You are on page 1of 27

Wintel Interview Questions and Answers

1) Differences b/w Conditional Forwarding and Stub Zones.


Ans:- Both do the same thing like forwarding the requests to appropriate name servers
who are authoritative for the domains in the queries. However, there is difference in
both, Stub Zone are Dynamic and Conditional forwarder are static.
Conditional Forwarding Where you want DNS clients in separate networks to
resolve each others names without having to query DNS servers on the Internet, such
as in the case of a company merger, you should configure the DNS servers in each
network to forward queries for names in the other network. DNS servers in one network
will forward names for clients in the other network to a specific DNS server that will
build up a large cache of information about the other network. When forwarding in this
way, you create a direct point of contact between two networks DNS servers, reducing
the need for recursion.
Stub Zone- Stub-Zones are dynamic -A stub zone is like a secondary zone in that it
obtains its resource records from other name servers (one or more master name
servers). A stub zone is also read-only like a secondary zone, so administrators cant
manually add, remove, or modify resource records on it. But the differences end here,
as stub zones are quite different from secondary zones in a couple of significant
ways.First, while secondary zones contain copies of all the resource records in the
corresponding zone on the master name server, stub zones contain only three kinds of
resource records:
A copy of the SOA record for the zone.
Copies of NS records for all name servers authoritative for the zone.
Copies of A records for all name servers authoritative for the zone.
2) How AD Replication Works ?
Ans:- http://technet.microsoft.com/en-us/library/cc772726(v=ws.10).aspx
3) How DNS is important in AD replication?
Ans:- Once DC gets its replication Partner Hostname then it queries DNS for IP Address.
Also, _MSDCS zone is required for Domain Controller Locator that enables the client to
locate the DC.
For complete details
http://technet.microsoft.com/en-us/library/cc759550(WS.10).aspx
4) Ports Required for Domain Controllers to communicate.

Ans:- http://yourcomputer.in/list-port-numbers-windows/

5) What is GPT and GPC?


Ans:- A GPO (Group Policy Object) is a collection of Group Policy settings, it consists of
GPC and GPT.
GPC (Group Policy Container) contains the information of property of GPO like
Security Filtering, GPO Status, GPO GUID etc.
GPT (Group Policy Template) contains the data of GPO in Sysvol folder that can be
checked after the configuration of the GPO that what settings have been configured to
the client.
6) What is new in Microsoft Clustering 2008?
Ans:- http://yourcomputer.in/whats-new-windows-server-2008-cluster/
7) What is Majority Node Set?
Ans:- A majority node set is a single quorum resource, from a server cluster perspective;
however, the data is actually stored on multiple disks across the cluster. Each cluster
node stores the configuration on a local disk it can have access to when it starts up. By
default, the location is pointed to %systemroot%\cluster\ResourceGUID
Further Explained :- http://yourcomputer.in/windows-cluster-interview-questions-andanswers/
If the configuration of the cluster changes, that change is replicated across the different
disks
8) What is NLB?
Ans:- NLB (Network Load Balance) is a Microsoft implementation of clustering and load
balancing that is intended to provide high availability and high reliability, as well as high
scalability.
http://technet.microsoft.com/en-us/library/cc779570(v=ws.10).aspx
9) Difference Between Unicast and Multicast
Ans:-

Unicast
Unicast is a one-to one connection between the client and the server. Unicast uses IP
delivery methods such as Transmission Control Protocol (TCP) and User Datagram

Protocol (UDP), which are session-based protocols. When a Windows Media Player client
connects using unicast to a Windows Media server, that client has a direct relationship
to the server. Each unicast client that connects to the server takes up additional
bandwidth. For example, if you have 10 clients all playing 100-kilobits per second (Kbps)
streams, those clients as a group are taking up 1,000 Kbps. If you have only one client
playing the 100 Kbps stream, only 100 Kbps is being used.

Multicast
Multicast is a true broadcast. The multicast source relies on multicast-enabled routers to
forward the packets to all client subnets that have clients listening. There is no direct
relationship between the clients and Windows Media server. The Windows Media server
generates an .nsc (NetShow channel) file when the multicast station is first created.
Typically, the .nsc file is delivered to the client from a Web server. This file contains
information that the Windows Media Player needs to listen for the multicast. This is
similar to tuning into a station on a radio. Each client that listens to the multicast adds
no additional overhead on the server. In fact, the server sends out only one stream per
multicast station. The same load is experienced on the server whether only one client or
1,000 clients are listening
http://support.microsoft.com/kb/291786
10) What is new in Windows 2008 AD?
Ans:Read-Only Domain Controllers
Fine-Grained Password Policies
Restartable Active Directory Service
Backup and Recovery
SYSVOL Replication with DFS-R
Auditing Improvements
UI Improvements
11) How to configure RODC to replicate password of users?
Ans:- You can add users in the PASSWORD REPLICATION POLICY tab of RODC computer
properties
12) What is the issue we face while recovering AD from VMware snapshot?
13) Difference between Authoritative and Non-authoritative restore in AD?

