Friday, July 31, 2009

mcse questions

MCSE stand for?
Microsoft Certified System Engineer.

2. How many versions of windows 2003 ?
Four version of windows 2003 are available
- Web Edition
- Standard Edition
- Data Centre Edition
- Enterprise Edition

Min hardware requirement of window XP & 2K3?
XP hardware requirement
Processor – 233 MHZ or Higher
RAM - 128 MB (recommended) & 64MB (Minimum)
Hard disk – 1.5 GB

Server 2003 Hardware requirement
Processor – 550MHZ
RAM – 128 MB (minimum) & 256 MB (recommended)
Hard disk – 2.9 GB

Why we format the drive?
Formatting a drive involves testing the disk and writing a new directory structure or address table onto the disk. Formatting also provide clustering and sector formation in a particular drive.

What is the difference between file system and system file?
File System :- A method for storing and organizing computer files and the data organizing computer files and the data they contain to make it easy to find and access them. Ex:- NTFS , FAT.

System file:- System files are software files required for starting your computer with your customized fonts.

What is the work of BOOT.INI , NTLDR , and NTDETECT.COM?
BOOT.INI :- It contains configuration option for a boot menu.
NTLDR :- Loads the operating system file to RAM.
NTDETECT.COM :- Responsible for detecting basic hardware that will be required to start the operating system.

What is difference between FAT16, FAT32 & NTFS?
FAT16 :- 16 bit cluster addressing therefore 65,536 cluster are addressable , max cluster size of 32 KB in DOS –based MS operating system yields a max partition size of 2 GB. With NT max cluster size is 64 KB , therefore max partition size is 4 GB, but FAT16 partition with 64 KB cluster size will not be readable in DOS, 95, 98,or ME.
FAT32 :- 32 bit cluster addressing, XP will create FAT32 partition upto 32 GB only.

NTFS :- 64 bit cluster addressing , 64 KB cluster size NTFS can format upto 1 TB partition.


What is the between NTFS 4.0 & 5.0?
NTFS 5.0 provide the disk Quota feature in addition to NTFS 4.0 .

Which file system use to format CD?
CDFS

What is difference between UNATTEND & RIS ?
UNATTEND Installation :- In unattend installation method, we create OS image with unattend file so that installation run without user interruption at client side, but this installation require existing operating system at at client side.

RIS(REMOTE INSTALATION SERVICE) :- In RIS installation method we create os images with DHCP server so that installation can client machine with the help of PXE BOOT Rom chip. But RIS can be created on domain controller only.

O.S.I Model represented by which organization?
ISO

What is range of class of IP address of class A, B, C, D, E?
Class A – 0 - 126
Class B - 128-191
Class C - 192-223
Class D - 223-239
Class E - 240-255

What is default gateway?
Default Gateway can be defined as entrance or exit for any network.

What is subnet mask?
A subnet mask is a 32 – bit value that allows the recipient of IP packets to distinguish the network ID portion
Of the IP address from the host ID portion of the IP address.

What is the difference between IP v4 & IPv6?
IP V4 :- It is 32 bit value and represented in binary system that is divided into four octat
IP V6 :- It is 128 bit value and represented in hexadecimal system .

What is Topologies ?
Network topology is the study of the arrangement or mapping of the elements (links, nodes, etc.) of a network, especially the physical (real) and logical (virtual) interconnections between nodes

What is technology?
The study or a collection of techniques; a particular technological concept; the body of tools and other implements produced by a given society.


How many types of technology used in networking?
Five types of technology used in the networking:-
- Ethernet
- Token Ring
- FDDI
- ATM
- Frame Relay

What is the difference between token ring & FDDI?
Token Ring :-
-Shielded twisted pair
-4, 16 Mbps
-No reliability specified
- Differential Manchester
-Centralized clock
-Priority and Reservation bits
- All three token operations possible
- Reliability specified (dual ring)

FDDI :-
-Optical Fiber
-100 Mbps
-Reliability specified (dual ring)
-4B/5B encoding
-Distributed clocking
-Timed Token Rotation Time
-Multi-token operation

What is ATM?
ATM (Asynchronous Transfer Mode) is a high-speed network protocol designed to support both voice and data communication. ATM is composed of 53 byte cells having 48 byte payloads, does not involve routing and is especially good for real time voice and video. DSL implementations often use ATM as the underlying data-transport protocol beneath TCP/IP.

What is Frame Relay?
A high-speed packet switching protocol used in wide area networks (WANs). Providing a granular service of up to DS3 speed (45 Mbps), it has become popular for LAN to LAN connections across remote distances, and services are offered by most major carriers.

What is client/server networking?
A computing model in which data processing tasks are distributed between clients, which request, display, and manipulate information, and servers which supply and store information.

