disks or tapes with the same administrative
properties.
 How do you install recovery console? C:\i386\win32 /cmdcons, assuming that your
Win server installation is on drive C.
 What’s new in Terminal Services for Windows 2003 Server? Supports audio
transmissions as well, although prepare for heavy network load.
 What scripts ship with IIS 6.0? iisweb.vsb to create, delete, start, stop, and list Web sites,
iisftp.vsb to create, delete, start, stop, and list FTP sites, iisdir.vsb to create, delete, start, stop,
and display virtual directories, iisftpdr.vsb to create, delete, start, stop, and display virtual
directories under an FTP root, iiscnfg.vbs to export and import IIS configuration to an XML file.
 What’s the name of the user who connects to the Web site anonymously?
IUSR_computername

Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 3


questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

 What secure authentication and encryption mechanisms are supported by IIS 6.0?
Basic authentication, Digest authentication, Advanced digest authentication, Certificate-based
Web transactions that use PKCS #7/PKCS #10, Fortezza, SSL, Server-Gated Cryptography,
Transport Layer Security
 What’s the relation between SSL and TLS? Transport Layer Security (TLS) extends SSL
by providing cryptographic authentication.
 What’s the role of http.sys in IIS? It is the point of contact for all incoming HTTP requests.
It listens for requests and queues them until they are all processed, no more queues are available,
or the Web server is shut down.
 Where’s ASP cache located on IIS 6.0? On disk, as opposed to memory, as it used to be in
IIS 5.
 What is socket pooling? Non-blocking socket usage, introduced in IIS 6.0. More than one
application can use a given socket.
 Describe the process of clustering with Windows 2003 Server when a new node is
added. As a node goes online, it searches for other nodes to join by polling the designated
internal network. In this way, all nodes are notified of the new node’s existence. If other nodes
cannot be found on a preexisting cluster, the new node takes control of the quorum resources
residing on the shared disk that contains state and configuration data.
 What applications are not capable of performing in Windows 2003 Server clusters? The
ones written exclusively for NetBEUI and IPX.
 What’s a heartbeat? Communication processes between the nodes designed to ensure
node’s health.
 What’s a threshold in clustered environment? The number of times a restart is attempted,
when the node fails.
 You need to change and admin password on a clustered Windows box, but that requires
rebooting the cluster, doesn’t it? No, it doesn’t. In 2003 environment you can do that via
cluster.exe utility which does not require rebooting the entire cluster.
 For the document of size 1 MB, what size would you expect the index to be with
Indexing Service? 150-300 KB, 15-30% is a reasonable expectation.
 Doesn’t the Indexing Service introduce a security flaw when allowing access to the
index? No, because users can only view the indices of documents and folders that they have
permissions for.
 What’s the typical size of the index? Less then 100K documents - up to 128 MB. More
than that - 256+ MB.
 Which characters should be enclosed in quotes when searching the index? &, @, $, #, ^,
( ), and |.
 How would you search for C++? Just enter C++, since + is not a special character (and
neither is C).
 What about Barnes&Noble? Should be searched for as Barnes’&’Noble.
 Are the searches case-sensitive? No.
 What’s the order of precedence of Boolean operators in Microsoft Windows 2003
Server Indexing Service? NOT, AND, NEAR, OR.
 What’s a vector space query? A multiple-word query where the weight can be assigned to
each of the search words. For example, if you want to fight information on ‘black hole’, but
would prefer to give more weight to the word hole, you can enter black[1] hole[20] into the
search window.

Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 4


questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

 What’s a response queue? It’s the message queue that holds response messages sent from
the receiving application to the sender.
 What’s MQPing used for? Testing Microsoft Message Queue services between the nodes
on a network.
 Which add-on package for Windows 2003 Server would you use to monitor the installed
software and license compliance? SMS (System Management Server).
 Which service do you use to set up various alerts? MOM (Microsoft Operations Manager).
 What languages does Windows Scripting Host support? VB, VBScript, JScript.

1 :: How do you double-boot a Win 2003 server box?


The Boot.ini file is set as read-only, system, and hidden to prevent unwanted
editing. To change the Boot.ini timeout and default settings, use the System option
in Control Panel from the Advanced tab and select Startup.

2 :: What do you do if earlier application does not run on Windows Server


2003?
When an application that ran on an earlier legacy version of Windows cannot be
loaded during the setup function or if it later malfunctions, you must run the
compatibility mode function. This is accomplished by right-clicking the application
or setup program and selecting Properties –> Compatibility –> selecting the
previously supported operating system.

3 :: If you uninstall Windows Server 2003, which operating systems can


you revert to?
Win ME,
Win 98,
2000,
XP.
Note, however, that you cannot upgrade from ME and 98 to Windows Server 2003.

4 :: How do you get to Internet Firewall settings?


Start –> Control Panel –> Network and Internet Connections –> Network
Connections.

5 :: What are the Windows Server 2003 keyboard shortcuts?


Winkey opens or closes the Start menu. Winkey + BREAK displays the System
Properties dialog box. Winkey + TAB moves the focus to the next application in the
taskbar. Winkey + SHIFT + TAB moves the focus to the previous application in the
taskbar. Winkey + B moves the focus to the notification area. Winkey + D shows
the desktop. Winkey + E opens Windows Explorer showing My Computer. Winkey +
F opens the Search panel. Winkey + CTRL + F opens the Search panel with Search
for Computers module selected. Winkey + F1 opens Help. Winkey + M minimizes
all. Winkey + SHIFT+ M undoes minimization. Winkey + R opens Run dialog. Winkey
+ U opens the Utility Manager. Winkey + L locks the computer.
Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 5
questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

6 :: What is Active Directory?


