Windows Sysadmin Interview Questions
Windows Sysadmin Interview Questions
Windows Sysadmin Interview Questions
1. Aneesh Said:
March 29th, 2006 11:49 pm
The Active Directory schema contains formal definitions of every object class
that can be created in an Active Directory forest it also contains formal definitions
of every attribute that can exist in an Active Directory object.Active Directory
stores and retrieves information from a wide variety of applications and services.
So that it can store and replicate data from a potentially infinite variety of sources,
Active Directory standardizes how data is stored in the directory. By
standardizing how data is stored, the directory service can retrieve, update, and
replicate data while ensuring that the integrity of the data is maintained.
2. kiran Said:
May 15th, 2006 11:46 pm
1) Schema master is a set of rules which is used to define the struture of active
directory. It contains definitions of all the objects which are stored in AD. It
maintains information and detail information of objects.
2) If there are many organisational units and to implement policy on all OUś we
use Domain level policy.
3)
4) Global Catalog Server maintains full information about its own domain and
partial information about other domains. It is a forest wide role.
12) Sites: one or more well-connected highly reliable and fast TCP/IP subnets. A
site allows administrator to configure active directory access and replication
topology to take advantage of the physical network.
13) dcpromo to add/remove active directory but first ADC should be removed
before DC if we want to remove DC first then check this server is last domain
controller in domain.
3. Pinkesh Said:
June 3rd, 2006 8:00 am
4. Pinkesh Said:
June 3rd, 2006 8:01 am
5. Muniraj Said:
June 24th, 2006 2:41 am
HI
I was just googling for Interview FAQ’s i got this URL as first choice
it is really dream come true situation for me because readily all possible
question’s and answers are given.
6. shaik Said:
June 29th, 2006 2:31 am
HI
I was just googling for Interview FAQ’s i got this URL as first choice
it is really dream come true situation for me because readily all possible
question’s and answers are given.
shaik
7. SUVENDU Said:
August 15th, 2006 11:08 pm
8. SUVENDU Said:
August 15th, 2006 11:08 pm
9. SUVENDU Said:
August 15th, 2006 11:11 pm
All domain controllers must be running Windows Server 2003, and the Active
Directory functional level must be at the Windows Server 2003.
Yes u can rename the domain in windows server 2003
User(s) are complaining of delays when using the network. What would you do?
hi
15.NTDS.DIT
14. we have to open the register to see the schema master fsmo role
regser 32 schmamgmt.
9.Physical computers,sites,dc
Logical user,o.us, etc….
6.Light wait directory Access Protocal (ldap)
5. What ever changes done in D.c(domain Controlers) will effect at A.D
we can call it as multimaster .
Hi
15. To allow users in one domain to access resources in another, AD uses trust.
Trust is automatically produced when domains are created. The forest sets the
default boundaries of trust, not the domain, and implicit trust is automatic. As
well as two-way transitive trust, AD trusts can be shortcut (joins two domains in
different trees, transitive, one- or two-way), forest (transitive, one- or two-way),
realm (transitive or nontransitive, one- or two-way), or external (nontransitive,
one- or two-way) in order to connect to other forests or non-AD domains. AD
uses the Kerberos V5 protocol, although NTLM is also supported and web clients
use SSL/TLS.
ip v6
it ia a 128 bit size address
here we can see total 8 ocatates each octate size is 16 bits superated with “:”
it is in hexa decimal formate
these 3 types
1.unicast address
2.multicast address
3.anycast address
loopback address of ip v6 is ::1
1.What is Rsop ?
Resultant set of policy is provid to make policy modification and trouble shooting
easier. Rsop is the query object it has two mode 1.logging mode: Polls existing
policies and the reports the result of the query. 2.Planning mode: The questins ask
about the planned policy and the report the result of the quer.
2.What is the concept for authoritative and nonauthoritative restoration?
1. Non-authoriative restore: which accept the entries from other domain controller
after the restoed data.
2.Authoritative: Not accept the entries from other domain controller.
3.What is the ntds.tit file default size?
40 mb
In standard dns server only the primary server can modify the zone and then
replicate the changes to other domain controllers(It was in windows NT4 before).
But when Dns gets integrated with AD .Zone can be modified and replicated from
any domain controller.
3.Fault tolerance
4.Security
You can prevent access to any updates to zone or individual record preventing
insecure dynamic updates.
ANS : DCPROMO
hi
1)What is system boot process in windows and linux.
2)how the hardware interact with OS.
3)what is paging.
Thanks
10. We can rename domain name in “Windows Server 2003″ functional level
16. NTDS.dit
dcpromo /forceremoval
Hi,
1.What is differnece between router and routing?