What is the difference between Hub, Switch & Bridge?
A hub is typically the least expensive, least intelligent, and least complicated of the three. Its job is very simple: anything that comes in one port is sent out to the others

A switch does essentially what a hub does but more efficiently. By paying attention to the traffic that comes across it, it can "learn" where particular addresses are.

A router is the smartest and most complicated of the bunch. A simple way to think of a router is as a computer that can be programmed to understand, possibly manipulate, and route the data its being asked to handle




Write down the protocol of each layer of OSI model?
Protocols of each layer of OSI Model
- Application Layer: - HTTP,SMTP,DHCP,FTP,TFTP,SNMP
- Presentation Layer: - JPEG, MPEG ,PICT,TIFF,MIDI
- Session Layer: - NFS , NetBIOS,SQL,RPC,ASP
- Transport Layer:- TCP, UDP, SPX, NCP
- Network Layer:- IP, IPX, NetBEUI, Apple Talk
- Data Link Layer:- PPP,SLIP
- Physical Layer:- RJ45

What is the difference between XP Home & Professional Edition?
Windows XP Home Edition
· Contains basic support for security among multiple users.
· Built-in support for peer-to-peer networking, but only for up to five computers.
· The backup utility is not installed by default, but is included on the CD.
Windows XP Professional Edition
· Includes extended support for security between multiple users on the same machine.
· Better support for peer-to-peer networking, plus support for joining a "Windows NT domain."
· The backup utility is installed by default.
· The Professional edition includes the following components not found in the Home edition:
o Administrative Tools (in the Start Menu and Control Panel)
o Automated System Recovery (ASR)
o Boot Configuration Manager
o Driver Query
o Group Policy Refresh Utility
o Multi-lingual User Interface (MUI) add-on
o NTFS Encryption Utility
o Offline Files and Folders
o Open Files
o Performance Log Manager
o Remote Desktop
o Scheduled Tasks Console
o Security Template Utility
o Task kill
o Task list
o Telnet Administrator
· Provides support for multi-processor systems (2 or 4 CPUs), Dynamic Disks, Fax.

What is the use of device manager?
It allows user to view and modify hardware settings. Device drivers can be installed or upgraded, and problems with device can be found and deal with here.

What is the use of Driver signing?
Driver signing is a windows process that allows companies to digitally sign their device software. It prevent and poorly written drivers from damaging your system and also allows administrators to block the installation of unsigned drivers.

What is the difference between Workgroup & Domain?
Workgroup is a specific group of users or network devices, organized by job function or proximity to shared resources. A workgroup network is also known decentralized network
Domain is a group of networked windows computers that shares a single SAM(Security Accounts Manager). A domain is a centralized network in which there is a central machine called domain controller which controls whole network.

What is Domain & Domain Controller?
Domain :- Domain is a group of networked windows computers that shares a single SAM(Security Accounts Manager).
Domain Controller :- Domain controller is the central machine which handle and authenticate the complete domain. Domain controller can be created by installing active directory on server operating system.

What is Active Directory?
Active Directory (AD) is a technology created by Microsoft that provides a variety of network services, including:
-LDAP-like Directory services
-Kerberos based authentication
-DNS based naming and other network information
OR
Active Directory is a hierarchical collection of network resources that can contain users, computers, printers, and other Active Directories. Active Directory Services (ADS) allow administrators to handle and maintain all network resources from a single location

Which folders generated during Active Directory Installation?
NTDS & Sysvol

What is function of NTDS & SYSVOL folder?
NTDS folder contains Active Directory Data Base and log files. By default location for NTDS folder location are on the same partition as the operating system.
SYSVOL folder on a domain controller that contains group policies and logon script. SYSVOL is replicated between domain controllers by the file replication service

What is NATIVE MODE & MIX MODE?
Native Mode:- In windows 2000 domains, the domain mode in which all domain controller in a domain are running windows 2000 and a domain administrator has switched the domain operation mode from mixed mode to native mode. Native mode supports universal group and nesting of groups. In native mode, domain controllers running Windows NT 4.0 or earlier are not supported.
MIXED Mode: - In a windows 2000 domain, the default domain mode setting. Mixed mode enables windows NT based backup domain controllers to coexist with windows 2000 based domain controllers. Mixed mode does not support universal groups or the nesting of groups. In windows server 2003 domains, mixed mode is referred as windows 2000 mixed, and it is one of three domain functional levels available.

What is the requirement of Active Directory installation?
Following requirement for installation of active Directory installation.
- Operating system must be server type.
- TCP/IP properties must be configured.
- Machine should have one NTFS formatted partition.
- Should be login by administrator account.
- DNS must be configured.

Which Command is use for Active Directory installation?
DCPROMO

What is Answer file in Unattend installation?
Unattend.txt file contain the answer file.