Active Directory is a network-based object store and service that locates and
manages resources, and makes these resources available to authorized users and
groups. An underlying principle of theActive Directory is that everything is
considered an object—people, servers, workstations, printers, documents, and
devices. Each object has certain attributes and its own security access control list
(ACL).

7 :: Where are the Windows NT Primary Domain Controller (PDC) and its
Backup Domain Controller (BDC) in Server 2003?
The Active Directory replaces them. Now all domain controllers share a multimaster
peer-to-peer read and write relationship that hosts copies of theActive Directory.

8 :: How long does it take for security changes to be replicated among the
domain controllers?
Security-related modifications are replicated within a site immediately. These
changes include account and individual user lockout policies, changes to password
policies, changes to computer account passwords, and modifications to the Local
Security Authority (LSA).

9 :: What is new in Windows Server 2003 regarding the DNS management?


When DC promotion occurs with an existing forest, the Active Directory Installation
Wizard contacts an existing DC to update the directory and replicate from the DC
the required portions of the directory. If the wizard fails to locate a DC, it performs
debugging and reports what caused the failure and how to fix the problem. In order
to be located on a network, every DC must register in DNS DC locator DNS records.
The Active Directory Installation Wizard verifies a proper configuration of the DNS
infrastructure. All DNS configuration debugging and reporting activity is done with
theActive Directory Installation Wizard.

10 :: When should you create a forest?


Organizations that operate on radically different bases may require separate trees
with distinct namespaces. Unique trade or brand names often give rise to separate
DNS identities. Organizations merge or are acquired and naming continuity is
desired. Organizations form partnerships and joint ventures. While access to
common resources is desired, a separately defined tree can enforce more direct
administrative and security restrictions.

11 :: How can you authenticate between forests?


Four types of authentication are used across forests:

(1) Kerberos and NTLM network logon for remote access to a server in another
forest;
(2) Kerberos and NTLM interactive logon for physical logon outside the user’s home
forest;
Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 6
questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

(3) Kerberos delegation to N-tier application in another forest; and


(4) user principal name (UPN) credentials.

12 :: What snap-in administrative tools are available for Active Directory?


Active Directory Domains and Trusts Manager, Active Directory Sites and Services
Manager, Active Directory Users and Group Manager, Active Directory Replication
(optional, available from the Resource Kit), Active Directory Schema Manager
(optional, available from adminpak)

13 :: What types of classes exist in Windows Server 2003 Active Directory?


Structural class:
The structural class is important to the system administrator in that it is the only
type from which new Active Directory objects are created. Structural classes are
developed from either the modification of an existing structural type or the use of
one or more abstract classes.

Abstract class:
Abstract classes are so named because they take the form of templates that
actually create other templates (abstracts) and structural and auxiliary classes.
Think of abstract classes as frameworks for the defining objects.

Auxiliary class:
The auxiliary class is a list of attributes. Rather than apply numerous attributes
when creating a structural class, it provides a streamlined alternative by applying a
combination of attributes with a single include action.

88 class:
The 88 class includes object classes defined prior to 1993, when the 1988 X.500
specification was adopted. This type does not use the structural, abstract, and
auxiliary definitions, nor is it in common use for the development of objects
inWindows Server 2003 environments.

14 :: How do you delete a lingering object?


Windows Server 2003 provides a command called Repadmin that provides the
ability to delete lingering objects in the Active Directory.

15 :: What is Global Catalog?


The Global Catalog authenticates network user logons and fields inquiries about
objects across a forest or tree. Every domain has at least one GC that is hosted on a
domain controller. In Windows 2000, there was typically one GC on every site in
order to prevent user logon failures across the network.

16 :: How is user account security established in Windows Server 2003?


When an account is created, it is given a unique access number known as a security
identifier (SID). Every group to which the user belongs has an associated SID. The
Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 7
questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

user and related group SIDs together form the user account’s security token, which
determines access levels to objects throughout the system and network.
SIDs from the security token are mapped to the access control list (ACL) of any
object the user attempts to access.

17 :: If I delete a user and then create a new account with the same
username and password, would the SID and permissions stay the same?
No.
If you delete a user account and attempt to recreate it with the same user name
and password, the SID will be different.

18 :: What do you do with secure sign-ons in an organization with many


roaming users?
Credential Management feature of Windows Server 2003 provides a consistent
single sign-on experience for users. This can be useful for roaming users who move
between computer systems. The Credential Management feature provides a secure
store of user credentials that includes passwords and X.509 certificates.

19 :: Anything special you should do when adding a user that has a Mac?
"Save password as encrypted clear text" must be selected on User Properties
Account Tab Options, since the Macs only store their passwords that way.

20 :: What remote access options does Windows Server 2003 support?


Dial-in,
VPN,
dial-in with callback.

21 :: Where are the documents and settings for the roaming profile
stored?
All the documents and environmental settings for the roaming user are stored
locally on the system, and, when the user logs off, all changes to the locally stored
profile are copied to the shared server folder. Therefore, the first time a roaming
user logs on to a new system the logon process may take some time, depending on
how large his profile folder is.

22 :: Where are the settings for all the users stored on a given machine?
\Document and Settings\All Users

23 :: What languages can you use for log-on scripts?


