Вы находитесь на странице: 1из 52

windows 2000, 2003 and exchange server,\\ networking

1. what is the ad? ad is distributed database, which organizes, manages, and controls network resources. ad
stores attributes of objects
2. objects? each object is a collection of attributes. ex: - users, computers, groups, domain, sites, and printers.
3. attributes?? each attribute is defined only once, but can be used in multiple object classes, but is defined
only once in the schema to ensure consistency.
4. ldap?? light-weight directory access protocol - ldap provides away to communicate with ad by specifying
unique naming paths for each object in the directory. name paths are 1. distinguished names, 2. relative
distinguished names.ex:--cn=rklraju,ou=sales, dc=msft, dc=saibaba cn,ou,dc – distinguished
names,rklraju, sales, msft, saibaba --- relative distinguished names
5. domain?? domain is a collection of computers, which share a common directory database. domain is a
security boundary, is a unit of replication.
6. ou?? used to delegate administrative control over the objects controlling of user and computer environments
using gp.
7. tree?? tree is hierarchical arrangement of domains that share a contiguous name space having transitive and
two-way trust.1.transitive trust – a trust extended to one domain is automatically extended to another domain
that trusts that domain. 2. two-way trust – there are two trust paths given in opposite direction between two
domains.
8. forest?? forest is a collection of one or more trees. the trees in forest share a common schemer and global
catalog. each tree in forest has its own unique name space. --- the first win 2000 domain that you create is
called the forest root domain and is the start of a forest, which collection of trees.
9. global catalog?? is a repository of information that contains a subset of the attributes of all objects in ad?
the global catalog contains the information that is necessary to determine the location of any objects in
directory. the global catalog enables users to uses universal group membership information to log on to the
network.
10. domain controller?? is a domain and in a forest automatically replicate any change to the ad database to
each other. an operation master is a domain controller that has been assigned one or more single master
operation roles in ad domain or forest. its –participate in ad replication; -- perform single master operation
roles in domain.
11. sites?? a site maps physical structure of your network. it –optimize replication traffic, --enable user to log
on to a domain controller by using high speed connection.
12. what are the administering methods of windows 2000? 1 centralized management:- ad allows
administrator to centrally manage large members of users computers, printers and network resources from a
central locations, 2. manage user environment:- group policy enables administrators to specify setting and
apply management group policy settings to ou aes in ad.3.delegate administration control:- ad allows an
administrator with proper authority to delegate a selected set of administrative privileges to appropriate users
groups with in your organization.
13. dns?? provides 1.name resolution – dns translates computer names to ip addresses to those computers can
locate each other. 2. naming convention for win 2000 domains: - ad uses dns naming convention to name win
2000 names, 3.locating the physical component of ad: - dns identifies domain controller by the specific
services that they provide, such as authenticating a log on request win 2000 uses dns to locate domain
controllers. this is accomplished by srv records which map a particular service to the domain controllers.
14. dns installation?? > assign a static ip address -> configure the dns primary suffix, ->install dns server
service ->create the forward lookup zone, ->create reserve lookup zone(optional).

15. how to create domain??  run  type dcpromo.exestart ad installation select the domain
controller and domain type  domain, dns and netbios names database, log & shared systems volume
locations  select mixed mode or native mode select a password for directory restore mode.
16. differences between mixed mode and native mode?? the integrator of win nt “h-o” domain and win 2000
domain is called as mixed mode. all domain controllers running on windows2000 server family is called
native mode.
17. replica domain controller?? to enable fault tolerance in the even that a domain controller goes offline
unexpectedly, if a domain controller fails the domain controllers will provide authentication services and
access to objects in ad, allowing the domain to operate as usual.
18. kerberos service?? its authenticates the users ticket by querying the ad and global catalog server to verify
the information contained in the user session ticket.
19. how to works kerberos v5?? this protocol is the primary authentication protocol in win2000. it verifies
both the identity of the user and the integrity of network services.
20. what will do netdom command?? is a command line utility that you can use to manage win 2000 domain
(verify & remove) and trusts relation ships from command prompt window.
21. replication?? replication is the process of updating information in ad from one domain controller to the
other domain controller in a network. replication synchronizes the copying of data on each domain
controller.
22. replication latency?? is the time needed for a change made on one dc to received by another domain
controller  default replication latency = 5 minutes,  when no changes, scheduled replication = one hour.
23. replication protocols?? rpc, smtp.
24. ad partitions?? 1. schema partition: - is stored on all of the dcs of a forest. 2. configuration partition: - is
replicated to all domain controllers in a forest. 3. domain partition:- is replicated to all dcs with in its domain.

25. fsmo roles(flexible single master operation)?? 1. schema mastercontrols all originating updates to the
schema.2. domain naming master: controls the addition or removal of domains in the forest 3.pdc emulator
 acts as a win nt pdc to support any backup domain controllers running win nt with in a mixed mode
domain. the pdc emulator is the first domain controller that is created in a new domain its performs roles---a)
acts as the pdc for any existing bdcs b)manages password changes from computers, c)minimizes replication
latency for password changes d)synchronizes the time on all domain controllers throughout the domain to its
time. e) prevents the possibilities of over writing gpos.4) rid relative identifier allocates blocks of ri: d to
each domain controller in the domain deletes the objects from the domain when the object is moved from
that domain to another domain. 5) infrastructure master is used to update object references in its domain
that point to the object in other domain. per-forest roles are schema master; domain naming master.per-
domain roles are pdc emulator, rid master, infrastructure master.
26. how seize or stop the roles?? ntdsuil.
27. ad services?, dc, dns, wins, dhcp, iis, print, file, media telephony, cluster, database, mail,backoffce, ris,
backup, application, certificate, license.
28. what is dhcp and define the working of dhcp?? dynamic host configuration protocol. its assigning ip
address automatically to network nodes either statically or dynamically. you can allocate ip addresses to
clients automatically when the clients start up; making it much easier to manage ip leases and corresponding
properties in a network  dhcp supports automatic updates to dns when host name or ip address changes
occur.

29. what is scope, super scope and multi scope?? scope is a set of properties that define a range of ip
addresses and related settings such as dns servers, default gateway, and other information that the client
needs to obtain from the dhcp server. super scope to allocate ip addresses to clients on a multinet, which is
a physical network segment containing multiple logical ip networks. ex:- you might support three different
class c logical ip networks on a physical network segment. each of the three class c address ranges is defined
as one of three individual child scopes under a super scope. a single dhcp server can support multiple local
ip networks and remote networks. multicast scopes is used to broadcast ip traffic to a group of nodes
using a single address, and is traditionally used in audio and video conferencing. dhcp server can allocate
multicast addresses to a group of computers much like it allocates unicast addresses to individual computers.
30. what is reservations?? a reservations assigns a specific ip address to a specific mac address.
31. how to see mac address?? ipconfig /all
32. what is default lease time?? a dynamically assigned address and associated properties is called a lease.
33. boot p forwarding and dhcp relay agent?? a dhcp relay agent (bootp relay agent) functions as a sort of
dhcp proxy, enabling dhcp clients on a given ip subnet to acquire ip leases from dhcp servers on other
subnets. this can not run on a win 2000 server that also is running the dhcp server service or nat with
automatic addressing enabled.
34. apipa, automatic private ip address range 169.254.0.1 to 169.254.255.254?? the rras service will use
apipa if it is unable to locate a dhcp server at startup. apipa enables win 2000 to assign addresses in the class
b address range 169.254.0.1 through 169.254.0.254. apipa is designed to allow automatic ip configuration
when no dhcp server is available. it does not allocate settings for default gateway, dns servers, or wins
servers.
35. what happened if dhcp fails?? network will fails, clients will disconnect from the network.

36. dhcp backup, where it will store??  administrative tools dhcp right click on dhcp server choose
backup. it will store-- sysem32\dhcp\backup

37. disaster recovery plan?understand the needs of the departments that rly on your systems.  understand
the systems that apply to the departments in the previous item. make it your business to understand
everything you need to about storage systems, media formats, software, scheduling, and more.  establish
policy and protocol with respect to backup and recovery.using the techniques and procedures discussed
previously, establish backup restore procedures for systems and systems states, data and data recovery and
archiving and remote storage.  perform disaster recovery trials, train, and perform weekly or monthly dr
drills.
38. dhcp lease process
39. define dns and purpose. ?? domain name system provides the primary means through which win2000
clients resolve host names to ip addresses.

40. define hosts, cache dns, lmhosts, dns??caching dns  helps reduce that load and reduce network traffic.
host map a host name to a an ip address and are the primary means by which names are resolved.
41. difference between dns and wins?? wins provides the same capabilities for resolving netbios names to
addresses that dns provides for host names.
42. what is the link between dns and ad?? ad use an identical hierarchical naming structure so that domains
computers are represented both as ad object and as dns domains and resource records.
43. what are zones (forward and reverse)?? we have two zones in dns 1. forward look-up zone : converts
names to ip-addresses .2. reverse look-up zone: convert ip addresses to name or fqdn .usually when we
configure mail servers we have to configure reverse look-up zone. this zone configuration provides a feature
of spam protection in mail servers
44. active directory integrate zone, primary zone, secondary zone and stub zone?? a primary master zone
maintains locally the records for those domains for which it is authoritative. the secondary master maintains
the zone records as a read-only copy and periodically performs zone transfers to refresh the data from the
primary master. a secondary master is essentially a backup dns server
45. dns replication with in dns servers. difference between primary and secondary zone?? a primary
master zone maintains locally the records for those domains for which it is authoritative. the secondary
master maintains the zone records as a read-only copy and periodically performs zone transfers to refresh the
data from the primary master. a secondary master is essentially a backup dns server

46. dns queries (recursive & interactive)?? dns queries works as a specified dns domain name, stated as a
fully qualified domain name (fqdn) a specified query type, which can either specify a resource record by
type or a specialized type of query operation a specified class for the dns domain name.
47. what is start of authority and purpose of it.??
48. what are the problems occurs if dns fails??
49. how do you know primary and secondary dns servers data is same (ie. replicated) or not?? no a
primary master zone maintains locally the records for those domains for which it is authoritative. the
secondary master maintains the zone records as a read-only copy and periodically performs zone transfers to
refresh the data from the primary master. a secondary master is essentially a backup dns server

50. what are service records? how many are they?/1. host records map a host name to a an ip address and
are the primary means by which names are resolved. 2)alias records alias name or cname, records map an
alias name to an existing fqdn 3) mail exchanger records enable mail to be routed through or toa domain.
4) service location records enable you to easily move a service from one host to another and designate
certain hosts as primary for a given service and others as secondary for that same service.
51. where the dns backup stores??

52. dynamic dns & static dns??dynamic dns  enables a win2000 dns server to automatically update resource
records for clients when their host names or ip addresses change.
53. how to check dns is working or not? ntds utilities??
54. preferred dns server, alternative dns difference??
55. how dns client will contact server?? now lets look how it works: 1.when a dns name resolution request is
forwarded to a dns server, the dns server examines its local dns cache for the ip address. 2. if the ip address is
not in the dns server's cache, it checks its hosts file. (since the hosts file is a static text file, it is not
commonly used.) 3. if the dns server is not authoritative and configured for forwarding, the dns server
forwards the request to a higher-level dns server4.if the dns server cannot forward the request, or if
forwarding fails, the dns server uses its root hints file (also known as cache.dns). the root hints file lists the
13 root dns servers. 5. the root dns server responds with the address of a com, edu, net, or other dns server
type (depending on the request). 6.the dns server forwards the request to the high-level dns server, which can
respond with a variety of ip addresses.
56. alias name?? alias name or cname, records map an alias name to an existing fqdn. ex:- if you r the
administrator for “rklraju.org” and you have a server in your network named “ravi”, with a corresponding a
record for “ravi” that points to the server’s ip address. you want to use the server as a web server. so, you
create an alias for www that points to “ravi.rklraju.org. users connect to www.rklraju.org and dns actually
routes them transparently to ravi.rklraju.org.
57. round robin, mask ordering??
58. dns zones, chronicle records what are they? a primary master zone maintains locally the records for those
domains for which it is authoritative. the secondary master maintains the zone records as a read-only copy
and periodically performs zone transfers to refresh the data from the primary master. a secondary master is
essentially a backup dns server
59. differences between fat & ntfs ?? ? fat and fat32 provide no security over locally logged-on users. only
native ntfs provides extensive permission control on both remote and local files.
60. difference between nt4.0, win2000andwin2003?? a) in 2000 we cannot rename domain whereas in 2003
we can rename domain
b) in 2000 it supports of 8 processors and 64 gb ram (in 2000 advance server) whereas in 2003 supports up to
64 processors and max of 512gb ram
c)2000 supports iis 5.0 and 2003 supports iis6.0
d) 2000 doesn’t support dot net whereas 2003 supports microsoft .net 2.0
e) 2000 has server and advance server editions whereas 2003 has standard, enterprise, datacentre and web
server editions.
f) 2000 doesn’t have any 64 bit server operating system whereas 2003 has 64 bit server operating systems
(windows server 2003 x64 std and enterprise edition)
g) 2000 has basic concept of dfs (distributed file systems) with defined roots whereas 2003 has enhanced dfs
support with multiple roots.
h) in 2000 there is complexity in administering complex networks whereas 2003 is easy administration in all
& complex networks
i) in 2000 we can create 1 million users and in 2003 we can create 1 billion users.
j) in 2003 we have concept of volume shadow copy service which is used to create hard disk snap shot which
is used in disaster recovery and 2000 doesn’t have this service.
k) in 2000 we don’t have end user policy management, whereas in 2003 we have an end user policy
management which is done in gpmc (group policy management console).
l) in 2000 we have cross domain trust relation ship and 2003 we have cross forest trust relationship.
m) 2000 supports 4-node clustering and 2003 supports 8-node clustering.
n) 2003 has high hcl support (hardware compatibility list) issued by microsoft
o) code name of 2000 is win nt 5.0 and code name of 2003 is win nt 5.1
p) 2003 has service called adfs (active directory federation services) which is used to communicate between
branches with safe authentication.
q) in 2003 their is improved storage management using service file server resource manager (fsrm)
r) 2003 has service called windows share point services (it is an integrated portfolio of collaboration and
communication services designed to connect people, information, processes, and systems both within and
beyond the organizational firewall.)
s) 2003 has improved print management compared to 2000 server
t) 2003 has telnet sessions available.
u) 2000 supports ipv4 whereas 2003 supports ipv4 and ipv6
61. what are the limitations of nt4.0?? win nt depends on a single primary domain controller, the pdc, which
holds the master database of the domain configuration, accounts security, and so on. the bdc (backup domain
controller) is a backup of pdc. the bdc can service the domain, interms of logon authentication, security, and
the like. but its registry databases can’t be edited.
62. what are the advantages of win 2000 and win 2003?? exchange server 2003 runs only on win 2000 server
and windows 2003, ad will supports to both.