What is ASCII?
ASCII (American National Standard Code for Information Interchange) is the most common format for computer text files. In general, ASCII is the standard code for information interchange among dissimilar computers and computer programs, using a coded character set consisting of 7-bit coded characters (8 bits including parity check).

What are NTFS Permissions?
NTFS permission allows administrator to fine tune permission setting give more control over what users can and cannot access. NTFS permission shows under security tab under properties of any file or folder. There are six basic NTFS permissions available: Full control, Modify, Read & Execute, Read, Write and List folder contents.

What is Disk Quota?
Disk Quota is used to limit a user’s or a group of user’s ability to consume disk space. This prevents a small group of users from monopolizing disk capacity and potentially interfering with other users or the entire system. Disk Quotas are commonly used by ISPs, by web hosting companies.

What is difference between Map Network drive & offline?
Map Network Drive is the virtual drive that creates a virtual drive of network data base for providing of accessing of remote machine data.
Offline is a windows feature that provides access of remote machine data base in case of network is not working properly.

What is Shadow Copy?
Shadow Copy (also called Volume Snapshot Service or VSS, or Previous Versions in Windows Vista) is a feature introduced with Windows Server 2003 and is in all releases of Microsoft Windows thereafter, that allows taking manual or automatic backup copies or snapshots of a file or folder on a specific volume at a specific point in time.

What is Terminal service & Remote desktop?
Terminal Services: The underlying technology that enables Remote Desktop for Administration, Remote assistance , and Terminal Server.
Remote Desktop:- A Microsoft windows server 2003 and Microsoft windows XP feature that enables an administrator to connect to a computer at a distant location and remotely operate the console.

Which protocol use in terminal service?
RDP protocol is used in terminal services.

What is use of Remote Assistance?
The Remote Assistance feature in Windows XP lets you share control of your computer with someone else over a network or the Internet.

What is difference between Basic Partition & Dynamic Volumes?
The main differences between basic and dynamic disks are:
· Dynamic disks support multipartition volumes; basic disks do not.
· Windows stores basic disk partition information in the registry and dynamic disk partition information on the disk.
The operations common to basic and dynamic disks are the following:
· Check disk properties, such as capacity, available free space, and current status.
· View volume and partition properties, such as size, drive-letter assignment, label, type, and file system.
· Establish drive-letter assignments for disk volumes or partitions, and for CD-ROM devices.
· Establish disk sharing and security arrangements for a volume or partition.
· Upgrade a basic disk to dynamic, or revert a dynamic disk to basic.


What is RAID 0, 1, 5?
RAID - Redundant Array of Independent (or Inexpensive) Disks. Type of disk storage configuration often used on servers, where several physical disks are combined into an array for better speed and/or fault tolerance.

RAID 0 (data striping) - file blocks are written to separate drives. Does not provide fault tolerance, because failure of one drive will result in data loss.
RAID 1 (data mirroring) - data is duplicated on two drives either through software or hardware. Provides faster read performance than a single drive and good fault tolerance.

RAID 5 :- Each entire data block is written on a data disk; parity for blocks in the same rank is generated on Writes, recorded in a distributed location and checked on Reads. RAID 5 requires a minimum of 3 drives to implement

What is Hardware RAID?
HARDWARE RAID - Dual-storage processors that improve data availability and performance create data protection information and transfer it to the disk drives. They are located in an external storage subsystem, freeing the CPU from performing RAID parity, striping, and rebuild overhead calculations. This intelligent circuit board controls the disk drives.


What is Parity?
A parity block is used by certain RAID levels. Redundancy is achieved by the use of parity blocks. If a single drive in the array fails, data blocks and a parity block from the working drives can be combined to reconstruct the missing

What is Hardware Profile?
The Hardware Profiles sub key stores information about the hardware profiles configured on the system.
A hardware profile consists of specified changes to the original hardware profile configured in the SOFTWARE and SYSTEM keys of HKEY_LOCAL_MACHINE. These changes are stored in the Hardware Profiles sub key in HKEY_LOCAL_MACHINE.

What is User Profile?
A User Profile is a collection of folders and data that stores the users current desktop environment, application and personal setting.

How many types of User Profile?
Three types of Profiles are configured in windows.
- Local Profile
- Roaming Profile
- Mandatory Profile

What is DHCP?
DHCP (Dynamic Host Configuration Protocol) is a protocol for automatic assignment of IP addresses in an organization's network. DHCP server assigns a dynamic IP address to each client, using the concept of a "lease" (amount of time) that the IP will be valid for a particular network node. Assigning short lease times to clients allows for a dynamic network with more nodes than available IP addresses.


What is Scope, Super scope & Multi scope?
Scope can be defined as a pool of IP address or range of IP address that are used to assigned to client.
Super Scope is the collection of several scopes under single DHCP server
Multi Scope contains the range of IP address from class D and used for the multicasting purpose.