2.What is dynamic routing and Static routing?
The schema is the component of the Active Directory directory service that
defines all the objects and attributes that the directory service uses to store data.
You can combine some objects in the schema to create more-complex definitions
if objects of greater complexity are required. You can also add new definitions to
the schema to support new types of objects in the directory.
What are all the process will done when we start server tell me briefly which file
work for which process.
35. om Said:
April 30th, 2007 11:12 am
The schema is the component of the Active Directory directory service that
defines all the objects and attributes that the directory service uses to store data.
You can combine some objects in the schema to create more-complex definitions
if objects of greater complexity are required. You can also add new definitions to
the schema to support new types of objects in the directory.
When you configure a new Windows Server 2003 domain, the default domain
functional level is Windows 2000 mixed.
Under this domain functional level, Windows NT, 2000, and 2003 domain
controllers are supported. However,
certain features such as group nesting, universal groups, and so on are not
available.
You need to run the registry file for schema in cmd mode :regsvr32.dll schmmgmt
Then you can see the Add -snap in wizard in mmc console ,there you can..
Domain fuctional level support only the windows domain controllers not client
level o/s.
4.Global Catalog
It is a searchable database Enginee.It is used to search the objects in a forest.In
2003 ,Universal Group caching membership is available for speedy logon across
domain. Port no:3268,3269
It is also taking part of AD replication.
5.How we can raise domain functional & forest functional level in Windows
Server 2003?
8.Already answered
Physical->sites,domain controller
Logical ->Forest,domain,tree,ou
11.multi-master replication
Whenever a change occurs to any object within an Active Directory domain, that
change is replicated automatically to all domain controllers within the domain.
This process is called multi-master replication. Multi-master replication does not
happen instantly across all servers simultaneously. Rather, it is a controlled
process where each domain controller peer is updated and validated in a logically
controlled procedure.
12.Site:
Site is one or more IP subnets.It contains connection objects and computer objects
and mainly used for AD replication.
14.Already answered.
16 NTDS.dit is the file that’s responsible for keep all Active Directory database.
The schema is the component of the Active Directory directory service that
defines all the objects and attributes that the directory service uses to store data.
You can combine some objects in the schema to create more-complex definitions
if objects of greater complexity are required. You can also add new definitions to
the schema to support new types of objects in the directory.
What is a default forest functionl level when you install the root domain controller
?
Hi,
Can you pleas answer my query
1.How to Export the Ad data in Excel.Specially Tabs Like
(General,Account,Exchange Advance,Security,Members of )Without any 3rd
party software.
2. Suppose i have deleted any object from Ad but after 2-3 days i want back that
object..What is the process to restore the deleted Ad object.
Hi,
Can anyone give me the answer of the mention Questions:
1. Windows server 2008 is actual which version of Windows server ?
2. Explain NAP in Windows Server 2008
3. How 1 can implement IP verison 6 using Windows Server 2008?
4. What are the enhancements in Terminal server which comes with Win2k8 ?
5. Which version of IIS comes with Windows server 2008?
6. What is the new feature included in Windows Server 2008 which can lock
entire hard disk drive?
7. How easy it is to combine Windows Server 2008 os with physical networking
& security appliances?
8. What are the certifications available for Windows 2008 track?
9. What is MCP member site and whats advantage of it ?
10. What is TechNet subscription and what indivisual get by subscribing to
TechNet?
Regards,
Raj Narayan
Write A Comment
Categories: Networking
5. Ip Address Ranges:
Class A: 0-126. 127 is a Broadcast
Class B: 128-191
Class C: 192-223
Class D: 224-239
Class E: 240-255.
Ques 11. Well.. firt of all one should know what a protocol actually means:
A Protocol is bascially set of rules designed and developed for the internetwork or
can say intranetwork Communications. the need of Tcp had been rised in early
years when like.. IBM Mainframe were not able to Communicate with the
Burroughs mainframe.. means if you wish to connect 2 or more computers they
should be same with everything from manufacturer to designer and
implementer…then TCP imerged as a solution-for-ever..
EARLIER it was NCP( Network Control Protocal) but later it refined into
TCP( Transmission Control Protocol) and IP(Internet Protocol)on jan.1,1983..
Some General roles of TCP/IP are:
1. Independence from particular vendor or network.
2. very low data overhead
3. good failure recovery.
and if the thinghs are taken seprately.. then
TCP is bascially responsible for proper data transmission by assuring data
integrity it is a connection oriented protocol that follows the under scenerio
1. Handshaking.
2. Packect Sequencing
3. Flow Control.
4. Error handling.
IP : Since the data to be sent must be put somewhere the IP works here .. the
required data is packaged in an IP packet.