JavaScipt,
VBScript,
DOS batch files
(.com, .bat, or even .exe)

Hardware design interview questions


Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 8
questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

1. Give two ways of converting a two input NAND gate to an inverter


2. Given a circuit, draw its exact timing response. (I was given a Pseudo Random Signal
Generator; you can expect any sequential ckt)
3. What are set up time & hold time constraints? What do they signify? Which one is
critical for estimating maximum clock frequency of a circuit?
4. Give a circuit to divide frequency of clock cycle by two
5. Design a divide-by-3 sequential circuit with 50% duty circle. (Hint: Double the Clock)
6. Suppose you have a combinational circuit between two registers driven by a clock. What
will you do if the delay of the combinational circuit is greater than your clock signal?
(You can’t resize the combinational circuit transistors)
7. The answer to the above question is breaking the combinational circuit and pipelining it.
What will be affected if you do this?
8. What are the different Adder circuits you studied?
9. Give the truth table for a Half Adder. Give a gate level implementation of the same.
10. Draw a Transmission Gate-based D-Latch.
11. Design a Transmission Gate based XOR. Now, how do you convert it to XNOR?
(Without inverting the output)
12. How do you detect if two 8-bit signals are same?
13. How do you detect a sequence of "1101" arriving serially from a signal line?
14. Design any FSM in VHDL or Verilog.
15. Explain RC circuit’s charging and discharging.
16. Explain the working of a binary counter.
17. Describe how you would reverse a singly linked list.
1 :: What is the Difference between Windows 2003 standard Enterprise,
Premium, Data center and Web Edition?
WEB EDITION:

To position windows server 2003 more competitively against other web servers,
Microsoft has released a
stripped-down-yet-impressive edition of windows server 2003 designed specially for
web services. the feature set and licensing allows customers easy deployment of
web pages, web sites, web applications and web services.
Web Edition supports 2GB of RAM and a two-way symmetric multiprocessor(SMP). It
provides unlimited anonymous web connections but only 10 inbound server
message block(SMB) connections, which should be more than enough for content
publishing. The server cannot be an internet gateway, DHCP or fax server. Although
you can remotely administer the server with Remote Desktop, the server can not be
a terminal
server in the traditional sense. The server can belong to a domain, but cannot be a

Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 9


questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

domain controller. The included version of the microsoft SQL server database
Engine can support as many as 25 concurrent connections.

2 :: How do you recover an object in Active Directory, which is accidentally


deleted by you, with no backup?
Using ntdsutil.exe command,we can restored the AD objects.

3 :: What is the Logical / Physical Structures of the AD Environment?


physical structure:
Forest, Site, Domain, DC

logical structure:
Schema partition, configuration partition, domain
partition and application partition

4 :: How to change the windows xp product key if wrongly installed with


other product key but you have original
product key? What you will do to Make your os as Genuine?
Some third party software are available for this function or reinstall this system

5 :: If 512mb Ram is there what will be the minimum and maximum Virtual
memory for the system?
To workout the total virtual memory (page file) required for windows XP you should
take the amount of ram in the system and + 25% (512MB + 25% (128MB) = 640MB
total virtual memory. by setting both the min and max to 640MB you can increase
the performances of the operating system.

6 :: Ntfldr.exe is missing in win xp os what will you do?


Boot from windows xp cd and go to recovery console mode
give the administrator password
c:\windows>
prompt will come
come out from windows with the help of command
c:\windows>cd ..
c:>

go to cd prompt d:
d:>cd i386
d:\i386>copy ntldr c: enter

d:\i386>copy ntdetect.com c: enter

restart u r computer

problem fix
Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 10
questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

7 :: What is LDAP?
LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and
other programs use to look up information from a server.

8 :: What is the SYSVOL folder?


The Sysvol folder on a Windows domain controller is used to replicate file-based
data among domain controllers. Because junctions are used within the Sysvol folder
structure, Windows NT file system (NTFS) version 5.0 is required on domain
controllers throughout a Windows distributed file system (DFS) forest.

9 :: What are application partitions? When do we use them?


Application Directory Partition is a partition space in Active Directory which an
application can use to store that application specific data. This partition is then
replicated only to some specific domain controllers.

The application directory partition can contain any type of data except security
principles (users, computers, groups).

10 :: What is the KCC?


With in a Site, a Windows server 2003 service known as the KCC automatically
generates a topology for replication among the domain controllers in the domain
using a ring structure.Th Kcc is a built in process that runs on all domain controllers.

The KCC analyzes the replication topology within a site every 15 minute to ensure
that it still works. If you add or remove a domain controller from the network or a
site, the KCC reconfigures the topology to relect the change.

11 :: What is tombstone lifetime attribute?


The number of days before a deleted object is removed from the directory services.
This assists in removing objects from replicated servers and preventing restores
from reintroducing a deleted object. This value is in the Directory Service object in
the configuration NIC

by default 2000 (60 days)

12 :: How do we Backup Active Directory?


Backing up Active Directory is essential to maintain an Active Directory database.
You can back up Active Directory by using the Graphical User Interface (GUI) and
command-line tools that the Windows Server 2003 family provides.

You frequently backup the system state data on domain controllers so that you can
restore the most current data. By establishing a regular backup schedule, you have
a better chance of recovering data when necessary.

To ensure a good backup includes at least the system state data and contents of
Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 11
questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

the system disk, you must be aware of the tombstone lifetime. By default, the
tombstone is 60 days. Any backup older than 60 days is not a good backup. Plan to
backup at least two domain controllers in each domain, one of at least one backup
to enable an authoritative restore of the data when necessary.

13 :: How do we restore AD?


You can’t restore Active Directory (AD) to a domain controller (DC) while the
Directory Service (DS) is running. To restore AD, perform the following steps.

Reboot the computer.

The computer will boot into a special safe mode and won’t start the DS. Be aware
that during this time the machine won’t act as a DC and won’t perform functions
such as authentication.

1. Start NT Backup.
2. Select the Restore tab.
3. Select the backup media, and select System State.
4. Click Start Restore.
5. Click OK in the confirmation dialog box.

