Wednesday, July 16, 2008

Interview base Question

. What does the Mount protocol do?
The Mount protocol returns a file handle and the name of the file system in which a requested file resides. The message is sent to the client from the server after reception of a client's request.

What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?
10Base2—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband
signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments
. 10Base5—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband
signaling, with 5 continuous segments not exceeding 100 meters per segment
. 10BaseT—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling

Explain a DNS resource record?

A resource record is an entry in a name server's database. There are several types of resource records used, including name-to-address resolution information. Resource records are maintained as ASCII files.

What protocol is used by DNS name servers?

DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP.

Explain RIP (Routing Information Protocol)?
It is a simple protocol used to exchange information between the routers.

Explain OSPF?

It is an Internet routing protocol that scales well, can route traffic along multiple paths, and uses knowledge of an Internet's topology to make accurate routing decisions.

Explain NVT (Network Virtual Terminal)?

It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session.

Explain Gateway-to-Gateway protocol?

It is a protocol formerly used to exchange routing information between Internet core routers

Explain IGP (Interior Gateway Protocol)?

It is any routing protocol used within an autonomous system.
Why should you care about the OSI Reference Model It provides a framework for discussing network operations and design.


Explain the difference between routable and non- routable protocols?

Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router

Explain the range of addresses in the classes of internet addresses?

Class A 0.0.0.0 - 127.255.255.255
Class B 128.0.0.0 - 191.255.255.255
Class C 192.0.0.0 - 223.255.255.255 Class
D 224.0.0.0 - 239.255.255.255 Class
E 240.0.0.0 - 247.255.255.255

Explain the minimum and maximum length of the header in the TCP segment and IP datagram?

The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes.

Explain MAC address?

The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique.

Explain RAID?

A method for providing fault tolerance by using multiple hard disk drives.

Explain NETBIOS and NETBEUI NETBIOS?
is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications. NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets.

Explain frame relay, in which layer it comes?

Frame relay is a packet switching technology. It will operate in the data link layer

Explain subnet?

A generic term for section of a large networks usually separated by a bridge or router.
How Gateway is different from Routers?

A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats.

What are the important topologies for networks
BUS topology: In this each computer is directly connected to primary network cable in a single line.
Advantages: Inexpensive, easy to install, simple to understand, easy to extend.
STAR topology: In this all computers are connected using a central hub.
Advantages: Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems.
RING topology: In this all computers are connected in loop.
Advantages: All computers have equal access to network media, installation can be simple, and signal does not degrade as much as in other topologies because each computer regenerates it.

What are major types of networks and explain
Server-based network
Peer-to-peer network Peer-to-peer network
computers can act as both servers sharing resources and as clients using the resources. Server-based networks provide centralized control of network resources and rely on server computers to provide security and network administration

Explain difference between baseband and broadband transmission?
In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.

. What are the possible ways of data exchange
(i) Simplex
(ii) Half-duplex
(iii) Full-duplex
Learn all about Ready Boost


If you're using Windows Vista, you can use Ready Boost to speed up your system. A new concept in adding memory to a system, it allows you to use non-volatile flash memory—like a USB flash drive or a memory card—to improve performance without having to add additional memory. Learn more.

One of the questions I am often asked is how to speed up the time it takes Windows to load or boot. There are a variety of factors (both hardware and software) involved in lowering the amount of time it takes for Windows to load. I will go over most of these ways in this page starting with changes in the system BIOS and moving onward from there.All of these changes are optional, and do not need to be carried out. Instead, they are offered as suggestions to try to lower the time it takes for Windows to boot. Some of these changes are very advanced and should only be attempted if you are comfortable with making the changes and have your data backed up.

System BIOS Changes:

One of the first places to help speed boot time in Windows is to make some simple changes to the system BIOS. The BIOS or Basic Input/output System is a set of instructions and commands built into the motherboard that allows the computer to know what type of hardware is connected and how to communicate with that hardware. You'll first have to gain access to the BIOS setup screen to make any changes. Do not make changes to the system settings in the BIOS lightly, one mistake can render the computer unbootable and cause more problems than its worth. For this reason, do not attempt making changes to the system BIOS unless you are willing to accept the risk along with it. With that said, you'll want to follow the directions below and make some simple changes to speed up the boot process
.1) You must start with the computer completely off, not in sleep or hibernation mode. Then turn the computer on
.2) Enter the system BIOS screen by the manufacturer’s suggestion. Depending on the computer, this may involve pressing the DEL key, pressing F1, Pressing F10, holding down CTRL-ALT-S, or a variety of other keystrokes to get to the BIOS screen. For a more complete list of keystrokes to enter the BIOS screen, visit Michael Steven's page on the subject
.3) Once in the BIOS setup, look for a BOOT menu and select it with your keyboard arrow keys, Tab, and Enter
.4) In most modern BIOS screens, you'll find an option for Quick Boot. Enable this to skip memory tests and other minor Power on Self Tests (POST)
.5) Find an option for Boot Device Priority next, and change the first boot device to be the hard drive. Changing this option will speed up the boot process, but it will also not allow the computer to boot from a floppy disk or CD-ROM. If booting from anything other than the hard drive is important to you, please skip this step. If later on, you need to boot from a CD-ROM, simply re-enter the BIOS setup and make the CD-ROM the first boot device
.6) Choose the option to Exit and Save Changes and the computer will reboot.There are other options in the BIOS to speed up boot time such as choosing the exact settings for your hard drive, and disabling AUTO DETECT of hard drives and other media. However I am skipping those changes and leaving them for a later discussion.

How to Speed Up Windows Boot Time
Changes to Windows Settings:


The next group of changes to consider will be to the many Windows settings. We will use a handy tool called the System Configuration Utility to accomplish most of these changes. Follow the steps below to open and use this tool.

