Академический Документы
Профессиональный Документы
Культура Документы
Ans) Active Directory is a directory service. The term directory service refers to two things:-
Active Directory is a way to manage all elements of your network, including computers, groups, users, domains, security policies, and
any type of user-defined objects. It melds several NT services and tools that have functioned separately.
Active Directory is built around Domain Name System (DNS) and lightweight directory access protocol (LDAP). DNS because it is
the standard on the Internet and is familiar, LDAP because most vendors support it. Active Directory clients use DNS and LDAP to
locate and access any type of resource on the network. Because these are platform-independent protocols, UNIX, Macintosh, and other
clients can access resources in the same fashion as Windows clients.
The Microsoft Management Console (MMC) is used to implement and manage Active Directory.
The two most important goals are:
• Users should be able to access resources throughout the domain using a single logon.
• Administrators should be able to centrally manage both users and resources.
Active Directory allows central control and decentralized administration of mixed NT 4.0 and 2000 Server domains. Clients can be
2000 Server workstations and servers, Windows 95, Windows 98, or any other system that has the Active Directory add-on installed.
Domain: - A collection of Microsoft windows server 2003 computers, users and groups that share a common directory database.
Domains are defined by an administrator.
Forest: - A grouping of active directory trees that have a trust relationship between them. Forests can consist of noncontiguous
namespace and, unlike domains and trees, do not have to be given a specific name. An active directory forest can only support a single
Microsoft exchange server 2003 organization.
Domain controller: - A server that is capable of performing authentication. In Microsoft windows server 2003, a domain controller
holds a copy of the active directory database.
Primary domain: - Primary domain controller, manages the master user database for the domain in NT environment.
Secondary domain: - Secondary domain controller contains copy of master user database for the domain in NT environment.
DNS Server:-Domain name system, a hierarchical name resolution system that resolves host names into IP addresses and vice versa.
DHCP Server: - Contains IP addresses, lease duration, and associated TCP/IP configuration information. The DHCP server listens for
client requests and processes them.
Zones: - In a DNS database, a manageable unit of the DNS database that is administered by a DNS server. A zone stores the domain
names and data of the domain with a corresponding name, except for domain names stored in delegated sub domains.
WINS server: - Runs on a Windows NT Server, NT based computer and handles name registration requests from WINS clients and
registers their names and IP addresses. The server also responds to name queries from WINS clients by returning the IP address of the
name being queried (assuming the name is registered with the WINS server).
Schema Master:- The schema is simply a blue print of all active directory objects and their attributes. The schema determines what
kind of objects can be stored in the directory and what attributes define those objects. Any modifications made to the schema must be
made on domain controller holding the schema master role.
Domain naming master:- The Domain naming master controls the addition and removal
Of domains in the forest.
PDC Emulator:- Windows 2000/2003 domains that have windows NT BDCs still in the operation (mixed mode) and windows
2000/2003 domains that have down level clients (such as 9x and NT) expect a PDC to be present on the network.
RID Master:- The RID master manages the distribution of RID numbers to other domain controllers. When a domain controller
generates a new security ID (SID) for a new user, computer, or group account, a domain security ID and a RID number are used. The
RID master makes certain that no two domain controllers have the same or overlapping RID numbers.
Infrastructure Master:- It updates group members as necessary. For example, when the membership of a particular group changes,
the infrastructure master updates the group to ensure that changes are processed appropriately.
Copy back up:- Backs up all files to the storage medium and does not reset their archive bits.
Differential back up: - Backs up only the files that have changed since the last normal backup and does not reset their
archive bits.
Incremental back up: - Backs up only those files that have changed since the last normal backup or incremental backup
and resets their archive bits.
Daily back up: - Backs up only the files that were created or modified today and does not reset their archive bits.
It is a subsystem storage concept designed for the purpose of offering higher levels of protection from data loss that can
occur from any down time caused by malfunctions compared to the protection offered by conventional disk drives. RAID
arrays composed of conventional discs can function for hundreds or even thousands of years without losing data because
of a disk failure.
SCSI is a parallel interface standard used by Apple Macintosh computers, PCs, and many UNIX systems for attaching
peripheral devices to computers. SCSI interfaces provide for faster data transmission rates (up to 80 megabytes per
second) than standard serial and parallel ports.
Q 9) Explain APIPA.
Ans) Auto Private IP Addressing (APIPA) takes effect on Windows 2000 Professional computers if no DHCP server can
be contacted. APIPA assigns the computer an IP address within the range of 169.254.0.0 through 169.254.255.254 with a
subnet mask of 255.255.0.0.
Q 10) what is server. What is exchange server and function? Types and
function of server?