After you restore the backup, reboot the computer and start in normal mode to use
the restored information. The computer might hang after the restore completes; I’ve
experienced a 30-minute wait on some machines.

14 :: What are GPOs?


Group Policy gives you administrative control over users and computers in your
network. By using Group Policy, you can define the state of a user's work
environment once, and then rely onWindows Server 2003 to continually force the
Group Policy settings that you apply across an entire organization or to specific
groups of users and computers.

15 :: What is the order in which GPOs are applied?


Group Policy settings are processed in the following order:

1:- Local Group Policy object-each computer has exactly one Group Policy object
that is stored locally. This processes for both computer and user Group Policy
processing.

2:- Site-Any GPOs that have been linked to the site that the computer belongs to are
processed next. Processing is in the order that is specified by the administrator, on
the Linked Group Policy Objects tab for the site in Group Policy Management
Console (GPMC). The GPO with the lowest link order is processed last, and therefore
has the highest precedence.

Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 12


questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

3:- Domain-processing of multiple domain-linked GPOs is in the order specified by


the administrator, on the Linked Group Policy Objects tab for the domain in GPMC.
The GPO with the lowest link order is processed last, and therefore has the highest
precedence.

4:- Organizational units-GPOs that are linked to the organizational unit that is
highest in the Active Directory hierarchy are processed first, then GPOs that are
linked to its child organizational unit, and so on. Finally, the GPOs that are linked to
the organizational unit that contains the user or computer are processed.

16 :: Name a few benefits of using GPMC?


Microsoft released the Group Policy Management Console (GPMC) years ago, which
is an amazing innovation in Group Policy management. The tool provides control
over Group Policy in the following manner:

► Easy administration of all GPOs across the entire Active Directory Forest
► View of all GPOs in one single list
► Reporting of GPO settings, security, filters, delegation, etc.
► Control of GPO inheritance with Block Inheritance, Enforce, and Security Filtering
► Delegation model
► Backup and restore of GPOs
► Migration of GPOs across different domains and forests

With all of these benefits, there are still negatives in using the GPMC alone.
Granted, the GPMC is needed and should be used by everyone for what it is ideal
for. However, it does fall a bit short when you want to protect the GPOs from the
following:

► Role based delegation of GPO management


► Being edited in production, potentially causing damage to desktops and servers
► Forgetting to back up a GPO after it has been modified
► Change management of each modification to every GPO

17 :: What are the GPC and the GPT? Where can I find them?
GPOs store group policy settings in two locations: a Group Policy container (GPC)
(preferred) and a Group Policy template (GPT). The GPC is an Active Directory object
that stores version information, status information, and other policy information (for
example, application objects).

The GPT is used for file-based data and stores software policy, script, and
deployment information. The GPT is located on the system volume folder of the
domain controller. A GPO can be associated with one or more Active Directory
containers, such as a site, domain, or organizational unit. Multiple containers can be
Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 13
questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

associated with the same GPO, and a single container can have more than one
associated GPO.

18 :: What are GPO links? What special things can I do to them?


To apply the settings of a GPO to the users and computers of a domain, site, or OU,
you need to add a link to that GPO. You can add one or more GPO links to each
domain, site, or OU by using GPMC. Keep in mind that creating and linking GPOs is a
sensitive privilege that should be delegated only to administrators who are trusted
and understand Group Policy.

19 :: What are administrative templates?


The GPO settings is divided between the Computer settings and the User settings.
In both parts of the GPO you can clearly see a large section called Administrative
Templates.

Administrative Templates are a large repository of registry-based changes (in fact,


over 1300 individual settings) that can be found in any GPO on Windows 2000,
Windows XP, and Windows Server 2003.

By using the Administrative Template sections of the GPO you can deploy
modifications to machine (called HKEY_LOCAL_MACHINE in the registry) and user
(called HKEY_CURRENT_USER in the registry) portions of the Registry of computers
that are influenced by the GPO.

20 :: Name the AD NCs and replication issues for each NC?


Name the AD NCs and replication issues for each NC

*Schema NC, *Configuration NC, * Domain NC

Schema NC This NC is replicated to every other domain controller in the forest. It


contains information about the Active Directory schema, which in turn defines the
different object classes and attributes within Active Directory.

Configuration NC Also replicated to every other DC in the forest, this NC contains


forest-wide configuration information pertaining to the physical layout of Active
Directory, as well as information about display specifiers and forest-wide Active
Directory quotas.

Domain NC This NC is replicated to every other DC within a single Active Directory


domain. This is the NC that contains the most commonly-accessed Active Directory
data: the actual users, groups, computers, and other objects that reside within a
particular Active Directory domain.

Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 14


questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

21 :: What is MUTEX?
A mutual exclusion object, or MUTEX, is an object created for use in computer
programs. The essential function of MUTEX is to make it possible for a multiple
program thread to make use of a single resource. Generally, the functionality of
mutual exclusion objects is to allow this use of a single resource by creating an
environment where the access to the resource is continually passed back and forth
between the various aspects of the program.

22 :: What is the difference between a computer process and thread?


A single process can have multiple threads that share global data and address
space with other threads running in the same process, and therefore can operate on
the same data set easily. Processes do not share address space and a different
mechanism must be used if they are to share data.

If we consider running a word processing program to be a process, then the auto-


save and spell check features that occur in the background are different threads of
that process which are all operating on the same data set (your document).

process:
In computing, a process is an instance of a computer program that is being
sequentially executed[1] by a computer system that has the ability to run several
computer programs concurrently.

Thread:
A single process may contain several executable programs (threads) that work
together as a coherent whole. One thread might, for example, handle error signals,
another might send a message about the error to the user, while a third thread is
executing the actual task of the...