Ans:- http://yourcomputer.in/authoritative-vs-non-authoritative-restoration-of-activedirectory
14) What is new in Authoritative restoration in windows 2008?
15) What is new in Windows Cluster 2008?
Ans:- http://yourcomputer.in/whats-new-windows-server-2008-cluster/
16) What is Strict Replication?
Ans:Strict Replication is a mechanism developed by Microsoft developers for Active Directory
Replication. If a domain controller has the Strict Replication enabled then that domain
controller will not get Lingering Objects from a domain controller which was isolated
for more than the TombStone Life Time. TSL is 180 days by default on a Forest created
with Windows Server 2003 SP1. A domain controller shouldnt be outof sync for more
than this period. Lingering Objects may appear on other domain controllers if replication
happens with the outdated domain controllers. These domain controllers will not
replicate with the outdated domain controllers if you have set the below mentioned
registry key.You must set the following registry setting on all the domain controllers to
enable the Strict Replication:
KEY
Name: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parame
ters

Registry Entry: Strict Replication Consistency

Value: 1 (enabled), 0 (disabled)

Type: REG_DWORD
17) What is Super Scope in DHCP?

Ans:A superscope is an administrative feature of Dynamic Host Configuration Protocol


(DHCP) servers running Windows Server 2008 that you can create and manage by using
the DHCP Microsoft Management Console (MMC) snap-in. By using a superscope, you
can group multiple scopes as a single administrative entity. With this feature, a DHCP
server can:
Support DHCP clients on a single physical network segment (such as a single
Ethernet LAN segment) where multiple logical IP networks are used. When more
than one logical IP network is used on each physical subnet or network, such
configurations are often called multinets.
Support remote DHCP clients located on the far side of DHCP and BOOTP relay
agents (where the network on the far side of the relay agent uses multinets).
In multinet configurations, you can use DHCP superscopes to group and activate
individual scope ranges of IP addresses used on your network. In this way, the DHCP
server can activate and provide leases from more than one scope to clients on a single
physical network.

Superscopes can resolve specific types of DHCP deployment issues for multinets,
including situations in which:
The available address pool for a currently active scope is nearly depleted, and
more computers need to be added to the network. The original scope includes
the full addressable range for a single IP network of a specified address class.
You need to use another range of IP addresses to extend the address space for
the same physical network segment.
Clients must be migrated over time to a new scope (such as to renumber the
current IP network from an address range used in an existing active scope to a
new scope that contains another range of IP addresses).
You want to use two DHCP servers on the same physical network segment to
manage separate logical IP networks.
18) What is the requirement to configure Full memory Dump in windows?

Ans:To generate a complete memory dump file:


1. Click Start > right-click Computer and select Properties in the menu.
2. Click Advanced > Settings > Startup and Recovery > Settings > Write
debugging information > Complete memory dump.
3. Click OK twice.
19) Which DNS record is required for Replication?
Ans:- Host A records of replication partners (Domain Controllers), Srv Records to find out
the Domain Controllers GUID in _msdcs zone (DC Locator)
20) Tools to analyze Memory Dump?
Ans:Windows Debugger (WinDbg.exe) tool
Dumpchk,exe
21) Tools to troubleshoot Group Policy issues?
Ans:- You can use AD inbuilt features to troubleshoot group policy issue like RSOP.msc or
can run RSOP by selecting users in Active Directory users and computers, gpresult -v,
gpt.ini in sysvol under Group Policy GUID folder can be checked to find out the GPO
settings configured
22) What AD parameters can be added to enable the Monitoring for AD?
23) How to troubleshoot AD replication issues?
Ans:- It can be troubleshooted by repmon command that generates the error result in
eventvwr. DNS can be checked between two destination. Network/Firewall issue

24) Booting sequence in windows 2008?


Heres the brief description of Windows Server 2008 Boot process.
1.
2.
3.
4.
5.
6.
7.

System is powered on
The CMOS loads the BIOS and then runs POST
Looks for the MBR on the bootable device
Through the MBR the boot sector is located and the BOOTMGR is loaded
BOOTMGR looks for active partition
BOOTMGR reads the BCD file from the \boot directory on the active partition
The BCD (boot configuration database) contains various configuration
parameters( this information was previously stored in the boot.ini)
8. BOOTMGR transfer control to the Windows Loader (winload.exe) or
winresume.exe in case the system was hibernated.
9. Winloader loads drivers that are set to start at boot and then transfers the control
to the windows kernel.

25) How to edit Schema in AD?


Ans:- Firstly, schmmgmt.dll has to be register. Then ADSIEdit tool can be used to edit
schema.
26) Difference between Windows 2003 & Windows 2008 boot process
Ans:Windows 2003 Boot Process:
1.POST
2.The MBR reads the boot sector which is the first sector of the active partition.
3.Ntldr looks path of os from boot.ini
4.Ntldr to run ntdedetect.com to get information about installed hardware.
5.Ntldr reads the registry files then select a hardware profile, control set and loads
device
drivers.
6.After that Ntoskrnl.exe takes over and starts winlogon.exe which starts lsass.exe
Windows Server 2008 Boot process.
1.
2.
3.
4.
5.
6.
7.