7 Application
6 Presentation Upper Layers
5 Session
4 Transport
3 Network
2 Data Link Lower Layers
1 Physical
The application layer is the end-user interface to the OSI system. It is where the
applications, such as electronic mail, USENET news readers, or database display
modules, reside. The application layer’s task is to display received information
and send the user’s new data to the lower layers.
In distributed applications, such as client/server systems, the application layer is
where the client application resides. It communicates through the lower layers to
the server.
The presentation layer’s task is to isolate the lower layers from the application’s
data format. It converts the data from the application into a common format, often
called the canonical representation. The presentation layer processes machine-
dependent data from the application layer into a machine-independent format for
the lower layers.
The presentation layer is where file formats and even character formats (ASCII
and EBCDIC, for example) are lost. The conversion from the application data
format takes place through a “common network programming language” (as it is
called in the OSI Reference Model documents) that has a structured format.
The presentation layer does the reverse for incoming data. It is converted from the
common format into application-specific formats, based on the type of application
the machine has instructions for. If the data comes in without reformatting
instructions, the information might not be assembled in the correct manner for the
user’s application.
The session layer organizes and synchronizes the exchange of data between
application processes. It works with the application layer to provide simple data
sets called synchronization points that let an application know how the
transmission and reception of data are progressing. In simplified terms, the
session layer can be thought of as a timing and flow control layer.
The session layer is involved in coordinating communications between different
applications, letting each know the status of the other. An error in one application
(whether on the same machine or across the country) is handled by the session
layer to let the receiving application know that the error has occurred. The session
layer can resynchronize applications that are currently connected to each other.
This can be necessary when communications are temporarily interrupted, or when
an error has occurred that results in loss of data.
The transport layer, as its name suggests, is designed to provide the “transparent
transfer of data from a source end open system to a destination end open system,”
according to the OSI Reference Model. The transport layer establishes, maintains,
and terminates communications between two machines.
The transport layer is responsible for ensuring that data sent matches the data
received. This verification role is important in ensuring that data is correctly sent,
with a resend if an error was detected. The transport layer manages the sending of
data, determining its order and its priority.
The network layer provides the physical routing of the data, determining the path
between the machines. The network layer handles all these routing issues,
relieving the higher layers from this issue.
The network layer examines the network topology to determine the best route to
send a message, as well as figuring out relay systems. It is the only network layer
that sends a message from source to target machine, managing other chunks of
data that pass through the system on their way to another machine.
The data link layer, according to the OSI reference paper, “provides for the
control of the physical layer, and detects and possibly corrects errors that can
occur.” In practicality, the data link layer is responsible for correcting
transmission errors induced during transmission (as opposed to errors in the
application data itself, which are handled in the transport layer).
The data link layer is usually concerned with signal interference on the physical
transmission media, whether through copper wire, fiber optic cable, or
microwave. Interference is common, resulting from many sources, including
cosmic rays and stray magnetic interference from other sources.
The physical layer is the lowest layer of the OSI model and deals with the
“mechanical, electrical, functional, and procedural means” required for
transmission of data, according to the OSI definition. This is really the wiring or
other transmission form.
When the OSI model was being developed, a lot of concern dealt with the lower
two layers, because they are, in most cases, inseparable. The real world treats the
data link layer and the physical layer as one combined layer, but the formal OSI
definition stipulates different purposes for each. (TCP/IP includes the data link
and physical layers as one layer, recognizing that the division is more academic
than practical.)
7. Iraban Said:
March 17th, 2006 10:29 am
Interviews Questions
1. Are all cacheless proxies DNS cacheful ? If so why ?
3. How does a DHCP work ? When a pc with no Ip address just with an MAC
addrress boots up , what are the steps that Happen till the time a Ip is given to the
pc from a DHCP.
4. What happens if there are 2 DHCP servers in the network and both gets a
message from 2 pcs booting at exactly the same moment of time.
8. Mike Said:
March 27th, 2006 11:52 am
You guys would fail. lol. Class D networks are reserved for multicasting.
someone asking the question isn’t interested in the IP range but what its used for.
What is DHCP.
ans….
DHCP is a protocol which is designe for Automatic Give the IP Address to DHCP
client..
DHCP Assine the IP Address for few days Lease & capture the clients MAC
address..
It is Updated version of BootP…
27. u can connect two computer using NAT wich use port forwarding method and
proxy server same time on the same line .