Startup Tab Changes:

1) Click on Start, Run and type MSCONFIG and press Enter

2) Click on the STARTUP tab in the System Configuration Utility to view all the items that begin on Startup. An example is shown below.Each item on the Startup tab that is checked loads immediately after Windows starts. If there are lots of items here, this will slow down the boot time for Windows considerably. Each of these items can be toggled on or off simply by using the checkmark box to the left of the item.The column directly to right of the checkmark is the Name of the program, while the next column over is the location on the hard drive or other device of the file. Finally the last column shows where in the computer the file is started from. This location could be in the registry as is the case with all the locations that begin with HKLM or HKCU, or it could be in the Windows Startup folder found under ALL PROGRAMS in Windows XP.You can examine each of these startup items and uncheck any that are not necessary. How do you know which ones are not necessary? Well, in most computer configurations, you'll want drivers running for your graphics or video controller and sound card, and most likely an antivirus and firewall running. Other startup items are usually extras that could be eliminated from boot up. To discover what a particular item is used for, jot down the name for the item and go over to a site called Process Library, type in the name of the process and click Find. This is a very handy tool for discovering which startup items are truly needed.When you are done modifying the checkmarks to the Startup tab, click OK and you'll be asked to reboot the system.Windows Services ChangesOnce the computer is rebooted, click on Start, Run and type MSCONFIG and press Enter again. This will reopen the System Configuration Utility. Click on the Services tab, then click on the option at the bottom called "Hide All Microsoft Services" to see what unnecessary Windows services are running that can be removed. Generally speaking, you want services related to your video/sound cards and antivirus or firewall programs left running. Other services may not be essential and can be removed. Remember to only remove unessential services or you risk experiencing boot problems. Use Google to search for information on unfamiliar services. Another good resource is Black Viper's Strange Services page.


Hardware Changes to Increase Boot Time:

Adding more Memory (RAM)Other than upgrading the motherboard and CPU, you can generally increase the amount of RAM in your computer to make it load programs and applications faster and provide a more enjoyable computing experience. You'll want to check your motherboard to make sure you have available slots and the maximum amount of RAM you can add to your particular motherboard.

Replacing your Hard Drive with a Faster RPM Drive:

If you have a slower hard drive such as a 5400 RPM or slower, you may want to consider upgrading to a faster 7200 RPMhard drive. The difference in RPM speed will generally be quite noticeable.

Changing to Static IP:

If your computer is connected to a local area network that you control and you have a DHCP server enabled on your router, during the boot process the computer queries the network to valid IP address. You can shave seconds off your boot time by assigning a valid IP address to your computer instead of using DHCP to assign it. To setup a Static IP for your computer, follow these directions.
1) Click on Start, Run
2) Type NCPA.CPL and press Enter to open the Network Connection Control Panel
3) Right-click on the Local Area Connection and choose Properties
4) Click on Internet Protocol (TCP/IP) and click Properties
5) You should see a screen similar to the one below. Fill in your static IP, subnet, default gateway, and DNS server information and click OK. If you aren't sure of your IP ranges on your router, consult your router manual or a friend that is more knowledgeable in networking terminology. Again, this is an optional item and does not necessarily need to be accomplished. Using DHCP is fine, although you sacrifice a few seconds for an IP to be assigned to from the network.

Switching from Master/Slave to Cable Select:

Master/Slave Settings Now for a refresher course on hard drive connections. When connecting more than one hard drive to a computer on the same IDE controller, you generally have to assign one as the primary (master) and one as the secondary (slave). You do this by changing the jumpers on the hard drive next to the power connector. Normally, the drive will have a diagram to let you know which jumper should be set for a master drive and which to set for a slave drive. You'll notice in the picture below the jumpers are circled on the end of the drive and the top of the drive shows the diagram to follow.After changing the jumpers, connect the hard drive cable from the motherboard to the hard drives. Under normal circumstances, the end of the drive cable attaches to the Master hard drive, while the inside connector on the cable connects to the Slave drive.

What About Cable Select?

Cable Select (CS) settings were designed to make it easier to connect hard drives because you didn't need to bother with setting the Master/Slave jumpers. You just connect the drives and depending on where you connected them to the cable the computer would know which is Master and which is Slave...in theory. Now comes the confusing part.With cable select, you first needed a special 40 conductor IDE cable that would determine master/slave connections. This was different from the normal IDE cables at the time. Also, the Master connector on CS cables was the inside connector not the end connector. This made for a very confusing switch from everyday master/slave configurations.80 conductor Ultra DMA cables WILL determine the Master/Slave settings through Cable Select however. So as technology advances, Cable Select as a concept may still catch on. With the newer Ultra DMA cables, you can set both drives to Cable Select (CS), connect them and they will work. Another change with the 80 conductor cables, the Master connector is on the end of the cable where it should be. In situations where you are using a newer Ultra DMA drive and cable, you can use Cable Select or standard Master/Slave jumper settings and the drive will boot properly.In my scenario to start this article, the change from Master/Slave to Cable Select for this particular computer reduced the Windows boot time by more than 2 minutes.For more information on Master/Slave settings versus Cable Select visit the following pages:

Other Windows Performance Tips:

Reduce the Number of Fonts installed:
Every font that is installed in Windows has to load when Windows starts. The more fonts you have installed, the slower Windows loads. Although you can safely have around 1000 fonts loaded in Windows, I like to keep my font list closer to 300-500 or fewer if possible. There are certain fonts that are definitely required by Windows, so be careful in removing any fonts from your computer unless you know they are not needed. Fonts such as Verdana,Arial,Trebuchet, Tahoma, Tahoma, Times New Roman, MS Sans Serif, and Courier New should be left on your system. Follow the directions below to remove extra fonts from Windows XP.
1) Open My Computer
2) Double-click on Drive C
3) Click on File, New Folder and title it Fonts Backup
4) Double-click on the Windows folder to open it
5) Double-click on the Fonts folder
6) Highlight the fonts you wish to remove, click on Edit and choose COPY
7) Navigate back to the C:\Fonts Backup folder and PASTE these fonts into your backup folder
8) Return to the Fonts Folder and right-click on any fonts you previously copied to the backup folder, then choose Delete.If you accidentally removed a font, simply reverse the procedure by copying and pasting the font back into the Windows\Fonts folder.