System is powered on
The CMOS loads the BIOS and then runs POST
Looks for the MBR on the bootable device
Through the MBR the boot sector is located and the BOOTMGR is loaded
BOOTMGR looks for active partition
BOOTMGR reads the BCD file from the \boot directory on the active partition
The BCD (boot configuration database) contains various configuration
parameters( this information was previously stored in the boot.ini)
8. BOOTMGR transfer control to the Windows Loader (winload.exe) or
winresume.exe in case the system was hibernated.

9. Winloader loads drivers that are set to start at boot and then transfers the control
to the windows kernel.

27) Name of utilities that is being used to check multipathing


Ans:- FCInfo utility or Storage Explorer (windows 2008) can be used to check the same.
For complete details: http://yourcomputer.in/how-to-check-wwn-on-windows-server/
28) How to create Host A record remotely?
Ans:- dnscmd command can be used for creating a Resource Record on DNS server.
Below is the command:

dnscmd [<ServerName>] /recordadd <ZoneName> <NodeName> <RRType> <RRData>

29) What is glue record?


Ans:Name servers in delegations are identified by name, rather than by IP address. This
means that a resolving name server must issue another DNS request to find out the IP
address of the server to which it has been referred. If the name given in the delegation
is a subdomain of the domain for which the delegation is being provided, there is
a circular dependency. In this case the name server providing the delegation must also
provide one or more IP addresses for the authoritative name server mentioned in the
delegation. This information is called glue. The delegating name server provides this
glue in the form of records in the additional section of the DNS response, and provides
the delegation in the answer section of the response.
For example, if the authoritative name server for example.org is ns1.example.org, a
computer trying to resolve www.example.org first resolves ns1.example.org. Since ns1
is contained in example.org, this requires resolving example.org first, which presents a
circular dependency. To break the dependency, the name server for the top level
domain org includes glue along with the delegation for example.org. The glue records
are address records that provide IP addresses for ns1.example.org. The resolver uses
one or more of these IP addresses to query one of the domains authoritative servers,
which allows it to complete the DNS query.
30) What is Loopback Group Policy?
Ans:- Group Policy applies to the user or computer in a manner that depends on where
both the user and the computer objects are located in Active Directory. However, in
some cases, users may need policy applied to them based on the location of the

computer object alone. You can use the Group Policy loopback feature to apply Group
Policy Objects (GPOs) that depend only on which computer the user logs on to.
31) Difference between Windows 2003 and Windows 2008
Ans:- http://yourcomputer.in/difference-between-windows-2003-and-2008/
32) TCP/UDP ports used in Windows?
Ans:- http://yourcomputer.in/list-port-numbers-windows/

33) Types of RAID


Ans:- http://yourcomputer.in/what-is-raid-configuration-in-windows/

Top Interview Questions for a System Administrator (Microsoft) Position:


All of the questions below are very common and must be prepared for before facing any interview for
a System-Server Administrator position.
Q: What is Active Directory?
A: Active Directory provides a centralised control for network administration and security. Server
computers configured with Active Directory are known as domain controllers. Active Directory stores
all information and settings for a deployment in a central database, and allows administrators to
assign policies and deploy and update software.
Q: What is a Domain?
A: A domain is defined as a logical group of network objects (computers, users, devices) that share
the same Active Directory database. A tree can have multiple domains.
Q: What is Domain Controller?
A: A domain controller (DC) or network domain controller is a Windows-based computer system that
is used for storing user account data in a central database. It is the centrepiece of the Windows
Active Directory service that authenticates users, stores user account information and enforces
security policy for a Windows domain.
A domain controller allows system administrators to grant or deny users access to system resources,
such as printers, documents, folders, network locations, etc., via a single username and password.
Q: What is Group Policy?

A: Group Policy allows you to implement specific configurations for users and computers. Group
Policy settings are contained in Group Policy objects (GPOs), which are linked to the following Active
Directory service containers: sites, domains, or organizational units (OUs).
Q: What are GPOs (Group Policy Objects)?
A: A Group Policy Object (GPO) is a collection of settings that control the working environment of
user accounts and computer accounts. GPOs define registry-based policies, security options,
software installation and maintenance options, script options, and folder redirection options.
There are two kinds of Group Policy objects:

* Local Group Policy objects are stored on individual computers.


* Nonlocal Group Policy objects, which are stored on a domain controller, are available only
in an Active Directory environment.

Q: What is LDAP?
A: LDAP (Light-Weight Directory Access Protocol) determines how an object in an Active Directory
should be named. LDAP is the industry standard directory access protocol, making Active Directory
widely accessible to management and query applications. Active Directory supports LDAPv2 and
LDAPv3.
Q: Where is the AD database stored?
A: The AD database is stored in C:\Windows\NTDS\NTDS.DIT.
Q: What is the SYSVOL folder?
A: The SYSVOL folder stores the server copy of the domains public files that must be shared for
common access and replication throughout a domain.
All AD databases are stored in a SYSVOL folder and its only created in an NTFS partition. The
Active Directory Database is stored in the %SYSTEM ROOT%NDTS folder.
Q: What is Garbage collection?
A: Garbage collection is the online defragmentation of the Active Directory which happens every 12
hours.
Q: When do we use WDS?
A: Windows Deployment Services is a server role used to deploy Windows operating systems
remotely. WDS is mainly used for network-based OS installations to set up new computers.
Q: What is DNS and which port number is used by DNS?
A: The Domain Name System (DNS) is used to resolve human-readable hostnames like
www.intenseschool.com into machine-readable IP addresses like 69.143.201.22.
DNS servers use UDP port 53 but DNS queries can also use TCP port 53 if the former is not
accepted.