26 ping ia process which use ICMP protocl error message which is encapsulated
in a IP packets its calculate the round trip delay time by sending the packet
sending time and subtract it from arrival time. the error messages are 1.destination
unrecheable
2.hardware error.
etc
its also sets maximum hop value and after it becomes 0 the packets discarted
Telnet is a application layer process of connection remote compter and local Area
Network compter by specifing the ip address by a specific port,
25 DHCP is used for MAC address to IP mapping its support both static and
dynamic mapping.Static mapping are done just like bootstrap and for dynamic
mapping it have database of MAC and IP when a packet with a MAC comes ask
for ip its check that assigne a dynamic IP fixed that for a specific time and then
return that packet with that IP
26 In OS when an event done it stored on Message queues and and its relavent
action are called then it executed and cleared message queue it’s tempurary buffer
of a multitusking OS.
5.Class D ip are used for multitusking. that is 1 to many relation ship used with
IGMP protocol for group managemnt.
6.TCP/IP has 4 layer 1.Applicatiotn
2.Transport
3.Internet
4.Netwok Access
Foolish vinod said the OSI Layer
7. Firewall are the rules which are used for Passing traffic thats is packets in
network layer and frame is datalink layer on a specific port it can be two type
1.Hardware
2.Software
11 TCP is a transport layer protocol sued for reliable delivery of segmented
packets
IP is network layer protocol used for end to end delivery of two nodes not
reliable.
27. u can connect two computer using NAT wich use port forwarding method and
proxy server same time on the same line .
26 ping ia process which use ICMP protocl error message which is encapsulated
in a IP packets its calculate the round trip delay time by sending the packet
sending time and subtract it from arrival time. the error messages are 1.destination
unrecheable
2.hardware error.
etc
its also sets maximum hop value and after it becomes 0 the packets discarted
Telnet is a application layer process of connection remote compter and local Area
Network compter by specifing the ip address by a specific port,
25 DHCP is used for MAC address to IP mapping its support both static and
dynamic mapping.Static mapping are done just like bootstrap and for dynamic
mapping it have database of MAC and IP when a packet with a MAC comes ask
for ip its check that assigne a dynamic IP fixed that for a specific time and then
return that packet with that IP
26 In OS when an event done it stored on Message queues and and its relavent
action are called then it executed and cleared message queue it’s tempurary buffer
of a multitusking OS.
5.Class D ip are used for multitusking. that is 1 to many relation ship used with
IGMP protocol for group managemnt.
6.TCP/IP has 4 layer 1.Applicatiotn
2.Transport
3.Internet
4.Netwok Access
Foolish vinod said the OSI Layer
7. Firewall are the rules which are used for Passing traffic thats is packets in
network layer and frame is datalink layer on a specific port it can be two type
1.Hardware
2.Software
11 TCP is a transport layer protocol sued for reliable delivery of segmented
packets
IP is network layer protocol used for end to end delivery of two nodes not
reliable.
Q1: User(s) are complaining of delays when using the network. What would you
do?
ANS:
- get the user(s) to demonstrate the problem
- provide solution
5. reserved for Multicast.. correct… I never really understood this properly until
working with OSPF. You can try memorising the table if you like but it’ll stick
better if you get some understanding on why, and what different addresses are
used for.
If you want a good undertanding of a decent routing protocol, get your head round
OSPF. It’s nice, easy and used a lot plus you’ll understand multicasting in the
process…
For example in OSPF - 224.0.0.5 is used for multicasting routing information and
is address you should always know about. I’ve been asked about this in EVERY
interview I’ve had in networks.
Active Directory.
Page file is a vertual memory of the operating system & work as Physical RAM.
It encreses the system performance & working.
What is a Printer.
Printer is a Hardware Device which is use to take hard copy of any text or data
from system..
1. Dot Matrix
2. Lazer
3. Inkjet
Ans..
WDS stands for Wireless Distributed System, & work as Bridging Technology.
In WDS mode Access Point can communicate with Wi-Fi Access Points only
does not support Wireless Cliens.
In this mode WSD AP requires Remote AP mac address so you have to type other
APs MAC address one by one.
and Configure AP in AP with WDS mode with Remote WDS mac address..
with this setting u can make Wireless LAN with out any ethernet wire.
Ans..
Yes, we can connect two or more system using many types of mathodes..
Question.
User(s) are complaining of delays when using
the network. What would you do?
Ans.
Network slow problem create by many reasions like.. Spyware, Virus, Spool
Virus, NetBios, or may be any machine infected with a Virus or Worm..
so you have update your antivirus or firewall software or desible the NetBios in
Wins Configurations.
thanks
Q. what is firewall?
Ans..
ISA is Software Firewal & Internet Soloution for small & large network. ISA
server blocks Inboud traffic as well as Outbound traffic.