63. what are the different versions in win 2003 and what are the differences between them?? 1. standard
fully supports ad and security, 2. enterprise supports server clustering, 3.data center supports up to 8-
node server clustering, 4.web server  supports to web based applications
64. what is group & how many are they. define each of them?? group is collection of users, contacts,
computers, and other groups, -- manage user access to shared resources. groups are local, global and
universal groups-- local groups assign access permissions to global domain groups for local domain
resources. global groups provide access to resources in other trusted domains. universal groups grant access
to resources in all trusted domains.
65. nested group?? in native mode, you can create a universa group and delegate the control over membership
to an enterprise or senior administrator whose job it is to manage the membership of the global groups.
domains must be in native mode to nest security groups. the universal group is not available in mixed mode.
66. what is ou and sub ou ? define purpose?? used to delegate administrative control over the objects by
assigning specific permissions to users and groups and controlling of user and computer environments using
gp
67. difference between ou and group?? groups are manage user access to shared resources. ou used to delegate
administrative control over the objects by assigning specific permissions to users and groups and controlling
of user and computer environments using gp
68. what are ntds database partitions?? 1. schema partition:- is stored on all of the dcs of a forest. 2.
configuration partition:- is replicated to all domain controllers in a forest. 3. domain partition:- is replicated
to all dcs with in its domain
69. define function of global catalog?? the global catalog enables users to uses universal group membership
information to log on to the network
70. link between infrastructure and global catalog?? the infrastructure operations master should not be the
same domain controller that hosts the global catalog. if the infrastructure master and the global catalog are
the same computer, the infrastructure master will not function because it does not contain any references to
objects that it does not hold. in this case, the domain replaces data and the global catalog server data cannot
exist on the same domain controller.
71. what is authorities restore and non authoritive restore? an authoritative restore allows you to mark
specific information in the database. authoritative restore occurs after non authoritative restore has been
performed.
72. what is multi master replication?? multi master replication provides tow advantages for ad. 1. with few
exceptions, there is no single domain controller that if unavailable, must be replaced before updates to active
directory can resume. 2. domain controllers can be distributed across the network and located in multiple
physical sites. locating domain controllers at multiple physical sites enables fault tolerance.
73. what is site links?? site link is an object userd to manage replication between sites , site link bridge consists
of two or more site links.
74. define trust relation ship and transitive?? the security principals of one domain are trusted by the security
services of another domain according to the trust relationship between the two domains. 1. transitive trust – a
trust extended to one domain is automatically extended to an other domains that trust that domain. 2. two-
way trust – there are tow trust path given in opposite direction between two domains.
75. how many types of backups? define them , difference between incremental and differential backup.
what is archive. any third party tools are used for backup?? archived backup, copy backup, daily backup,
normal backup, incremental backup, differential backup.  a backup of all files that have changed since
the last full or incremental backup, differential backup works exactly as the incremental, except that it does
not do any thing to the archive bit.  archived backup that documents the state of the archive bit at the time
of copy.

76. define ras, ca, dfs??ras remote access server allocates ipx network numbers and node numbers to
connecting clients. ca certificate authority, win2000 server running certificate services on your network
from which to obtain the certificate this certificate server is called a certificate authority. distributed file
system—enables you to simplify a user’s view of the lan and its resources.

77. define file server, dfs replication, frs, maximum. how many roots can be created?? file server is
configured for advanced file services and storage. this server is usually configured for raid-0 , or raid-5
arrays, fail-over and cluster arrangements, to provide high availability of the services to all users.
dfs – replication  distributed file system—enables you to simplify a user’s view of the lan and its
resources. dfs does this through replication which copies the root or link to one or more other server. frs 
file replication server.- set ntfs permissions on the main share folder to grant users read-only access but sill
allow frs the control necessary to write changes to the share’s child folders. --- a server can host only one dfs
root, so you must delete any existing root prior to creating a new one
78. which protocol the ping command works? how it works?? tcp/ip, ping—packet internet groper, it works,
it bounces a packet off a remote host and listens for the return packet. if the packet comes back, you have
basic tcp/ip connectivity between the two hosts.
79. netstat, tracert, arp, route, nbtstat commands?? netstatprovides three primary functions 1).
monitoring connections to remote hosts, 2). viewing protocol statistics for a connection, and 3).extracting the
ip address of a host to which you hav connected using domain names
>netstat –a --show all connections, including server connections.tracertuse tracert to trace the route
used to connect to another host and determine where, if at all, a connection is failing.
art address resolution protocol, lets you view the arp table on your local computer, which associates
physical mac addresses of other computers on the local network with their ip addresses.
route view or modify entries in the local computer’s static routing table.nbtstat  to display statistics for
netbios over tcp/ip connections.
80. difference between pinging ip address and system name?? ip address contains two separate pieces of
information. each host must have a unique ip address that identifies the host on the network. systems name :-
identification of user or client or server,
81. system state, automatic disaster recovery, recovery console mode repair?? system recoveryconsole is
also a new feature that allows you to boot to an ntfs-supported command line that will allow you to access
ntfs volume. win 2000 also boots to a menu of “safe mode” choices in the event of serious system instability.
disaster recovery is managed by using win2000 remote and removable storage services to maintain reliable
backup sets.

82. nat and pap servers?? network address translation can inspect inbound packets to host names and
query the internal ip address of the host from an internal dns. password authentication protocol only use
pap to support clients that do not support any of the other authentication methods, or in situations where
security is not an issue. enable pap for the rras server through the authentication methods dialog box in the
rras server’s properties.
83. ftp configuration , website configuration , disk quotas , disk management , defragmentation
,compression , encryption , firewall , network load balancing??
ftpopen the iis console, right-click the server in the tree, and choose new- ftp site, to start the ftp site
creation wizard. -> ip address, tcp port, path, read/write.website open the iis console, right-click the server
where you want to asdd the site and choose new- website, to start the website creation wizard. -> ip address,
tcp port, host header,ssl port, path, allow anonymous access , access permissions. disk quotasis
controlling and enforcing a user’s ability to save data to a volume. the quota service ignores compression and
applies the original size of a compressed file to the account.
disk management: - you need the appropriate permissions to work with any disk on any computer that can
be loaded into the snap-in viewer. disk defragmentation rearranges how the data is stored in the ad
database, defragmentation can occur online of offline. compression the quota service ignores
compression and applies the original size of a compressed file to the account
encryption file system it encrypts the folder but not any of its contents, including subfolders or files. any
new objects that you create in the folder, however, will be encrypted. if instead you choose apply changes to
this folder, subfolders, and files, efs encrypts not only the folder, but also all of its child objects.
84. how to configure ip address command mode. stop & start service command mode?? ip config, ip config
/release, ipconfig / renew.
85. what is ras and purpose of it?? remote access server allocates ipx network numbers and node numbers to
connecting clients.
86. terminal services and purpose?? allows a user to establish a session on the server from a dumb terminal or
with terminal emulation software running on just about any device that can connect to the network. if needed
remote access to the server, you would usually have had to use pe anywhere or carbon copy.

87. rpc and arp?? rpcremote procedure call which manages communications between clients and servers on
separate machines. ad replication uses rpc over ip for replication within a site.arp address resolution
protocol -- lets you view the arp table on your local computer, which associates physical mac addresses of
other computers on the local network with their ip addresses.
88. outlook express files extension & microsoft outlook files extension?? .pst, .mst

89. clustering, sms, iis, mom?? clustering is a form of fault tolerance that allows users connected to one
server to be automatically connected to another server when the former server fails.
iis internet information server—provides both web and ftp services to the intranet and is an extremely
powerful internet server. mom microsoft operations management—its
sends alert messaging server.
90. raid levels? define the first 5 of them?? redundant array of independent disk.
raid-o – [striped] –part of each byte of data is written to each drive in array. raid o is not redundant, but it
provides the highest performance, because each byte of data is written in parallel.
raid-1 (mirroring) all data on a drive is mirrored to a second drive. this provides the highest reliability.
write performance is fairly slow, because data must be written to both drives.
raid 0+1 as with raid 0, data is striped across each drive in the array however the array is mirrored to one
or more parallel arrays. this provides the highest reliability and performance, but has the same high dist
storage requirements as raid1 raid 5 part of each bute of data is striped to each in the array. however
writes include parity information that allows any data to be recovered from the remaining drives if a drive
fails.

91. basic disks and dynamic disks?? basic disks disks that are set up for basic storage are known as basic
disks. basic disks canconsist of primary partitions, extended partitions, and logical drives. dynamic disk
in which a single disk is configured as a single active partition. this configuration is known as a dynamic
disk. its support volumes, which are storage objects that can consist of portions of a single dynamic disk or
several dynamic disks.

92. boot files? boot sequence? boot files (boot.ini)the file loads a menu on to the screen at startup and allows
you to select pre-boot options.
93. login procedure, back ground process??

94. authentication ticket issuing. how many tickets description?? 1. bi-factorial  network login is a bi-
factorial exercise, meaning that it requires the user or device to present tow factors to the authentication
mechanisms of the network.—userid, password. 2.mono-factorial identification is a far more sucure and
convenient form of authentication for two reasons – it is more secure, there can be only one—its more
convenient, both for the user and the authenticator.

95. how to take backup of ntds and restore?? ntds.dit this single file is the ad database and stores all of the
ad objects on the domain contrloller. .dit—directory information tree. the default location is the –system
root\ntds folder.

96. site replication? inter site , replication max time , bhs , band width ?? site replications a) replication
within sites—occurs between domain controllers in the same site. assumes fast and highly reliable network
links. does not compress replication traffic. uses a change notification mechanism. b) replication between
sites—occurs on manually defined schedule. is designed to optimize bandwidth. one or more replicas in each
site act as bridgeheads. inter site topology generator (istg)  in each site to perform replication between
sites.
97. how can we install a dc ? steps ?? click the start button, click run, type dcpromo, and then
click ok the active directory installation wizard appears domain controller type
selection wizard network credentials wizard---provide the credentials with
permissions to add new domain controllers (domain administrator). you require to
provide “user name”, “password”, and “domain” in the corresponding fields and click
next to continue type password for restore mode password and confirm password
provide the path to store the ad database and path to store log folders enter the
folder path to store the sysvol folder directory services restore mode administrator
password wizard appearsnext then it ll start to install
98. why dns is required for ad? fqdn??ad use an identical hierarchical naming structure so that domains and
computers are represented both as ad object and as dns domains and resources records. dns provides the
primary function in as ad 1. name resolution. 2. naming convention for windows 2000 domains. 3. locating
the physical component of ad. fqdn fully qualified domain names.