Q: What are main Email Servers and which are their ports?
A: Email servers can be of two types:
Incoming Mail Server (POP3, IMAP, HTTP)
The incoming mail server is the server associated with an email address account. There cannot be
more than one incoming mail server for an email account. In order to download your emails, you
must have the correct settings configured in your email client program.
Outgoing Mail Server (SMTP)
Most outgoing mail servers use SMTP (Simple Mail Transfer Protocol) for sending emails. The
outgoing mail server can belong to your ISP or to the server where you setup your email account.
The main email ports are:

* POP3 port 110

* IMAP port 143

* SMTP port 25

* HTTP port 80

* Secure SMTP (SSMTP) port 465

* Secure IMAP (IMAP4-SSL) port 585

* IMAP4 over SSL (IMAPS) port 993

* Secure POP3 (SSL-POP) port 995

Q: What do Forests, Trees, and Domains mean?


A: Forests, trees, and domains are the logical divisions in an Active Directory network.
A domain is defined as a logical group of network objects (computers, users, devices) that share the
same active directory database.
A tree is a collection of one or more domains and domain trees in a contiguous namespace linked in
a transitive trust hierarchy.
At the top of the structure is the forest. A forest is a collection of trees that share a common global
catalog, directory schema, logical structure, and directory configuration. The forest represents the
security boundary within which users, computers, groups, and other objects are accessible.
Q: Why do we use DHCP?
A: Dynamic Host Configuration Protocol assigns dynamic IP addresses to network devices allowing
them to have a different IP address each time they are connected to the network.

Q: What are Lingering Objects?


A: A lingering object is a deleted AD object that still remains on the restored domain controller in its
local copy of Active Directory. They can occur when changes are made to directories after system
backups are created.
When restoring a backup file, Active Directory generally requires that the backup file be no more
than 180 days old. This can happen if, after the backup was made, the object was deleted on
another DC more than 180 days ago.
Q: How can we remove Lingering Objects?
A: Windows Server 2003 and 2008 have the ability to manually remove lingering objects using the
console utility command REPADMIN.EXE.
Q: Why should you not restore a DC that was backed up 6 months ago?
A: When restoring a backup file, Active Directory generally requires that the backup file be no more
than 180 days old. If you attempt to restore a backup that is expired, you may face problems due to
lingering objects.
Q: How do you backup AD?
A: Backing up Active Directory is essential to maintain the proper health of the AD database.
Windows Server 2003
You can backup Active Directory by using the NTBACKUP tool that comes built-in with Windows
Server 2003 or use any 3rd-party tool that supports this feature.
Windows Server 2008
In Server 2008, there isnt an option to backup the System State data through the normal backup
utility. We need to use the command line to backup Active Directory.
1. Open up your command prompt by clicking Start, typing cmd and then hit Enter.
2. In your command prompt, type wbadmin start systemstatebackup -backuptarget:e: and press
Enter.

--------------------------========================================---------------------------------Windows admin interview questions

Describe how the DHCP lease is obtained.


Its a four-step process consisting of (a) IP request, (b) IP offer, IP selection and (d) acknowledgement.

I cant seem to access the Internet, dont have any access to the corporate network and on ipconfig my
address is 169.254.*.*. What happened?
The 169.254.*.* netmask is assigned to Windows machines running 98/2000/XP if the DHCP server is not
available. The name for the technology is APIPA (Automatic Private Internet Protocol Addressing).

Weve installed a new Windows-based DHCP server, however, the users do not seem to be getting DHCP
leases off of it.
The server must be authorized first with the Active Directory.

How can you force the client to give up the dhcp lease if you have access to the client PC?
ipconfig /release

What authentication options do Windows 2000 Servers have for remote clients?
PAP, SPAP, CHAP, MS-CHAP and EAP.

What are the networking protocol options for the Windows clients if for some reason you do not want
to use TCP/IP?
NWLink (Novell), NetBEUI, AppleTalk (Apple).

What is binding order?


The order by which the network protocols are used for client-server communications. The most frequently used
protocols should be at the top.

How do cryptography-based keys ensure the validity of data transferred across the network?

Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting
ends, the data was modified or corrupted.

Should we deploy IPSEC-based security or certificate-based security?


They are really two different technologies. IPSec secures the TCP/IP communication and protects the
integrity of the packets. Certificate-based security ensures the validity of authenticated clients and servers.

What is LMHOSTS file?


Its a file stored on a host machine that is used to resolve NetBIOS to specific IP addresses.

Whats the difference between forward lookup and reverse lookup in DNS?
Forward lookup is name-to-address, the reverse lookup is address-to-name.