There are different methods to share one internet connection on multipe numbers
of computer.
2-NAT
NAT or NATING basic function is to convert private IP to Public IP and vice
versa.
It work same like ICS but have some enhanced features and can used for large
number of client computers.
* NAT has also option of Firewall.
* No limitation of IP Scheme..it also provide dynamic IP addressing
* Also have a feature of Server Publishing
*Cannot cache
TCP/IP is a two-way communication between the client and the server and it is a
reliable and there is a confirmation regarding reaching the message to the
destination. It is like a phone call.
UDP is a one-way communication only between the client and the server and it is
not a reliable and there is no confirmation regarding reaching the message to the
destination.
when u want to know about understanding the nature of network then first of all u
should be concentrate on OSI MODEL
osi model have 7 layers and every layer perform unique task:
1 APPLICATION LAYER
2 PRESENTATION LAYER
3 SESSION LAYER
4 TRANSPORT LAYER
5 NETWORK LAYER
6 DATA LINK LAYER
7 PHYSICAL LAYER
BUT NETWORK WORK ON LAYER 7 -1
THANKS SEE YOU ANY TIME WITH LOTS OF FUNDAS
2.What are some of the problems associated with operating a switched LAN?
Ans:
A switched LAN (Local Area Network) may use a Gigabit Ethernet switch that
includes different ports connected to PCs and to layer 3 routers. The routers
connected to different switch ports can not immediately identify failures either of
other routers or of the ports and links by which they are connected to the switch.
The routers currently have to rely on slow timeout mechanisms, such as missed
hello packets, to detect failures on other links connected to the switch.
Thus, the time required to detect failures can and often does dominate the time
required for a routing algorithm to determine a new network topology around a
detected failure (convergence time).
5.Class D: 224-239 its Class D - Used for multicasts, Class D is slightly different
from the first three classes. It has a first bit value of 1, second bit value of 1, third
bit value of 1 and fourth bit value of 0. The other 28 bits are used to identify the
group of computers the multicast message is intended fo
$netstat
and this will give you a list of all opened sockets to the associated ports for
TCP/UDP/RAW protocols.
Michael Mountrakis
mountrakis@illumine.gr
Michael Mountrakis
www.illumine.gr
RPM package manager is a tool which is use to install, upgrade and removes the
rpm packages. RPM is develop by redhat and support many linux distirbutions
like Fedora Project, Redhat Enterprise Linux, CentOs, Mendriva and othrs.
-v for verbose
Some examples:-
User(s) are complaining of delays when using the network. What would you do
1. Distribution List?
2. GAL, Routing Group, Stm files, Eseutil & ininteg - what are they used for?
3. What is MIME & MAPI?
4. List the services of Exchange Server 2000?
5. How would you recover Exchange server when the log file is corrupted?
1. Masud Said:
January 24th, 2006 7:12 pm
On a recent interview i was asked “What is the maximum storage capacity for
Exchange standard version? What would you do if it reaches maximum
capacity?”
2. saed Said:
February 18th, 2006 3:43 am
3. Shri Said:
April 1st, 2006 6:27 am
6. shaik Said:
June 29th, 2006 2:25 am
(what happend if i give that ip and what happend about the replication of ther dc
when i am in suspend mode) ?
7. mohd.sameer Said:
August 3rd, 2006 1:30 am
i have been asked if there is set of 30 harddisk configured for raid 5 if two
harddisk failed what about data
8. Tech Said:
September 17th, 2006 3:40 am
i have been asked if there is set of 30 harddisk configured for raid 5 if two
harddisk failed what about data
Hi,
Can anybody give me the answer of the mention questions.
1.How Can i Deploy the Latest Patched in Pc through G.P. wihtout having the
Admin Right in Pc.
2.How to remove the $sharing through G.P. in 1000 PCs.
3.In Raid 5,Suppose i have 5 HDD of 10-10 GB, After configuring the Raid how
much space do i have for utilise.
4.How Can i Resolve the Svr name through Nslookup.
Q) i have been asked if there is set of 30 harddisk configured for raid 5 if two
harddisk failed what about data
A) It depends how u had configured ur RAID its only Raid5 or with with spare if
its only raid 5 then in raid5 if ur 2 nos of HDD goes then ur raid is gone.
Q) How Can i Deploy the Latest Patched in Pc through G.P. wihtout having the
Admin Right in Pc.
A) Create a batch file and place all the patches in the Netlogon, and deploy the
batch file through GP to all the pcs so the same should take affect after restarting
the pc.
Q) In Raid 5,Suppose i have 5 HDD of 10-10 GB, After configuring the Raid how
much space do i have for utilise.