Disk Cleanup, Scandisk, and Defrag:

Performing regular hard drive maintenance on your computer every few months will not only catch problems before they cause serious damage but also make your hard drive run at its optimal level. Follow these instructions to clean up the drive and defrag it.
1) Open My Computer
2) Right-click on the hard drive usually Drive C
3) Click on the Tools tab
4) Under Error Checking, click on Check Now. Optionally, you may want to check the boxes to "Automatically Fix File Errors" and "Scan For and Attempt Recovery for Bad Sectors"
5) Next, click on the General tab and click on Disk Cleanup. After the computer calculates the amount of files to remove, place a checkmark next to the type of files you wish to remove and click Ok. Read the descriptions for each type of file to determine if you should delete it.
6) Finally, click on the Tools tab again and under Defragmentation click Defragment Now
7) Click on the hard drive you wish to defrag, click on Analyze and then click on Defragment. This process may take some time to complete.

Speed ur pc

5 ways to speed up your PC

By following a few simple guidelines, you can maintain your computer and keep it running smoothly. This article discusses how to use the tools available in Windows XP Service Pack 2 (SP2) and Windows Vista to more efficiently maintain your computer and safeguard your privacy when you're online.

* Free up disk space
* Speed up access to data
* Detect and repair disk errors
* Protect your computer against spyware
* Learn all about ReadyBoost

Free up disk space
By freeing disk space, you can improve the performance of your computer. The Disk Cleanup tool helps you free up space on your hard disk. The utility identifies files that you can safely delete, and then enables you to choose whether you want to delete some or all of the identified files.Use Disk Cleanup to:

.Remove temporary Internet files.
.Remove downloaded program files (such as Microsoft ActiveX controls and Java applets).
•Empty the Recycle Bin.
•Remove Windows temporary files.
•Remove optional Windows components that you don't use.
•Remove installed programs that you no longer use.

Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access later.
To use Disk Cleanup
1.Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.
2.In the Disk Cleanup for dialog box, scroll through the content of the Files to delete list.
Choose the files that you want to delete.
3.Clear the check boxes for files that you don't want to delete, and then click OK.
4.When prompted to confirm that you want to delete the specified files, click Yes.
After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your computer cleaner and performing better


Speed up access to data

Disk fragmentation slows the overall performance of your system. When files are fragmented, the computer must search the hard disk when the file is opened to piece it back together. The response time can be significantly longer.
Disk Defragmenter is a Windows utility that consolidates fragmented files and folders on your computer's hard disk so that each occupies a single space on the disk. With your files stored neatly end-to-end, without fragmentation, reading and writing to the disk speeds up.
When to run Disk DefragmenterIn addition to running Disk Defragmenter at regular intervals—monthly is optimal—there are other times you should run it too, such as when:
•You add a large number of files.
•Your free disk space totals 15 percent or less.
•You install new programs or a new version of Windows.


To use Disk Defragmenter:

1.Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter.
Click Analyze to start the Disk Defragmenter.
2.In the Disk Defragmenter dialog box, click the drives that you want to defragment, and then click the Analyze button. After the disk is analyzed, a dialog box appears, letting you know whether you should defragment the analyzed drives.
Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.
3.To defragment the selected drive or drives, click the Defragment button. Note: In Windows Vista, there is no graphical user interface to demonstrate the progress—but your hard drive is still being defragmented.
After the defragmentation is complete, Disk Defragmenter displays the results.
4.To display detailed information about the defragmented disk or partition, click View Report.
5.To close the View Report dialog box, click Close.
6.To close the Disk Defragmenter utility, click the Close button on the title bar of the window.


Detect and repair disk errors

In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.
As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing (such as file saving) difficult, or even impossible. The Error Checking utility scans the hard drive for bad sectors, and scans for file system errors to see whether certain files or folders are misplaced.
If you use your computer daily, you should run this utility once a week to help prevent data loss.


To run the Error Checking utility:
1.Close all open files.
2.Click Start, and then click My Computer.
3.In the My Computer window, right-click the hard disk you want to search for bad sectors, and then click Properties.
4.In the Properties dialog box, click the Tools tab.
5.Click the Check Now button.
6.In the Check Disk dialog box, select the Scan for and attempt recovery of bad sectors check box, and then click Start.
7.If bad sectors are found, choose to fix them.
Tip: Only select the "Automatically fix file system errors" check box if you think that your disk contains bad sectors.


Protect your computer against spyware

Spyware collects personal information without letting you know and without asking for permission. From the Web sites you visit to usernames and passwords, spyware can put you and your confidential information at risk. In addition to privacy concerns, spyware can hamper your computer's performance. To combat spyware, you might want to consider using Microsoft Windows Defender, which is included in Windows Vista, and is available as a free download for Microsoft XP SP2. Alternatively, there are other free anti-spyware software programs available.


