Академический Документы
Профессиональный Документы
Культура Документы
Ans :- Servers are computer that provides the services. As for Example –
.1 DNS Server
.2 WINS Server
.3 DHCP Server
.4 RAS Server
.5 VPN Server
Ans :- RAS stands for Remote Access Server. It is basically use for
mobile user in the network. This Server provides the remote
access connectivity for mobile user. In this way all of the mobile
users are connected to server through telephone line. This Server
also provides the connectivity between two or more Offices in the
Network.
Ans :- VPN stands for Virtual Private Network. It is basically use for
mobile user in the network. This Server provides the remote
access connectivity for mobile user. In this way all of the mobile
users are connected to server through internet. This Server also
provides the connectivity between two or more Offices in the
Network. VPN is Cost Effective (No costly).
Ans :- IAS stands for Internet Authentication Services. IAS Server is also
known as RADIUS Server. IAS Server Provides the centralized
management of multiple RAS & VPN Servers in the Network. On
this Server Remote Access Policy and Remote Access Logging
Options are available.
Θ υ ε σ − :7. FAT/NTFS?
Ans :- There is major differences are available between FAT and NTFS
File System such as
FAT
• Fat stands for File Allocation Table
• There are two categories in Fat File System
o Fat 16
o Fat 32
• In Fat Up To Folder Level Security is available
• Compression Option is not available
• Encryption Option is not available
• Disk Quota Option is not Available
• FAT Supported By All Of The Microsoft Based Operating System
NTFS
• NTFS stands for New Technology File System
• There are three categories in NTFS file System
o NTFS 4.0 – NT O/S
o NTFS 5.0 – 2000 O/S
o NTFS 6.0 – 2003O/S
• In NTFS Up-to File Level Security is available
• Compression Option is available
• Encryption Option is available
• Disk Quota Option is Available
• NTFS Supported By only Limited Microsoft Based Operating System
Ans :- There are many differences are available between Windows NT,
2000 and 2003 O/S, Such As--
NT
There is no active directory
There is no tree/forest hierarchical structure are available
There is no Site Relationship
There is no parent domain and child domain concepts are
available in the network.
NT support NTFS 4.0 File system
NT Support NTLM Version 2 Lan Authentication Protocol
In NT by default no Trust Relationship are configured
In NT we will use System Policy
In NT specific Client Site Operating System is available i.e. NT
Workstation 4.0 Edition
In NT we will use Exchange 5.5 Server
In NT We Can Create Only One Way Trust Relationship inside
The Network.
2000
There is Active Directory
Tree/Forest Hierarchal Structure are available
There is Site Relationship is available
There is parent domain and child domain concept are available
2000 support NTFS 5.0 File system
2000 Support Kerberos Version 5 Authentication Protocol
In 2000 by default Two-Way Trust Relationship are configured
In 2000 we will use Group Policy
2000 support maximum 32 Processor and 64 GB RAM
In 2000 specific Client Site Operating System is available i.e. 2000
Professional
In 2000 we will use Exchange 2000 Server
In 2000 no Stub Zone is available in DNS
In 2000 Resultant Setup Policy is not available
In 2000 GPMC is not available
In 2000 Conditional Forwarding option is not available
In 2000 Effective Permission option is not available
In 2000 Only some Administrative Command Line Tools are
available
Active Directory Saved Query Option is not available
Shadow Copy Option is not available in Windows 2000 O/S
ASR Option is not available in Windows 2000 O/S
In Windows 2000 We Can Create Maximum 1 DFS Root On A Single
DFS Server in The Network.
In 2000 We Can Create Two Way Trust Relationship inside The
Network.
2003
There is Active Directory
Tree Forest Hierarchal Structure are available
There is Site Relationship is available
There is parent domain and child domain concept are available
2003 support NTFS 6.0 File system
2003 Support Kerberos Version 5 Authentication Protocol
In 2003 by default Two-Way Trust Relationship are configured
In 2003 we will use Group Policy
2003 support maximum 64 Processor and 512 GB RAM
In 2003 no specific Client Site Operating System is available you can
use either win 2k Professional either Win XP Professional in the
Network.
In 2003 we will use Exchange 2003 Server
In 2003 Stub Zone is available in DNS
In 2003 Resultant Setup Policy is available
In 2003 GPMC is available
In 2003 Conditional Forwarding option is available
In 2003 Effective Permission option is available
In 2003 more Administrative Command Line Tools are available
Active Directory Saved Query Option is available
Shadow Copy Option is available in Windows 2003 O/S
ASR Option is available in Windows 2003 O/S
In Windows 2003 We Can Create More Than 1 DFS Root On A
Single DFS Server in The Network.
In 2003 We Can Create Two Way Trust Relationship inside The
Network.
Ans :- A group of tree is called forest and does not sharing a contiguous
name space but sharing a common configuration (Schema).
Ans :- D.C. stands for Domain Controller and A.D.C. stands for
Additional Domain Controller. A.D.C. is a back up copy of D.C.