A) -1 out of the total (eg- if u r using 5 u will get only 4 because 1 goes for
parity).
How Can i Deploy the Latest Patched in Pc through G.P. wihtout having the
Admin Right in Pc.
A) Create a batch file and place all the patches in the Netlogon, and deploy the
batch file through GP to all the pcs so the same should take affect after restarting
the pc.
what is sysprep?
what is netlogon?
what is hotfrix.
Like that some other security features added in Win2k3, main features are above
This is a mail server.. we can use this Server to send mails in Intranet as well as
outside.
Global Catalog server is a Searchable Index book. With this we can find out any
object in the Active Directory.
We can have each domain controller in domain or only first domain controller in a
domain..
–Stub is like secondary but it contains only copy of SOA records, copy of NS
records, copy of A records for that zone. No copy of MX, SRV records etc.,
With this Stub zone DNS traffic will be low
RID Master — It assigns RID and SID to the newly created object like Users and
computers. If RID master is down (u can create security objects upto RID pools
are avialable in DCs) else u can’t create any object one its down
Infrastructure Master: This works when we are renaming any group member ship
object this role takes care.
*** FTP, NNTP, SMTP, KERBEROS, DNS, DHCP, POP3 port numbers?
FTP : 20, 21
(20 is for controlling, 21 is Transmitting)
NNTP : 119
SMTP : 25
Kerberos : 88
DNS : 53
DHCP : 67, 68
Pop3 : 110
*** What is Kerberos? Which version is currently used by Windows? How does
Kerberos work?
What is the new major feature introduced in Exchange 2003, which was not
included in Exchange 2000?
What are the port Numbers for pop3, imap, smtp port, smtp over ssl, pop3 over
ssl, imap over ssl ?
If you have deleted the user, after you recreated the same user. How you will give
the access of previous mail box ?
Ans: Deals with the restoration of computer system with all attendent software
and connections to full functionality under a variety of damaging or interfering
external condtions.
ANS: SMTP
Ans: Take the system state data backup. This will backup the active directory
database. Microsoft recomend only Full backup of system state database
IIS
SMTP
WWW service
NNTP
.NET Framework
ASP.NET
Then run Forestprep
The run domainprep
bart said,
How Can i Deploy the Latest Patched in Pc through G.P. wihtout having the
Admin Right in Pc.
A) Create a batch file and place all the patches in the Netlogon, and deploy the
batch file through GP to all the pcs so the same should take affect after restarting
the pc.
you can only publish or assign msi packages or Zap files. They are the only two
valid file formats allowable when using “intellimirror”. in active directory.
Actually you are incorrect as well. If you create a script and assign it to the
STARTUP script in a GPO applied to the COMPUTER and not the USER, then it
runs as a local administrator on the computer.
What is the new major feature introduced in Exchange 2003, which was not
included in Exchange 2000?
What are the port Numbers for pop3, imap, smtp port, smtp over ssl, pop3 over
ssl, imap over ssl ?
POP3 : 110
Standard IMAP4 : 143
SMTP : 25
pop3 over ssl : 992
imap over ssl : 993
31. Khan Said:
October 1st, 2007 1:32 am
* IIS
* SMTP services
* NNTP services
* ASP.NET
* www services
* .net framework
What is a smarthost?
A Exchange server is having bandwidth issues, explain how you would look at
fixing the issue?
If you use the Reset button to cold boot the computer, it generally restarts the boot
process, including the POST. However, this procedure does not necessarily
discontinue power to the motherboard. If the power is not interrupted, the cold
boot may fail to reset all adapters in the computer’s adapter slots.
A: The layers are physical, data link, network, transport, session, presentation, and
application layers.
Q: In the TCP client-servel model, how does the three-way handshake work in
opening connection?
A: The client first sends a packet with sequence "x" to the server. When the server
receives this packet, the server will send back another packet with sequence "y",
acknowledging the request of the client. When the client receives the acknowledgement
from the server, the client will then send an acknowledge back to the server for
acknowledging that sequence "y" has been received.
Q: What is the purpose of exchanging beginning sequence numbers during the the
connection in the TCP client-server model?
A: To ensure that any data lost during data transfer can be retransmitted.
A: ATM works by transmitting all traffic in small, fixed-sized cells. These small, fixed-
size cells reduces queuing delay and can be switched quickly. ATM fits into layer 2 of
the OSI model and provides functions for framing and error correction. At the port
interface, ATM switches convert cells into frames, and vice versa. ATM provides Quality
of Service and traffic shaping.