Learn all about ReadyBoost

If you're using Windows Vista, you can use ReadyBoost to speed up your system. A new concept in adding memory to a system, it allows you to use non-volatile flash memory—like a USB flash drive or a memory card—to improve performance without having to add additional memory

Hardware And Computer Architecture

Hardware - Frequently Asked Questions

1.) Windows explorer is not working , what might be the problem and how you will fix?If The successful login is not letting the administrator to enter into the starting screen , then there will be missing of the browseui.dll,that file should be reinstalled to get the windows explorer working back.
2.) What are the components with which the Cisco Aironet components can associate?Not all Aironet devices can associate with all other types of Aironet devices. For instance, the Client Adapter card cannot form a wireless association with a Workgroup Bridge (WGB). Refer to Cisco Aironet Hardware Association Matrix for a complete description of association capabilities.
3.) What are the different platforms of Cisco Aironet APs available?Cisco Aironet 1500 SeriesCisco Aironet 1300 SeriesCisco Aironet 1240 AG SeriesCisco Aironet 1230 AG Series Cisco Aironet 1200 SeriesCisco Aironet 1130 AG SeriesCisco Aironet 1100 SeriesCisco Aironet 1000 Series
4.) WHAT MACS ARE UPGRADEABLE TO THE POWERPC?Apple will provide logic board replacements for all Centris, Quadra and WorkGroup Server models except the Quadra 700,900 and 950. There should also be logic board replacements for the IIvx, IIvi, LC 475, 520, 550, and 575, Performa 475,476, 550, and 600. Upgraded AV Macs will lose their special video capabilities, at least initially. Apple will also make available PowerPC processor upgrade boards that fit into the PDS slots of the Quadra 605, 610, 650, 700, 800, 900, and 950 as well as the Centris 610 and 650 and the Performa 475 and 476. Macs upgraded via a PDS card run at twice the speed of the system clock. Thus a 25 MHz 68040 Mac with a PDS accelerator will become a 50 MHz PowerMac. You'll be able to disable the accelerator if you have old software that's not PowerPC compatible or that just plain runs faster on the older hardware. 68030 desktop Macs with expansion slots will be upgradeable via third party accelerator cards. Daughtercard upgrades for the Powerbook 500 and Duo 280 series will be available sometime late this summer or early fall.
5.) CAN I ADD AN FPU TO MY MAC? CAN I REPLACE THE 68LC040 WITH A 68040?All 68020 and 68030 desktop Macs that did not ship with an FPU standard (i.e. the IIsi and LC series) have special slots that can accommodate an FPU card. All Macs that have the FPUless 680LC40 CPU run just fine if that chip is replaced with a full 68040 that includes an FPU. All PowerPC Macs include an integrated FPU. There is no way to add only an FPU to a 68000 Mac like an SE though some third party accelerators do include FPU's as well as faster CPU's.
6.) WHAT'S VRAM?Video RAM is where the computer stores the images displayed on your screen. On some earlier Macs with built-in video (Mac 128, IIci) this was kept in main memory. However it's considerably more efficient and faster to store the screen image in its own separate RAM. Generally the more VRAM you have the more colors or shades of gray you can display and the larger the monitors you can use. The chart below shows the number of colors that can be displayed at a given resolution with the specified amount of VRAM.
7.) What is Exchange Server 2007?Exchange Server 2007 is the next version of Exchange Server, the industry's leading server for e-mail, calendaring, and unified messaging. The release of Exchange Server 2007 is closely aligned with the Microsoft Office 2007 wave of products, which together deliver a best-in-class enterprise messaging and collaboration solution.
8.) What does it mean to "power cycle" a device?Power cycling an electronic device is a technical way of saying "resetting" it. When you power cycle a device, you turn it off and then turn it back on again. Pretty high-tech, huh? Usually, you should let the device sit for a couple seconds after turning it off to make sure the memory in the device is fully cleared before turning it back on. Any electronic device can be power cycled, but the term is frequently used with cable modems, DSL modems, and routers. This is because small internal errors in these devices can prevent them from functioning correctly. Resetting them typically fixes the errors and allows them to work correctly again.
9.) What does it mean when a computer is "low on resources?"The resources a computer has are mainly processing speed, hard disk storage, and memory. The phrase "low on resources" usually means the computer is running out of memory. The best way to prevent this error from coming up is to install more RAM on your machine. Upgrading your RAM is the best performance booster you can give your computer, and it usually doesn't cost a lot.


Computer Architecture - Frequently Asked Questions

1.) What is Virtual Memory?
This Memory is used extending the capability of physical memory. This memory is simulated by the hard drive.When all the RAM is being used the computer will swap data to the hard drive and back to give the impression that there is more memory
2.) What are the five stages in a DLX pipeline?
Instruction Fetch Stage Instruction Decode Stage Instruction Execution Stage Memory Stage Write Back
3.) What is MESI?
MESI is a Cache Coherency protocol used in multi-processor systems to indicate the state in which the data in the cache of a particular processor is. It stands of Modified, Exclusive, Shared and Invalid
4.) What is cache memory?
Cache memory is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. As the microprocessor processes data, it looks first in the cache memory and if it finds the data there (from a previous reading of data), it does not have to do the more time-consuming reading of data from larger memory.(cache memory is used between the c.p.u and the ram to access dta fastly)
5.) What is hard disk and what is its purpose?
Hard disk is the secondary storage device, which holds the data in bulk, and it holds the data on the magnetic medium of the disk.Hard disks have a hard platter that holds the magnetic medium, the magnetic medium can be easily erased and rewritten, and a typical desktop machine will have a hard disk with a capacity of between 10 and 40 gigabytes. Data is stored onto the disk in the form of files.
6.) What’s the speed and device maximum specs for Firewire?
EEE 1394 (Firewire) supports the maximum of 63 connected devices with speeds up to 400 Mbps.
7.) What’s the difference between L1 and L2 cache?
Level 1 cache is internal to the chip, L2 is external. L1 Cache is of Higher speed than that of L2 Cache.
8.) What is the difference between primary & secondary storage device?
In primary storage device the storage capacity is limited. It has a volatile memory. In secondary storage device the storage capacity is larger. It is a nonvolatile memory. Primary devices are: RAM / ROM. Secondary devices are: Floppy disc / Hard disk.

