Вы находитесь на странице: 1из 5

WINDOWS 2000

------------- -------------
Name 3 differences between Windows 2000 Standard and Windows 2000 Advanced
Server.

In reference to Windows 2000 DNS, what are resource records -better known as
SRV
records?

LMHost Records

What is the current service pack for Windows 2000?


Service Pack 4

Where would I go in Windows 2000 to find out more information in reference to a


service not starting?

Event Viewer

Active Directory Services:-

What is Active Directory?

The Active Directory catalogs information about all the objects on a network, including
people, computers, and printers, and distributes that information throughout your
network. Security is integrated with Active Directory through logon authentication and
access control. With Active Directory, you only need to log on once to easily find and use
resources anywhere on the network. For example, you can search Active Directory for a
printer that prints in color and is located near your computer, a group of users managed
by a particular individual, or a shared folder to which a unique keyword has been
assigned.

What is Active directory Database?

Windows 2000 Active Directory data store, the actual database file, is %SystemRoot
%\ntds\NTDS.DIT. The ntds.dit file is the heart of Active Directory including user accounts. Active
Directory's database engine is the Extensible Storage Engine ( ESE ) which is based on the Jet
database used by Exchange 5.5 and WINS. The ESE has the capability to grow to 16 terabytes
which would be large enough for 10 million objects. Back to the real world. Only the Jet database
can maniuplate information within the AD datastore.

The Active Directory ESE database, NTDS.DIT, consists of the following tables:

• Schema table
the types of objects that can be created in the Active Directory, relationships between
them, and the optional and mandatory attributes on each type of object. This table is fairly
static and much smaller than the data table.
• Link table
contains linked attributes, which contain values referring to other objects in the Active
Directory. Take the MemberOf attribute on a user object. That attribute contains values
that reference groups to which the user belongs. This is also far smaller than the data
table.
• Data table
users, groups, application-specific data, and any other data stored in the Active Directory.
The data table can be thought of as having rows where each row represents an instance of
an object such as a user, and columns where each column represents an attribute in the
schema such as GivenName.

What are Operation Master Roles.?

W2K AD domain controllers split up the master operations roles. This is usually transparent to most
administrators. Active Directory will manage which domain controller has which master operations
role. The key is normally. There are five master controller roles. By default, they are on the first
domain controller in the domain. For performance issues, you probably want to split the roles apart.
1. Place the RID and PDC FSMO emulator roles on the same DC.
2. Place the infrastructure FSMO master on a non-global catalog server.
3. Place the domain naming FSMO master on a Global Catalog Server.

What is Domain Controller on Active Directory Services?

The domain controllers in a Microsoft Windows network as well as backup domain controllers are
central to the security of all devices on that network and must be secured to a high level. In a
Windows 2000 Server domain, the domain controller is the computer running Windows 2000
Server that manages all user access on the network which includes logging on, authentication and
access to the directory and shared resources.

Name atleast 5 services on Active directory Sevices?

What are hidden shares?

A network share on a Microsoft network that is not visible when viewing another
computers shares, however is still accessible if the name of the hidden share is known.

Creating a Microsoft Windows hidden share

A Microsoft Windows hidden share is created by adding a "$" symbol to the end of the
name of the share. For example if you were sharing a folder named "hope" when creating
the shared name adding a "$" to the end of hope so the shared name is "hope$" will make
a hidden share.

Accessing a Microsoft Windows hidden share

Assuming we were attempting to access the "hope$" share that we created in the above
example from another computer we would type the below network path to access the
hidden share.
//<computer_name>/hope$

Viewing Microsoft Windows hidden shares

Hidden shares give the users a false impression that the share cannot be found unless it is
known. Although this may be true for most users, a user can still obtain numerous
programs available on the Internet that enable a user to view all shares regardless if they
are hidden or not. If you are creating a hidden share to protect sensitive data it is
recommend you password protect the share instead of making it hidden.

What is SCHEMA in active directory database?