A: Take the 2 addresses, write them in binary form, then AND them. The answer is
130.40.32.0
Categories: Networking
| Large list of Intel interview questions Security interview questions for network admin |
All categories: .NET | C++ | Database | General | Hardware | Java | Networking |
SAP ABAP | Testing | Unix/Linux | VB | Web dev | Windows
1. nalini Said:
December 22nd, 2005 9:43 pm
4.
on router or switch to shutdown the interface commands are:
router>enable
router#config t
router(config)#int s0
router(conf_if)#no shutdown
3.
conf t
int foo
switchport mode trunk
exit
4.
conf t
int foo
shutdown
exit
3. Anjan Said:
June 22nd, 2006 1:06 pm
9. TACACS+ is a security application used with AAA that provides centralized
validation of users attempting to gain access to a router or network access server.
TACACS+ services are maintained in a database on a TACACS+ daemon
running on a UNIX, Windows NT, or Windows 2000 workstation.
4. Anjan Said:
June 22nd, 2006 1:12 pm
6. rocky Said:
December 10th, 2006 9:13 pm
example
255.255.0.0 class b. the netmask is 255.255
0.0.255.255 .. the 255.255 here defines the host portion. its a wild thing really
2. How do you configure a Cisco switch or router? What are the steps needed?
>enable
#configure terminal
en
config t
int s0/0
shutdown
5. What is VTP?
6. What is VMPS?
7. What is SPAN/RSPAN?
8. What is flow/netflow?
7. Hariharan Said:
May 25th, 2007 1:25 am
Netmask defines the class. whereas wildcard mask defines the allow or deny
which is used in the access-list. Means, 0.0.0.255 represents… 0=match;
1=ignore; so here in this wc mask all 0 octets should match exactly where as .255
octet can be anything.
Following is wrong:
nalini said,
4.
on router or switch to shutdown the interface commands are:
router>enable
router#config t
router(config)#int s0
router(conf_if)#no shutdown
Right way:
on the interface of the router/switch,which you want to shutdown,just enter the
command “shutdown”
The wildcard mask is usually a string of binary digits shown over the subnet
number, telling the router which parts of the subnet number to look at. A binary
“0″ over a particular digit in the subnet number says “Pay attention to this digit.”
A “1″ says “Ignore this digit.” In a wildcard mask, all the binary “0″s in a
conventional subnet mask are replaced by “1″s and all the “1″s are replaced by
“0″s.
1. murali Said:
August 17th, 2006 8:46 am
hi…
how to send messages or get control of other system connected in LAN with the
client OS is 2000 pro and server is NT workstation
2. Marcus Said:
September 14th, 2006 6:39 am
3. Emmanuel Said:
October 8th, 2006 9:52 am
Thank you.
Rmmanue
4. Emmanuel Said:
October 8th, 2006 9:57 am
I faced on interview They asked how many servers u have, how u will configure.
we havw 400 system, one mail server.
But i need how corporate leve configaration. Please guide me in this mater.
Thank you.
Emmanuel
Tell them that you have 400 pc based network, and you configure a Active
Directory domain on windows servers to centralize administration tasks.
Its depends on the role of the server. If you installing Active Directory, you have
to run DCPROMO on commond prompt, and followed instructions.
Over all its depends on the role.
Simply you can say– there is an option in windows “Manage Server” once you
follow the instructions it will guide you to configure your server.
2) How many types of servers?
If they are concern with Hardware server, tell them the hardware configuration
and vendor of the server.
If they are asking about the types of windows server, tell them Standard,
enterprise, or Small business server etc.
7. Guruprasad Said:
November 3rd, 2006 1:15 am
8. bart Said:
November 29th, 2006 12:10 am
9. haque Said:
March 31st, 2007 12:45 am
1) How to migrate from windows 2000 to 2003 without distrubing the existing
Domain ?????????
2) How to migrage from Ms. Exchange 2000 to 2003 and how to configure
Outlook Web Access ????????
3) What r the ports to required to configure to Exchange Server ????????
4) What is IIS and how to migrate from IIS 5.0 to IIS 6.0 ???
1) What r the frequently asked questions on ADS 2003. and what r the main
differences between ADS 2000 and 2003 ????????
2) What are main differences between WINS and DNS ???
3) Why we have to go to DNS what r the advantages in DNS ???????
4) What r the frequently asked questions on DNS ????
5) What r the frequently asked questions on DHCP ????
6) What r the frequently asked questions FTP ????
7) What r the frequently asked questions on DFS ????
8) What r the frequently asked questions on File Server ??????????
9) What r the frequently asked questions on Print Server ?????????