Frequently Asked Questions

Computer Networks & Linux

1.) What is The A Port Number?
A Port Number is allocated by the operating system (or can be requested) , in such a way to identify the pocess in a standalone system or a network.default Port Number for FTP is 21.
2.) What is a default gateway?
The exit-point from one network and entry-way into another network, often the router of the network.
3.) What is DHCP?
DHCP is a protocol which is designe for Automatic Give the IP Address to DHCP client.. DHCP Assine the IP Address for few days Lease & capture the clients MAC address.. It is Updated version of BootP…
4.) What is a default gateway?
The exit-point from one network and entry-way into another network, often the router of the network.
5.) How do you set a default route on an IOS Cisco router?
ip route 0.0.0.0 0.0.0.0 x.x.x.x [where x.x.x.x represents the destination address]
6.) What is the difference between a domain local group and a global group?
Domain local groups grant permissions to objects within the domain in which the reside. Global groups contain grant permissions tree or forest wide for any objects within the Active Directory
7.) What is LDAP used for?
LDAP is a set of protocol used for providing access to information directories.
8.) What tool have you used to create and analyze packet captures?
Network Monitor in Win2K / Win2K3, Ethereal in Linux, OptiView Series II (by Fluke Networks).
9.) What is the significance of the IP address 255.255.255.255?
The limited broadcast address is utilized when an IP node must perform a one-to-everyone delivery on the local network but the network ID is unknown.

Linux - Frequently Asked Questions


1.) Is UNIX and Linux Both Are same?
No,Both are different.But Both are writen in POSIX standards , thats why lots of authors used to refer as same, but strictly saying both are differnt.
2.) Tell The Two Boot loader Names in Linux?
The Most Popular Boot Loaders are…
LILO
GRUB
3.)What is the major advantage of a hash table?
The major advantage of a hash table is its speed. Because the hash function is to take a range of key values and transform them into index values in such a way that the key values are distributed randomly across all the indices of a hash table.
4.)What is NFS? What is its job?
NFS stands for Network File System. NFS enables filesystems physically residing on one computer system to be used by other computers in the network, appearing to users on the remote host as just another local disk.
5.)What is the main advantage of creating links to a file instead of copies of the file?
The main advantage is not really that it saves disk space (though it does that too) but, rather, that a change of permissions on the file is applied to all the link access points. The link will show permissions of lrwxrwxrwx but that is for the link itself and not the access to the file to which the link points. Thus if you want to change the permissions for a command, such as su, you only have to do it on the original. With copies you have to find all of the copies and change permission on each of the copies.
6.)In Linux OS, what is the file server?
The file server is a machine that shares its disk storage and files with other machines on the network
7.)Which field is used to define the user’s default shell?
command-The last field, called either command or login command, is used to specify what shell the user will use when he logs in.
8.)What is LILO?
LILO stands for Linux boot loader. It will load the MBR, master boot record, into the memory, and tell the system which partition and hard drive to boot from..

Network Services
Whether improving a legacy system, integrating new hardware into an established setup, or building next generation solutions, Command has the experience and expertise to precisely meet your networking needs. We can help identify areas for improvement, enhance existing functionality, and streamline overall performance to provide your organization with a consistently reliable, next generation-ready technological backbone

Jetking India's No 1 Computer Hardware & Networking Institute

Hyderabad
Jetking Infotrain Ltd

Jetking India's No 1 Computer Hardware & Networking Institute. Jetking, the pioneer Institute in the field of Computer Hardware and Networking has helped 2,00,000 students in 100 centres across the country realize their dreams by placing them with bluechip companies. We are looking for quality-driven, proactive professinals for our Regional Office at Secunderabad, Ameerpet & Dilshuknager.

Address:
Jetking Infotrain Ltd, 209,
Archana Arcade,
Behind Hotel Ramakrishna,
Opp Railway Reservation Complex,
Secunderabad (RO cum Centre).

Telephone: 66316912/13, 9392484656

http://secro@jetkinginfotrain.com

Win 2003

Some interview base Question

10. WHAT IS AD
A. A active directory centralized database where it contains information about objects like, Users, Groups, Computers, Printers, OUs, Contacts and Shared Folders.
11. FEATURES OF AD
A. Fully integrated Security, Integration with DNS, Policy Based Administration, Scalable, Flexible, Extensible, Inter operability with other directory services.
12. WHAT ARE THE COMPONENTS OF AD
A. Logical Structure : Domains, Trees, Forests & OUs
Physical Structure : Sites and Domain Controllers
13. WHAT IS STRUCTURE OF AD
A. LOGICAL and PHYSICAL
14. WHAT IS THE PROTOCOL USED BY AD FOR DIRECTORY ACCESS
A. LDAP Light Weight Directory Access Protocol
15. WHAT ARE THE NAMING CONVENTIONS USED BY LDAP
A. DN-(Distinguished Name)RDN-(Relative Distinguished Name)
UPN-(User Principal Name) GUID-(Golbal Unique Identifier)
16. WHAT IS A DOMAIN
A. Domain is collection of computers connected together with a server and users.
17. WHAT IS WORKGROUP
A. Collection of computers connected together without a server (only clients)
18. WHAT IS A TREE
A. Tree is a logical component of AD. Is a collection of domains which share contiguous name space.
19. WHAT IS A FOREST
A. Collection of Trees which don’t share contiguous name space.
20. WHAT IS A SITE
A. Site is a Physical component of AD. Group of TCP/IP subnets connected with a high speed wan link.
21. WHAT IS DC
A. Server with AD installed