Only one different is available Between D.C. and A.D.C. i.e. -
Operation Master Role. On D.C all of the three Operation Master
Roles are available—
1. RID Master
2. PDC Emulator
3. Infrastructure Operation Master Role
But on A.D.C no any operation master roles are available
Ans :- Group policy provides the stream line access to all of the users in
the network. Group policy is basically assigned on active directory
container i.e. Site, domain, OU. When ever we want some users
in the network do not use shut down the system, do not use run
command, do not use control panel, then we put that user in the
OU and assign the appropriate Group Policy on That OU.
1. Mixed Mode – In this mode NT, win 2k and win 2k3 D.C are
available.
2. Win 2k Native Modes – In this mode Win 2k And win 2k3 D.C are
available.
3. Win 2k3 Native Mode – In this mode only win 2k3 D.C are
available.
Θ υ ε σ − :23. What is SCSI?
Ans :- SCSI stands for Small Computer System Interface. In SCSI the
rate of data transmission is fast. SCSI Hard Disk Speed—R.P.M is
fast In SCSI Data Transmission Speed Is 320 MBPS in the
Network. In SCSI Controller We Can connect Maximum 15
physical Devices in the System.
Ans :- A record is also called host record. This record is basically created
in forward lookup Zone.
Ans :- B Router stands for Bridge Router. We can say this is a layer three
bridge that provides the communication between two or more
different network ID.
Ans :- POP stands for Post Office Protocol. It is basically use for mail
receiving purpose in the network.
SMTP stands for Simple Mail Transfer Protocol. It is basically use for
sending a mail as well as receiving a mail in the network.
1. Schema Partition
2. Configuration Partition
3. Domain Partition
Ans :- FIXMBR Repair the Master boot Record of the Partition Boot
Sector.
Ans :- SID stands for Security Identifier. Every Object has a unique ID,
it is called SID.
Ans :- Printer is a Software that Governing the Print Device. There are
two types of Printer—
1. Local Printer
2. Network Printer.
Ans :- In incremental Backup only incremental parts are backup not full
backup.
Θ υ ε σ − :51. What is Differential backup?
Ans :- It is basically use in DNS Server. When client query to the DNS
Server, In that case if the DNS is having a best result then DNS
Server give the best result To The Client Computer In The
Network otherwise DNS Server forward the client query to the
root DNS server on own behalf and give the complete result To
The client computers in The Network
Ans :-
1. RIP v.1 – Broadcast – Small Network Use
2. RIP v.2 – Multicast
3. IGMP – Multicast
4. OSPF – Multicast – For Larger Network
Ans :- In Remote Access Policy there are three options are available—
Ans :- SACL stand for System Access Control List. In SACL basically
auditing entry is available of any user in the network.
Ans :- This file is basically using for repairing of any application in the
network.
Ans :- It is basically use for that application, which do not have the MSI
file. We create a text file with zap extension for deploying or
installation purpose of any application in the network.
Θ υ ε σ − :70. What is ace?
3. RID Master – RID Master provides RID no. of each D.C in the
Network. Every D.C is having a one id no, it is called RID NO.
domain—rid, object—S.I.D.
Ans :-
1. NTLDR
2. NTDETECT.COM
3. BOOT.INI
4. NTBOOTDD.SYS
5. NTOSKRNL.EXE
1. Fault Tolerance
2. Load Balancing
Ans :- In this process the one lacks version no high of each object in
active directory database and this parts is overrides on other D.C
in the network. We will use This Method in Following Options
Such As--- Some Deletions, Some rename
Ans :- Schema basically reads The Attributes and defines The Classes.
Such As User class, Printer Class, Computer Class.
Ans :- RSOP stands for Resultant Set of Policy. It is basically use for,
when ever we Want, What ever the effective policy Is apply On a
particular User and particular computer in The Network
Θ υ ε σ − :82. What Is Group Policy Modeling?
Ans :- In Group policy Modeling, We Can find out what Ever the
effective policy Is Apply On a particular User and particular
computer in The Network
Ans :- In Group policy resulting, we can find Out What ever the effective
policy Is Apply On a particular User and particular computer in
The Network
Ans :- SUS stands for software Update server. This server provides the
Automatic Updating from Microsoft Update Server to All of The
Clients and servers in the network
Ans :- GPMC stands For Group policy Management Console. With The
Help Of this Tools We Manage the Group policy Object Of entire
Forest from single Location in The Network. With The Help of
This Too we also take The Backup and restoring Of Group policy
object.
Ans :-
00 MSDOS.SYS
00 IO.SYS
00 COMMAND.COM
Ans :- ASR stands for automatic system recovery. ASR provides the
complete backup of any Computers in The Network.
Ans :- System Policy are Used in NT environment But Group policy Are
Used in Windows 2000 And Windows 2003 Environment.