The Active Directory schema contains formal definitions of every object class that can be created in an
Active Directory forest. The schema also contains formal definitions of every attribute that can exist in an
Active Directory object.

Name the file where database is store in Active directory Services?


NTDS.DIT

What is “REGEDIT” ?
It is a tool for editing registry.

Port Numbers for the following:-

1)HTTP - 80
2)DNS - 53
3)POP3 - 110
4)SMTP - 25
5)TCP/IP23
6)FTP - 21
7)DHCP Client – 546 & DHCP Server - 547

Exchange 5.5

Experience with Exchange 5.5:-

Name at least 5 services on an Exchange 5.5 server.

What is the latest Service Pack for Exchange 5.5 server?


Service Pack 4

What files are usually located in the MDBDATA directory on an Exchange 5.5
server?
What is the difference between Priv.edb and Pub.edb?

Where is the directory information stored in Exchange 2000?

How many times do you need to run forest prep in a single Active Directory forest
that contains 4 domains?

What is the Active Directory Connector (ADC)?

The task of the ADC is to replicate directory information such as mailboxes, users and groups
between the Exchange 5.5 directory and Active Directory.

The ADC service itself relies on the administrator to define connection agreements. These
agreements name the servers involved in the replication cycle, which direction to replicate, which
objects to replicate, and when to replicate the data.

The ADC uses LDAP to contact both the Exchange 5.5 and Active Directory. LDAP works efficiently
over all types of network links, regardless of whether the connection is fast, slow, or high latency.

What is the Recipient Update Service (RUS)?


RUS is responsible for updating address lists and email addresses in your Active Directory.

What are the features of Exchange 2000 and Exchange 5.5?

What are the differences between exchange 5.5 and Exchange 2k.?

What do you understand by an Exchange Server?


1
Exchange Server, the Microsoft messaging and collaboration server, is software that runs on servers
that enables you to send and receive electronic mail and other forms of interactive communication
through computer networks. Designed to interoperate with a software client application such as
Microsoft Outlook, Exchange Server also interoperates with Outlook Express and other e-mail client
applications.

Describe Mail Flow in an exchange Server.

Describe Exchange Structure.

function structree(structure,file_name);

level=1;
%variable initialization
row=[1 1];
structure(level,1).data=structure;
%structure initialization
fid = fopen(file_name,'w');
%open file
while ~isequal(level,0);
flag=isa(structure(level,1).data,'struct'); %check that current
structure is really a structure
if (flag==1);
if(row(level)==1); %do this only if you are accesing this
level for the first time
Temp_names=fieldnames(structure(level,1).data); %get field
names
Temp_size=size(Temp_names); %get number
of fields
Directory_size(level)=Temp_size(1); %store
number of fields
Directory_names(1:Directory_size(level),level)=Temp_names;
%store field names in corresponding level
end
Display_name=Directory_names{row(level),level}; %Change field
name from cell to arrray
for index= 1:level-1; %add necessary tabs
fprintf(fid,'\t|');
end
fprintf(fid,'---');
fprintf(fid,'%s\n',Display_name); %Write name to file
level=level+1; %Go up one level
row(level+1)=1; %Initialize row variable
structure(level,1).data=structure(level-1,1).data.
(Display_name); %Update current structure
else
level=level-1; %If current sutructure is not really a
structure go down one level
row(level)=row(level)+1; %Go to next row
feedline=0;
while (row(level)>Directory_size(level)); %Do this if row
number exceeds the number of fields
level=level-1; %Go down one level
%for index= 1:level-1; %add necessary tabs
% fprintf(fid,'\t|');
%end
if(feedline==0)
fprintf(fid,'\n');
feedline=1;
end
if (level==0);
break;
end
row(level+1)=1;
row(level)=row(level)+1;
end
if (level>1);
structure(level,1).data=getfield(structure(level-
1,1).data,Directory_names{row(level-1),level-1}); %Update structure
end

end
end
status = fclose(fid); %Close file

Вам также может понравиться