22. WHAT IS A CHILD DC
A. Is a sub domain controller under root domain controller which share name space.
23. WHAT IS AN ADDITIONAL DC
A. It is a backup server for DC
24. HOW TO PROMOTE DC ON A MEMBER SERVER
A. Start - run - DCPromo
25. WHAT IS A ROLE OF ADDITIONAL DC
A. It maintains backup of AD to provide fault tolerance and network load balancing.
26. A DC CAN HAVE HOW MANY ADDITIONAL DCS
A. Any no. of ADCs
27. WHAT ARE THE ADDITIONAL TOOLS FOUND AFTER INSTALLING A DC
A. ADUC, ADSS, ADDT, DCSP, DSP
28. WHAT ARE DIFF FUNCTIONAL LEVELS OF 2003
A. Domain functional level and Forest functional levels
29. WHAT IS A MEMBER SERVER
A. 2000 of 2003 server which is a part of the domain
30. WHAT IS A STANDALONE SERVER
A. Server which is not a part of domain
31. WHAT IS AN OBJECT
A. It is a representation of in entity
32. WHAT ARE THE DIFFERENT OBJECTS IN AD
A. Users, Groups, Computers, Printers, OUs, Contacts and Shared Folders
33. WHAT IS A SCHEMA
A. Set of rules. Schema is design of AD, defines objects and classes
34. WHAT IS AN ATTRIBUTE
A. Attribute is a piece of information about objects (Properties of objects)
35. WHAT IS A CLASS
A. Class is a Collection of AD objects
36. WHAT IS AN FSMO
A. Flexible single master operations
37. WHAT ARE THE DIFF OPERATIONS MASTER OF 2003
38. SCHEMA MASTER, DOMAIN NAMING MASTER, PDC EMULATOR, INFRASTRUCTURE MASTER, RID MASTER
39. WHAT IS A SCHEMA MASTER
A. Is responsible for over all management, structure and design of schema
Only one schema master in entire forest
40. WHAT IS A DOMAIN NAMING MASTER,
A. Is responsible for addition or removal of domains and maintaining unique domain names.
Only one DN master in entire forest
41. WHAT IS A PDC EMULATOR
A. Is responsible for providing backward compatibility for NT BDCs in mixed mode. It acts like a PDC for BDCs. It updates the password changes, Synchronizes time between DCs
Only one PDC EMULATOR per domain.
42. WHAT IS A INFRASTRUCTURE MASTER
A. Is responsible for updating user and group information and updating Global Catalog,
Only one INFRASTRUCTURE MASTER per domain
43. WHAT IS A RID MASTER
A. Relative Identifier is responsible for assigning unique IDs to the objects created in the AD
Only one RID MASTER per domain
44. WHAT IS FILE SYSTEM
A. File system provides the services like saving, deleting & copying of files & folders in a systematic manner on the hard disk
45. WHAT ARE DIFF FS SUPPORTED BY 2000 & 2003
A. FAT, FAT32, NTFS, CDFS & UDFS


46. FEATURES OF NTFS IN 2000 & 2003
A. Provides file & folder level security, compression, encryption, reduced fragmentation, hot fixing, maximum partition size : 2 TB, file size : up to 64 GB, Disk quotas, mounting.
46. NEWLY ADDED NTFS FEATURES IN 2003
A. Volume Shadow copy services, maximum partition size: 16 TB
file size can be up to 16 TB, Recovery logging of disk activities
47. WHAT IS THE NTFS VERSION FOR 2000 & 2003
A. Ver 5.0 & 5.1 for 2000 and Ver 5.2 for win 2003
48. WHAT ARE THE FILE & FOLDER PERMISSIONS IN 2K
A. File Permissions: Fullcontrol, Modify, Read & Execute, Read, Write, Special Permissions
Folder Permissions: Fullcontrol, Modify, Read & Execute, List Folder Contents, Read, Write, Special Permissions
49. WHAT IS THE SIGNIGICANCE OF MODIFY & FULL CONTROL PERMISSIONS
A. FC = RWXDO, Modify = RWXD
50. WHAT ARE THE ADVANCED PERMISSIONS AVAILABLE IN 2K
A. Combination of permissions.
51. WHAT ARE THE FILE ATTRIBUTES
A. Read, Write, Hidden & Archive.
52. WHAT ARE THE SHARE LEVEL PERMISSIONS
A. Full Control, Change, Read
53. HOW TO SHARE A RESOURCE (F/F, DRIVE, PRINTER, ETC...)
A. Right Click - Properties - Share
54. SHARE/FILE NAMES CAN BE UPTO
A. Share name can be up to 80 Characters, File Names can be up to 255 characters.
55. HOW TO MAP A SHARED RESOURCE
A. Right click on the share and click map network drive
56. HOW TO CONNECT TO A SHARED RESOURCE USING COMMAND PROMPT
A. Start - Run - CMD - Net use Z: (\\systemname\sharename)
57. WHAT IS NET USE, NET SHARE, NET VIEW, NET USER ETC
A. Net use for mapping drives, net share for creating shares, net view for users logged in and net user for creating or modifying users
58. HOW TO SHARE A RESOURCE REMOTELY
A. From Computer Management - connect to the computer - shared folders - new
59. HOW TO ACCESS A REMOTE SHARE
A. Start - Run - (\\SN\SN) or My network places
60. WHAT IS A QUOTA & ITS FEATURES
A. New feature in 2000 & 2003. Quotas enable in Administrator to limit the access to the free space on local or server’s hard disks
61. WHAT IS A DFS,
A. Distributed file system enable in Administrator to gather all the scattered shares on the network and maintain in a single server and make them appear as if they are on the same side server
62. BENEFITS OF DFS
A. Easy file access, fault tolerance, load balancing and security
63. DFS TERMINOLOGY
A. DOMAIN DFS ROOT, STANDALONE DFS ROOT & DFS LINK
64. DIFF B/W DOMAIN DFS ROOT AND STAND ALONE DFS ROOT
A. Domain DFS root offers fault tolerance and load balancing, can be configured only on DC.
Stand Alone DFS root does not offer FT & LB can be configured only on Stand alone server
63. WHAT IS A DFS REPLICA OR TARGET
A, It is a backup for doman dfs root on another server
64. HOW MANY DFS ROOTS CAN EXIST FOR A DC
A. 5000 to 50000
65. HOW MANY DFS LINKS CAN EXIST FOR A DC
A, 5000 to 50000