23 :: What is INODE?
INODE is a pointer to a block on the disk and it is unique.
Inode is an unique number. Inode holds metadata of files.

24 :: Explain the working of Virtual Memory?


Virtual memory like as a temporary storage area.It consists of page table.In this
pages are divided into frames.It is a continuous memory allocation.It is also called
logical memory.

25 :: How does Windows NT supports Multitasking?


Preemptive multitask

26 :: What is Semaphore?
A hardware or software flag.
In multitasking systems, a semaphore is a variable with a value that indicates the
status of a common resource.
Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 15
questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

Its used to lock the resource that is being used.


A process needing the resource checks the semaphore to determine the resource's
status
and then decides how to proceed.

27 :: Recovery from Deadlock?


Process Termination:
->Abort all deadlocked processes.
->Abort one process at a time until the deadlock cycle is eliminated.
->In which order should we choose to abort?
Priority of the process.
How long process has computed, and how much longer to completion.
Resources the process has used.
Resources process needs to complete.
How many processes will need to be terminated?
Is process interactive or batch?
Resource Preemption:
->Selecting a victim ? minimize cost.
->Rollback ? return to some safe state, restart process for that state.
->Starvation ? same process may always be picked as victim, include number of
rollback in cost factor.

28 :: What is multi tasking, multi programming, multi threading?


Multi programming:
Multiprogramming is the technique of running several programs at a time using
timesharing.
It allows a computer to do several things at the same time. Multiprogramming
creates logical parallelism.
The concept of multiprogramming is that the operating system keeps several jobs in
memory simultaneously. The operating system selects a job from the job pool and
starts executing a job, when that job needs to wait for any i/o operations the CPU is
switched to another job. So the main idea here is that the CPU is never idle.

Multi tasking:
Multitasking is the logical extension of multiprogramming .The concept of
multitasking is quite similar to multiprogramming but difference is that the
switching
between jobs occurs so frequently that the users can interact with each program
while it is running. This concept is also known as time-sharing systems. A time-
shared operating system uses CPU scheduling and multiprogramming to provide
each user with a small portion of time-shared system.

Multi threading:
An application typically is implemented as a separate process with several threads
Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 16
questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

of control. In some situations a single application may be required to perform


several similar tasks for example a web server accepts client requests for web
pages, images, sound, and so forth.

29 :: Differentiate between RAM and ROM?


Semiconductor memories are of two types: RAM (random access memory) and ROM
(read only memory).
RAM is a read/write memory. Information can be written into and read from a RAM.
It is volatile memory.
It stores information so long as power supply is on.
ROM is permanent type memory. Its contents are not lost when power supply goes
off. the user cannot write into a ROM.Its contents are decided by the manufacturer
and written at the time of manufacture. Programmable ROMs are also available.
They are called PROMs.

30 :: Binding of Instructions and Data to Memory?


Address binding of instructions and data to memory addresses can happen at three
different stages
Compile time: If memory location known a priori, absolute code can be generated;
must recompile code if starting location changes.
Load time: Must generate relocatable code if memory location is not known at
compile time.
Execution time: Binding delayed until run time if the process can be moved during
its execution from one memory segment to another. Need hardware support for
address maps (e.g., base and limit registers).
Multistep Processing of a User Program

31 :: Why paging is used?


Paging is solution to external fragmentation problem which is to permit the logical
address space of a process to be noncontiguous, thus allowing a process to be
allocating physical memory wherever the latter is available.

32 :: What is a Safe State and its use in deadlock avoidance?


When a process requests an available resource, system must decide if immediate
allocation leaves the system in a safe state
->System is in safe state if there exists a safe sequence of all processes.
->Sequence <P1, P2? Pn> is safe if for each Pi, the resources that Pi can still
request can be satisfied by currently available resources + resources held by all the
Pj, with j<I.
If Pi resource needs are not immediately available, then Pi can wait until all Pj have
finished.
When Pj is finished, Pi can obtain needed resources, execute, return allocated
resources, and terminate.

Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 17


questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

When Pi terminates, Pi+1 can obtain its needed resources, and so on.
->Deadlock Avoidance ?ensure that a system will never enter an unsafe state.

33 :: Explain the difference between microkernel and macro kernel?


Micro-Kernel: A micro-kernel is a minimal operating system that performs only the
essential functions of an operating system. All other operating system functions are
performed by system processes.
Monolithic: A monolithic operating system is one where all operating system code is
in a single executable image and all operating system code runs in system mode.

34 :: Differentiate between Compiler and Interpreter?


An interpreter reads one instruction at a time and carries out the actions implied by
that instruction. It does not perform any translation. But a compiler translates the
entire instructions.

35 :: What is the relation between process system time, process waiting


time , and process CPU time?
Process system time (turn around time) = process cpu time + process waiting time

36 :: Condition for deadlock occurrence?


Deadlock can arise if four conditions hold simultaneously.

Mutual exclusion:
only one process at a time can use a resource.

Hold and wait:


a process holding at least one resource is waiting to acquire additional resources
held by other processes.

No preemption:
a resource can be released only voluntarily by the process holding it, after that
process has completed its task.

Circular wait:
there exists a set {P0, P1, ?, P0} of waiting processes such that P0 is waiting for a
resource that is held by P1, P1 is waiting for a resource that is held by P
2, Pn1 is waiting for a resource that is held by
Pn, and P0 is waiting for a resource that is held by P0.