What is APIPA?
A feature of windows that enables DHCP clients to automatically self – configure an IP address and subnet mask when their DHCP server can not found. APIPA provides IP address of range of 169.254.x.y with a subnet of 255.255.0.0


What is by default leased duration of DHCP?
8 days



What is difference and relation between BOOTP & DHCP?
BOOTP/DHCP differences
There are significant differences in the way in which BOOTP and DHCP perform host configuration. The following table compares and contrasts the features of the two protocols that vary.

BOOTP DHCP
Designed prior to DHCP. Designed after BOOTP.
Intended to configure diskless workstations with limited boot capabilities. Intended to configure frequently relocated networked computers (such as portables) that have local hard drives and full boot capabilities.
Dynamic BOOTP has a default 30-day expiration on IP address leases. DHCP has a default eight-day expiration on IP address leases.
Supports a limited number of client configuration parameters called vendor extensions. Supports a larger and extensible set of client configuration parameters called options.
Describes a two-phase bootstrap configuration process, as follows:
· Clients contact BOOTP servers to perform address determination and boot file name selection.
· Clients contact Trivial File Transfer Protocol (TFTP) servers to perform file transfer of their boot image. Describes a single-phase boot configuration process whereby a DHCP client negotiates with a DHCP server to determine its IP address and obtain any other initial configuration details it needs for network operation.
BOOTP clients do not rebind or renew configuration with the BOOTP server except when the system restarts. DHCP clients do not require a system restart to rebind or renew configuration with the DHCP server. Instead, clients automatically enter a rebinding state at set timed intervals to renew their leased address allocation with the DHCP server. This process occurs in the background and is transparent to the user.



What is DHCP Lease process?
DHCP lease process consists of a four packet conversion between the DHCP client and DHCP server. This process sometime also known as DORA.
- DISCOVER: - The DHCP clients initiates the process by trying to discover any DHCP server in the network
- OFFER:- Any server running the BOOTP service responds with an offer to an IP address if it receives the
Packet.
-REQUEST:- The DHCP client is not picky; it will request the first offer it receives. Also broadcast back to the
Network, this packet contains the server identifier (IP address) for the DHCP server who made the offer.
-ACKNOWLEDGEMENT:- The ack packet is sent from the DHCP server to the requesting client and contain
the pertinent IP configuration information – IP address, subnet mask, and any other optional information.


What is full form of MADCAP in DHCP?
The primary components of DHCP allow you to deploy a DHCP server and a Multicast Address Dynamic Client Allocation Protocol (MADCAP) server.
MADCAP server: - When you deploy DHCP as a MADCAP server, the DHCP server can dynamically assign multicast IP addresses to clients that want to join the group of clients that receive the information sent in the multicast messages.
What is port no. of DHCP?
67(Server) ,68(Client)

What is MAC Address?
MAC address is unique physical address for each NIC. It is in the hexadecimal format.

What is back up?
Backup is the activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe

How many type of Backup?
There are five types of backup in window server 2003.
- Normal Backup
- Incremental Backup
- Differential Backup
- Copy Backup
- Daily Backup

How many type of Restore?
Three types of Restore
- Original Location
- Alternate Location
- Single Folder

What is Extension of Backup?
Extension for Backup is .bkf

Which file is use to take Active Directory backup?
System state

What is A.S.R?
Automatic System Recovery, A device or process that detects a computer failure and attempts recovery

What is S.A.M?
Security Accounts Manager (SAM) :- A windows service used during the logon process. SAM maintains user account information, including the list of the groups to which a user belongs.

What is D.N.S?
Domain Name Service (DNS) is a network service used in TCP/IP networks that translates host names to IP address and vice versa.

How many Zones in DNS?
Three Zones are used in DNS
- Primary Zone
- Secondary Zone
- Stub zone

What is use of NSLOOKUP?
NSLOOKUP is a utility that allows user to query a name server to see which ip address a name resolve to.

Define all Resource Record?
The important resource record are as follows :
- SOA(Start Of Authority):- The SOA record includes information on the zone property information, such as of the primary DNS server for the zone and the version information.
- NS(Name Server) :- The Name Server (NS) resource record provides a list of the authoritative DNS servers for a domain, as well authoritative DNS server for any delegated sub domains. Each domain must have one (or more) NS resource records at the zone root.
- HOST (A) :- The Host(A) resource record contains the IP address of a specific host, and maps the FQDN to this 32- bit IPV4 addresses.
- Alias (CNAME):- Alias (CNAME) resource records ties an alias name to its associated domain name. Alias (CNAME) resource records are referred to as canonical names. Alias resource records should be used when user have to rename a host that is defined in a host (A) resource record in the identical zone.
- MX (Mail Exchanger):- The mail exchanger (MX) resource record provides routing for messages to mail servers and backup servers. The MX resource record provides information on which mail servers processes e-mail for the particular domain name.
- Pointer (PTR):- The pointer (PTR) resource record points to a different resource record, and is used for reverse lookups to point to A resource record.
- Service (SRV):- Service (SRV) resource records are typically used by Active Directory to locate domain controllers, LDAP servers, and global catalog servers. The SRV records defines the location of specific services in a domain.