66. NO OF DFS REPLICAS CAN EXIST FOR A DC
A. 31
67. WHAT IS EFS & ITS FEATURES
A. Encryption is the process of converting data into a format that cannot be read by another user. Once a user has encrypted a file, the file automatically remains encrypted whenever the file is stored on disk.
Decryption is the process of converting data from encrypted format back to its original format. Once a user has decrypted a file, the file remains decrypted whenever the file is stored on disk.
68. WHAT IS A TRUST
A. Trust is the process of offering or accessing resources from one domain to another domain.
69. WHAT IS A TRANSITIVE TRUST
A. It is a two way trust
Ex. If A trusts B, B automatically trusts A
70. WHAT IS A IN/NON TRANSITIVE TRUST
A. It is one way trust
Ex. If A trusts B, B does not trust A
71. WHAT IS AN IMPLICIT TRUST
A. Trust between the parent domain and grand child domain
72. WHAT IS AN EXPLICIT TRUST
A. It is a manual trust established by administrator between two forest or domains
73. WHAT IS THE DEFAULT TRUST BETWEEN THE PARENT & A CHILD DOMAIN
A. Two way transitive trust
74. HOW TO IMPLEMENT A TRUST
A. ADDT
75. AUTHENTICATION PROTOCOLS OF W2K
A. Kerberos & NTLM
76. WHAT IS SPOOFING
A.
77. WHAT IS A KDC
A. Key Distribution Centre (DC) which issues keys to the clients
78. WHAT IS KERBEROS
A. It is an authentication protocol of Win 2000 & 2003
79. WHAT IS NTLM
A. It is an authentication protocol of Win NT
80. AUTHENTICATION PROCESS IN 2000 & 2003
A. 1.Clients sends a request to DC
B. DC creates a client session key & server session key.
C. The server session key packages client information and server session key and forms a session ticket.
D. Client session key and session ticket are sent to the client which consists of rights and permissions.
E. Then the server verifies the authenticator between the client & server
F. Allows the resource
81. FEATURES OF KERBEROS
A. Introduced in the year 1991 by MIT (MASSACHUSETTS INSTITUTE OF TECHNOLOGY)
B. Windows 2000 was first to implement this protocol
C. Kerberos is a name of 3 headed dog (Cerderos)
D. It fallows a 3 headed approach while authenticating the users
E. It provides high level of security
F. It encrypts the user name & password when they are being sent over N/W
82. WHAT IS A TIMESTAMP
A. Time check during while user logs in
83. WHAT IS A TIME SERVICE
A.
84. WHAT IS TGT & TGS
85. WHAT IS A BASIC DISK & DYNAMIC DISK
A. Basic disk refers to partitions, dynamic refers to volumes
86. WHAT IS A SIMPLE, SPANNED , STRIPPED, MIRRORED AND RAID 5 VOLUME
A. Simple Volume : Space from single hard disk forms simple volume
B. Spanned Volume : Free space can span more than one hard disk and appears as a single volume
C. Stripped Volume: Space selection from each hard disk is identical in size
D. Mirrored Volume : Is an additional hard disk used for imaging primary hard disk to protect the data in the second disk when first disk fails.
87. WHAT IS RAID? RAID0, RAID 1, & RAID5
A. Redundancy array inexpensive disks : It is a standard used for protecting the data
B. RAID0 : Striping without parity offers no fault tolerance
C. RAID1 : Mirroring offers fault tolerance, doesn’t offer performance, requires down time.
D. RAID5 : Striping with parity offers highest fault tolerance, offers availability and performance i.e no down time.
88. DRIVES ARE REQUIRED FOR RAID 0,1,5
A. RAID0 : Minimum 2 disks and Maximum 32
B. RAID1 : Minimum & Maximum 2 disks
C. RAID5 : Minimum 3 and Maximum 32
89. WHICH OF THE RAIDS PROVIDE HIGHEST FT
A. RAID 5
90. HOW TO REGENARATE THE DATA LOST FROM RAID 1 & 5
A. By fixing new HDD selecting regenerate option by right clicking on the drive from disk management.
91. PRINT PROCESS IN 2K
A.
Document to be printed handed over to GDI


GDI invokes print drivers and drivers convert the doc format to either RAW or EMF and hands over to the spooler

Spooler gathers the document to the local HDD and hands over to print processor

Print processor presents the format to the printer which is understandable by the printer (RAW) and hands over to Print Monitor

Print Monitor determines the port to which print device is attached submits the data to print device

Prints the output


92. WHAT IS A PRINT POOL
A. Group of Printers
93. WHAT IS THE DIFF B/W RAW & EMF FORMAT
A. Raw format is the only format printer understands
B. EMF (Enhanced Meta Format) It is a compressed format used for faster printing over the N/W.
94. WHAT IS LOCAL PRINTER
A. The printer which is directly attached to the computer