37 :: Compare Linux credit based algorithm with other scheduling


algorithms?
For the conventional time ?shared processes, Linux uses a prioritized, credit-based
algorithm. Each process possesses a certain number of scheduling credits; when a
new task must be chosen to run, the process with most credits is selected. Every
time that a timer interrupt occurs, the currently running process loses one credit;
Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 18
questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

when its credits reaches zero, it is suspended and another process is chosen. If no
runnable processes have any credits, then Linux performs a recrediting operation,
adding credits to every process in the system (rather than just to the runnable
ones), according to the following rule:
Credits = credits/2 + priority
The above scheduling class is used for time-shared process and the in Linux for the
real-time scheduling is simpler it uses scheduling classes: first come, first served
(FCFS), and round-robin (RR) .In both cases, each process has a priority in addition
to its scheduling class. In time-sharing scheduling, however, processes of different
priorities can still compete with one another to some extent; in real-time
scheduling, the scheduler always runs the process with the highest priority. Among
processes of
equal priority, it runs the process that has been waiting longest. The only difference
between FCFS and RR scheduling is that FCFS processes continue to run until they
either exit or block, whereas a round-robin process will be preempted after a while
and will be moved to the end of the scheduling queue.

38 :: Why thread is called as a lightweight process?


It is called light weight process to emphasize the fact that a thread is like a process
but is more efficient and uses fewer resources( n hence "lighter")and they also
share the address space.

39 :: What is the cause of thrashing? How does the system detect


thrashing? Once it detects thrashing, what can the system do to eliminate
this problem?
Thrashing is caused by under allocation of the minimum number of pages required
by a process, forcing it to continuously page fault. The system can detect thrashing
by evaluating the level of CPU utilization as compared to the level of
multiprogramming. It can be eliminated by reducing the level of multiprogramming.

40 :: Define Demand Paging, Page fault interrupt, and Trashing?


Demand Paging: Demand paging is the paging policy that a page is not read into
memory until it is requested, that is, until there is a page fault on the page.
Page fault interrupt: A page fault interrupt occurs when a memory reference is
made to a page that is not in memory. The present bit in the page table entry will
be found to be off by the virtual memory hardware and it will signal an interrupt.
Trashing: The problem of many page faults occurring in a short time, called page
thrashing

41 :: Give a non-computer example of preemptive and non-preemptive


scheduling?
Consider any system where people use some kind of resources and compete for
them. The non-computer examples for preemptive scheduling the traffic on the
single lane road if there is emergency or there is an ambulance on the road the

Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 19


questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

other vehicles give path to the vehicles that are in need. The example for
preemptive scheduling is
people standing in queue for tickets.

42 :: What is starvation and aging?


Starvation:
Starvation is a resource management problem where a process does not get the
resources it needs for a long time because the resources are being allocated to
other processes.

Aging:
Aging is a technique to avoid starvation in a scheduling system. It works by adding
an aging factor to the priority of each request. The aging factor must increase the
request?s priority as time passes and must ensure that a request will eventually be
the highest priority request (after it has waited long enough)

43 :: If a system has 128 MB RAM and 1 GB hard Disk, and a process


decides to use its fully allotted Virtual Memory 2^32 - 2GB = 2 GB, how is
it practically possible?. But this works in all machines. How?
Virtual memory is double of RAM.As per question RAM is 128MB.so virtual memory
is 256MB.

44 :: Difference between Logical and Physical Address Space?


The concept of a logical address space that is bound to a separate physical address
space is central to proper memory management.
Logical address generated by the CPU; also referred to as virtual address.
Physical address address seen by the memory unit.
Logical and physical addresses are the same in compile-time and load-time address-
binding schemes; logical (virtual) and physical addresses differ in execution-time
address-binding scheme

45 :: Describe the actions taken by thread library to context switch


between user level threads?
The thread library function performs the following actions to context switch
between user level threads Copy all live registers to Thread control Block (TCB)
Restore the state of the thread to run next i.e (copy the values of live registers from
(TCB) to registers) Move to the next thread to execute

46 :: Explain briefly about, processor, assembler, compiler, loader, linker


and the functions executed by them?
Processor:
A processor is the part a computer system that executes instructions .It is also
called a CPU

Assembler:
Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 20
questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

An assembler is a program that takes basic computer instructions and converts


them into a pattern of bits that the computer's processor can use to perform its
basic operations. Some people call these instructions assembler language and
others use the term assembly language.

Compiler:
A compiler is a special program that processes statements written in a particular
programming language and turns them into machine language or "code" that a
computer'sprocessor uses. Typically, a programmer writes language statements in a
language such as Pascal or C one line at a time using an editor. The file that is
created contains what are called the source statements. The programmer then runs
the appropriate language compiler, specifying the name of the file that contains the
source statements.

Loader:
In a computer operating system, a loader is a component that locates a given
program (which can be an application or, in some cases, part of the operating
system itself) in offline storage (such as a hard disk), loads it into main storage (in a
personal computer, it's called random access memory), and gives that program
control of the compute

Linker:
Linker performs the linking of libraries with the object code to make the object code
into an executable machine code.

47 :: Explain Segmentation with paging?


Segments can be of different lengths, so it is harder to find a place for a segment in
memory than a page. With segmented virtual memory, we get the benefits of
virtual memory but we still have to do dynamic storage allocation of physical
memory. In order to avoid this, it is possible to combine segmentation and paging
into a two-level
virtual memory system. Each segment descriptor points to page table for that
segment.This give some of the advantages of paging (easy placement) with some of
the advantages of segments (logical division of the program).

48 :: What are the major differences between windows XP and Windows


2000 operating systems?
Both Windows XP and 2000 come in different flavors like for XP u have
Home,professional and Enterprise Edition.
With 2000 u have professional,Server/s as it professional is more like client pc in
Client server Architecture can also be used for development environment XP home
for rather general purpose users or say newbies with minimal configuration.