99. what is group policy ?? gp enables you to set centralized and decentralized policies.  ensure users have
the required environments. lower total cost of ownership by controlling user and computers environments.
 enforce corporate polices.
100. what are the required components of windows server 2003 for installing exchange 2003? -
asp.net, smtp, nntp, w3svc
101. what must be done to an ad forest before exchange can be deployed? - setup /forestprep
102. what exchange process is responsible for communication with ad? - dsaccess
103. what 3 types of domain controller does exchange access? - normal domain controller, global
catalog, configuration domain controller
104. what connector type would you use to connect to the internet, and what are the two methods of
sending mail over that connector? - smtp connector: forward to smart host or use dns to route to each
address
105. how would you optimize exchange 2003 memory usage on a windows server 2003 server with
more than 1gb of memory? - add /3gb switch to boot.ini
106. what would a rise in remote queue length generally indicate? - this means mail is not being sent to
other servers. this can be explained by outages or performance issues with the network or remote servers.
107. what would a rise in the local delivery queue generally mean? - this indicates a performance issue
or outage on the local server. reasons could be slowness in consulting ad, slowness in handing messages off
to local delivery or smtp delivery. it could also be databases being dismounted or a lack of disk space.
108. what are the standard port numbers for smtp, pop3, imap4, rpc, http, https ldap and global
catalog? - smtp – 25, pop3 – 110, imap4 – 143, rpc – 135, http- 80, https- 443, ldap – 389, global catalog -
3268
109. name the process names for the following: system attendant? – mad.exe, information store –
store.exe, smtp/pop/imap/owa – inetinfo.exe
110. what is the maximum amount of databases that can be hosted on exchange 2003 enterprise? -
20 databases. 4 sgs x 5 dbs.
111. what are the disadvantages of circular logging? - in the event of a corrupt database, data can only
be restored to the last backup.
112. how to send messages or get control of other system connected in lan with the client os is 2000 pro
and server is nt workstation- net send “computer name or user” message
113. how windows server will configure? its depends on the role of the server. if you installing active
directory, you have to run dcpromo on command prompt, and followed instructions.
over all it depends on the role. simply you can say– there is an option in windows “manage server” once you
follow the instructions it will guide you to configure your server
114. how many types of server? if they are concern with hardware server, tell them the hardware
configuration and vendor of the server. if they are asking about the types of windows server, tell them
standard, enterprise, or small business server etc.
115. what is the server environment?. servers have tow type of structures in ad1.logical structure –
domains, organizational units, trees and forest, and global catalog.2.physical structure-- domain controllers
and sites.
116. how many servers u have how u will configure. we have 400 system, one mail server.------tell
them that you have 400 pc based network, and you configure a active directory domain on windows servers
to centralize administration tasks.
117. what must be done to an ad forest before exchange can be deployed? - setup /forestprep -question
is incorrect, in order for ms exchange 2k or 2003 to be successfully “deployed” both forestprep and domain
prep must successfully complete first, before the setup.exe of the actual exchange install, or the install and
will error out if attempted.
118. what steps are required to perform a bare-metal recovery? a: reinstall the os.
start -> run -> type “ntbackup” -> ok -> next -> select restore -> next -> select backup files -> next -> finish
119. name key files or directories on a unix system that should always be backed up. a: : /etc, /boot,
/home
120. what is raid 0? : level 0 backup is normal or full backup. a normal backup disregards the archive bit in all
files and backs up all files and folders selected, regardless of when they were modified. a normal backup is
the most complete type of backup, and the only type of backup that can be used to back up the registry and
other critical system files. a normal backup takes the longest amount of time to back up and recover. a normal
backup clears the archive bit on all files after backing up.
121. what is raid 0+1? why is it better than 0? raid 1: its a mirroring process so that raid 1 s better than raid
0-- raid 0+1:striping + mirroring: data is striped across 2 or more disks, then duplicated to identical disk
setups. this provides speed, as well as redundancy
122. what is raid-5? raid5:this s also striping and parity process in this raid 5 used 4 partations.4 th one s spare
in case 2 nd paratation s failed spare (i mean 4 th ) s activate to 2 nd partation--- raid 5: raid with parity. data
is striped across multiple disks. a disk or disks in a raid-5 set is reserved for parity information. this way data
can be reconstructed using the pairity information.
123. why would you not want to encapsulate a root directory with veritas? this is not nessacarily the case
anymore with versions of vxfs greater than 4.5. root disk encapsulation requires kernel-level drivers in most
cases. because of this, encapsulating the root partition can make it unreadable in a bare-metal recovery
situation.
124. what is concatenation? concatenation is a process whereby multiple disk drives are combined into a larger
volume. e.g. 2 drives, 1 30 gb drive, and a 10 gb drive are combined to present a 40gb drive to the os.
125. what is striping? a technique for spreading data over multiple disk drives. disk striping can speed up
operations that retrieve data from disk storage. the computer system breaks a body of data into units and
spreads these units across the available disks. systems that implement disk striping generally allow the user
to select the data unit size or stripe width.
disk striping is available in two types. single user striping uses relatively large data units, and improves
performance on a single-user workstation by allowing parallel transfers from different disks. multi-user
striping uses smaller data units and improves performance in a multi-user environment by allowing
simultaneous (or overlapping) read operations on multiple disk drives.
126. why would you not want to do root-disk encapsulation with veritas?
this is not nessacarily the case anymore with versions of vxfs greater than 4.5. root disk encapsulation
requires kernel-level drivers in most cases. because of this, encapsulating the root partition can make it
unreadable in a bare-metal recovery situation.
127. what is concatenation? concatination is a process whereby multple disk drives are combined into a larger
volume. e.g. 2 drives, 1 30 gb drive, and a 10 gb drive are combined to present a 40gb drive to the os.
128. what is striping? striping is a process whereby data is split across multiple disks. this is typically done
with identical drives. data being written is split into small blocks (8-32k typically) and written across as
many drives that are in the striped volume. the block-size is typically called an ‘interlace’ or ‘interleave’
factor. this makes writing and reading data much faster than writing to a single disk.
129. what is a spindle? spindles are the center-points of disk drives.. the rotating shaft. the reason this question
could be relevant is that when discussing raid, it’s not uncommon to hear terms like “spliting data across as
many spindles as possible to achieve performance”… i think this term has started to fall out of use however.
130. what is an incremental backup? an incremental backup is copying data that has only changed since the
last full backup.
131. what steps are required to perform a bare-metal recovery? most bare-metal recovery solutions require
that a minimal os be installed back onto the system. there is software out there that can assist with this.
however it’s usually easier to just boot a box from a cd or network server, install a base os, and recover from
the last known good backup.
132. name key files or directories on a unix system that should always be backed up.
solaris systems: /etc - system configuration information. /var/adm - additional log directory for solaris.
/var/log - preserve log data for forensics if needed. linux systems:
/etc-system configuration information. /boot - linux kernel information
/var/log - log data for forensics if needed.
133. what is a level 0 backup? level 0 backup is normal or full backup. a normal backup disregards the archive
bit in all files and backs up all files and folders selected, regardless of when they were modified. a normal
backup is the most complete type of backup, and the only type of backup that can be used to back up the
registry and other critical system files. a normal backup takes the longest amount of time to back up and
recover. a normal backup clears the archive bit on all files after backing up.
134. what is an incremental backup? an incremental backup is the quickest method for performing backups
of data. an incremental backup only backs up files that have been created or modified (their archive bit is set
to 1) since the last normal or incremental backup. an incremental backup also clears the archive bit (sets the
archive bit back to 0) of all files that it backs up.
135. what steps are required to perform a bare-metal recovery? reinstall the os.
start -> run -> type “ntbackup” -> ok -> next -> select restore -> next -> select backup files -> next -> finish
136. what is raid 0+1? why is it better than 0?
·raid 0: striping. data is spread across multiple disks. no redundancy.
·raid 1: mirroring. data written to a mirror is duplicated to a second disk or volume.
·raid 0+1: striping + mirroring: data is striped across 2 or more disks, and then duplicated to identical disk
setups. this provides speed, as well as redundancy.
·raid 1+0: mirroring + striping: _mirrors_ are striped across multiple disks. faster than 0+1, but not as
redundant.
·raid 5: raid with parity. data is striped across multiple disks. a disk or disks in a raid-5 set is reserved for
parity information. this way data can be reconstructed using the parity information.
137. why would you not want to encapsulate a root directory with veritas? encapsulating the root partition
can make it unreadable in a bare-metal recovery situation.
138. what is concatenation? concatenation is the operation of joining two character strings end to end.
139. what is striping? a technique for spreading data over multiple disk drives. disk striping can speed up
operations that retrieve data from disk storage. the computer system breaks a body of data into units and
spreads these units across the available disks. systems that implement disk striping generally allow the user
to select the data unit size or stripe width. disk striping is available in two types. single user striping uses
relatively large data units, and improves performance on a single-user workstation by allowing parallel
transfers from different disks. multi-user striping uses smaller data units and improves performance in a
multi-user environment by allowing simultaneous (or overlapping) read operations on multiple disk drives.
140. what is a spindle? spindles are the center-points of disk drives.. the rotating shaft. the reason this question
could be relevant is that when discussing raid, it’s not uncommon to hear terms like “splitting data across as
many spindles as possible to achieve performance”
141. what is raid? redundant array of independent disks.
raid 0-each file has a backup.
142. i can put 30 hdd in a dell server(configuration of raid 5)in between two hdd was get problem. on that
time wat we have to do?? i have out 2 new hdd ….
if i put 2 new hdd wat about the configuration of raid 5??or we have configure raid 5.how??
143. explain hidden shares. hidden or administrative shares are share names with a dollar sign ($) appended to
their names. administrative shares are usually created automatically for the root of each drive letter. they do
not display in the network browse list.
144. how do the permissions work in windows 2000? what permissions does folder inherit from the
parent? when you combine ntfs permissions based on users and their group memberships, the least
restrictive permissions take precedence. however, explicit deny entries always override allow entries.
145. why can’t i encrypt a compressed file on windows 2000? you can either compress it or encrypt it, but not
both.
146. if i rename an account, what must i do to make sure the renamed account has the same permissions
as the original one? nothing, it’s all maintained automatically.
147. what’s the most powerful group on a windows system? administrators.
148. what are the accessibility features in windows 2000? stickykeys, filterkeys narrator, magnifier, and on-
screen keyboard.
149. why can’t i get to the fax service management console? you can only see it if a fax had been installed.
150. what do i need to ensure before deploying an application via a group policy? make sure it’s either an
msi file, or contains a zap file for group policy.
151. how do you configure mandatory profiles? rename ntuser.dat to ntuser.man
152. i can’t get multiple displays to work in windows 2000. multiple displays have to use peripheral
connection interface (pci) or accelerated graphics port (agp) port devices to work properly with windows
2000.
153. what’s a maximum number of processors win2k supports? 2
154. i had some ntfs volumes under my windows nt installation. what happened to ntfs after win 2k
installation? it got upgraded to ntfs 5.
155. how do you convert a drive from fat/fat32 to ntfs from the command line? convert c: /fs:ntfs
156. explain apipa. auto private ip addressing (apipa) takes effect on windows 2000 professional computers if
no dhcp server can be contacted. apipa assigns the computer an ip address within the range of 169.254.0.0
through 169.254.255.254 with a subnet mask of 255.255.0.0.
157. how does internet connection sharing work on windows 2000? internet connection sharing (ics) uses the
dhcp allocator service to assign dynamic ip addresses to clients on the lan within the range of 192.168.0.2
through 192.168.0.254. in addition, the dns proxy service becomes enabled when you implement ics.
158. describe how the dhcp lease is obtained. it’s a four-step process consisting of (a) ip request, (b) ip offer,
© ip selection and (d) acknowledgement.
159. i can’t seem to access the internet, don’t have any access to the corporate network and on ipconfig
my address is 169.254.*.*. what happened? the 169.254.*.* netmask is assigned to windows machines
running 98/2000/xp if the dhcp server is not available. the name for the technology is apipa (automatic
private internet protocol addressing).
160. we’ve installed a new windows-based dhcp server, however, the users do not seem to be getting dhcp
leases off of it. the server must be authorized first with the active directory.
161. how can you force the client to give up the dhcp lease if you have access to the client pc? ipconfig
/release
162. what authentication options do windows 2000 servers have for remote clients? pap, spap, chap, ms-
chap and eap.
163. what are the networking protocol options for the windows clients if for some reason you do not want
to use tcp/ip? nwlink (novell), netbeui, appletalk (apple).
164. what is data link layer in the osi reference model responsible for? data link layer is located above the
physical layer, but below the network layer. taking raw data bits and packaging them into frames. the
network layer will be responsible for addressing the frames, while the physical layer is reponsible for
retrieving and sending raw data bits.
165. what is binding order? the order by which the network protocols are used for client-server
communications. the most frequently used protocols should be at the top.
166. how do cryptography-based keys ensure the validity of data transferred across the network? each ip
packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the
data was modified or corrupted.
167. should we deploy ipsec-based security or certificate-based security? they are really two different
technologies. ipsec secures the tcp/ip communication and protects the integrity of the packets. certificate-
based security ensures the validity of authenticated clients and servers.
168. what is lmhosts file? it’s a file stored on a host machine that is used to resolve netbios to specific ip
addresses.
169. what’s the difference between forward lookup and reverse lookup in dns? forward lookup is name-to-
address, the reverse lookup is address-to-name.
170. how can you recover a file encrypted using efs? use the domain recovery agent.
171. what is a default gateway? - the exit-point from one network and entry-way into another network, often
the router of the network.
172. how do you set a default route on an ios cisco router? - ip route 0.0.0.0 0.0.0.0 x.x.x.x [where x.x.x.x
represents the destination address]
173. what is the difference between a domain local group and a global group? - domain local groups grant
permissions to objects within the domain in which the reside. global groups contain grant permissions tree or
forest wide for any objects within the active directory.
174. what is ldap used for? - ldap is a set of protocol used for providing access to information directories.
175. what tool have you used to create and analyze packet captures? - network monitor in win2k / win2k3,
ethereal in linux, optiview series ii (by fluke networks).
176. how does hsrp work?
177. what is the significance of the ip address 255.255.255.255? - the limited broadcast address is utilized
when an ip node must perform a one-to-everyone delivery on the local network but the network id is
unknown.
178. what is active directory schema? schema is definitions of all objects , attributes. there is only one schema
for an entire forest so that all objects created in ad conform the same rule. schema is 1. dynamically
available, 2.dynamically updatable, 3. protected by dacls (discretionary access control lists)
179. what are the domain functional levels in windows server 2003? if there are many organisational
units and to implement policy on all ouś we use domain level policy.

180. what are the forest functional levels in windows server 2003?
181. what is global catalog server? global catalog server maintains full information about its own domain and
partial information about other domains. it is a forest wide role.
182. how we can raise domain functional & forest functional level in windows server 2003?
183. which is the default protocol used in directory services?
184. what is ipv6? internet protocol version 6 (ipv6) is a network layer ip standard used by electronic devices to
exchange data across a packet-switched internetwork. it follows ipv4 as the second version of the internet
protocol to be formally adopted for general use.
185. what is multimaster replication? multi-master replication is a method of replication employed by
databases to transfer data or changes to data across multiple computers within a group. multi-master
replication can be contrasted with a master-slave method (also known as single-master replication
186. what is a site? site maps a physical structure of networks. one or more well-connected highly reliable and
fast tcp/ip subnets. a site allows administrator to configure active directory access and replication topology to
take advantage of the physical network
187. which is the command used to remove active directory from a domain controler? dcpromo to
add/remove active directory but first adc should be removed before dc if we want to remove dc first then
check this server is last domain controller in domain
00326504521963
188. what is the file that’s responsible for keep all active directory database? .ntds.dit
FORID:1

189. in which domain functional level, we can rename domain name? all domain controllers must be running
windows server 2003, and the active directory functional level must be at the windows server 2003.yes u can
rename the domain in windows server 2003
190. what is rsop ?resultant set of policy is provid to make policy modification and trouble shooting
easier. rsop is the query object it has two mode 1.logging mode: polls existing policies and the reports the
result of the query. 2.planning mode: the questins ask about the planned policy and the report the result of the
quer.
191. expain the vpn?? vpn.. using the virtual private network this is technology which is use to make virtual
network between any remote location. vpn make a tunnel type connection for fast & secure communication.
using third party software we have many type of vpn softwares.
192. how isa server works ? ans..isa is software firewal & internet soloution for small & large network. isa
server blocks inboud traffic as well as outbound traffic. it is a multitasking firewall server it provides nat
(natwork address translation)& web proxy etc.. isa server provides secure vpn for connect remote clients or
remote location…
193. what is the concept for authoritative and nonauthoritative restoration?
1. non-authoriative restore: which accept the entries from other domain controller after the restoed data.
2.authoritative: not accept the entries from other domain controller.
194. what is the ntds.dit file default size? 40 mb
195. your computer gives you “non-disk error” before you log on what would you do to make your
computer work? describe how the dhcp lease is obtained. it’s a four-step process consisting of (a) ip
request, (b) ip offer, © ip selection and (d) acknowledgement.
196. i can’t seem to access the internet, don’t have any access to the corporate network and on ipconfig
my address is 169.254.*.*. what happened? the 169.254.*.* netmask is assigned to windows machines
running 98/2000/xp if the dhcp server is not available. the name for the technology is apipa (automatic
private internet protocol addressing).
197. we’ve installed a new windows-based dhcp server, however, the users do not seem to be getting dhcp
leases off of it. the server must be authorized first with the active directory.
198. how can you force the client to give up the dhcp lease if you have access to the client pc? ipconfig
/release
199. what authentication options do windows 2000 servers have for remote clients? pap, spap, chap, ms-
chap and eap.
200. what are the networking protocol options for the windows clients if for some reason you do not want
to use tcp/ip? nwlink (novell), netbeui, appletalk (apple).
201. what is data link layer in the osi reference model responsible for? data link layer is located above the
physical layer, but below the network layer. taking raw data bits and packaging them into frames. the
network layer will be responsible for addressing the frames, while the physical layer is reponsible for
retrieving and sending raw data bits.
202. what is binding order? the order by which the network protocols are used for client-server
communications. the most frequently used protocols should be at the top.
203. how do cryptography-based keys ensure the validity of data transferred across the network? each ip
packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the
data was modified or corrupted.
204. should we deploy ipsec-based security or certificate-based security? they are really two different
technologies. ipsec secures the tcp/ip communication and protects the integrity of the packets. certificate-
based security ensures the validity of authenticated clients and servers.
205. what is lmhosts file? it’s a file stored on a host machine that is used to resolve netbios to specific ip
addresses.
206. what’s the difference between forward lookup and reverse lookup in dns? forward lookup is name-to-
address; the reverse lookup is address-to-name.
207. how can you recover a file encrypted using efs? use the domain recovery agent.
208. what are the required components of windows server 2003 for installing exchange 2003? - asp.net,
smtp, nntp, w3svc
209. what must be done to an ad forest before exchange can be deployed? - setup /forestprep
210. what exchange process is responsible for communication with ad? – dsaccess
211. what 3 types of domain controller does exchange access? - normal domain controller, global catalog,
configuration domain controller
212. what connector type would you use to connect to the internet, and what are the two methods of
sending mail over that connector? - smtp connector: forward to smart host or use dns to route to each
address
213. how would you optimise exchange 2003 memory usage on a windows server 2003 server with more
than 1 gb of memory? - add /3 gb switch to boot.ini
214. what would a rise in remote queue length generally indicate? - this means mail is not being sent to other
servers. this can be explained by outages or performance issues with the network or remote servers.
215. what would a rise in the local delivery queue generally mean? - this indicates a performance issue or
outage on the local server. reasons could be slowness in consulting ad, slowness in handing messages off to
local delivery or smtp delivery. it could also be databases being dismounted or a lack of disk space.
216. what are the standard port numbers for smtp, pop3, imap4, rpc, ldap, ftp, udp, http, https and global
catalog? - smtp – 25, pop3 – 110, imap4 – 143, rpc – 135, ldap – 389, global catalog – 3268 ftp—20,21,
udp -137, http –80, https – 443.
217. name the process names for the following: system attendant? – mad.exe, information store – store.exe,
smtp/pop/imap/owa – inetinfo.exe
218. what is the maximum amount of databases that can be hosted on exchange 2003 enterprise? - 20
databases. 4 sgs x 5 dbs.
219. what are the disadvantages of circular logging? - in the event of a corrupt database, data can only be
restored to the last backup.
220. what is a class d ip address? ip address ranges:
class a: 0-126. 127 is a broadcast
class b: 128-191
class c: 192-223
class d: 224-239
class e: 240-255. ip address ranges:
class a: 0-126. : for about >256 subnets and >16777214 hosts per subnet
127.0.0.1: for proper configurations of tcp/ip.
class b: 128-191: for about >65536 subnets and >65534 hosts per subnet
class c: 192-223: for about >16777214 networks and 254 hosts per subnet
class d: 224-239 : these addressess are for scientific researches ..
class e: 240-255. : these are kept for future use
221. what is firewall? firewalls are of two types:
-hardware firewall
-software firewall.
firewall in simple manner is bascially the utility to provide the security over the network. these are the
security measures that prevents the network’s in and out traffic to pass through the specific security filters so
that the unwanted and unsecure data can be stopped from entering into the network. further… as a security
measure it also depends on the network designer and implementer that how to use a firewall mean to say the
security measures like how to present the content filtering and url filtering which type of firewall should be
used and where to put it.
222. how isa server works ? ans..isa is software firewal & internet soloution for small & large network. isa
server blocks inboud traffic as well as outbound traffic. it is a multitasking firewall server it provides nat
(natwork address translation)& web proxy etc.. isa server provides secure vpn for connect remote clients or
remote location…
223. what are fmso roles? list them.?? ans:fsmo roles are server roles in a forest
there are five types of fsmo roles
1-scheema master
2-domain naming master
3-rid master
4-pdc emullator
5-infrastructure master
224. how can i deploy the latest patched in pc through g.p. without having the admin right in pc.?? create
a batch file and place all the patches in the netlogon, and deploy the batch file through gp to all the pcs so the
same should take affect after restarting the pc
225. how to remove the $sharing through g.p. in 1000 pcs.
226. in raid 5,suppose i have 5 hdd of 10-10 gb, after configuring the raid how much space do i have for
utilise.-- 40 gb
227. can i changed password if my machince’s connectivity to dc who holds pdc emulator role has been
fails? a) no you can’t the password.
228. i have been asked if there is set of 30 hard disk configured for raid 5 if two harddisk failed what
about data a) it depends how u had configured ur raid its only raid5 or with with spare if its only raid 5 then
in raid5 if ur 2 nos of hdd goes then ur raid is gone.
229. in raid 5,suppose i have 5 hdd of 10-10 gb, after configuring the raid how much space do i have for
utilise.?? a) -1 out of the total (eg- if u r using 5 u will get only 4 because 1 goes for parity).
230. how can i resolve the svr name through nslookup a) what exactly u want to do, nslookup command
will let u know through which server u r getting routed, (eg- c:\nslookup then u will get ur domain name to
which u r getting routed. and if u want to get the name of the pc/server with the ip address then u have to give
the command c:\nbtstat -a ip xx-xx-xx-xx)
231. how can i deploy the latest patched in pc through g.p. wihtout having the admin right in pc.
a) create a batch file and place all the patches in the netlogon, and deploy the batch file through gp to all the
pcs so the same should take affect after restarting the pc.(the answer to the above question is incorrect.you
cannot deploy a batch file using group policy.you can only publish or assign msi packages or zap files. they
are the only two valid file formats allowable when using “intellimirror”. in active directory. )
232. what is kerberos? which version is currently used by windows? how does kerberos work?
233. what is a firewall? a firewall is simply a program or hardware device that filters the information coming
through the internet connection into your private network or computer system. if an incoming packet of
information is flagged by the filters, it is not allowed through. firewalls use one or more of three methods to
control traffic flowing in and out of the network: \*
packet filtering - packets (small chunks of data) are analyzed against a set of filters. packets that make it
through the filters are sent to the requesting system and all others are discarded.
* proxy service - information from the internet is retrieved by the firewall and then sent to the requesting
system and vice versa.
* stateful inspection - a newer method that doesn’t examine the contents of each packet but instead compares
certain key parts of the packet to a database of trusted information. information traveling from inside the
firewall to the outside is monitored for specific defining characteristics, then incoming information is
compared to these characteristics. if the comparison yields a reasonable match, the information is allowed
through. otherwise it is discarded
234. what is active directory schema? schema master is a set of rules which is used to define the struture
of active directory. it contains definitions of all the objects which are stored in ad. it maintains
information and detail information of objects.
235. what are the domain functional levels in windows server 2003? if there are many organisational
units and to implement policy on all ouś we use domain level policy