What is ROOT HINT & FORWARDER?
Root Hints: DNS data stored on a DNS server that identifies the authoritative DNS servers for the root zone of the DNS namespace. The root hints are stored in the file cache.dns, located in the Windows\system32\Dns folder.
Forwarder: A DNS server designated by other internal DNS servers to be used to forward queries for resolving external or offsite DNS domain names

What is Web Server?
A server that holds and delivers web pages and other web content using the HTTP protocol.

What is Anonymous User?
The Anonymous user is used for public access (browsing) to your Web Site. Anonymous access is the most common Web site access control method. It allows anyone to visit the public areas of your Web sites while preventing unauthorized users from gaining access to your Web server's critical administrative features and private information.

What is VIRTUAL directory in WEB SERVESR?
A remote virtual directory is a directory that is not contained within the Web site's home directory but appears to client browsers as though it is within the home directory. A remote virtual directory has an alias that is mapped to a Universal Naming Convention (UNC) share location.

What is FTP?
File Transfer Protocol (FTP) is a TCP/IP protocol and software that permit the transferring of files between computer systems.

What is port on of FTP?
21

What is TELNET?
Telnet is a protocol that functions at application layer of OSI model, providing terminal emulation capabilities.

Why we use MMC?
The Microsoft Management Console (MMC) is a component of Windows 2000 and later Windows NT-based operating systems that provides system administrators and advanced users with a flexible interface through which they may configure and monitor the system.

How many GROUP type?
Two types of Group
- Security Group
- Distribution Group

What is Group?
Group is collection of user which make easy for administrator to perform the task of administrator level when they need to apply permission and restrictions with same level to menu of the user then such permission and restriction can be applied to related group.

What is by default Minimum length of password in 2K3?
7 character

What is File Server?
A file Server is a specialized server in holding and distributing files.

What is Certificate Authority?
Certificate Authority (CA) is an entity responsible for establishing and vouching for the authenticity of public keys belonging to subjects (usually users or computers) or other certificate authority.

What is Domain, Domain Tree & Forest?
Domain: A group of computers and other devices on a network that are administered as a single unit. On the Internet, domain names are hierarchical constructions (such as microsoft.com) that form the basis for the Domain Name System (DNS). On a Windows 2000 or Windows NT network, a domain is a group of users, computers, and other resources for which information is stored in a directory service, on a server called a domain controller.
TREE: A tree is a grouping or hierarchical arrangement of one or more window server 2003 domains that user can create one or more child domains to an existing parent domain. Domain in a tree shares a contiguous naming structure.

FOREST: A forest is a grouping or hierarchical arrangement of one or more separate completely independent domain tree. As such forests have the following feature:
* All domains in a forest share a common schema
* All domains in a forest share a common global catalog.
* All domains in a forest are linked by implicit two way transitive trust.
* Tree in a forest have different naming structure according to their domains.

What is BDC?
BDC stand for Backup Domain Controller. It also known as Additional Domain Controller(ADC). BDC is a Domain controller which has the following feature.
* It works as backup of primary domain controller provide the fault tolerance to PDC
* Replication takes place in between both domain controller (PDC & BDC)
* ADC does not have any FSMO roles
* There is no trusting in between PDC & BDC.

What is PDC?
PDC stand for Primary Domain Controller. (Primary Domain Controller) A Windows NT/2000/2003 service that manages security for its local domain. Every domain has one PDC, which contains a database of usernames, passwords and permissions. The PDC also provides a time service for the network and typically obtains the time from an edge router, which gets its time from the Internet

What is CHILD Domain Controller?
Child Domain is a domain located in the namespace tree directly beneath another domain (the parent domain). For example example.microsoft.com is a child domain of the parent domain, Microsoft.com. A child domain is also called a sub domain.

Which type of Trust is by default created in Child domains?
Parent child trust is created in child domains that is two transitive trust

What is FSMO Roles?
Flexible Single Master Operation (FSMO) roles are special roles assigned to one or more domain controller in an active directory domain.

What Schema, RID, PDC, Domain Naming Master & Infrastructure?
Schema: - The domain controller assigned the schema master role controls all updates and modification to the Schema.
Domain Naming Master:- The Domain Controller holding the domain naming master controls the addition or remove of domains in the forest.
RID:- The Domain Controller assigned the RID master role allocate sequence of relative IDs to each of the user in the various domain controllers in the domain.
PDC:- The Domain Controller assigned the PDC emulator master role is responsible for updating group policies and other security permission over the domain.
Infrastructure Master:- The Domain Controller assigned the Infrastructure master role is responsible for updating the group to user references whenever the member of groups are renamed or changed.