How can you recover a file encrypted using EFS?


Use the domain recovery agent.

What is the Difference between Windows 2003 standard Enterprise, Premium, Data center and Web
Edition?
WEB EDITION:
To position windows server 2003 more competitively against other web servers, Microsoft has released a
stripped-down-yet-impressive edition of windows server 2003 designed specially for web services. the feature
set and licensing allows customers easy deployment of web pages, web sites, web applications and web
services.
Web Edition supports 2GB of RAM and a two-way symmetric multiprocessor(SMP). It provides unlimited
anonymous web connections but only 10 inbound server message block(SMB) connections, which should be
more than enough for content

publishing. The server cannot be an internet gateway, DHCP or fax server. Although you can remotely
administer the server with Remote Desktop, the server can not be a terminal
server in the traditional sense. The server can belong to a domain, but cannot be a domain controller. The
included version of the microsoft SQL server database Engine can support as many as 25 concurrent
connections.

How do you recover an object in Active Directory, which is accidentally deleted by you, with no backup?
Using ntdsutil.exe command,we can restored the AD objects.

What is the Logical / Physical Structures of the AD Environment?


physical structure:
Forest, Site, Domain, DC
logical structure:
Schema partition, configuration partition, domain partition and application partition

How to change the windows xp product key if wrongly installed with other product key but you have
original product key? What you will do to Make your os as Genuine?
Some third party software are available for this function or reinstall this system

If 512mb Ram is there what will be the minimum and maximum Virtual memory for the system?
To workout the total virtual memory (page file) required for windows XP you should take the amount of ram in
the system and + 25% (512MB + 25% (128MB) = 640MB total virtual memory. by setting both the min and max
to 640MB you can increase the performances of the operating system.

What is LDAP?

LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to
look up information from a server.

What is the SYSVOL folder?


The Sysvol folder on a Windows domain controller is used to replicate file-based data among domain
controllers. Because junctions are used within the Sysvol folder structure, Windows NT file system (NTFS)
version 5.0 is required on domain controllers throughout a Windows distributed file system (DFS) forest.

What are application partitions? When do we use them?


Application Directory Partition is a partition space in Active Directory which an application can use to
store that application specific data. This partition is then replicated only to some specific domain
controllers.The application directory partition can contain any type of data except security principles (users,
computers, groups).

How do we Backup Active Directory?


Backing up Active Directory is essential to maintain an Active Directory database. You can back up Active
Directory by using the Graphical User Interface (GUI) and command-line tools that the Windows Server
2003 family provides.You frequently backup the system state data on domain controllers so that you can
restore the most current data. By establishing a regular backup schedule, you have a better chance of
recovering data when necessary.To ensure a good backup includes at least the system state data and contents
of the system disk, you must be aware of the tombstone lifetime. By default, the tombstone is 60 days. Any
backup older than 60 days is not a good backup. Plan to backup at least two domain controllers in each
domain, one of at least one backup to enable an authoritative restore of the data when necessary.

How do we restore AD?


You cant restore Active Directory (AD) to a domain controller (DC) while the Directory Service (DS) is
running. To restore AD, perform the following steps.
Reboot the computer.
The computer will boot into a special safe mode and wont start the DS. Be aware that during this time the
machine wont act as a DC and wont perform functions such as authentication.

1. Start NT Backup.
2. Select the Restore tab.
3. Select the backup media, and select System State.
4. Click Start Restore.
5. Click OK in the confirmation dialog box.
After you restore the backup, reboot the computer and start in normal mode to use the restored information.
The computer might hang after the restore completes; Ive experienced a 30-minute wait on some machines.

What are GPOs?


Group Policy gives you administrative control over users and computers in your network. By using Group
Policy, you can define the state of a users work environment once, and then rely on Windows Server 2003 to
continually force the Group Policy settings that you apply across an entire organization or to specific groups of
users and computers.

What domain services are necessary for you to deploy the Windows Deployment Services on
your network?
Windows Deployment Services requires that a DHCP server and a DNS server be installed in the domain

What is the difference between a basic and dynamic drive in theWindowsServer2008environment?


A basic disk embraces the MS-DOS disk structure; a basic disk can be divided into partitions (simple volumes).
Dynamic disks consist of a single partition that can be divided into any number of volumes. Dynamic disks also
support Windows Server 2008 RAID implementations.

What is the main purpose of a DNS server?


DNS servers are used to resolve FQDN hostnames into IP addresses and vice versa

Commonly Used DNS Records?


A-Records (Host address)
CNAME-Records (Canonical name for an alias)
MX-Records (Mail exchange)
NS-Records (Authoritative name server)
PTR-Records (domain name pointer)
SOA-Records (Start of authority)
------------------------------------------\\\\\\\\\\\\\\\\\\\-------------------\\\\\\\\\\\\\\\\\\\\\\\----------------------------------------------------------

Whats the difference between NTFS & FAT?