236. what are the forest functional levels in windows server 2003?
237. what is global catalog server? global catalog server maintains full information about its own domain and
partial information about other domains. it is a forest wide role
238. what is ipv6? internet protocol version 6 (ipv6) is a network layer ip standard used by electronic devices to
exchange data across a packet-switched internetwork. it follows ipv4 as the second version of the internet
protocol to be formally adopted for general use
239. in which domain functional level, we can rename domain name? all domain controllers must be running
windows server 2003, and the active directory functional level must be at the windows server 2003.
yes u can rename the domain in windows server 2003
240. what is a site? sites: one or more well-connected highly reliable and fast tcp/ip subnets. a site allows
administrator to configure active directory access and replication topology to take advantage of the physical
network
241. which is the command used to remove active directory from a domain controller? dcpromo to
add/remove active directory but first adc should be removed before dc if we want to remove dc first then
check this server is last domain controller in domain.
242. how we can create console, which contain schema? . we have to open the register to see the schema
master fsmo role--regser 32 schmamgmt
243. what is trust? to allow users in one domain to access resources in another, ad uses trust. trust is
automatically produced when domains are created. the forest sets the default boundaries of trust, not the
domain, and implicit trust is automatic. as well as two-way transitive trust, ad trusts can be shortcut (joins
two domains in different trees, transitive, one- or two-way), forest (transitive, one- or two-way), realm
(transitive or nontransitive, one- or two-way), or external (nontransitive, one- or two-way) in order to
connect to other forests or non-ad domains. ad uses the kerberos v5 protocol, although ntlm is also supported
and web clients use ssl/tls.
00326504521963
244. what is the file that’s responsible for keep all active directory database? ntds.dit
FORID:1

245. what is rsop ?resultant set of policy is provid to make policy modification and trouble shooting easier. rsop
is the query object it has two mode 1.logging mode: polls existing policies and the reports the result of the
query. 2.planning mode: the questins ask about the planned policy and the report the result of the quer.
246. what is the concept for authoritative and nonauthoritative restoration? 1. non-authoriative restore:
which accept the entries from other domain controller after the restoed data. 2.authoritative: not accept the
entries from other domain controller.
247. what is the ntds.tit file default size? 40 mb
248. which is the command used to remove active directory from a domain controler? think ” dcpromo ”
in command prompt .
249. what is multimaster replication?ans. it is also known as single-master replication. multi-master
replication is a method of replication employed by databases to transfer data or changes to data across
multiple computers within a group. multi-master replication can be contrasted with a master-slave method.
250. what is a denial of service(dos) attack? denial of service attack means server or machine receive so many
packets from the single or multiple network sources or spoofed resources so that its all resources will be used
to in responce of those packets & after that it will hang or not responding. then it will start to denial to its
services
251. can i changed password if my machine’s connectivity to dc who holds pdc emulator role has been
fails?
a) no you can’t change the password.
252. i have been asked if there is set of 30 hard disk configured for raid 5 if two hard disk failed what
about data
a) it depends how u had configured ur raid its only raid5 or with spare if its only raid 5 then in raid5 if ur 2
nos of hdd goes then ur raid is gone.
253. q) how can i deploy the latest patched in pc through g.p. wihtout having the admin right in pc.
a) create a batch file and place all the patches in the netlogon, and deploy the batch file through gp to all the
pcs so the same should take affect after restarting the pc.{{ you cannot deploy a batch file using group
policy.you can only publish or assign msi packages or zap files. they are the only two valid file formats
allowable when using “intellimirror”. in active directory}}
254. q) in raid 5,suppose i have 5 hdd of 10-10 gb, after configuring the raid how much space do i have for
utilise.
a) -1 out of the total (eg- if u r using 5 u will get only 4 because 1 goes for parity).
255. q) how can i resolve the svr name through nslookup
a) what exactly u want to do, nslookup command will let u know through which server u r getting routed,
(eg- c:\nslookup then u will get ur domain name to which u r getting routed. and if u want to get the name of
the pc/server with the ip address then u have to give the command c:\nbtstat -a ip xx-xx-xx-xx)
256. how can i deploy the latest patched in pc through g.p. wihtout having the admin right in pc.
a) create a batch file and place all the patches in the netlogon, and deploy the batch file through gp to all the
pcs so the same should take affect after restarting the pc.
257. what are fmso roles? list them
ans:fsmo roles are server roles in a forest
there are five types of fsmo roles
1-scheema master
2-domain naming master
3-rid master
4-pdc emulator
5-infrastructure master
258. what’s the difference between local, global and universal groups? domain local groups assign access
permissions to global domain groups for local domain resources. global groups provide access to resources in
other trusted domains. universal groups grant access to resources in all trusted domains.
259. i am trying to create a new universal user group. why can’t i? universal groups are allowed only in
native-mode windows server 2003 environments. native mode requires that all domain controllers be
promoted to windows server 2003 active directory.
260. what is lsdou? it’s group policy inheritance model, where the policies are applied to local machines, sites,
domains and organizational units.
261. why doesn’t lsdou work under windows nt? if the ntconfig.pol file exists, it has the highest priority
among the numerous policies.
262. where are group policies stored? %systemroot%system32\grouppolicy
263. what are gpt and gpc? group policy template and group policy container.
264. where is gpt stored? %systemroot%\sysvol\sysvol\domainname\policies\guid
265. you change the group policies, and now the computer and user settings are in conflict. which one has
the highest priority? the computer settings take priority.
266. you want to set up remote installation procedure, but do not want the user to gain access over it.
what do you do? gponame–> user configuration–> windows settings–> remote installation services–>
choice options is your friend.
267. what’s contained in administrative template conf.adm? microsoft netmeeting policies
268. how can you restrict running certain applications on a machine? via group policy, security settings for
the group, then software restriction policies.
269. you need to automatically install an app, but msi file is not available. what do you do? a .zap text file
can be used to add applications using the software installer, rather than the windows installer.
270. what’s the difference between software installer and windows installer? the former has fewer privileges
and will probably require user intervention. plus, it uses .zap files.
271. what can be restricted on windows server 2003 that wasn’t there in previous products? group policy
in windows server 2003 determines a users right to modify network and dial-up tcp/ip properties. users may
be selectively restricted from modifying their ip address and other network configuration parameters.
272. how frequently is the client policy refreshed? 90 minutes give or take.
273. where is secedit? it’s now gpupdate.
274. you want to create a new group policy but do not wish to inherit. make sure you check block
inheritance among the options when creating the policy.
275. what is "tattooing" the registry? the user can view and modify user preferences that are not stored in
maintained portions of the registry. if the group policy is removed or changed, the user preference will persist
in the registry.
276. how do you fight tattooing in nt/2000 installations? you can’t.
277. how do you fight tattooing in 2003 installations? user configuration - administrative templates - system -
group policy - enable - enforce show policies only.
278. what does intellimirror do? it helps to reconcile desktop settings, applications, and stored files for users,
particularly those who move between workstations or those who must periodically work offline.
279. what’s the major difference between fat and ntfs on a local machine? fat and fat32 provide no security
over locally logged-on users. only native ntfs provides extensive permission control on both remote and local
files.
280. how do fat and ntfs differ in approach to user shares? they don’t, both have support for sharing.
281. explain the list folder contents permission on the folder in ntfs. same as read & execute, but not
inherited by files within a folder. however, newly created subfolders will inherit this permission.
282. i have a file to which the user has access, but he has no folder permission to read it. can he access it?
it is possible for a user to navigate to a file for which he does not have folder permission. this involves
simply knowing the path of the file object. even if the user can’t drill down the file/folder tree using my
computer, he can still gain access to the file using the universal naming convention (unc). the best way to
start would be to type the full path of a file into run… window.
283. for a user in several groups, are allow permissions restrictive or permissive? permissive, if at least one
group has allow permission for the file/folder, user will have the same permission.
284. for a user in several groups, are deny permissions restrictive or permissive? restrictive, if at least one
group has deny permission for the file/folder, user will be denied access, regardless of other group
permissions.
285. what hidden shares exist on windows server 2003 installation? admin$, drive$, ipc$, netlogon, print$
and sysvol.
286. what’s the difference between standalone and fault-tolerant dfs (distributed file system)
installations? the standalone server stores the dfs directory tree structure or topology locally. thus, if a shared
folder is inaccessible or if the dfs root server is down, users are left with no link to the shared resources. a
fault-tolerant root node stores the dfs topology in the active directory, which is replicated to other domain
controllers. thus, redundant root nodes may include multiple connections to the same data residing in
different shared folders.
287. we’re using the dfs fault-tolerant installation, but cannot access it from a win98 box. use the unc path,
not client, only 2000 and 2003 clients can access server 2003 fault-tolerant shares.
288. where exactly do fault-tolerant dfs shares store information in active directory? in partition knowledge
table, which is then replicated to other domain controllers.
289. can you use start->search with dfs shares? yes.
290. what problems can you have with dfs installed? two users opening the redundant copies of the file at the
same time, with no file-locking involved in dfs, changing the contents and then saving. only one file will be
propagated through dfs.
291. i run microsoft cluster server and cannot install fault-tolerant dfs. yeah, you can’t. install a standalone
one.
292. is kerberos encryption symmetric or asymmetric? symmetric.
293. how does windows 2003 server try to prevent a middle-man attack on encrypted line? time stamp is
attached to the initial client request, encrypted with the shared key.
294. what hashing algorithms are used in windows 2003 server? rsa data security’s message digest 5 (md5),
produces a 128-bit hash, and the secure hash algorithm 1 (sha-1), produces a 160-bit hash.
295. what third-party certificate exchange protocols are used by windows 2003 server? windows server
2003 uses the industry standard pkcs-10 certificate request and pkcs-7 certificate response to exchange ca
certificates with third-party certificate authorities.
296. what’s the number of permitted unsuccessful logons on administrator account? unlimited. remember,
though, that it’s the administrator account, not any account that’s part of the administrators group.
297. if hashing is one-way function and windows server uses hashing for storing passwords, how is it
possible to attack the password lists, specifically the ones using ntlmv1? a cracker would launch a
dictionary attack by hashing every imaginable term used for password and then compare the hashes.
298. what’s the difference between guest accounts in server 2003 and other editions? more restrictive in
windows server 2003.
299. how many passwords by default are remembered when you check "enforce password history
00326504521963
remembered"? user’s last 6 passwords.
300. when i create a user folder in server 2003 and set the share and security permissions it allows the
user read permissions only . they cannot write to the folder no matter what permissions i set.how do i
FORID:1
get around this?
301. “what’s the difference between local, global and universal groups? domain local groups assign access
permissions to global domain groups for local domain resources. global groups provide access to resources in
other trusted domains. universal groups grant access to resources in all trusted domains.”
302. after reading that id probably not trust this site for too much, according to that both universal and
global groups are the same! what about server modes? mixed, native or 2003 mode? universal groups
cant be assigned in mixed or non native / 2003 modes. plus if you need to be reading a site like this to pass
an interview you really dont diserve the job you have wrongly applied for.
303. i am having windows 2003 server ,as well as 40 clients ,
my clients is differnt os i mean redhat or sun or windows ,eventhough i want to apply ip address for all
clients ,how i can assingh the ip address
304. is it possible to create user with administrator access and deny permission to open specific folder.
windows server 2003 web edition (member, not domen).
305. how to give permissions to user could not use control panel,delete folders,files,
306. how to use all installed software on server through client pc.
307. back up and restore commands?/
308. security protocol of nt 4.0 and 2000/2003??
309. what is aglp??
310. ou group filtering??
311. ad users and computers??
312. computer account, machine account, user accounts, container??
313. user configuration and computer configuration??
314. no over ride??
315. block inheritance??
316. which one is high priority??
317. software distribution??
318. msi files and mst files . exe to msi files ? how it will refresh ??
319. group polices . where these can apply ??
320. what are the sequence of applying policies ??
321. where this polices will store ??
322. local security policy , domain controller security policy , domain security policy ??
323. what is the default domain functional level in windows server 2003?
324. what are the physical & logical components of ads
325. in which domain functional level, we can rename domain name?
326. how we can create console, which contain schema?
327. can you explain us briefly archeitecture of windows 2000/2003?
328. what are main differences in windows nt and windows 2000 archeitecture ?
329. user(s) are complaining of delays when using the network. what would you do?
330. what is maen different between hub and switch ?
331. what is meam by brodcast id?
332. what is mean by loop back id?
333. differences between win 2000 server & advanced server?
334. logical diagram of active directory? what is the difference between child domain & additional
domain server?
335. ftp, nntp, smtp, kerberos, dns, dhcp, pop3 port numbers?
336. what is kerberos? which version is currently used by windows? how does kerberos work?
337. workers can not print from the printer, there user log on are correct and are allowed to print from
that printer in active directory. how would you resolve this issue?
338. your hard drive is partitioned as follows: 8 gigs for os drive c, 8 gigs for hot swappable dirve d and
rest is free as dirve e. your drive c crashes, how would you reboot your system without installing a new
operating system?
339. why do i sometimes lose a server’s address when using more than one server?
340. what is bind?
341. name the steps to setup a slave zone in bind
342. name the steps to setup a primary zone in bind
343. what commands would you use under solaris or linux to modify/view an ldap tree?
344. how we can raise domain functional & forest functional level in windows server 2003?
345. which is the deafult protocol used in directory services?
346. what is the default domain functional level in windows server 2003?
347. what are the physical & logical components of ads
348. differences between win 2000 server & advanced server?
349. logical diagram of active directory? what is the difference between child domain & additional
domain server?
350. what is kerberos? which version is currently used by windows? how does kerberos work?
351. distribution list?
352. gal, routing group, stm files, eseutil & ininteg - what are they used for?
353. what is mime & mapi?
354. list the services of exchange server 2000?
00326504521963 FORID:1
355. how would you recover exchange server when the log file is corrupted?
356. “what is the maximum storage capacity for exchange standard version? what would you do if it
reaches maximum capacity?”
357. boot process in windows nt/xp/2000/2003
358. how do you configure memory dump if c:,d:,e: & paging file is configured so and so way?
359. what is active directory compared to sam?
360. can i changed password if my machince’s connectivity to dc who holds pdc emulator role has been
fails?
361. exchange 2000 server standard edition limits the database size to 16 gigabytes.
362. what is the diffence between sd-ram and dd-ram ?
363. can i change my dc ip(dns,pref dns,gateway) while dc is working.
and can i give another ip.
364. (what happend if i give that ip and what happend about the replication of ther dc when i am in
suspend mode) ?
365. how can i deploy the latest patched in pc through g.p. wihtout having the admin right in pc.
366. how to remove the $sharing through g.p. in 1000 pcs.
367. how can i resolve the svr name through nslookup.
368. what is difference between scope and superscope ?
369. how can i make my server a daemon?
370. how should i choose a port number for my server?
371. layers in tcp/ip
372. how can i be sure that a udp message is received?
373. how to get ip header of a udp message
374. writing udp/sock_dgram applications
375. how many bytes in an ipx network address?
376. what is the difference between mutex and semaphore?
377. what is priority inversion?
378. different solutions to dining philosophers problem.
379. what is a message queue?
380. user(s) are complaining of delays when using the network. what would you do?
381. what are some of the problems associated with operating a switched lan?
382. name some of the ways of combining tcp/ip traffic and sna traffic over the same link.
383. what sort of cabling is suitable for fast ethernet protocols?