What r the frequently asked questions on ADS 2003. and what r the main
differences between ADS 2000 and 2003 ????????
2) What are main differences between WINS and DNS ???
3) Why we have to go to DNS what r the advantages in DNS ???????
4) What r the frequently asked questions on DNS ????
5) What r the frequently asked questions on DHCP ????
6) What r the frequently asked questions FTP ????
7) What r the frequently asked questions on DFS ????
8) What r the frequently asked questions on File Server ??????????
9) What r the frequently asked questions on Print Server ?????????
14. seenu Said:
July 18th, 2007 2:06 am
XP
1.Firewall
2.Automatic update
3.Media Player 9 is support to DVD
4.Visual style
5.Remote Desktop
6.On Screen Board
7.Program Capability wizard
8 etc………………..
most of these are terrible questions for a general windows/AD sysadmin. They’re
bookish, not realistic; the kind of thing one looks up if one doesn’t use every day.
Also, too many of the questions are focused on exchange. For example, we
outsource exchange, so a windows sysadmin here wouldn’t be asked any of those
questions…
Categories: Windows
| Windows Server 2003 interview and certification questions Windows Server 2003 IIS
and Scripting interview questions |
All categories: .NET | C++ | Database | General | Hardware | Java | Networking |
SAP ABAP | Testing | Unix/Linux | VB | Web dev | Windows
I really surprize to read this fruit full matter. Plz update and change all these
information day by day……
When I create a user folder in server 2003 and set the share and security
permissions it allows the user read permissions only . They cannot write to the
folder no matter what permissions I set.How do I get around this?
Sir,
HOW TO INSTALL
ACTIVE DIRECTORY ON WINDOWS SERVER 2003?
APPLYING GROUP POLICIES,
CREATING USERS,
GIVING PERMISSIONS
5. Myles Said:
March 19th, 2005 4:53 pm
“What’s the difference between local, global and universal groups? Domain local
groups assign access permissions to global domain groups for local domain
resources. Global groups provide access to resources in other trusted domains.
Universal groups grant access to resources in all trusted domains.”
After reading that id probably not trust this site for too much, according to that
both universal and global groups are the same! What about server modes? mixed,
native or 2003 mode? universal groups cant be assigned in mixed or non native /
2003 modes.
Plus if you need to be reading a site like this to pass an interview you really dont
diserve the job you have wrongly applied for.
When i search this website i m very happy ,i got what i want b’coz i m in the
search
such a website which give me the basic knowledge of Windows server 2003 and
this site give
very much intersting facts about it and this site is also very much useful for the
candidate
who want do interview preperation And improve their Knowledge.
sir, what is the difference between local policy and group policy. and where the
local policy is applied. plz mention it. thanks.
regards
trilochan
sir .
i have a one problm , i am having Windows 2003 server ,as well as 40 clients ,
My clients is differnt OS I mean redhat or sun or windows ,eventhough I want to
apply ip address for all clients ,How i can assingh the ip address
9. Vitaliy Said:
October 4th, 2005 1:49 pm
Information about windows server 2003 was useful. But this is not for the basic
users i guess. The person who doesn’t know what is schema, global catelog like
that information should also be given. pls include that.
site was good, I had practically implemted domain 2000 & 2003 in enterprise with
more than 6000 users . implemented group policy, password policy, profiles,
home drives ,concorrent login etc… but many a times you don’t get into the
basics which are required for interviews. and this questions provides many basic
question which even i never thought to read.
I have one suggestion to all, first parctically learn how domain work then read the
interview question, it will be much easier
Information about windows server 2003 was useful. But this is not for the basic
users i guess. The person who doesn’t know what is schema, global catelog like
that information should also be given. pls include that.
please gv some detail information on server 2003.
thanks
I have one thing that I have not been able to fix for months. I have a domain and
the domain name is not the same as the “pre-windows 2000 domain name”. When
users go to login they see this old name. Nothing is wrong but this old name is not
the current domain name they login to. How do I change this pre Windows 2000
name to make it the same as what this pre Windows 2000 name points to?
Sir,I have a simple DHCP network environment in my office with a central point
switch also switch has a connectivity with internet modem.here we are using
windows xp as operating system and we have no proxied or firewall as a
gateway.i just want to handle the network but since it is dhcp i am facing
difficulties in tracing or blocking some one from preveting from internet.how can
we work out this in such a simple networking enviornment.also i wanna send
messages to them.what are the possibilities.
16. tj Said:
November 16th, 2007 7:48 pm
You have the technical support manager of a major bank on the other line, and he
is very upset because his server is down, and he wants the problem resolved in 1
hour. And you know that it would take at least 3 hours to get it resolved.