NTFS is the current file system used by Windows Operating System. It provides security for local
user as well as for domain users. It offers features like security permissions (to limit other users'
access to folders), quotas (so one user can't fill up the disk), shadowing (backing up) and many
other features that help Windows. On the other hand, FAT32 is the older Microsoft file system,
primarily used by the Windows 9X line and Window could be installed on a FAT32 partition up to XP.
In comparison, FAT32 offers none of what was mentioned above, and also has a maximum FILE (not
folder) size of 4GB, which is kind of small these days, especially in regards to HD video.
Why cannot you restore a DC that was backed up 4 months ago?
When restoring a backup file, Active Directory generally requires that the backup file be no more
than 180 days old. The lifetime of backed up file is either 60 or 120 days. If attempt to you restore a
backup that is expired, you may encounter problems because of lingering objects.
What is VLAN?
VLAN Stand for Virtual Local Area Network. It is a logical grouping of network users and resources
connected to administratively defined ports on a switch.
Uses of VLAN are as follows:1. It is secured connection.
2. It reduces cost for any network.
3. It increases flexibility.
4. On a network, sensitive data may be broadcast. In such cases, it provides security only those

users who have access to the data.


4. It creates separate broadcast domain.
What is the use of Global Catalog?
A Global Catalog is something that each domain has, and it is used for authenticating the user on
the network, on windows 2000 network logons were protected from failures by assigning a Global
Catalog to every site. It stores a copy of all Active Directory objects in a forest. The global catalog
stores a full copy of all objects in the directory for its host domain and a partial copy of all objects for
all other domains in the forest.
What is role of active directory?
Active directory is a domain controller which is use to authenticate and administrate the group of
computer, user, server etc. The active Directory means a service that identifies and handles
resources, making them visible for different groups or members that are authorized. All the policies
and security will be applicable on the client machine which one is join the domain and all this policies
and security is defined in active directory.
What is binding order?
The order by which the network protocols are used for client-server communications. The most
frequently used protocols should be at the top.
What do I do to look at the RID allocation table for a Domain Controller?
Go to Command prompt and type
C:\>dcdiag /test:ridmanager /s:<dcname> /v
Here dcname is the name of our Domain Controller.
What is the role of Proxy Server?
A proxy server is a computer that acts as an intermediary between a local network and a larger-scale
network such as the Internet. Proxy servers provide increased performance and security. In some
cases, they monitor employees' use of outside resources. A proxy server is associated with or part of
a gateway server that separates the enterprise network from the outside network and a firewall
server that protects the enterprise network from outside intrusion.
What is CIDR?
CIDR stands for classless inter domain routing. It was developed in the 1990s as a standard scheme
for routing network traffic across the Internet. It helps in preventing the wasting of IP address and
nowadays we are facing the shortage of the IP address. So this CIDR helps to prevent the waste of
IP address. CIDR notation is a syntax of specifying IP addresses and their associated routing prefix.
It appends a slash character to the address and the decimal number of leading bits of the routing
prefix, e.g., 192.168.1.0/24

What is the role of DHCP?


Dynamic Host Configuration Protocol (DHCP) is used for the DHCP servers, automatically provides
an Internet Protocol (IP) host with its IP address and other related configuration information such as
the subnet mask and default gateway. The server knows nothing about the personal computers until
they make a request for information. Usually the most common information sent is IP address and
DHCP is used to make a large network administration easier. DHCP is also useful if an administrator
wants to change the IP addresses of a large number of systems. Instead of reconfiguring all the
systems, he can just edit one DHCP configuration file on the server for the new set of IP addresses.
What is the SYSVOL folder?
Sysvol is an important component of Active Directory. The Sysvol folder stores the servers copy of
the domains public files. The Sysvol folder is shared on an NTFS volume on all the domain
controllers in a particular domain. The term SYSVOL refers to a set of files and folders that reside on
the local hard disk of each domain controller in a domain and that are replicated by the File
Replication service (FRS). Sysvol is used to deliver the policy and logon scripts to domain members.
What is difference between Frond end & Back End Server?
A back end server is a computer resource that has not been exposed to the internet. For this the
computing resource does not directly communicate with the internet user. It can also be described as
a server whose main role is to store and retrieve all email messages. On the other hand, a frontend
server is a computer resource that has exposed to the internet.
What are the role Unicast, Multicast and Broadcast?
Unicast is a kind of transmission in which data is sent from one host to another host. Unicast
transmission is one-to-one communications.
Unicast -> A transmission to a single port.
Multicast is different from Unicast. Its a transmission where data can be sent to more host. Where
information is sent to multiple receiver.
On the other hand, In Broadcast data is sent by one host but received by all the hosted connected
with it.

Windows Questions and Answers:


1 :: What is the Difference between Windows 2003
standard Enterprise, Premium, Data center and Web
Edition?
WEB EDITION:
To position windows server 2003 more competitively against other web servers, Microsoft

has released a
stripped-down-yet-impressive edition of windows server 2003 designed specially for web
services. the feature set and licensing allows customers easy deployment of web pages,
web sites, web applications and web services.
Web Edition supports 2GB of RAM and a two-way symmetric multiprocessor(SMP). It
provides unlimited anonymous web connections but only 10 inbound server message
block(SMB) connections, which should be more than enough for content
publishing. The server cannot be an internet gateway, DHCP or fax server. Although you
can remotely administer the server with Remote Desktop, the server can not be a terminal
server in the traditional sense. The server can belong to a domain, but cannot be a domain
controller. The included version of the microsoft SQL server database Engine can support
as many as 25 concurrent connections.