microsoft exchange server interview questions


1. distribution list?
2. gal, routing group, stm files, eseutil & ininteg - what are they used for?
3. what is mime & mapi?
4. list the services of exchange server 2000?
5. how would you recover exchange server when the log file is corrupted?
6. what is exchange server?? exchange is a client/ server electronic messaging system.
7. exchange server relation with ad?? the exchange routing engine that moves messages between exchange
serversan to external messaging components. the routing engine uses routing information stored in active
directory to figure out where and even when to send messages.
8. how to configure outlook with exchange server??
9. how to take exchange server backup ??
10. mail box stores , stores box ??
11. difference between exchange server 5.5 and 2003 ??
12. exchange 2000 server standard edition limits?? the database size to 16 gigabytes.

networking faqs
1.i have been called up for the tech interview on next week for the post of network engineer. help me out ?
tcp/ip is a connection oriented protocol layer whereas udp is connectionless protocol
2. what is difference between tcp/ip and udp? tcp/ip is a connection oriented protocol layer whereas udp is
connectionless protocol
3. encryption operation performed at what layer1.presentation layer2.physical layer3.transport
layer operation perform in presentation layer is1:data encriptiondecription,2: protocal conversion,3:
character conversion. ans is 1:-presentation layer
4. if you have 3 pc's with static ip's and there is one pc workstation that has ftp going through a router i
am going to make a few assumptions to this vague question. i am assuming that the the ftp workstation is
running ftp server and all ip addresses are publically routable ip addressess. now it is quite easy. from a unix
workstation enter the command ftp xxx ( being the ip address of the server you want to address ). you will
then get a response saying ( connected ). that is if the ftp server is open to guest and anonymous connections,
which is not normally.

you also need to remember that ftp uses tcp ports 20 and 21 for data and control.
5. what are the network monitoring tools? like what tools do you use to monitor network connections?
tools are 1 ipconfig 2 ping 3 tracert 4 pingpath
6. in tcp/ip udp is connection less , why? tcp is reliable but udp is not reliable tcp sent it's packet in it's
arriving order udp has no order
7.how to configure a router? here are two ways to configure router....u can install routher through the router
disk which will require the connetion information like ur user name and password, setup wizard will auto
detect the conntion and will configure the router, second method is mannul, wherein we open router page
ex:speedtouch576 router page ip address is 192.168.1.254, once page is open then go to setup wizard it will
ask for user name and password,if ur conntion is optaion dynamic ip address which is ur network server
address then it will automatically connet, otherwise you have to optain some information from service
provider..like vpi code and vci code,multiplexing method, enscapsulations..etc) put these information
correctly on router page, router will be online
8. what is difference between public ip and private ip? public ip is that ,which provide by isp,and ping by any
user from any where, private ip is ping locally public ip are the ip
that can be accessed by every one,ie very user has the access to this ip's.e.g yahoo.com,google.com etc are
the pubic ip's. private ip's are the ip that can not be
accessed by every one,ie they are execively owned by an organization,only the user of that organisation has
the access to this ip's. range of private ip address are
class a 10.0.0.1 to 10.255.255.254 class b
172.16.0.1 to 172.31.255.254 class
c 192.0.0.1 to 192.255.255.254 excluding ips are
public ip's.
9. what is the difference between bri and pri port? both bri (basic rate interface) and pri (primary rate
interface) provide multiple digital bearer channels over which temporary connections can be made and data
can be sent. features:isdn bri services
2 b channels (64 kbps) and one d channel (16 kbps). the total bandwidth is 144 kbps.
in north america isdn pri service is pri t1 total bandwidth 1.544 mbps ( 23 b channel with 64 kbps + 1 d
channel with 64 kbps) in europe isdn pri
service is pri e1 total bandwidth 2.048 mbps (30 b channel with 64 kbps + 1 d channel with 64 kbps)
10. what is ras server? ras means remote access service - we can remotely administar the server from any part
of network in a organization or through vpn connectionex:- terminal service you should enable remote
desktop services and you can troubleshooting your client and server pc's
11. what is the difference between remote desktop sharing and desktop sharing through net
meeting? remote desktop sharing means you can access the remote desktop and share the screen in local. but
any command you enter would be executed by remote. desktop sharing through netmeeting means you share
your screen, and anyone connect to you pc through netmeeting will share you screen automaticly.
12.why do we use subnet mask? what are its uses? a subnet allows the flow of network traffic between hosts
to be segregated based on a network configuration. by organizing hosts into logical groups, subnetting can
improve network security and performance. the most recognizable aspect of subnetting is the subnet mask.
like ip addresses, a subnet mask contains four bytes (32 bits) and is often written using the same "dotted-
decimal" notation. for example, a very common subnet mask in its binary representation
11111111 11111111 11111111 00000000 is typically shown in the equivalent, more readable form
255.255.255.0 1
13. what is the difference between win 2000 ads and win 2003 ads? 1.in win 2003 ads we can remane dns
with netdom command 2.by default password complexity is enabled so we must disable password
complexity from account policy in domain security policyto create uers.we can restrict users not to change
the ipaddress of the system,
14.what is the difference between windows server 2003 and windows server 2000 and operating system ? )
in 2000 we cannot rename domain whereas in 2003 we can rename domain
b) in 2000 it supports of 8 processors and 64 gb ram (in 2000 advance server) whereas in 2003 supports up to
64 processors and max of 512gb ram
c)2000 supports iis 5.0 and 2003 supports iis6.0
d) 2000 doesn’t support dot net whereas 2003 supports microsoft .net 2.0
e) 2000 has server and advance server editions whereas 2003 has standard, enterprise, datacentre and web
server editions.
f) 2000 doesn’t have any 64 bit server operating system whereas 2003 has 64 bit server operating systems
(windows server 2003 x64 std and enterprise edition)
g) 2000 has basic concept of dfs (distributed file systems) with defined roots whereas 2003 has enhanced dfs
support with multiple roots.
h) in 2000 there is complexality in administering complex networks whereas 2003 is easy administration in
all & complex networks
i) in 2000 we can create 1 million users and in 2003 we can create 1 billion users.
j) in 2003 we have concept of volume shadow copy service which is used to create hard disk snap shot which
is used in disaster recovery and 2000 doesn’t have this service.
k) in 2000 we don’t have end user policy management, whereas in 2003 we have a end user policy
management which is done in gpmc (group policy management console).
l) in 2000 we have cross domain trust relation ship and 2003 we have cross forest trust relationship.
m) 2000 supports 4-node clustering and 2003 supports 8-node clustering.
n) 2003 has high hcl support (hardware compatibility list) issued by microsoft
o) code name of 2000 is win nt 5.0 and code name of 2003 is win nt 5.1
p) 2003 has service called adfs (active directory federation services) which is used to communicate between
branches with safe authentication.
q) in 2003 their is improved storage management using service file server resource manager (fsrm)
r) 2003 has service called windows share point services (it is an integrated portfolio of collaboration and
communication services designed to connect people, information, processes, and systems both within and
beyond the organizational firewall.)
s) 2003 has improved print management compared to 2000 server
t) 2003 has telnet sessions available.
u) 2000 supports ipv4 whereas 2003 supports ipv4 and ipv6
15. in roaming profile how to give only excel permission to particular user? in roaming profile ,go to
file which you want to share it ,right click the folder containing the file and give share and select the user to
wich you want to give and assign.
16. how can i control the usb ports through network? through group policy or through remote desktop
to local pc
17. what is patch management ? patch management is an area of systems management that involves acquiring,
testing, and installing multiple patches (code changes) to an administered computer system. patch management tasks
include: maintaining current knowledge of available patches, deciding what patches are appropriate for particular
systems, ensuring that patches are installed properly, testing systems after installation, and documenting all associated
procedures, such as specific configurations required. a number of products are available to automate patch
management tasks, including ringmaster's automated patch management, patchlink update, and gibraltar's everguard.
18. if in a company with 80 computers with wireless network .all are using wireless internet.what is
bandwidth the bandwidth per user in a 80 computers in a wireless network depends on the connection speed
and no. of the wireless accesspoints and no. of users connected to each access point if the network is a
combination of cable and partial wireless. say, 5 users are actively connected to a single wireless accesspoint
which supports a connection speed of 10mbps, then each user has 10/5 mbps (2mbps) connection speed or
bandwidth logically.
19. what is terminal service? terminal services is a component of microsoft windows operating systems
(both client and server versions) that allows a user to access applications or data stored on a remote computer
over a network connection. terminal services is microsoft's take on server centric computing, which allows
individual users to acces network resources easily.
20. what is difference between terminal service and remote desktop? terminal services is a component
of microsoft windows operating systems (both client and server versions) that allows a user to access
applications or data stored on a remote computer over a network connection. terminal services is microsoft's
take on server centric computing, which allows individual users to acces network resources easily. remote
desktop is working with the help of remote desktop protocol (rdp) is a multi-channel protocol that allows a
user to connect to a computer running microsoft terminal services. the server listens by default on tcp port
3389.
21. what is the difference between layer 3 switch and router? layer 3 switch is a multiport bridge with a
router added in. layer 3 switches are faster than routers, but they usually lack some of the advanced
functionalities of routers.
a router is a device that routes the packets to their destination. it means that a router analyzes the layer 3
destination address of every packet, and devises the best next hop for it. this process takes time, and hence
every packet encounters some delay because of this.
22. can somebody give me a clear calculation and explanation why 2 is 10 in binary digits? n decimal
system upto ten numbers are possible(0-9).in binary only two(0-1). so the first number is 0 in both, next 1,1
next 10,1. because the possiblity of the next greatest number to 1 in binary is 10.
23. what is daemon? how does it differ from the cron batch process? when a cron initiates a command
can the a daemon is a process which runs in the backgorund which doesn need any user interaction. once
started it keeps on running and oing its neccessary tasks.
a chron batch process.... now these are one of the jobs scheduled by the user in the chron tab files. each of
these files are executed as per the details mentioned by the user in the chron tab files. all these jobs scheduled
are run by a daemon called chrond.when & is used at the end of a command... it becomes a daemon.
24. what is a dns ? how it works ? dns stands for domain name server . it's primary purpose is to convert
user friendly names to ip adresses . we have two zones in dns 1. forward look-up zone : converts names to ip-
addresses .2. reverse look-up zone : convert ip addresses to name or fqdn .usually when we configure mail
servers we have to configure reverse look-up zone . this zone configuration provides a feature of spam
protection in mail servers .now lets look how it works :1.when a dns name resolution request is forwarded to
a dns server, the dns server examines its local dns cache for the ip address. 2. if the ip address is not in the
dns server's cache, it checks its hosts file. (since the hosts file is a static text file, it is not commonly used.) 3.
if the dns server is not authoritative and configured for forwarding, the dns server forwards the request to a
higher-level dns server4.if the dns server cannot forward the request, or if forwarding fails, the dns server
uses its root hints file (also known as cache.dns). the root hints file lists the 13 root dns servers. 5. the root
dns server responds with the address of a com, edu, net, or other dns server type (depending on the request).
6.the dns server forwards the request to the high-level dns server, which can respond with a variety of ip
addresses.
25. why we are using private ip in the lan? private address have defined to the use in corporate domains.
these ip s have been reserved by internet .
these ip s are not used in internet .
th ip range is from 10.0.0.0 /8
172.16.18.0 to 172.31.xx.xx
and 192.168.xx.xx.
when these ip packets are routed in to internet they are discarded and dropped.
and it is not advised to use public address in private lan to avoid connectivity issues when connecting the
network to internet.because the public ip may be in use in internet
26. what is difference between layer 2 switch and layer 3 switch ? there is only one big diffrence
between layer 2 and layer 3 swithces is that we are able to do routing in interanetwork with layer 3 swithces
which is not possible to do with layer 2. cisco 2950 catalyst swithe is the example of that. layer 2 switch can
only do switching where as layer 3 can do switching as well as routing,,ex: of layer 2 switches 1912,
2950, layer 3 switches 4503, 5500,
27. how to configure clients from 2000ads server? its very first u need to make that pc as member of
domain. for this u should provide administrato password to authenticate
28. what is trojan horse? how to save a system from that? trojan horse's are the program , which are
having a capability to replicate itself , and they could me multiple itselef through hosts and also these
programs are very harmful for system., how to avoid - use any antivirus like avg , e-trust , trendmicro etc.
29. what is tcp/ip? tcp/ip- is a suite of protocols used for computer to computer communication. it has 5
layers. it consists of 4 layers which is an improved version of osi model wherein the seven layers have been
reduced to 4 layers. application; transport; ip layer; physical access layer.
30. describe the osi model? 1) application layer:interface between user and network.it provide user
interface application. 2) presentation layer:negoiate the data exchange format. 3)session layer:allow user to
establish connection using easily remember names. 4) transport layer:provides end to end reliable transfer.5)
network layer:routes the data through a large network.6) data link layer: it determine access to the network
media.7) physical layer:it convert frames into bits.
31. in trojan horse how can we avoid the system from its effect? trojan horse is a small program which
replicates itself in any network or system . for avoiding it use trendmicro antivirus for corporate offisecan
corporate edition ,
33. how to configure dhcp server? dhcp- dynamic host configuration protocol. this service is used to
assign ip addresses to systems in a network. if in the case of internet, your system's ip address is assigned
automatically by your isp coz u need to assign an ip address which is not in use and that is well known by
your isp using this service.1.check out in the properties dialog box, you can see the check box marked as
"assign ip address automatically" if you make use of internet.2.in the case of a local network u can assign an
ip address manually.
34. user(s) are complaining of delays when using the network. what would you do?
35. what are some of the problems associated with operating a switched lan?
36. name some of the ways of combining tcp/ip traffic and sna traffic over the same link.
37. what sort of cabling is suitable for fast ethernet protocols?
34.what is a class d ip address? ip address ranges:
class a: 0-126. 127 is a broadcast
class b: 128-191
class c: 192-223
class d: 224-239
class e: 240-255. ip address ranges:
class a: 0-126. : for about >256 subnets and >16777214 hosts per subnet
127.0.0.1: for proper configuraions of tcp/ip.
class b: 128-191: for about >65536 subnets and >65534 hosts per subnet
class c: 192-223: for about >16777214 networks and 254 hosts per subnet
class d: 224-239 : these addressess are for scientific researches ..
class e: 240-255. : these are kept for future use
35.why do i sometimes lose a server’s address when using more than one server?
36.what is firewall? firewalls are of two types:
-hardware firewall
-software firewall.
firewall in simple manner is bascially the utility to provide the security over the network. these are the
security measures that prevents the network’s in and out traffic to pass through the specific security filters so
that the unwanted and unsecure data can be stopped from entering into the network..
further… as a security measure it also depends on the network designer and implementer that how to use a
firewall mean to say the security measures like how to present the content filtering and url filtering which
type of firewall should be used and where to put it..
37.how do i monitor the activity of sockets?
38.how would i put my socket in non-blocking mode?
39.what are raw sockets?
40.what is the role of tcp protocol and ip protocol.--- well.. firt of all one should know what a protocol actually
means:
41.a protocol is bascially set of rules designed and developed for the internetwork or can say intranetwork
communications. the need of tcp had been rised in early years when like.. ibm mainframe were not able to
communicate with the burroughs mainframe.. means if you wish to connect 2 or more computers they should
be same with everything from manufacturer to designer and implementer…then tcp imerged as a solution-
for-ever..
earlier it was ncp( network control protocal) but later it refined into tcp( transmission control protocol) and
ip(internet protocol)on jan.1,1983..
some general roles of tcp/ip are:
1. independence from particular vendor or network.
2. very low data overhead
3. good failure recovery.
and if the thinghs are taken seprately.. then
tcp is bascially responsible for proper data transmission by assuring data integrity it is a connection oriented
protocol that follows the under scenerio
1. handshaking.
2. packect sequencing
3. flow control.
4. error handling.
ip : since the data to be sent must be put somewhere the ip works here .. the required data is packaged in an ip
packet.
42.what is udp? . udp is a connectionless protocol that do not provide reliable transfer of information and is fast
in nature as compare to tcp. this disadvantage on other hand is suitable for applications like video and voice.
43.how can i make my server a daemon?
44.how should i choose a port number for my server?
45.layers in tcp/ip
46.how can i be sure that a udp message is received?
47.how to get ip header of a udp message
48.writing udp/sock_dgram applications
49.how many bytes in an ipx network address?
50.what is the difference between mutex and semaphore?
51.what is priority inversion?
52.different solutions to dining philosophers problem.
53.what is a message queue?
54.questions on shared memory.
55.what is dhcp? dhcp is used for mac address to ip mapping its support both static and dynamic mapping. static
mapping are done just like bootstrap and for dynamic mapping it have database of mac and ip when a packet
with a mac comes ask for ip its check that assigns a dynamic ip fixed that for a specific time and then return
that packet with that ip
56. -----ping ia process which use icmp protocol error message which is encapsulated in a ip packets its calculate
the round trip delay time by sending the packet sending time and subtract it from arrival time. the error
messages are 1.destination unreachable 2.hardware error. etc its also sets maximum hop value and after it
becomes 0 the packets discarded telnet is a application layer process of connection
remote computer and local area network computer by specifying the ip address by a specific port,
00326504521963 FORID:1
57.can i connect two computers to internet using same line ? u can connect two
computer using nat which use port forwarding method and proxy server same time on the same line .
58. are all cache less proxies dns cacheful? if so why?
59. how does a ping work? the exact mechanism.
60. how does a dhcp work ? when a pc with no ip address just with an mac address boots up , what are the steps
that happen till the time a ip is given to the pc from a dhcp.
61.what happens if there are 2 dhcp servers in the network and both gets a message from 2 pcs booting at
exactly the same moment of time.
62.how to change mac address? ans:--you can change a mac address easily. go to the desktop>write click on
the my computer icon>properties>device manager>network adapters> properties> advance>network
address.. and then change the value. the value should be hexadecimal or 16 octat
63.what is dhcp? ------dhcp is a protocol which is design for automatic give the ip address to dhcp client..dhcp
assine the ip address for few days lease & capture the clients mac address. it is updated version of bootp…
64.what is a page file? -------page file is a virtual memory of the operating system & work as physical ram. it
increases the system performance & working.
65.user(s) are complaining of delays when using the network. what would you do? ans:- get the user(s) to
demonstrate the problem - determine how many other users are affected- ensure desktop hardware and
configuration is ok- trace all connections (they may be on another subnet)- commence some monitoring or
diagnostics - determine problem (if there is one)- provide solution
66.what is wds mode in ap?ans..wds stands for wireless distributed system, & work as bridging technology. in
wds mode access point can communicate with wi-fi access points only does not support wireless cliens. if we
want communicate 4 ap to each other so we should configure one ap as wds mode. in this mode wsd ap
requires remote ap mac address so you have to type other aps mac address one by one. and configure ap in ap
with wds mode with remote wds mac address.. with this setting u can make wireless lan with out any
ethernet wire.
67. can i connect two computers to internet using same line. ans..yes, we can connect two or more system
using many types of mathodes..1. remote help invitations.. if you have high or medium speed internet
connection you can access the system..
2. vpn.. using the virtual private network this is technology which is use to make virtual network between
any remote location. vpn make a tunnel type connection for fast & secure communication. 3. using third
party software we have many type of vpn softwares.
68.describe your home wlan setup.(pay attention to candidate’s confidence. plus if the candidate built it
himself. plus if the network is secured additionally, regardless of the protocols used. plus if the candidate
fought poor coverage.)
69.ad-hoc vs. infrastructure topology. advantages and disadvantages. ad-hoc networks are easy to set up. by
definition ad-hoc wlans do not require access point, so they are cheaper. with infrastructured wlans one can
connect to wired lan, enable wireless roaming for office workers, centralize wlan management, boost the
range.
70.your preferred brand for wireless cards and access points. (an experienced candidate will be able to come
up with strong argument to defend his preferences. he will point to the past projects as well.)
71.range and throughput of 802.11a, 802.11b and 802.11g networks. the official spec for 802.11a is 54 mbps
and 25-75 feet indoors. the official spec for 802.11b is 11 mbps and 100-150 feet indoors. the official spec
for 802.11g is 54 mbps and 100-150 feet indoors. an experienced candidate will provide his own
observations.
72.how do you secure a wireless network? forbid ssid broadcasting, enable mac-level access where
appropriate, enable wep, enable 802.11i where available, enable firewalls, enable wpa.
73.what does wi-fi stand for? wireless fidelity.
74.what is 802.11i? it’s a new ieee standard defining wireless network security.
75.what are the recommended channels if you’re setting up three wlans and want minimum interference?
1, 6 and 11 for the us, 1, 7 and 13 for europe and 1, 7 and 14 for japan.
76.what are your preferred tools for wardriving? somewhere the names kismet, *stumbler or others should
come up. ask the candidate to describe his preferred configuration for wardriving.
77.bridge and router defferences?? bridge: it is also a network device which is use to connect multiple pc in the
network. it is use in small or lans network. it work on layer 2 or 3(some times)of osi model.it is connect pc
through hub. router: router is electronic machine and network device which is work as gateway.router
connect multiple network or wirele
cisco
1. what is a wildcard mask, and how is it different from a netmask? > netmask determines the subnet part of
the ip address example:- 255.255.0.0 class b. the netmask is 255.255 wildcard mask is the opposite. u see this
in ospf.0.0.255.255 .. the 255.255 here defines the host portion. its a wild thing really
2. how do you configure a cisco switch or router? what are the steps needed?
>enable
#configure terminal configs are slightly similar
3. how would i place an interface into trunking mode? en
config t
int s0/0
switchport mode trunk encapsulation dot1q|isl
4. how do you shutdown an interface on a router or switch?
en
config t
int s0/0
shutdown
5. what is vtp?virtual trunking protocol. set up on switches to manage vlans.
6. what is vmps?vlan membership policy server. maps information regarding vlan
7. what is span/rspan?switched port analyzer. remote switched port analyzer.
you can monitor traffic flowing to a port from another port.
8. what is flow/netflow?protocol for collecting ip information
9. what is tacacs? radius?terminal access controller access control system
remote access dial in user service
security enabled by aaa
authentication, authorization, accounting
provides a means of validation of users gaining access to a router
accounting not used with radius.