With 2000 server you have all the server capabilities plus on default u might have
Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 21
questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

NTFS system rather than FAT or FAT32. pluse with server u have capabilities of
hosting services like DHCP, DNS, TERMINAL SERVICES etc..

There would be a lot if i start explaining in detail but for a creamy part...this is more
than enough

49 :: What is the difference between Hard and Soft real-time systems?


A hard real-time system guarantees that critical tasks complete on time. This goal
requires that all delays in the system be bounded from the retrieval of the stored
data to the time that it takes the operating system to finish any request made of it.
A soft real time system where a critical real-time task gets priority over other tasks
and retains that priority until it completes. As in hard real time systems kernel
delays need to be bounded

50 :: Why are page sizes always powers of 2?


Recall that paging is implemented by breaking up an address into a page and offset
number. It is most efficient to break the address into X page bits and Y offset bits,
rather than perform arithmetic on the address to calculate the page number and
offset. Because each bit position represents a power of 2, splitting an address
between bits results in a page size that is a power of 2.

51 :: On a system with paging, a process cannot access memory that it


does not own why? How could the operating system allow access to other
memory? Why should it or should it not?
An address on a paging system is a logical page number and an offset. The physical
page is found by searching a table based on the logical page number to produce a
physical page number. Because the operating system controls the contents of this
table, it can limit a process to accessing only those physical pages allocated to the
process. There is no way for a process to refer to a page it does not own because
the page will not be in the page table. To allow such access, anoperating system
simply needs to allow entries for non-process memory to be added to the process?s
page table. This is useful when two or more processes need to exchange data?they
just read and write to the same physical addresses (which may be at varying logical
addresses). This makes for very efficient interprocess communication.

52 :: What is active directory? How it works?


What is dns? How it works?
What is dhcp? How it works?
What is ias? How it works?
Active is a centralize directory database it's provide single point of administration
what is DHCP
dynamic host configuration protocol
it is one of the network service which is provides the ip address dynamically to the
DHCP client

Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 22


questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

it give ip address automatically to the client


WHAT IS DNS
do mine naming service
it provide ip to host and host to ip

53 :: What is the main component of operating system?


Main component of operating system are kernel and shell.

Shell is a interface between application program and kernel whenever application


program wants some work to be done It contacts kernel and kernel inturn perform
work with the help of device drivers .thus we can say kernel is an interface between
hardware and shell.

Kernel uses device drivers to control microcontroller card of peripheral device and
inturn work is being accomplished.

application program -> [shells ->kernel ->device driver -> controller card ->
physical hardware]

54 :: What are Dynamic Loading, Dynamic Linking and Overlays?


Dynamic Loading:
► Routine is not loaded until it is called
► Better memory-space utilization; unused routine is never loaded.
► Useful when large amounts of code are needed to handle infrequently occurring
cases.
► No special support from the operating system is required implemented through
program design.
Dynamic Linking:
► Linking postponed until execution time.
► Small piece of code, stub, used to locate the appropriate memory-resident library
routine.
► Stub replaces itself with the address of the routine, and executes the routine.
► Operating system needed to check if routine is in processes? memory address.
► Dynamic linking is particularly useful for libraries.
Overlays:
► Keep in memory only those instructions and data that are needed at any given
time.
► Needed when process is larger than amount of memory allocated to it.
► Implemented by user, no special support needed from operating system,
programming design of overlay structure is complex.

55 :: What is Dispatcher?
Dispatcher module gives control of the CPU to the process selected by the short-
term scheduler; this involves:

Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 23


questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

Switching context
Switching to user mode
Jumping to the proper location in the user program to restart that program
Dispatch latency ? time it takes for the dispatcher to stop one process and start
another running.

56 :: What is the difference between unix and windows?


Unix and Windows use completely different paradigms for run-time loading of code.
Before you try to build a module that can be dynamically loaded, be aware of how
your system works.

In Unix, a shared object (.so) file contains code to be used by the program, and also
the names of functions and data that it expects to find in the program. When the file
is joined to the program, all references to those functions and data in the file's code
are changed to point to the actual locations in the program where the functions and
data are placed in memory. This is basically a link operation.

In Windows, a dynamic-link library (.dll) file has no dangling references. Instead, an


access to functions or data goes through a lookup table. So the DLL code does not
have to be fixed up at runtime to refer to the program's memory; instead, the code
already uses the DLL's lookup table, and the lookup table is modified at runtime to
point to the functions and data.

In Unix, there is only one type of library file (.a) which contains code from several
object files (.o). During the link step to create a shared object file (.so), the linker
may find that it doesn't know where an identifier is defined. The linker will look for it
in the object files in the libraries; if it finds it, it will include all the code from that
object file.

57 :: What is Context Switch?


Switching the CPU to another process requires saving the state of the old process
and loading the saved state for the new process. This task is known as a context
switch. Context-switch time is pure overhead, because the system does no useful
work while switching. Its speed varies from machine to machine, depending on the
memory
speed, the number of registers which must be copied, the existed of special
instructions(such as a single instruction to load or store all registers).

58 :: What are different tasks of Lexical Analysis?


The purpose of the lexical analyzer is to partition the input text, delivering a
sequence of comments and basic symbols. Comments are character sequences to
be ignored, while basic symbols are character sequences that correspond to
terminal symbols of the grammar defining the phrase structure of the input

Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 24


questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

59 :: Deadlock Detection-Algorithm Usage?


► When, and how often, to invoke depends on:
How often a deadlock is likely to occur?
How many processes will need to be rolled back?

► If detection algorithm is invoked arbitrarily, there may be many cycles in the


resource graph and so we would not be able to tell which of the many deadlocked
processes ?caused? the deadlock.

60 :: Common Functions of Interrupts?