Ans) Server: A computer that delivers information, services and software to other computers linked by a network.
Exchange Server: A Microsoft messaging system including mail server, email client and groupware applications (such as
shared calendars).
Microsoft Exchange Server is a collaborative software server from Microsoft. Among other things, Microsoft Exchange
manages electronic mail, and is thus a popular mail server.
Q 15) How does the browser know to go to a certain IP address when you enter a domain like
crackthecampus.com?
Ans) It searches through local DNS cache, if nothing is there, it queries the ISP DNS server.
Q 17) Can you be able to identify between Straight- through and Cross- over cable wiring?
Ans) Straight-through is type of wiring that is one to one connection Cross- over is type of wiring which those wires are
got switched. We use Straight-through cable when we connect between NIC Adapter and Hub. Using Cross-over cable
when connect between two NIC Adapters or sometime between two hubs.
Q 18) what is the difference between a domain local group and a global group?
Ans) Domain local groups grant permissions to objects within the domain in which the reside. Global groups contain grant
permissions tree or forest wide for any objects within the Active Directory.
Q 21) How can you force the client to give up the dhcp lease / IP address if you have access to the client PC?
Ans) ipconfig /release
Q 22) what do you do if earlier application doesn’t run on Windows server 2003?
Ans) When an application that ran on an earlier legacy version of Windows cannot be loaded during the setup function or
if it later malfunctions, you must run the compatibility mode function. This is accomplished by right-clicking the application
or setup program and selecting Properties > Compatibility > selecting the previously supported operating system.
Q 25) what snap-in administrative tools are available for Active Directory?
Ans) Active Directory Domains and Trusts Manager, Active Directory Sites and Services Manager, Active Directory Users
and Group Manager, Active Directory Replication (optional, available from the Resource Kit), Active Directory Schema
Manager (optional, available from adminpak)
Q 28) where are the settings for all the users stored on a given machine?
Ans) \Document and Settings\All Users
Q 29) what is the difference between local, global and universal groups?
Ans) Domain local groups assign access permissions to local domain groups for local domain resources. Global groups
provide access to resources in other trusted domains. Universal groups grant access to resources in all trusted domains.
Q 33) what is the difference between the basic disk and dynamic disk?
Ans) The basic type contains partitions, extended partitions, logical drivers, and a collection of static volumes; the
dynamic type does not use partitions but dynamically manages volumes and provides advanced storage options.
10BaseT: An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling
and twisted pair cabling.
DNS:
- The purpose is to resolve host names to IP addresses.
- Names are hierarchical in nature.
- Name registration is static and has to be done manually.
- Doesn't support incremental replication of data between DNS servers. This means the whole database has to be replicated every time.
- Doesn't support DHCP.
- Supports other TCP/IP application services such as email routing.
With group policies we can enforce a standardized desktop and system settings
configuration, install software, download documents to a client computer and configure internet settings. Group policies are designed
to lower the total cost of ownership by giving administrator more control over desktops.
Workgroup computing occurs when all the individuals have computers connected to a network (a group of two or more computer
systems linked together) that allows them to send e-mail to one another, share data files, and other resources such as printers.
Normally, a workgroup is limited to 10 network devices/computers. Since workgroup machines might have different account names,
you really have to know the admin account for each specific machine in order to effectively manage the workgroup. Workgroup is
called peer-to-peer connection.
Q 50) what is the file name of Active directory and where is it stored
Ans) NTDS.DIT, stored in %Systemroot%\Windows\NTDS folder.
Q 52) what is the difference between NTFS and FAT file system?
Ans) FAT (file allocation table): FAT16 & 32
NTFS (new technology file system): has an additional feature such as Security & File compression (not both at same time)
You can convert a partition from FAT to NTFS but not vice versa. To do so, open an MS-DOS Prompt window and type the following
command:
CONVERT drive: /FS: NTFS
For example, if you want to convert your D drive to NTFS, you'd replace the word drive with the letter D, as follows:
CONVERT D: /FS: NTFS
Transport Layer is responsible for end-to-end connectivity. It is also known as the heart of OSI Layers. Following tasks are
performed at the Transport Layer: -
Identifying Service
Multiplexing & De-multiplexing
Segmentation
Sequencing & Reassembling
Error Correction
Flow Control
Protocol use: TCP, UDP, RTP, SCTP, SPX, ATP, IL. This layer is for flow control.
Network Layer is responsible for providing best path for data to reach the destination. Logical Addressing works on this layer. Router
is a Network Layer device.
It is divided into two parts
Routed Protocols
E.g. IP, IPX, Apple Talk.
Routing Protocols
E.g. RIP, IGRP, OSPF, EIGRP
Protocol use: IP, ICMP, IGMP, IPX, BGP, OSPF, RIP, IGRP, EIGRP, ARP, RARP, X.25.