sql &oracle faqs


11. what are the components of physical database structure of oracle database? oracle database is
comprised of three types of files. one or more datafiles, two are more redo log files, and one or more control
files.
22. what are the components of logical database structure of oracle database? there are tablespaces and
database's schema objects.
33. what is a tablespace? a database is divided into logical storage unit called tablespaces. a tablespace is used
to grouped related logical structures together.
44. what is system tablespace and when is it created? every oracle database contains a tablespace named
system, which is automatically created when the database is created. the system tablespace always contains
the data dictionary tables for the entire database.
55. explain the relationship among database, tablespace and data file. each databases logically divided into
one or more tablespaces one or more data files are explicitly created for each tablespace.
66. what is schema? a schema is collection of database objects of a user.
77. what are schema objects? schema objects are the logical structures that directly refer to the database's data.
schema objects include tables, views, sequences, synonyms, indexes, clusters, database triggers, procedures,
functions packages and database links.
88. can objects of the same schema reside in different tablespaces? yes.
99. can a tablespace hold objects from different schemes? yes.
1010. what is oracle table? a table is the basic unit of data storage in an oracle database. the tables of a database
hold all of the user accessible data. table data is stored in rows and columns.
1111. what is an oracle view? a view is a virtual table. every view has a query attached to it. (the query is a
select statement that identifies the columns and rows of the table(s) the view uses.)
1212. what is partial backup ? a partial backup is any operating system backup short of a full backup, taken
while the database is open or shut down.
1312. what is mirrored on-line redo log ? a mirrored on-line redo log consists of copies of on-line redo log
files physically located on separate disks, changes made to one member of the group are made to all
members.
1413. what is full backup ? a full backup is an operating system backup of all data files, on-line redo log files
and control file that constitute oracle database and the parameter.
1514. can a view based on another view ? yes.
1615. can a tablespace hold objects from different schemes ? yes.
1716. can objects of the same schema reside in different tablespaces.? yes.
1817. what is the use of control file ? when an instance of an oracle database is started, its control file is used to
identify the database and redo log files that must be opened for database operation to proceed. it is also used
in database recovery.
1918. do view contain data ? views do not contain or store data.
2019. what are the referential actions supported by foreign key integrity constraint ? update and delete
restrict - a referential integrity rule that disallows the update or deletion of referenced data. delete cascade -
when a referenced row is deleted all associated dependent rows are deleted.
2120. what are the type of synonyms? there are two types of synonyms private and public.
2221. what is a redo log ? the set of redo log files ysdate,uid,user or userenv sql functions, or the pseudo
columns level or rownum.
2322. what is an index segment ? each index has an index segment that stores all of its data.
2423. explain the relationship among database, tablespace and data file.? each databases logically divided
into one or more tablespaces one or more data files are explicitly created for each tablespace
2524. what are the different type of segments ? data segment, index segment, rollback segment and temporary
segment.
2625. what are clusters ? clusters are groups of one or more tables physically stores together to share common
columns and are often used together.
2726. what is an integrity constrains ? an integrity constraint is a declarative way to define a business rule for a
column of a table.
2827. what is an index ? an index is an optional structure associated with a table to have direct access to rows,
which can be created to increase the performance of data retrieval. index can be created on one or more
columns of a table.
2928. what is an extent ? an extent is a specific number of contiguous data blocks, obtained in a single
allocation, and used to store a specific type of information.
3029. what is a view ? a view is a virtual table. every view has a query attached to it. (the query is a select
statement that identifies the columns and rows of the table(s) the view uses.)
3130. what is table ? a table is the basic unit of data storage in an oracle database. the tables of a database hold
all of the user accessible data. table data is stored in rows and columns.
3231. can a view based on another view? yes.
3332. what are the advantages of views? - provide an additional level of table security, by restricting access to
a predetermined set of rows and columns of a table.
- hide data complexity.
- simplify commands for the user.
- present the data in a different perspective from that of the base table.
- store complex queries.
3433. what is an oracle sequence? a sequence generates a serial list of unique numbers for numerical columns
of a database's tables.
3534. what is a synonym? a synonym is an alias for a table, view, sequence or program unit.
3635. what are the types of synonyms? there are two types of synonyms private and public.
3736. what is a private synonym? only its owner can access a private synonym.
3837. what is a public synonym? any database user can access a public synonym.
3938. what are synonyms used for? - mask the real name and owner of an object.
- provide public access to an object
- provide location transparency for tables, views or program units of a remote database.
- simplify the sql statements for database users.
4039. what is an oracle index? an index is an optional structure associated with a table to have direct access to
rows, which can be created to increase the performance of data retrieval. index can be created on one or more
columns of a table.
4140. how are the index updates? indexes are automatically maintained and used by oracle. changes to table
data are automatically incorporated into all relevant indexes.