Is This Answer Correct?74 Yes

4 No

Post Your Answer

2 :: How do you recover an object in Active Directory,


which is accidentally deleted by you, with no backup?
Using ntdsutil.exe command,we can restored the AD objects.

Is This Answer Correct?108 Yes

4 No

Post Your Answer

3 :: What is the Logical / Physical Structures of the AD


Environment?
physical structure:
Forest, Site, Domain, DC
logical structure:
Schema partition, configuration partition, domain
partition and application partition

Is This Answer Correct?73 Yes

7 No

Post Your Answer

4 :: How to change the windows xp product key if


wrongly installed with other product key but you have
original
product key? What you will do to Make your os as
Genuine?
Some third party software are available for this function or reinstall this system

Is This Answer Correct?55 Yes

6 No

Post Your Answer

5 :: If 512mb Ram is there what will be the minimum and


maximum Virtual memory for the system?
To workout the total virtual memory (page file) required for windows XP you should take the
amount of ram in the system and + 25% (512MB + 25% (128MB) = 640MB total virtual
memory. by setting both the min and max to 640MB you can increase the performances of
the operating system.

Is This Answer Correct?36 Yes

5 No

Post Your Answer

6 :: Ntfldr.exe is missing in win xp os what will you do?


Boot from windows xp cd and go to recovery console mode
give the administrator password
c:windows>
prompt will come
come out from windows with the help of command
c:windows>cd ..
c:>
go to cd prompt d:
d:>cd i386

d:i386>copy ntldr c: enter


d:i386>copy ntdetect.com c: enter
restart u r computer
problem fix

Is This Answer Correct?30 Yes

0 No

Post Your Answer

7 :: What is LDAP?
LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other
programs use to look up information from a server.

Is This Answer Correct?33 Yes

4 No

Post Your Answer

8 :: What is the SYSVOL folder?


The Sysvol folder on a Windows domain controller is used to replicate file-based data
among domain controllers. Because junctions are used within the Sysvol folder structure,
Windows NT file system (NTFS) version 5.0 is required on domain controllers throughout a
Windows distributed file system (DFS) forest.

Is This Answer Correct?18 Yes

2 No

Post Your Answer

9 :: What are application partitions? When do we use


them?
Application Directory Partition is a partition space in Active Directory which an application
can use to store that application specific data. This partition is then replicated only to some
specific domain controllers.

The application directory partition can contain any type of data except security principles
(users, computers, groups).

Is This Answer Correct?15 Yes

1 No

Post Your Answer

10 :: What is the KCC?


With in a Site, a Windows server 2003 service known as the KCC automatically generates a
topology for replication among the domain controllers in the domain using a ring
structure.Th Kcc is a built in process that runs on all domain controllers.
The KCC analyzes the replication topology within a site every 15 minute to ensure that it still
works. If you add or remove a domain controller from the network or a site, the KCC
reconfigures the topology to relect the change.

Server Roles and Features


Windows Server 2012: Server Roles and Features
The newest version of Windows Server has new and enhanced features that greatly simplify a
server administrators job making it easier and more efficient. Planning is the most logical step in the
process of installing and configuring your network for Windows Server 2012.
Any administrator realizes the value in knowing the capabilities, server roles, features, versions, and
licensing information of the server. So that the server can be put to the best possible use to allow for
making the network to be more efficient and allow users to be more productive within the
organization.
The role that a server performs is a primary duty, service, or technology that the server provides for
an organization. Windows Server 2012 provides several primary sever roles.
Windows Server 2012 Server Roles
Active Directory Certificate Services (ADCS) enables Windows Server 2012 to provide
certificates to clients and servers.
Active Directory Domain Services (ADDS) configures server to host Active Directory database,
and to use this database to authenticate users to logon to the network and authorize their use of
resources.

Active Directory Federation Services (ADFS) enables a Windows Server 2012 sever to use
login information for a variety of severs and services so that a single login provides users with
access to all resources.
Active Directory Lightweight Directory Services (ADLDS) used to setup a small version of
Active Directory database for the purpose of Active Directory integrated applications.
Active Directory Rights Management Services (ADRMS) enables Active Directory to exchange
information with AD RMS- compatible software. Enabling an additional layer of security that content
owners can use to protect their documents. Content owners can specifically set permissions that
controls who can open, modify, forward or print each document.
Application Server a server on which you have installed an server application such as Microsoft
SQL Server or Microsoft Exchange Server.
DHCP Server enables a Windows server to automatically lease IP addresses to different clients
such as computers and printers instead of requiring you to manually configure each devices IP
address settings.
DNS Server configures a Windows server to provide name resolution services the process by
which a computer finds a computers IP address based on a provide computer name.
FAX Server a fax server sends and receives faxes for multiple users. When it receives faxes, a fax
server forwards those faxes to the relevant users mailbox.
File and Storage Services a server service, used to manage access to files on the server. Also
used to implement Distributed File Services (DFS) and access to network storage.
Hyper-V Hyper V service is installed and configured to support the implementation of virtual
machines.
Print and Document Services enables you to centrally manage printers and scanners, as well as
their queues on the network.
Network Policy and Access Services enables you to secure remote access to the network,
meeting requirements that all remote users authenticate to the server running Network Policy and
Access Services before gaining access to the corporate network.
Remote Access - enables users to connect to the network remotely without requiring virtual private
network (VPN) connections.
Remote Desktop Services enables a Windows server to provide access to virtual desktops,
session-based desktops, and applications that encompass Remote App.
Volume Activation Services configures a Windows server to automate the process of tracking
volume license keys and their activation. The service can also be used to implement Key
Management Services (KMS) host or Active Directory-based license activation for domain members.
Web Server (IIS) enables the setup of a Windows server as a web server.

