Академический Документы
Профессиональный Документы
Культура Документы
Grater Security
Cross-forest Authentication
Cross-forest Authorization
Cross-certification Enhancements
IAS and Cross-forest authentication
Credential Manager
Software Restriction Policies
IIS
Fault-tolerant process architecture----- The IIS 6.0 fault-tolerant process architecture isolates Web sites
and applications into self-contained units called application pools
Health Monitoring---- IIS 6.0 periodically checks the status of an application pool with automatic
restart on failure of the Web sites and applications within that application pool, increasing application
availability. IIS 6.0 protects the server, and other applications, by automatically disabling Web sites
and applications that fail too often within a short amount of time
Automatic Process Recycling--- IIS 6.0 automatically stops and restarts faulty Web sites and
applications based on a flexible set of criteria, including CPU utilization and memory consumption,
while queuing requests
Rapid-fail Protection---- If an application fails too often within a short amount of time, IIS 6.0 will
automatically disable it and return a "503 Service Unavailable" error message to any new or queued
requests to the application
Edit-While-Running
10.what is the process of DHCP for getting the IP address to the client ?
There is a four way negotiation process b/w client and server
DHCP Discover (Initiated by client)
DHCP Offer (Initiated by server)
DHCP Select (Initiated by client)
DHCP Acknowledgment (Initiated by Server)
DHCP Negative Acknowledgment (Initiated by server if any issues after DHCP offer)
12.What are the port numbers for FTP, Telnet, HTTP, DNS ?
FTP-21, Telnet – 23, HTTP-80, DNS-53, Kerberos-88, LDAP-389
3.If you uninstall Windows Server 2003, which operating systems can you revert to?
Win ME, Win 98, 2000, XP. Note, however, that you cannot upgrade from ME and 98 to Windows
Server 2003
6.Where are the Windows NT Primary Domain Controller (PDC) and its Backup Domain Controller
(BDC) in Server 2003?
The Active Directory replaces them. Now all domain controllers share a multimaster peer-to-peer read
and write relationship that hosts copies of the Active Directory.
7.How long does it take for security changes to be replicated among the domain controllers?
Security-related modifications are replicated within a site immediately. These changes include account
and individual user lockout policies, changes to password policies, changes to computer account
passwords, and modifications to the Local Security Authority (LSA).
16.If I delete a user and then create a new account with the same username and password, would the
SID and permissions stay the same?
No. If you delete a user account and attempt to recreate it with the same user name and password, the
SID will be different.
17.What do you do with secure sign-ons in an organization with many roaming users?
Credential Management feature of Windows Server 2003 provides a consistent single sign-on
experience for users. This can be useful for roaming users who move between computer systems. The
Credential Management feature provides a secure store of user credentials that includes passwords and
X.509 certificates.
18.Anything special you should do when adding a user that has a Mac?
"Save password as encrypted clear text" must be selected on User Properties Account Tab Options,
since the Macs only store their passwords that way.
20.Where are the documents and settings for the roaming profile stored?
All the documents and environmental settings for the roaming user are stored locally on the system,
and, when the user logs off, all changes to the locally stored profile are copied to the shared server
folder. Therefore, the first time a roaming user logs on to a new system the logon process may take
some time, depending on how large his profile folder is.
21.Where are the settings for all the users stored on a given machine?
C:\Document and Settings\All Users
7. What is the difference between layer 2 and layer 3 in the OSI model?
Layer 2 is responsible for switching data whereas Layer 3 is responsible for routing the data.
Layer3: With information gathered from user, Internet protocol make one IP packet with source
IP and Destination IP and other relevant information. It can then route packet through router to
the destination.
Layer2: Soon after it receives IP packet from layer 3, it encapsulate it with frame header (ATM
header in case of ATM technology) and send it out for switching. In case of Ethernet it will
send data to MAC address there by it can reach to exact destination.