Name the FSMO Roles that work forest wide?
-Schema Master
-Domain Naming Master

Name the FSMO Roles that works domain wide?
-Relative Identifier (RID)
- Primary Domain Controller (PDC)
- Infrastructure Master

What is Domain Functionality?
- Window 2000 mix
-Window 2000 native
-Windows server 2003 interim.
-Window server 2000

What is the Forest Functional Level?
-Window 2000
-Window server 2003 interim.
-Window server 2003

What is Replication?
Replication is a process of copying directory information to other servers to keep them all synchronized.

What is Fault Tolerance?
Fault Tolerance is the ability of a system to ensure data integrity when an unexpected hardware or software failure occurs.

Which Command use for Replication?
replmon

Which process uses LM HOST?
LMHOST file used to provide WINS resolution for NetBIOS.

100. What is SMTP & POP?
Simple Mail Transfer Protocol (SMTP) is a protocol that allows for a simple e-mail service and is responsible for moving messages from one e-mail server to another.
Post Office Protocol (POP) provides a storage mechanism for incoming mail.

101. What is difference between RRAS & VPN?
RRAS
* It is use for remotely access of PC from another location
* RRAS uses the PPP protocol to communicate
* RRAS do not provide security
* Data sent in clear text form
VPN
* Provide private network communication over public network
* VPN use PPTP, IPSEC & L2TP protocol
* Provide security by using secure protocol
* Data sent in cipher text

102. Which protocol is use in VPN Process?
Following protocols are used in VPN Process:-
- IPSEC
- PPTP
- L2TP

103. Which protocol use in RRAS?
PPP protocol uses in RRAS.

104. What is NAT, ICS, PROXY?
NAT: - NAT stands for Network Address Translation. NAT is the translation of an Internet Protocol address (IP address) used within one network to a different IP address known within another network

PROXY SERVER: - A proxy server is an intermediate gateway that sits between a client PC and the Internet and provides forwarding/caching service, as well as security, logging and administrative control. A caching web proxy server saves content (such as Web pages) in its local cache the first time a request is made, and then serves the pages to other local clients from cache, without the need to forward the request to the Internet. Pages are only requested from the Internet if they are not found in cache. The proxy server forwards requests acting as a client, with its own IP address, and then in turn serves the pages to local clients. Caching proxy servers offer transparent service to clients, they can save bandwidth and improve performance, however they can also cause slowdowns when congested, as well as some problems delivering dynamic and secure content.

ICS: - ICS (Internet Connection Sharing) enables a Windows computer to share its Internet connection with other client computers on a local area network by sharing public LAN interface. To setup ICS, the host/server computer generally has two network adapters: one for the Internet, and one for the local area network.

105. What is TRUST?
Trust is the logical relationship between different domain controller in network that is used for inter domain login of users. It means by creating trust relationship between different domain we can login the user of trusted domains.

106. What is Realm Trust?
A realm trust relationship exists between an Active Directory domain and a non-Windows Kerberos realm.

107. What is G.P.O?
A Group Policy Object (GPO) is a collection of settings that define what a system will look like and how it will behave for a defined group of users. Microsoft provides a program snap-in that allows you to use the Group Policy Microsoft Management Console (MMC).

108. What is O.U?
An OU is a container that enables you to organize objects such as users, computers and even other OUs in a domain to form a logical administrative group. An OU is the smallest Active Directory component to which you can delegate administrative authority. A domain can have it own unique OU hierarchy.

109. What is Software Deployment?
Software Deployment is window server 2003 service that can be used to deploy software to computers or users across an organization or in a specific department or business unit.
110. What is DFS?
Distributed File System (DFS) is a service that allows system administrator to organize distributed network shares into a logical namespace, enabling users to access files without specifying their physical location and providing load sharing across network shares.

111. What is RPC?
RPC (Remote Procedure Call) is a protocol that a program can use to request a service from a program located on another computer in a network. RPC helps with interoperability because the program using RPC does not have to understand the network protocols that are supporting communication. In RPC, the requesting program is the client and the service-providing program is the server.

112. What is LDAP?
Lightweight Directory Access Protocol (LDAP) is a protocol which allows clients to perform object lookups with a directory using a standard method.

113. What is ROLL Back Driver?
Roll Back is new feature in XP & Window Server 2003 by which if any installed driver is not working properly we can recover that driver by roll back feature without using driver CD.