oracle interview questions and answers


41. what is a tablespace? a database is divided into logical storage unit called tablespaces. a tablespace is used
to grouped related logical structures together
42. what is rollback segment ? a database contains one or more rollback segments to temporarily store "undo"
information.
43. what are the characteristics of data files ? a data file can be associated with only one database. once
created a data file can't change size. one or more data files form a logical unit of database storage called a
tablespace.
44. how to define data block size ? a data block size is specified for each oracle database when the database is
created. a database users and allocated free database space in oracle datablocks. block size is specified in init.ora
file and can’t be changed latter.
45. what does a control file contain ? a control file records the physical structure of the database. it contains the
following information.
database name
names and locations of a database's files and redolog files.
time stamp of database creation.
46.what is difference between unique constraint and primary key constraint ? a column defined as unique
can contain nulls while a column defined as primary key can't contain nulls.
47.what is index cluster ? a cluster with an index on the cluster key
48.when does a transaction end ? when it is committed or rollbacked.
49. what is the effect of setting the value "all_rows" for optimizer_goal parameter of the alter session
command ? what are the factors that affect optimizer in choosing an optimization approach ? answer the
optimizer_mode initialization parameter statistics in the data dictionary the optimizer_goal parameter of the alter
session command hints in the statement.
50. what is the effect of setting the value "choose" for optimizer_goal, parameter of the alter session
command ? the optimizer chooses cost_based approach and optimizes with the goal of best throughput if
statistics for atleast one of the tables accessed by the sql statement exist in the data dictionary. otherwise the
optimizer chooses rule_based approach.
51. what does commit do ? commit makes permanent the changes resulting from all sql statements in the
transaction. the changes made by the sql statements of a transaction become visible to other user sessions
transactions that start only after transaction is committed.
52. what does rollback do ? rollback retracts any of the changes resulting from the sql statements in the
transaction.
53. define transaction ? a transaction is a logical unit of work that comprises one or more sql statements
executed by a single user.
62. what is read-only transaction ? a read-only transaction ensures that the results of each query executed in
the transaction are consistant with respect to the same point in time.
63. what is a deadlock ? explain . two processes wating to update the rows of a table which are locked by the
other process then deadlock arises. in a database environment this will often happen because of not issuing
proper row lock commands. poor design of front-end application may cause this situation and the performance of
server will reduce drastically.
these locks will be released automatically when a commit/rollback operation performed or any one of this
processes being killed externally.
64. what is a schema ? the set of objects owned by user account is called the schema.
65. what is a cluster key ? the related columns of the tables are called the cluster key. the cluster key is indexed
using a cluster index and its value is stored only once for multiple tables in the cluster.
66. what is parallel server ? multiple instances accessing the same database (only in multi-cpu environments)
68. what is clusters ? group of tables physically stored together because they share common columns and are
often used together is called cluster.
69. what is an index ? how it is implemented in oracle database ? an index is a database structure used by the
server to have direct access of a row in a table. an index is automatically created when a unique of primary key
constraint clause is specified in create table comman (ver 7.0)
86.what are various types of joins ? equijoins, non-equijoins, self join, outer join
87.what is a package cursor ? a package cursor is a cursor which you declare in the package specification without
an sql statement. the sql statement for the cursor is attached dynamically at runtime from calling procedures.
88.if you insert a row in a table, then create another table and then say rollback. in this case will the row be
inserted ? yes. because create table is a ddl which commits automatically as soon as it is executed. the ddl commits
the transaction even if the create statement fails internally (eg table already exists error) and not syntactically.
89.what are the various types of queries ?? normal queries
sub queries
co-related queries
nested queries
compound queries
90.what is a transaction ? a transaction is a set of sql statements between any two commit and rollback statements.
91.what is implicit cursor and how is it used by oracle ? an implicit cursor is a cursor which is internally created
by oracle. it is created by oracle for each individual sql.
92.which of the following is not a schema object : indexes, tables, public synonyms, triggers and packages ? public
synonyms
94.what is pl/sql? pl/sql is oracle's procedural language extension to sql. the language includes object oriented
programming techniques such as encapsulation, function overloading, information hiding (all but inheritance), and
so, brings state-of-the-art programming to the oracle database server and a variety of oracle tools.
95.is there a pl/sql engine in sql*plus? no. unlike oracle forms, sql*plus does not have a pl/sql engine. thus, all
your pl/sql are send directly to the database engine for execution. this makes it much more efficient as sql statements
are not stripped off and send to the database individually.
96.is there a limit on the size of a pl/sql block? currently, the maximum parsed/compiled size of a pl/sql block is
64k and the maximum code size is 100k. you can run the following select statement to query the size of an existing
package or procedure.
sql> select * from dba_object_size where name = 'procedure_name'
64.when to create indexes ? to be created when table is queried for less than 2% or 4% to 25% of the table rows.
65.how can you avoid indexes ? to make index access path unavailable - use full hint to optimizer for full table
scan - use index or and-equal hint to optimizer to use one index or set to indexes instead of another. - use an
expression in the where clause of the sql.
66.what is the result of the following sql :
select 1 from dual
union
select 'a' from dual; error
67.can database trigger written on synonym of a table and if it can be then what would be the effect if original table
is accessed. yes, database trigger would fire.
68.can you alter synonym of view or view ? no
69.can you create index on view ? no
70.what is the difference between a view and a synonym ? synonym is just a second name of table used for
multiple link of database. view can be created with many tables, and with virtual columns and with conditions. but
synonym can be on view.
71.what is the difference between alias and synonym ? alias is temporary and used with one query. synonym is
permanent and not used as alias.
72.what is the effect of synonym and table name used in same select statement ? valid
73.what's the length of sql integer ? 32 bit length
74.what is the difference between foreign key and reference key ? foreign key is the key i.e. attribute which
refers to another table primary key. reference key is the primary key of table referred by another table.
75.can dual table be deleted, dropped or altered or updated or inserted ? yes
76.if content of dual is updated to some value computation takes place or not ? yes
77.if any other table same as dual is created would it act similar to dual? yes
78.for which relational operators in where clause, index is not used ?
<> , like '% ...' is not functions, field +constant, field || ''
79.assume that there are multiple databases running on one machine. how can you switch from one to another
? changing the oracle_sid
80.what are the advantages of oracle ? portability : oracle is ported to more platforms than any of its competitors,
running on more than 100 hardware platforms and 20 networking protocols.
market presence : oracle is by far the largest rdbms vendor and spends more on r & d than most of its competitors
earn in total revenue. this market clout means that you are unlikely to be left in the lurch by oracle and there are
always lots of third party interfaces available.
backup and recovery : oracle provides industrial strength support for on-line backup and recovery and good software
fault tolerence to disk failure. you can also do point-in-time recovery.
performance : speed of a 'tuned' oracle database and application is quite good, even with large databases. oracle can
manage > 100gb databases.
multiple database support : oracle has a superior ability to manage multiple databases within the same transaction
using a two-phase commit protocol.
81.what is a forward declaration ? what is its use ? pl/sql requires that you declare an identifier before using it.
therefore, you must declare a subprogram before calling it. this declaration at the start of a subprogram is called
forward declaration. a forward declaration consists of a subprogram specification terminated by a semicolon.
82.what are actual and formal parameters ? actual parameters : subprograms pass information using parameters.
the variables or expressions referenced in the parameter list of a subprogram call are actual parameters. for example,
the following procedure call lists two actual parameters named emp_num and amount:
eg. raise_salary(emp_num, amount);
formal parameters : the variables declared in a subprogram specification and referenced in the subprogram body are
formal parameters. for example, the following procedure declares two formal parameters named emp_id and
increase: eg. procedure raise_salary (emp_id integer, increase real) is current_salary real;
• what is normalization? explain different levels of normalization?

o check out the article q100139 from microsoft knowledge base and of course, there’s much more
information available in the net. it’ll be a good idea to get a hold of any rdbms fundamentals text
book, especially the one by c. j. date. most of the times, it will be okay if you can explain till third
normal form.
• what is denormalization and when would you go for it?

o as the name indicates, denormalization is the reverse process of normalization. it’s the controlled
introduction of redundancy in to the database design. it helps improve the query performance as the
number of joins could be reduced.
• how do you implement one-to-one, one-to-many and many-to-many relationships while designing tables?

o one-to-one relationship can be implemented as a single table and rarely as two tables with primary
and foreign key relationships. one-to-many relationships are implemented by splitting the data into
two tables with primary key and foreign key relationships. many-to-many relationships are
implemented using a junction table with the keys from both the tables forming the composite primary
key of the junction table. it will be a good idea to read up a database designing fundamentals text
book.
• what’s the difference between a primary key and a unique key?

o both primary key and unique enforce uniqueness of the column on which they are defined. but by
default primary key creates a clustered index on the column, where are unique creates a nonclustered
index by default. another major difference is that, primary key doesn’t allow nulls, but unique key
allows one null only.
• what are user defined datatypes and when you should go for them?

o user defined datatypes let you extend the base sql server datatypes by providing a descriptive name,
and format to the database. take for example, in your database, there is a column called flight_num
which appears in many tables. in all these tables it should be varchar(8). in this case you could create
a user defined datatype called flight_num_type of varchar(8) and use it across all your tables. see
sp_addtype, sp_droptype in books online.
• what is bit datatype and what’s the information that can be stored inside a bit column?

o bit datatype is used to store boolean information like 1 or 0 (true or false). untill sql server 6.5 bit
datatype could hold either a 1 or 0 and there was no support for null. but from sql server 7.0 onwards,
bit datatype can represent a third state, which is null.
• define candidate key, alternate key, composite key.

o a candidate key is one that can identify each row of a table uniquely. generally a candidate key
becomes the primary key of the table. if the table has more than one candidate key, one of them will
become the primary key, and the rest are called alternate keys. a key formed by combining at least
two or more columns is called composite key.
• what are defaults? is there a column to which a default can’t be bound?

o a default is a value that will be used by a column, if no value is supplied to that column while
inserting data. identity columns and timestamp columns can’t have defaults bound to them. see create
default in books online.
• what is a transaction and what are acid properties?

o a transaction is a logical unit of work in which, all the steps must be performed or none. acid stands
for atomicity, consistency, isolation, durability. these are the properties of a transaction. for more
information and explanation of these properties, see sql server books online or any rdbms
fundamentals text book. explain different isolation levels an isolation level determines the degree of
isolation of data between concurrent transactions. the default sql server isolation level is read
committed. here are the other isolation levels (in the ascending order of isolation): read uncommitted,
read committed, repeatable read, serializable. see sql server books online for an explanation of the
isolation levels. be sure to read about set transaction isolation level, which lets you customize the
isolation level at the connection level. read committed - a transaction operating at the read committed
level cannot see changes made by other transactions until those transactions are committed. at this
level of isolation, dirty reads are not possible but nonrepeatable reads and phantoms are possible. read
uncommitted - a transaction operating at the read uncommitted level can see uncommitted changes
made by other transactions. at this level of isolation, dirty reads, nonrepeatable reads, and phantoms
are all possible. repeatable read - a transaction operating at the repeatable read level is guaranteed not
to see any changes made by other transactions in values it has already read. at this level of isolation,
dirty reads and nonrepeatable reads are not possible but phantoms are possible. serializable - a
transaction operating at the serializable level guarantees that all concurrent transactions interact only
in ways that produce the same effect as if each transaction were entirely executed one after the other.
at this isolation level, dirty reads, nonrepeatable reads, and phantoms are not possible.
• create index myindex on mytable(mycolumn)what type of index will get created after executing the above
statement?
o non-clustered index. important thing to note: by default a clustered index gets created on the primary
key, unless specified otherwise.
• what’s the maximum size of a row?

o 8060 bytes. don’t be surprised with questions like ‘what is the maximum number of columns per
table’. 1024 columns per table. check out sql server books online for the page titled: "maximum
capacity specifications". explain active/active and active/passive cluster configurations hopefully you
have experience setting up cluster servers. but if you don’t, at least be familiar with the way
clustering works and the two clusterning configurations active/active and active/passive. sql server
books online has enough information on this topic and there is a good white paper available on
microsoft site. explain the architecture of sql server this is a very important question and you better be
able to answer it if consider yourself a dba. sql server books online is the best place to read about sql
server architecture. read up the chapter dedicated to sql server architecture.
• what is lock escalation?

o lock escalation is the process of converting a lot of low level locks (like row locks, page locks) into
higher level locks (like table locks). every lock is a memory structure too many locks would mean,
more memory being occupied by locks. to prevent this from happening, sql server escalates the many
fine-grain locks to fewer coarse-grain locks. lock escalation threshold was definable in sql server 6.5,
but from sql server 7.0 onwards it’s dynamically managed by sql server.
• what’s the difference between delete table and truncate table commands?

o delete table is a logged operation, so the deletion of each row gets logged in the transaction log,
which makes it slow. truncate table also deletes all the rows in a table, but it won’t log the deletion of
each row, instead it logs the deallocation of the data pages of the table, which makes it faster. of
course, truncate table can be rolled back. truncate table is functionally identical to delete statement
with no where clause: both remove all rows in the table. but truncate table is faster and uses fewer
system and transaction log resources than delete. the delete statement removes rows one at a time and
records an entry in the transaction log for each deleted row. truncate table removes the data by
deallocating the data pages used to store the table’s data, and only the page deallocations are recorded
in the transaction log. truncate table removes all rows from a table, but the table structure and its
columns, constraints, indexes and so on remain. the counter used by an identity for new rows is reset
to the seed for the column. if you want to retain the identity counter, use delete instead. if you want to
remove table definition and its data, use the drop table statement. you cannot use truncate table on a
table referenced by a foreign key constraint; instead, use delete statement without a where clause.
because truncate table is not logged, it cannot activate a trigger. truncate table may not be used on
tables participating in an indexed view
• explain the storage models of olap

o check out molap, rolap and holap in sql server books online for more infomation.

• what are the new features introduced in sql server 2000 (or the latest release of sql server at the time of your
interview)? what changed between the previous version of sql server and the current version?
o this question is generally asked to see how current is your knowledge. generally there is a section in
the beginning of the books online titled "what’s new", which has all such information. of course,
reading just that is not enough, you should have tried those things to better answer the questions. also
check out the section titled "backward compatibility" in books online which talks about the changes
that have taken place in the new version.
• what are constraints? explain different types of constraints.

o constraints enable the rdbms enforce the integrity of the database automatically, without needing you
to create triggers, rule or defaults. types of constraints: not null, check, unique, primary key, foreign
key. for an explanation of these constraints see books online for the pages titled: "constraints" and
"create table", "alter table"
• what is an index? what are the types of indexes? how many clustered indexes can be created on a table? i
create a separate index on each column of a table. what are the advantages and disadvantages of this
approach?
o indexes in sql server are similar to the indexes in books. they help sql server retrieve the data quicker.
indexes are of two types. clustered indexes and non-clustered indexes. when you create a clustered
index on a table, all the rows in the table are stored in the order of the clustered index key. so, there
can be only one clustered index per table. non-clustered indexes have their own storage separate from
the table data storage. non-clustered indexes are stored as b-tree structures (so do clustered indexes),
with the leaf level nodes having the index key and it’s row locater. the row located could be the rid or
the clustered index key, depending up on the absence or presence of clustered index on the table. if
you create an index on each column of a table, it improves the query performance, as the query
optimizer can choose from all the existing indexes to come up with an efficient execution plan. at the
same t ime, data modification operations (such as insert, update, delete) will become slow, as every
time data changes in the table, all the indexes need to be updated. another disadvantage is that,
indexes need disk space, the more indexes you have, more disk space is used.
• what is raid and what are different types of raid configurations?

o raid stands for redundant array of inexpensive disks, used to provide fault tolerance to database
servers. there are six raid levels 0 through 5 offering different levels of performance, fault tolerance.
msdn has some information about raid levels and for detailed information, check out the raid advisory
board’s homepage
• what are the steps you will take to improve performance of a poor performing query?

o this is a very open ended question and there could be a lot of reasons behind the poor performance of
a query. but some general issues that you could talk about would be: no indexes, table scans, missing
or out of date statistics, blocking, excess recompilations of stored procedures, procedures and triggers
without set nocount on, poorly written query with unnecessarily complicated joins, too much
normalization, excess usage of cursors and temporary tables. some of the tools/ways that help you
troubleshooting performance problems are: set showplan_all on, set showplan_text on, set statistics io
on, sql server profiler, windows nt /2000 performance monitor, graphical execution plan in query
analyzer. download the white paper on performance tuning sql server from microsoft web site. don’t
forget to check out sql-server-performance.com
• what are the steps you will take, if you are tasked with securing an sql server?

o again this is another open ended question. here are some things you could talk about: preferring nt
authentication, using server, databse and application roles to control access to the data, securing the
physical database files using ntfs permissions, using an unguessable sa password, restricting physical
access to the sql server, renaming the administrator account on the sql server computer, disabling the
guest account, enabling auditing, using multiprotocol encryption, setting up ssl, setting up firewalls,
isolating sql server from the web server etc. read the white paper on sql server security from
microsoft website. also check out my sql server security best practices
• what is a deadlock and what is a live lock? how will you go about resolving deadlocks?