Physical Layer is responsible for electrical, mechanical and procedural checks. Data will be converted into Binary (i.e.) 0’s & 1’s.
Data will be in the form of electrical pulses if it is Coaxial or Twisted Pair cable and in the form of Light if it is Fiber Optic Cable.
Devices working at Physical Layer are Hubs, Repeaters, Cables, and Modems etc.
Protocol use: 10BASE-T, 100BASE-T, 1000BASE-T, SONET/SDH, T-carrier/E-carrier, various 802.11 physical layers.
Q 57) what are the boot options for a PC. List them & which option do we use & when?
Ans) when PC reboots press F8 so you reach the boot options.
a) Safe Mode: This starts Windows using only basic drivers and no network connection. Safe Mode allows a Windows PC to start
using default settings (VGA display driver, Microsoft mouse, no network connection, minimal device drivers) so that you can perform
a system repair. These options often allow you to repair your Windows configuration without performing a complete re-installation of
the system software. For example, if you have installed an application that subsequently prevents Windows from starting, you should
be able to start in Safe Mode so that you can remove the offending application.
b) Safe Mode with Networking: This is useful if you need to connect to CFS (combat flight simulator) to install new drivers from
the shared copy of installation files.
c) Safe Mode with Command Prompt: This startup option does not start the Windows GUI. However VGA drivers are installed so
the option is very similar to basic Safe Mode.
d) Enable Boot Logging: This starts Windows whilst logging all devices and services that are loaded in a file, NTBTLOG.TXT, in
the Windows directory. A log is always created by the preceding three Safe Mode options.
e) Enable VGA Mode: This option specifically addresses the problems which occur when a video driver prevents Windows from
starting.
f) Last Known Good Configuration: If Windows fails to start successfully, try the option Last Known Good Configuration before all
others including Safe Mode. This starts Windows using the registry information it saved at the last successful shutdown and it can
correct basic configuration problems. It does not solve problems caused by incorrect or missing files.
g) Directory Services Restore Mode: For Windows 2000 and 2003 servers only.
i) Disable automatic restart on system failure: Windows XP only: If Windows experiences a critical error on startup; a blue screen
error (BSOD) message may be displayed before the system restarts. This option allows you to disable the automatic restart so that the
error message can be read.
Q 59) What is firewall, How to change settings for windows firewall, 3rd party firewalls?
Ans) A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware
and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private
networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which
examines each message and blocks those that do not meet the specified security criteria.
If you right click on local area connection icon you will get the option to change windows firewall settings. You can also
start or stop the service from services menu by typing services.msc in run window & then selecting the service.
3rd party firewalls are Norton or Symantec, McAfee, AVG, etc.
Q 63) other general OS based questions as what options u have in manage (right click my comp manage), which logs u have
in event viewer, etc..?
Ans) Once you reach there you will find System tools (here we have Event viewer, shared folders, local users & groups, Performance
logs & alerts, device manager), Storage (here we have a option for disk management which tells you the file system for each drive),
Services & applications.
Event viewer has system, application & security logs. Any errors or success are logged in respective logs. Are helpful in
troubleshooting. For e.g. if a print job fails you would have event ID 9 in system log indicating print job failure.
Q 65) what is a logical structure (partition) and Physical structure (partition) in Active Directory?
Ans) In logical structure we have the domain, the OU and the object, and each object has attributes that define it. The active directory
also uses sites, but sites are not considered a part of the active directory logical structure, or hierarchy. Sites are maintained in the
active directory for replication and traffic control purposes only. A site, by definition, is a physical location of computer and users,
contrasting to a domain, which is a logical grouping of computers and users. It is important to note that sites and domains are not
interrelated- a site can contain several domains or a domain could span multiple sites. While a domain is a logical, administrative level
of networking, a site is a physical level.
We can also back data by using fault tolerance solutions. Fault tolerance simply means that a system has a capability to tolerate a
system failure, or fault. Hard disk fault tolerance is not a replacement for an effective backup plan. Although very effective and useful.
Disk fault tolerance requires you to have 2 or more hard disks. Their are 2 types of fault tolerance:
Mirrored volumes
RAID-5 volumes
System state data is also a method for backing up AD. It is defined as a collection of system state data that you back up as a
collection. System state data made up of several components, but you cannot back up those components individually due to
dependencies among the data. Every windows 2000\2003 computer contains system state data, and when you perform backup for AD,
you simply choose to back up system state data on domain controller.
For windows 2000 domain controllers, system state data contains the following:
Registry
COM+ class registration database
System boot files
Active directory services database
SYSVOL directory