114. What is difference between Partition & Volume?
Partition is the feature of basic hard disk. Partitions are generally created on single hard disk. They do not provide the feature of disk sharing. There are two type of partition –
1. Primary partition
2. Extended Partition
We can create maximum four partition on a single hard disk in which we can create maximum one Extended partition.
Volume is the feature of the dynamic disk which has been created by using space of multiple hard disks. We can create unlimited number of volumes. There are five types of volumes.
- Simple Volume
- Spanned Volume
- Stripped Volume
- Mirrored Volume
- RAID

115. What are the Hardware & Software requirements of RIS?
Software requirement for RIS
- Operating System must be Server type
- Active Directory must be installed
- Two NTFS formatted partition
Hardware Requirement for RIS
- All client machines should have PXE boot ROM LAN card
- All machine are connected by RIS server

116. What is WINS?
Window Internet Naming Service (WINS) is a window NT service that dynamically associates the NETBIOS name of a host with a domain name.



117. What is NetBIOS?
Network Basic Input Output System (NetBIOS) is a session layer protocol that opens communication sessions for applications that want to communicate on a network.

118. What is CMOS, POST & BIOS?
CMOS(Complementary Metal Oxide Semiconductor) is an area of nonvolatile memory containing setting that determine how a computer is configured.
BIOS(Basic Input Output System) is ROM based software on a motherboard that acts as a kind of interpreter between an operating system and a computer’s hardware.
POST(Power On Self Test) is a set of diagnostic program, loaded automatically from ROM BIOS during startup, designed to ensure that the major system components are present and operating.

119. What is MAIL or EXCHANGE SERVER?
Exchange Server is the server which provides the service of mailing to the different users in the network or domain.

120. What is GCS?
The global catalog is the central repository of information about objects in a tree or forest. A domain controller that holds a copy of the global catalog is called a global catalog is called a Global Catalog Server (GCS).

121. Which Command checks the applied Group policies?
rsop.msc

122. Which file system support windows 2003?
NTFS & FAT

123. What is Event viewer?
Event viewer is a component by which you can view and manage event logs, gather information about hardware and software problem, and monitor security events.

124. Which file edit in profile to change it to Mandatory Profile?
Ntuser.dat

125. What is Schema?
The set of definitions for the universe of objects that can be stored in a directory. For each object class, the schema defines which attributes an instance of the class must have, which additional attributes it can have, and which other object classes can be its parent object class.

126. What is DELEGATION?
Delegation is an assignment of administrative responsibility to a user, computer, group, or organization.

127. What is difference between MICROSOFT OUTLOOK & OUTLOOK EXPRESS?
Microsoft Outlook is the in build feature of windows operating system. Microsoft Outlook has the high manipulating power as compare to other one.
Outlook Express is a feature of Microsoft office which also work as mail agent in windows operating system and also having the less manipulating power.

128. Which file contains BACKUP of mail in MICROSOFT OUTLOOK?
.pst file contain the Backup of mail in Microsoft Outlook.

129. What is range for PRIVATE IP Address?
The reserved Private addresses are as follows
Class A - 10.0.0.0 to 10.255.255.255
Class B – 172.16.0.0 to 172.31.255.255
Class C - 192.168.0.0 to 192.168.255.255


130. What is SOA in DNS?
SOA(Start Of Authority):- The SOA record includes information on the zone property information, such as of
the primary DNS server for the zone and the version information.

131. What is IETF?
Internet Engineering Task Force - an open international community that standardizes most Internet communication protocols.

132. Why we use Zone Transfer in DNS?
Zone transfer The process by which Domain Name System (DNS) servers interact to maintain and synchronize authoritative name data. When a DNS server is configured as a secondary master for a zone, it periodically queries another DNS server configured as its source for the zone. If the version of the zone kept by the source is different, the secondary master server will pull zone data from its source DNS server to synchronize zone data.

133. What is IP Security?
IPSec (short for IP Security) is a group of related protocols for negotiating encryption and authentication at the IP (host-to-host) level. IPSec is a security extension of IPv4 and a requirement for IPv6 that encrypts all transmissions over a TCP/IP network. IPSec tunnels use port 500/udp for Internet Key Exchange (IKE), as well as port 50 for Encapsulation Header (ESP), and/or port 51 for Authentication Header (AH).

134. What is Stub Zone?
A copy of a zone that contains only the resource records required to identify the authoritative DNS servers for that zone. A DNS server that hosts a parent zone and a stub zone for one of the parent zone’s delegated child zones can receive updates from the authoritative DNS servers for the child zone.

135. Why we use EFS?
EFS (Encrypting File System) is a Microsoft windows server 2003 feature that enables users to encrypt files and folders on an NTFS volume to keep them safe from intruders who have physical access to the disk.

136. Which symbol use to access any drive in network without sharing?
$ symbol

138. What is the difference between ARP & RARP?
ARP (Address Resolution Protocol) is a protocol for mapping IP addresses to MAC (Media Access Control) physical machine addresses. ARP uses an ARP cache table to maintain a correlation and convert between each MAC address and its corresponding IP address in both directions.