► Interrupt transfers control to the interrupt service routine generally, through the
interrupt vector, which contains the addresses of all the service routines.
► Interrupt architecture must save the address of the interrupted instruction.
► Incoming interrupts are disabled while another interrupt is being processed to
prevent a lost interrupt.
► A trap is a software-generated interrupt caused either by an error or a user
request.
► An operating system is interrupt driven.

61 :: Distributed Systems?
Distribute the computation among several physical processors.
Loosely coupled system each processor has its own local memory; processors
communicate with one another through various communications lines, such as high-
speed
buses or telephone lines
Advantages of distributed systems:
► Resources Sharing
► Computation speed up load sharing
► Reliability
► Communications

62 :: While running DOS on a PC, which command would be used to


duplicate the entire diskette?
diskcopy
Java Thread States

63 :: What is CPU Scheduler?


► Selects from among the processes in memory that are ready to execute, and
allocates the CPU to one of them.
► CPU scheduling decisions may take place when a process:
1.Switches from running to waiting state.
2.Switches from running to ready state.
3.Switches from waiting to ready.
4.Terminates.

Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 25


questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

► Scheduling under 1 and 4 is nonpreemptive.


► All other scheduling is preemptive.

64 :: What do you mean by deadlock?


Deadlock is a situation where a group of processes are all blocked and none of them
can become unblocked until one of the other becomes unblocked. The simplest
deadlock is two processes each of which is waiting for a message from the other.

65 :: Give an example of microkernel?


► Amoeba
► WinNT
► Minix

66 :: What is the difference between a process and a task?


TASK :
A Particular Work to be Done is known as TASK

PROCESS :
one or more PROCESS will be required to complete a task.

67 :: Describe different job scheduling in operating systems?


Scheduling is the activity of the deciding when process will receive the resources
they request.

FCFS:
FCSFS stands for First Come First Served. In FCFS the job that has been waiting the
longest is served next.

Round Robin Scheduling:


Round Robin scheduling is a scheduling method where each process gets a small
quantity of time to run and then it is preempted and the next process gets to run.
This is called time-sharing and gives the effect of all the processes running at the
same time

Shortest Job First:


The Shortest job First scheduling algorithm is a nonpreemptive scheduling algorithm
that chooses the job that will execute the shortest amount of time.

Priority Scheduling:
Priority scheduling is a scheduling method where at all times the highest priority
process is assigned the resource.

68 :: Difference between Primary storage and secondary storage?


Main memory:
only large storage media that the CPU can access directly.
Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 26
questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

Secondary storage:
extension of main memory that provides large nonvolatile storage capacity.

69 :: Explain the difference between microkernel and macro kernel?


Micro-Kernel:
A micro-kernel is a minimal operating system that performs only the essential
functions of an operating system. All other operating system functions are
performed by system processes.

Monolithic:
A monolithic operating system is one where all operating system code is in a single
executable image and all operating system code runs in system mode.

70 :: I have deleted a file from recycle bin but i want to use that file how
can i restore that file? I have already used system restore for the same
but the file could not be restore?
THere is two solutions:

1. Restore from last back.

2. User Recycler folder. Start-->RUN-->type c:recycler --> type FTYPE

71 :: What is a Real-Time System?


A real time process is a process that must respond to the events within a certain
time period. A real time operating system is an operating system that can run real
time processes successfully

72 :: What is the important aspect of a real-time system or Mission Critical


Systems?
A real time operating system has well defined fixed time constraints. Process must
be done within the defined constraints or the system will fail. An example is the
operating system for a flight control computer or an advanced jet airplane. Often
used as a control device in a dedicated application such as controlling scientific
experiments, medical imaging systems, industrial control systems, and some
display systems.Real-Time systems may be either hard or soft real-time.

Hard real-time:
Secondary storage limited or absent, data stored in short term memory, or read-
only memory (ROM) Conflicts with time-sharing systems, not supported by general-
purpose operating systems.

Soft real-time:
► Limited utility in industrial control of robotics

Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 27


questions
February 3, 2010 [WINDOWS SERVER INTERVIEW FAQ’S]

► Useful in applications (multimedia, virtual reality) requiring advanced operating-


system features.

73 :: What are the difference phases of software development or software


life cycle?
Specification of the task
Design of algorithms
Implementation (coding)
Testing and debugging
Maintenance and evolution of the system
Obsolescence

74 :: What are the main difference between Micro-Controller and Micro-


Processor?
A microcontroller is by definition a is a computer on a chip. It includes all the
necessary parts (including the memory) all in one IC. You just need to apply the
power (and possibly clock signal) to that device and it starts executing the program
programmed to it. A microcontroller generally has the main CPU core,
ROM/EPROM/EEPROM/FLASH, RAM and some necessary functions (like timers and
I/O controllers) all integrated into one chip. The original idea behind the
microcontroller was to limit the capabilities of the CPU itself, allowing a complete
computer (memory, I/O, interrupts, etc) to fit on the available silicon real estate.
Microcontrollers are typically used where processing power isn't so important. More
important are generally compact construction, small size, low power consumption
and that those chips are cheap. For example controlling a microwave oven is easily
accomplished with the smallest of microcontrollers. There is countless number of
small
electronic devices which are nowadays based on microcontroller. A modern home
can include easily tens or hundreds of microcontrollers, as almost every modern
device which has electronics have a microcontroller (or more than one) inside.
Microprocessor is generally just the CPU core itself, although nowadays it might
have some accessory parts also integrated to the same chip

75 :: What is the state of the processor, when a process is waiting for


some event to occur?
Waiting state

Mohammed Rafique | Windows Server 2003 IIS and Scripting interview 28


questions

Вам также может понравиться