Ans :- There are many benefits for creating a Site inside the Network
Such as:
00 Manage Replication Traffic inside the Network
00 For Group policy Purpose
00 Administrative Burden will be Low
00 Network Traffic will be Low
00 Network Performance will be Good
00 Logon Traffic
00 Reduce The No. Of request For Global Catalog
Server
1. LAN:-LAN stands for Local Area Network. In a fixed area all of the
computers are connected to each other, it is called LAN. In LAN we
do not use any third party Service Provider Network such as
Telephone Line, Internet and Satellite.
2. WAN:-WAN stands for Wide Area Network. Across the world all of
the computers are connected to each other, it is called WAN. In WAN
we use Third Party Service Provider Network such as Telephone Line,
Internet and Satellite.
PXE and Non-PXE:-Boot roam is available on PXE Card. Boot roam is not
available in Non-PXE Card.
4. Fiber Optic Cable:-In Fiber Optic Cable the data are sending in
digital form not in analog form. The rate of data transmission is fast
by using this cable.
Network ID:-The first part of the IP Address that defines the network is
called Network ID.
Host ID:-The second or last part of The IP Address that defines the Host
number is called Host ID.
1. Static Nat
2. Dynamic Nat
3. Overloading Nat—PAT(Port address Translation)
Packet Switching:-In Packet Switching all of the data are sending from
source computer to destination computer through may be a different way.
Circuit Switching:-In Circuit Switching all of the data are sending from
source computer to destination computer through a single way.
Disk Quota:-When we want some users in the network do not use more disk
space of the Hard Disk then we put a appropriate Disk Quota entry on those
users.
Port:-A Port is recognized by the service as for example FTP uses Port 21.
6. Data Link Layer:-Data Link Layer provides the Source Mac address
And destination Mac address in the Network. All of the Wan
Technology Is a Layer 2 technology. Switch and Bridge Is a Layer
2device in The Network.
TCP:-
1. TCP Stands for Transmission Control protocol
2. TCP is a Connection Oriented protocol
3. It Is a unicasting protocol
4. The Rate of Data transmission Is Slow in TCP
5. In TCP The Guarantee Of Data Delivery
6. In TCP Acknowledgement is must.
UDP:-
1. UDP Stands for User Datagram protocol.
2. It Is a Connection Less protocol
3. It Is a Broadcasting protocol
4. The Rate Of Data transmission is Fast
5. In UDP No Guarantee of Data Delivery
6. In UDP No Acknowledgement
DOD Model Stands For department of defense model. This Model is also
known As TCP/IP Model. There are four Layers in DOD Model---
1. Application Layer—3 layer of OSI Model
2. Transport layer—transport layer of OSI Model
3. Internet layer—Network layer Of OSI Model
4. Network Interface Layer Or physical Layer—Data link & Physical
Layer of OSI Model.
File System:-A logical division of the Hard Disk is called File System such
as sector or Tracks.
User Profile:-A user profile contents the information about a specific user’s
log on setting Such As Desktop Setting. There are three types of user profile.
USB:-USB stands for Universal Serial Bus. It is basically use for physically
connecting many devices At a Same Time that supports the USB such as
printer, mouse, scanner, web camera etc. It is compatible with near about
127 devices at the same time.
CAL:-CAL stands for Client Access License. Any client computer who
accesses the server in a network must require a license. There are two types
of license Per Server and Per Seat. We convert Per Server to Per Seat at one
time but we cannot convert from Per Seat to Per Server.
Safe Mode:-In this mode load only basic devices and drivers that are require
to start the computer. not loading the following drivers such as VGA card,
soundcard, network card etc. Only load the Basic driver Such as keyboard,
mouse, and storage device.
VGA MODE:-Load the basic VGA driver. This mode is useful if a video
driver is preventing windows operating system from starting properly, basic
resolution 480 x 640 pixels setting are applies.
Zone:-Zone is the database in the DNS where all computers A Record (Host
Record) and PTR Record (Pointer Record) are Available in the network.
1. Normal Scope:-
2. Multicast Scope:-
3. Super Scope:-
1. Server Level:-
2. Scope Level:-
3. Class Level:-
1. Push Partner:-
2. Pull Partner:-
A. Log on Locally
B. Change the System Time
C. Shut Down the System
D. Access the Computer from Network
Power User:-A user that Are having the special authority to maintain the
user accounts such as add a user account, delete a user account, modify a
user account, change the password of a user etc. is called Power User.
Backup Operator:-A user that is having the power of Backup and Restore
the file of a computer it is called Backup Operator.
Wireless Communication:-In Wireless Communication we have not need
to attach a device to the computer by the help of wire. Wireless
Communication device works on the basis of receive and transmit the analog
or digital signals in The Network. There are two types of Wireless
Communication:
Recovery Agent:-Recovery Agent has the power of Decrypt the file of any
user.
Spool Folder:-Spool Folder shows the entire documents that are waiting for
print in print queue.
ERD:-ERD stands for Emergency Repair Disk. ERD having a backup copy
of system state data such as registry, system files, partition boot sector,
startup environment etc. It is most important tool to recover your system
registry.