o deadlock is a situation when two processes, each having a lock on one piece of data, attempt to
acquire a lock on the other’s piece. each process would wait indefinitely for the other to release the
lock, unless one of the user processes is terminated. sql server detects deadlocks and terminates one
user’s process. a livelock is one, where a request for an exclusive lock is repeatedly denied because a
series of overlapping shared locks keeps interfering. sql server detects the situation after four denials
and refuses further shared locks. a livelock also occurs when read transactions monopolize a table or
page, forcing a write transaction to wait indefinitely. check out set deadlock_priority and "minimizing
deadlocks" in sql server books online. also check out the article q169960 from microsoft knowledge
base.
• what is blocking and how would you troubleshoot it?

o blocking happens when one connection from an application holds a lock and a second connection
requires a conflicting lock type. this forces the second connection to wait, blocked on the first. read
up the following topics in sql server books online: understanding and avoiding blocking, coding
efficient transactions. explain create database syntax many of us are used to creating databases from
the enterprise manager or by just issuing the command: create databae mydb.
• but what if you have to create a database with two file groups, one on drive c and the other on drive d with
log on drive e with an initial size of 600 mb and with a growth factor of 15%?
o that’s why being a dba you should be familiar with the create database syntax. check out sql server
books online for more information.
• how to restart sql server in single user mode? how to start sql server in minimal configuration mode?

o sql server can be started from command line, using the sqlservr.exe. this exe has some very important
parameters with which a dba should be familiar with. -m is used for starting sql server in single user
mode and -f is used to start the sql server in minimal configuration mode. check out sql server books
online for more parameters and their explanations.
• as a part of your job, what are the dbcc commands that you commonly use for database maintenance?

o dbcc checkdb, dbcc checktable, dbcc checkcatalog, dbcc checkalloc, dbcc showcontig, dbcc
shrinkdatabase, dbcc shrinkfile etc. but there are a whole load of dbcc commands which are very
useful for dbas. check out sql server books online for more information.
• what are statistics, under what circumstances they go out of date, how do you update them?

o statistics determine the selectivity of the indexes. if an indexed column has unique values then the
selectivity of that index is more, as opposed to an index with non-unique values. query optimizer uses
these indexes in determining whether to choose an index or not while executing a query. some
situations under which you should update statistics: 1) if there is significant change in the key values
in the index 2) if a large amount of data in an indexed column has been added, changed, or removed
(that is, if the distribution of key values has changed), or the table has been truncated using the
truncate table statement and then repopulated 3) database is upgraded from a previous version. look
up sql server books online for the following commands: update statistics, stats_date, dbcc
show_statistics, create statistics, drop statistics, sp_autostats, sp_createstats, sp_updatestats
• what are the different ways of moving data/databases between servers and databases in sql server?

o there are lots of options available, you have to choose your option depending upon your requirements.
some of the options you have are: backup/restore, dettaching and attaching databases, replication, dts,
bcp, logshipping, insert…select, select…into, creating insert scripts to generate data.
• explain different types of backups avaialabe in sql server? given a particular scenario, how would you go
about choosing a backup plan?
o types of backups you can create in sql sever 7.0+ are full database backup, differential database
backup, transaction log backup, filegroup backup. check out the backup and restore commands in sql
server books online. be prepared to write the commands in your interview. books online also has
information on detailed backup/restore architecture and when one should go for a particular kind of
backup.
• what is database replication? what are the different types of replication you can set up in sql server?

o replication is the process of copying/moving data between databases on the same or different servers.
sql server supports the following types of replication scenarios: snapshot replication transactional
replication (with immediate updating subscribers, with queued updating subscribers) merge
replication see sql server books online for indepth coverage on replication. be prepared to explain
how different replication agents function, what are the main system tables used in replication etc.
• how to determine the service pack currently installed on sql server?

o the global variable @@version stores the build number of the sqlservr.exe, which is used to
determine the service pack installed. to know more about this process visit sql server service packs
and versions.
• what are cursors? explain different types of cursors. what are the disadvantages of cursors? how can you
avoid cursors?
o cursors allow row-by-row processing of the resultsets. types of cursors: static, dynamic, forward-only,
keyset-driven. see books online for more information. disadvantages of cursors: each time you fetch a
row from the cursor, it results in a network roundtrip, where as a normal select query makes only one
roundtrip, however large the resultset is. cursors are also costly because they require more resources
and temporary storage (results in more io operations). further, there are restrictions on the select
statements that can be used with some types of cursors. most of the times, set based operations can be
used instead of cursors. here is an example: if you have to give a flat hike to your employees using
the following criteria: salary between 30000 and 40000 — 5000 hike salary between 40000 and
55000 — 7000 hike salary between 55000 and 65000 — 9000 hike. in this situation many developers
tend to use a cursor, determine each employee’s salary and update his salary according to the above
formula. but the same can be achieved by multiple update statements or can be combined in a single
update statement as shown below:
o update tbl_emp set salary = case when salary between 30000 and 40000
then salary + 5000 when salary between 40000 and 55000 then salary +
7000 when salary between 55000 and 65000 then salary + 10000 end

o another situation in which developers tend to use cursors: you need to call a stored procedure when a
column in a particular row meets certain condition. you don’t have to use cursors for this. this can be
achieved using while loop, as long as there is a unique key to identify each row. for examples of using
while loop for row by row processing, check out the ‘my code library’ section of my site or search for
while. write down the general syntax for a select statements covering all the options. here’s the basic
syntax: (also checkout select in books online for advanced syntax).
o select select_list [into new_table_] from table_source [where
search_condition] [group by group_by_expression] [having
search_condition] [order by order_expression [asc | desc] ]

• what is a join and explain different types of joins.

o joins are used in queries to explain how different tables are related. joins also let you select data from
a table depending upon data from another table. types of joins: inner joins, outer joins, cross joins.
outer joins are further classified as left outer joins, right outer joins and full outer joins. for more
information see pages from books online titled: "join fundamentals" and "using joins".
• can you have a nested transaction?

o yes, very much. check out begin tran, commit, rollback, save tran and @@trancount

• what is an extended stored procedure? can you instantiate a com object by using t-sql?

o an extended stored procedure is a function within a dll (written in a programming language like c,
c++ using open data services (ods) api) that can be called from t-sql, just the way we call normal
stored procedures using the exec statement. see books online to learn how to create extended stored
procedures and how to add them to sql server. yes, you can instantiate a com (written in languages
like vb, vc++) object from t-sql by using sp_oacreate stored procedure. also see books online for
sp_oamethod, sp_oagetproperty, sp_oasetproperty, sp_oadestroy. for an example of creating a com
object in vb and calling it from t-sql, see ‘my code library’ section of this site.
• what is the system function to get the current user’s user id?

o user_id(). also check out other system functions like user_name(), system_user, session_user,
current_user, user, suser_sid(), host_name().
• what are triggers? how many triggers you can have on a table? how to invoke a trigger on demand?

o triggers are special kind of stored procedures that get executed automatically when an insert, update
or delete operation takes place on a table. in sql server 6.5 you could define only 3 triggers per table,
one for insert, one for update and one for delete. from sql server 7.0 onwards, this restriction is gone,
and you could create multiple triggers per each action. but in 7.0 there’s no way to control the order in
which the triggers fire. in sql server 2000 you could specify which trigger fires first or fires last using
sp_settriggerorder. triggers can’t be invoked on demand. they get triggered only when an associated
action (insert, update, delete) happens on the table on which they are defined. triggers are generally
used to implement business rules, auditing. triggers can also be used to extend the referential integrity
checks, but wherever possible, use constraints for this purpose, instead of triggers, as constraints are
much faster. till sql server 7.0, triggers fire only after the data modification operation happens. so in a
way, they are called post triggers. but in sql server 2000 you could create pre triggers also. search sql
server 2000 books online for instead of triggers. also check out books online for ‘inserted table’,
‘deleted table’ and columns_updated()
• there is a trigger defined for insert operations on a table, in an oltp system. the trigger is written to instantiate
a com object and pass the newly insterted rows to it for some custom processing. what do you think of this
implementation? can this be implemented better?
o instantiating com objects is a time consuming process and since you are doing it from within a
trigger, it slows down the data insertion process. same is the case with sending emails from triggers.
this scenario can be better implemented by logging all the necessary data into a separate table, and
have a job which periodically checks this table and does the needful.
• what is a self join? explain it with an example.

o self join is just like any other join, except that two instances of the same table will be joined in the
query. here is an example: employees table which contains rows for normal employees as well as
managers. so, to find out the managers of all the employees, you need a self join.
o create table emp ( empid int, mgrid int, empname char(10) )
o insert emp select 1,2,’vyas’ insert emp select 2,3,’mohan’ insert
emp select 3,null,’shobha’ insert emp select 4,2,’shridhar’ insert
emp select 5,2,’sourabh’
o select t1.empname [employee], t2.empname [manager] from emp t1, emp
t2 where t1.mgrid = t2.empid here’s an advanced query using a left
outer join that even returns the employees without managers (super
bosses)
o select t1.empname [employee], coalesce(t2.empname, ‘no manager’)
[manager] from emp t1 left outer join emp t2 on t1.mgrid = t2.empid

• what is normalization? - well a relational database is basically composed of tables that contain related data.
so the process of organizing this data into tables is actually referred to as normalization.
• what is a stored procedure? - its nothing but a set of t-sql statements combined to perform a single task of
several tasks. its basically like a macro so when you invoke the stored procedure, you actually run a set of
statements.
• can you give an example of stored procedure? - sp_helpdb , sp_who2, sp_renamedb are a set of system
defined stored procedures. we can also have user defined stored procedures which can be called in similar
way.
• what is a trigger? - triggers are basically used to implement business rules. triggers is also similar to stored
procedures. the difference is that it can be activated when data is added or edited or deleted from a table in a
database.
• what is a view? - if we have several tables in a db and we want to view only specific columns from specific
tables we can go for views. it would also suffice the needs of security some times allowing specfic users to
see only specific columns based on the permission that we can configure on the view. views also reduce the
effort that is required for writing queries to access specific columns every time.
• what is an index? - when queries are run against a db, an index on that db basically helps in the way the data
is sorted to process the query for faster and data retrievals are much faster when we have an index.
• what are the types of indexes available with sql server? - there are basically two types of indexes that we use
with the sql server. clustered and the non-clustered.
• what is the basic difference between clustered and a non-clustered index? - the difference is that, clustered
index is unique for any given table and we can have only one clustered index on a table. the leaf level of a
clustered index is the actual data and the data is resorted in case of clustered index. whereas in case of non-
clustered index the leaf level is actually a pointer to the data in rows so we can have as many non-clustered
indexes as we can on the db.
• what are cursors? - well cursors help us to do an operation on a set of data that we retreive by commands
such as select columns from table. for example : if we have duplicate records in a table we can remove it by
declaring a cursor which would check the records during retreival one by one and remove rows which have
duplicate values.
• when do we use the update_statistics command? - this command is basically used when we do a large
processing of data. if we do a large amount of deletions any modification or bulk copy into the tables, we
need to basically update the indexes to take these changes into account. update_statistics updates the indexes
on these tables accordingly.
• which tcp/ip port does sql server run on? - sql server runs on port 1433 but we can also change it for better
security.
• from where can you change the default port? - from the network utility tcp/ip properties –> port number.both
on client and the server.
• can you tell me the difference between delete & truncate commands? - delete command removes the rows
from a table based on the condition that we provide with a where clause. truncate will actually remove all the
rows from a table and there will be no data in the table after we run the truncate command.
• can we use truncate command on a table which is referenced by foreign key? - no. we cannot use truncate
command on a table with foreign key because of referential integrity.
• what is the use of dbcc commands? - dbcc stands for database consistency checker. we use these commands
to check the consistency of the databases, i.e., maintenance, validation task and status checks.
• can you give me some dbcc command options?(database consistency check) - dbcc checkdb - ensures that
tables in the db and the indexes are correctly linked.and dbcc checkalloc - to check that all pages in a db are
correctly allocated. dbcc sqlperf - it gives report on current usage of transaction log in percentage. dbcc
checkfilegroup - checks all tables file group for any damage.
• what command do we use to rename a db? - sp_renamedb ‘oldname’ , ‘newname’

• well sometimes sp_reanmedb may not work you know because if some one is using the db it will not accept
this command so what do you think you can do in such cases? - in such cases we can first bring to db to
single user using sp_dboptions and then we can rename that db and then we can rerun the sp_dboptions
command to remove the single user mode.
• what is the difference between a having clause and a where clause? - having clause is basically used only
with the group by function in a query. where clause is applied to each row before they are part of the group
by function in a query.
• what do you mean by collation? - collation is basically the sort order. there are three types of sort order
dictionary case sensitive, dictonary - case insensitive and binary.
• what is a join in sql server? - join actually puts data from two or more tables into a single result set.

• can you explain the types of joins that we can have with sql server? - there are three types of joins: inner join,
outer join, cross join
• when do you use sql profiler? - sql profiler utility allows us to basically track connections to the sql server
and also determine activities such as which sql scripts are running, failed jobs etc..
• what is a linked server? - linked servers is a concept in sql server by which we can add other sql server to a
group and query both the sql server dbs using t-sql statements.
• can you link only other sql servers or any database servers such as oracle? - we can link any server provided
we have the ole-db provider from microsoft to allow a link. for oracle we have a ole-db provider for oracle
that microsoft provides to add it as a linked server to the sql server group.
• which stored procedure will you be running to add a linked server? - sp_addlinkedserver,
sp_addlinkedsrvlogin
• what are the os services that the sql server installation adds? - ms sql server service, sql agent service, dtc
(distribution transac co-ordinator)
• can you explain the role of each service? - sql server - is for running the databases sql agent - is for
automation such as jobs, db maintanance, backups dtc - is for linking and connecting to other sql servers
• how do you troubleshoot sql server if its running very slow? - first check the processor and memory usage to
see that processor is not above 80% utilization and memory not above 40-45% utilization then check the disk
utilization using performance monitor, secondly, use sql profiler to check for the users and current sql
activities and jobs running which might be a problem. third would be to run update_statistics command to
update the indexes
• lets say due to n/w or security issues client is not able to connect to server or vice versa. how do you
troubleshoot? - first i will look to ensure that port settings are proper on server and client network utility for
connections. odbc is properly configured at client end for connection ——makepipe & readpipe are utilities
to check for connection. makepipe is run on server and readpipe on client to check for any connection issues.
• what are the authentication modes in sql server? - windows mode and mixed mode (sql & windows).

• where do you think the users names and passwords will be stored in sql server? - they get stored in master db
in the sysxlogins table.
• what is log shipping? can we do logshipping with sql server 7.0 - logshipping is a new feature of sql server
2000. we should have two sql server - enterprise editions. from enterprise manager we can configure the
logshipping. in logshipping the transactional log file from one server is automatically updated into the
backup database on the other server. if one server fails, the other server will have the same db and we can use
this as the dr (disaster recovery) plan.
• let us say the sql server crashed and you are rebuilding the databases including the master database what
procedure to you follow? - for restoring the master db we have to stop the sql server first and then from
command line we can type sqlserver –m which will basically bring it into the maintenance mode after which
we can restore the master db.
• let us say master db itself has no backup. now you have to rebuild the db so what kind of action do you take?
- (i am not sure- but i think we have a command to do it).
• what is bcp? when do we use it? - bulkcopy is a tool used to copy huge amount of data from tables and
views. but it won’t copy the structures of the same.
• what should we do to copy the tables, schema and views from one sql server to another? - we have to write
some dts packages for it.

Вам также может понравиться