RARP (Reverse ARP) A TCP/IP protocol used by a diskless workstation to obtain its IP address. Upon startup, the client station sends out a RARP request in an Ethernet frame to the RARP server, which returns the layer 3 addresses for a layer 2 address (performing the opposite function of an ARP).

139. Which Command use ICMP protocol?
Ping Command uses the ICMP Protocol.

140. What is the function of PING & TRACEROUTE?
Ping (Packet Internet Gopher) is a basic Internet utility program that sends a small amount of data (ICMP packet) to test connectivity between network devices. The verb ping refers to using the ping command to test whether a particular IP address exists and can accept requests.
Traceroute is a utility that records the route between your computer and a destination computer on the Internet. It measures the time it takes to reach each node (specific gateway computer at each hop) needed to make the connection.

141. What is Tunnel in VPN?
A Tunnel is a virtual point-to-point connection made through a public network. It transports encapsulated datagram.

142. What is Point to Point & Peer to Peer?
Point to Point Network communication in which two devices have exclusive access to a network medium. For Example a printer connected to only one workstation would be using a point to point connection.
Peer to Peer Computer that hooked together and have no centralized authority. Each computer is equal and can act as a both a server and a workstation.

143. What is difference between Internet, Intranet & Extranet?
Internet: A packet switching internetwork that consists of thousands of individual networks and millions of computers around the world. No central managing body owns or administers the internet.
Intranet: A TCP/IP network owned by a private organization that provides services such as Web sites only to that organization's users.
Extranet: It is a network that connects different intranet in the organization.

144. What is H.C.L?
HCL stands for Hardware Compatibility List which simplifies the installation and reduce the potential errors.

145. What is CAL?
CAL stands for Client Access License. CAL is the legal right to connect to a service or application. CAL can be configured per server per device/per user.

146. What is IIS?
Internet Information service (IIS) is the software service that support web site creation, configuration, and management, along with other internet functions. Microsoft internet Information service include Network News Transfer Protocol (NNTP), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP).

147. What is Netlogon service?
A user-mode service that runs in the Windows security subsystem. The Netlogon service passes the user’s credentials through a secure channel to the domain database and returns the domain security identifiers and user rights for the user. In addition, the Netlogon service performs a variety of other functions related to the user logon process, such as periodic password updates for computer accounts and domain controller discovery.

148. What is I.A.S?
Internet Authentication Services (IAS):- A service included with Microsoft windows server 2003 that provide centralized authentication and authorization services.

149. What is difference between Leased line Circuit Switching & Packet Switching?
Circuit Switching: A type of network communications in which two communicating systems establish a connection that remains open throughout the life of the transaction. The telephone network is an example of a circuit-switched network. After placing a call, the telephone system establishes a path through the network connecting the two telephones, and all communications follow that path until it is broken by one of the callers disconnecting.

Packet Switching: A type of network communications in which messages are broken up into discrete units and transmitted to the destination. These units (called packets) can take different routes to the destination and might arrive there in a different order than that in which they were sent, but the receiving system is capable of reassembling them in the proper order. Packet switching is what makes it possible for the computers on a LAN to share a single network medium. If the computers transmitted entire messages at once, they could monopolize the network for long periods of time, preventing other computers from transmitting.
150. What is difference between 2K & 2k3?
Window 2000
- We can apply 620 group policies
- No restore option
- Simultaneously 10 users can access in a network
- We can make nearly 1 million users
Window 2003
- We can apply 720 group policies
- Restore option
- Simultaneously unlimited users can access on the network
- We can create on billion users

151. What is GCS?
GCS stands for Global Catalog Server. The global catalog is the central repository of information about objects in a free or forest. A domain Controller that holds a copy of the global catalog is called a global catalog server. By default, a global catalog is created automatically on the initial domain controller in the first domain controller.

152. Which protocol is equivalent with IPX & SPX?
IPX is equivalent to IP protocol & SPX is equivalent to TCP

153. What is Virtual Memory?
Virtual memory is type of memory in computer technology where hard disk space is used as a kind of backup memory. The swap file is used to provide virtual memory to the windows system.

154. How we set logon hours on Users?
Logon hours can be set on a user by following process
R.C on user à properties à Account à logon hours à selects the logon hours and days à apply








155. What is RADIUS?
RADIUS (Remote Access Dial-Up User Service) is an authentication standard technology, often used to protect access to wireless networks. RADIUS is a user name and password scheme that enables only approved users to access the network; it does not affect or encrypt data. The first time a user wants access to the network, secure files or internet locations, he or she must input his or her name and password and submit it over the network to the RADIUS server. The server then verifies that the individual has an account and, if so, ensures that the person uses the correct password before she or he can get on the network. RADIUS can be set up to provide different access levels or classes of access.

156. What is Port Number?
A Port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server.

No comments:

Post a Comment