Windows Deployment Services (WDS) a service used to install and configure Windows
operating systems across the network.
Windows Server Update Services (WSUS) enables automated deployment of updates for
Microsoft products such as Windows and Microsoft Office.
Windows Server 2012 Features
Windows BitLocker Drive Encryption enable or disable encryption at the disk or volume level.
Enables encryption at the Windows startup environment.
Failover Clustering used to set up server clusters, increasing the reliability of you your servers by
providing back up servers.
Group Policy Management an administrative console used to implement Group Policy on an
organizations network.
Ink and Handwriting Services enables the network to support input via pens, and recognition of
handwriting and math equations.
Internet Printing Client configure support for user to connect and print to local printers or Internet
printers using the Internet Printing Protocol (IPP).
Network Load Balancing (NLB) used to balance the user workload across multiple servers
running a stateless application. Stateless applications respond independently to each client request,
making it possible for multiple servers to balance the client requests.
Remote Assistance enables support to clients that send invitations, by providing remote
assistance you can access the client desktop as if you were sitting at the actual computer.
Remote Server Administration Tools enables remote management of servers running Windows
Server 2008 R2 and Windows Server 2012. It is also possible to manage Windows Server 2003
servers as long as you connect to them through a server running either Windows Server 2008 R2 or
Windows Server 2012.
Simple Mail Transfer Protocol use to configure a server to send email messages.
Telnet Client, Telnet Server enables setup of server to support uses connecting and accessing
files using the Telnet Protocol. The Telnet Client is used to connect to Telnet servers.
Windows PowerShell- provides a command-line interface for running commands or scripts to
perform administrative tasks.
Windows Server Backup use to backup a Windows server and if necessary to restore a backup
after a server failure.
Windows System Resource Manager(WSRM) - enables the configuration of the allocation of both
a servers CPU and RAM resources.

Wireless Local Area Network Service (LAN) configure the wireless LAN service to enable a
server to communicate using a wireless network adapter.
Windows on Windows (WoW) 64 Support Windows Server 2012 64-Bit servers use this feature
to allow 32-Bit applications to run.
New Features Added to Windows Server 2012
Command auto-completion a feature that displays clickable lists of cmdlets as you type in
Windows PowerShell. Lists include matching cmdlets, parameters, parameter values, files, folders.
Enhanced storage Windows Server 2012 includes features that enable the operating system to
support large disk workloads on virtual machines. Also included is a new virtual hard disk format
(VHDX) which improves performance, support for Virtual Fibre Channel enabling virtual machines to
communicate with Fibre Channel Storage Area Networks (SANs); The ability to implement 4-KB disk
sectors on Hyper-V virtual disk for improved capacity and reliability; and support for Offloaded Data
Transfer (ODX), enabling the virtual machine host to focus CPU time on the application and rely on
the SAN to manage reading and writing to disk.
Features on Demand Choosing this feature during installation prevents Setup from copying all
operating system source files to the servers disk. The advantage is it eliminates the use of disk
space for storage of resource files. To install a feature or role you use Features on Demand to install
features and roles by obtaining source files and resources stored in a remote location, Windows
update, or the installation media. The disadvantage of implementation is that you must provide the
source files whenever you want to install a feature or sever role.
IP Address Management (IPAM) Server enables central management of both DHCP and DNS
servers. Can also be used to discover, monitor, and audit DHCP and DNS servers.
New Cmdlets new cmdlets for configuring and managing Active Directory replication and
replication topology.
Resilient File System (ReFS) included in Windows Server 2012 is this new file system provides
enhanced reliability, better data integrity, and compatibility with existing APIs and file system filters.
Revised Task Manager The new Task Manager includes a new Processes Tab, enabling you to
identify the processes that are consuming server resources.
User interface you are prompted during installation whether you want to install a Server Core
installation, a Minimal Server Interface, a server with a graphical user interface (GUI), or full desktop
experience interface. After installing a server different options can be chosen by using PowerShell
cmdlets.

Windows BrancheCache - a bandwidth optimization technology designed to optimize the traffic


on a wide area network (WAN). BranchCache optimizes performance by caching content from a
headquarters office and storing it locally on the BranchCache Server.

You might also like