Sunday, September 21, 2008 Selva No comments§§
WINDOWS Shortcut Keys§
General Windows Keystrokes
Get Help – F1
Open the Start Menu – WINDOWS LOGO KEY or CTRL+ESC
Switch between Open Applications – ALT+TAB
Open the Shortcut Menu – APPLICATIONS KEY or SHIFT+F10
Minimize all Applications – WINDOWS LOGO KEY+M
Find a File or Folder from Desktop – F3
Move to First Item on the Taskbar – WINDOWS LOGO KEY+TAB
Open Windows Explorer – WINDOWS LOGO KEY+E
Open Run Dialog – WINDOWS LOGO KEY+R
Application Keystrokes
Exit the Active Application – ALT+F4
Open the Application Control Menu – ALT+SPACEBAR
Move to the Menu Bar – ALT
Move between Menus – ALT, ARROW KEYS
Choose a Menu Item – ENTER
Open a child Window Control Menu – ALT+DASH
Cancel or close a Menu – ESC or ALT
Working in Dialog Boxes
Move through Dialog Controls – TAB
Move Backward through Dialog Controls – SHIFT+TAB
Move to Another Page – CTRL+TAB
Reverse Direction through Pages – CTRL+SHIFT+TAB
Select/Deselect in List View – SPACEBAR or CTRL+SPACEBAR
Toggle a Check Box ON/OFF – SPACEBAR
Working with Text
Move One Character Left – LEFT ARROW
Move One Character Right – RIGHT ARROW
Move One Word Left – CTRL+LEFT ARROW
Move One Word Right – CTRL+RIGHT ARROW
Move to Beginning of Line – HOME
Move to End of Line – END
Move One Paragraph Up – CTRL+UP ARROW
Move One Paragraph Down – CTRL+DOWN ARROW
Move to Beginning of Document – CTRL+HOME
Move to End of Document – CTRL+END
Scroll Up or Down One Screen – PAGE UP or PAGE DOWN
Select One Character Left – SHIFT+LEFT ARROW
Select One Character Right – SHIFT+RIGHT ARROW
Select One Word Left – CTRL+SHIFT+LEFF ARROW
Select One Word Right – CTRL+SHIFT+RIGHT ARROW
Select to Beginning of Line – SHIFT+HOME
Select to End of Line – SHIFT+END
Select to Beginning of Document – CTRL+SHIFT+HOME
Select to End of Document – CTRL+SHIFT+END
Select All – CTRL+A
Undo – CTRL+Z
Delete Current Character – DELETE
Delete Prior Character – BACKSPACE
Working in Windows Explorer
Delete Selected File or Folder – DELETE
Rename Selected File or Folder – F2
Refresh Window – F5
Switch Between Tree View and List View – F6 or TAB
Go Up One Folder Level – BACKSPACE
Open File or Folder Properties – ALT+ENTER
Untruncate Columns in List View – CTRL+NUM PAD PLUS
Using the Clipboard
Copy Selected File or Text to Clipboard – CTRL+C
Cut Selected File or Text to Clipboard – CTRL+X
Paste Contents of Clipboard – CTRL+V
CTRL+C - Copy
CTRL+X - Cut
CTRL+V - Paste
CTRL+Z - Undo
CTRL+B - Bold
CTRL+U - Underline
CTRL+I - Italic
F2 - Rename object
F3 - Find: All Files
CTRL+X - Cut
CTRL+C - Copy
CTRL+V - Paste
SHIFT+DEL - Delete selection immediately, without moving the item to the Recycle Bin.
ALT+ENTER - Open the property sheet for the selected object.
To Copy a File - Press down and hold the CTRL key while you drag the file to another folder.
To Create a Shortcut - Press down and hold CTRL+SHIFT while you drag a file to the desktop
or a folder.
F4 - Selects the Go To A Different Folder box and moves down the entries in the box (if the
toolbar is active in Windows Explorer).
F5 - Refreshes the current window.
F6 - Moves among panes in Windows Explorer.
CTRL+G - Opens the Go To Folder tool (in Windows 95 Windows Explorer only).
CTRL+Z - Undo the last command.
CTRL+A - Select all the items in the current window.
BACKSPACE - Switch to the parent folder.
SHIFT+CLICK - Close Button For folders, close the current folder plus all parent folders.
Accessibility Shortcuts