95. WHAT IS A NETWORK PRINTER
A. A printer with its own NIC
95. HOW TO CONNECT TO A REMOTE PRINT DEVICE
A. My Network places, Browse the Printers, R/C Connect
96. WHAT ARE THE DEFAULT BUILT IN USER A/Cs
A. Administrator and Guest A/Cs
97. WHAT ARE THE DEFAULT BUILT IN GROUP A/CS
A. Account Operators, Server Operators, Backup Operators, Administrators, Print Operators, etc
98. WHAT IS A LOCAL GROUP
A. A group which can be created on client computer
99. WHAT IS A DOMAIN LOCAL GROUP
A. A group with pre-defined rights and permissions used for setting permissions
100. WHAT IS A GLOBAL GROUP
A. Is a collection of users used for organizing users
101. WHAT IS A GROUP SCOPE
A. Group scope identifies the extent of the group with in a domain or forest
102. WHAT IS A UNIVARSAL GROUP
A. Group made up of users from different domains
103. WHAT ARE TWO TYPES OF GROUPS
A. DISTRIBUTION, SECURITY
104. WHAT ARE THE USER ENVIRONMENT NEEDS
A. Desktop settings, Startup applications & Network connectivity
105. WHAT IS A PROFILE
A. Profile is combination of user environment, desktop environment
106. WHAT IS A POLICY
A. Policy is a feature of OS which determines which user has what type of access to the N/W resources
107. WHAT ARE THE DIFF POLICIES SUPPORTED IN 2K
A. ACCOUNT , AUDIT, SECURITY AND GROUP POLICY
108. WHAT ARE DIFF TYPES OF PROFILES
A. Local : Profile which is saved in the local HDD where the user works available only one computer
B. Roaming : Profile which is saved in the server and available in the entire Network
C. Mandatory : Available in the entire N/W but setting are not saved when a user logs off
109. HOW THE PROFILE IS APPLIED
A. When the user logs in is loaded with a local profile and N/W profile which ever is latest takes precedence
110. HOW THE GROUP POLICY IS APPLIED
A. First computer policy is applied then site, domain and OU level
111. DIFF SECURITY POLICES OF 2K
A. Local Security Policy : which is limited in only to the local machine
B. Domain security policy : Applies to all the domains & computers with in the domain
C. Domain controller security policy : Applies policies only to one domain controller
112. WHAT IS A RIGHT
A. It is a permission or type of access what a user can do and can’t do
113. WHAT IS A GROUP POLICY
A. It is a combination of permissions, security and rights which can be applied on sites, domains and OUs
114. WHAT IS A GROUP POLICY OBJECT
A. In object with a combination of permissions which can be linked with sites, domains and OUs

115. HOW TO LINK GPO WITH DC/SITE/OU
A. DC Properties - Group Policy - New - GPO Name
116. WHAT ARE THE FEATURES OF GROUP POLICY
A. Group policy offers security, software deployment, folder redirection, logon logoff scripts, internet explorer maintenance, back up and restore etc.
117. GP CAN BE IMPLIMENTABLE ON
A. Local computer, Sites, domains, DCs and OUs
118. WHAT IS THE SIGNIFICANCE OF INHERITENCE OF GROUP POLICY
A. When you apply policy on site level, policy gets inherited by all the domains and OUs
119. WHAT IS THE SIGNIFICANCE OF BLOCKING GROUP POLICY INHERITANCE
A. When a child object need not be effected with the policy applied on the parent
120. WHAT IS THE PURPOSE OF LINKING AN EXISTING GP WITH ANOTHER CONTAINER
A. A single GPO can have multiple policies set and can be linked with sites domains and OUs. Need not create multiple GPOs.
120. WHAT IS THE ORDER IN WHICH GPOs ARE APPLIED
A. Always the first policy is applied then the second and so on
121. WHAT ARE THE SUBFOLDERS SEEN UNDER COMPUTER CONFIGURATION &
USER CONFIGURATION
A. Computer configuration, software setting, windows settings and administrative templates
B. User configuration, software setting, windows settings and administrative templates
122. HOW TO APPLY SECURITY POLICIES USING GP
A. Using LSP, DSP, DCSP under admin tools.
123. WHAT IS THE ADVANTAGE OF DEPLOYING SOFTWARES USING GP
A. Automating, upgrading and repairing software installation online
124. WHAT ARE THE THREE PRIMARY GP SOFTWARE DEPLOYMENT METHODS
A. Published, assigned and advanced
125. LAN PROTOCOLS SUPPORTED BY 2K
A. NetBEUI, IPX/SPX, TCP/IP, NWLINK, APPLETALK, DECNET
WINDOWS RAS AND ARAP
126. WAN PROTOCOLS SUPPORTED BY 2K & 03
A. SLIP,PPP,
127. VPN PROTOCOLS SUPPORTED BY 2K & 03
A. L2F, PPTP AND L2TP
128. DIFF RAS AUTHENTICATION PROTOCOLS
A. PAP, CHAP, MSCHAP AND MSCHAP V2
129 WHAT IS AN ARP
A. Address Resolution protocol used for mapping IP to MAC
129. FEATURES OF TCP/IP
A. It is a most popular LAN and WAN protocol
B. Supported by many OS
C. It is a routable protocol
D. It is a robust protocol
E. Available in two Versions IP V.4 & IP V.6
130. WHAT IS A SUBNET MASK
A. Acts like a mask between N/W and Host ID or used for differentiating N/W with Host ID
131. WHAT IS SUBNETTING
A. Dividing the same N/W into Smaller subnets
132. WHAT IS A GATEWAY
A. Address of a Router
133. WHAT ARE THE DIFF TCP/IP CLASSES
A. A, B, C, D and E


134. WHAT ARE THE RESERVED IP ADDRESSES
A. 10.0.0.1 to 10.255.255.254
B. 172.16.0.1 to 172.31.255.254
C. 192.168.0.1 to 192.168.255.255
135. WHAT IS ‘IANA’
A. Internet assigned numbering authority is now called as Internet Corporation for assigning names and numbers (ICANN)
136. WHAT IS MULTICASTING
A. Use of class D IPs : Used for publishing the same message to group of people
137. WHAT IS A NETWORK ID
A. WHAT IS A BROADCAST ID
A. 0.0.0.0 and 255.255.255.255
138. WHAT IS A LOOP BACK ID
A. 127.0.0.1
139. DIFF TROUBLESHOOTING UTILITIES OF TCP/IP
A. Ping, IPconfig, Nbtstat, netstat, pathping, tracert etc
139. WHAT ARE THE CORE PROTOCOLS OF TCP/IP
A. TCP,UDP, ICMP and ARP
140. WHAT IS ROUTING
A. Process of providing communication between two different N/Ws
141. WHAT IS DIFF BETWEEN STATIC & DYNAMIC ROUTING
A. Static Routing : Doesn’t require any protocols and routing table remains static until admin changes.
B. Dynamic Routing : Uses dynamic routing protocols like RIP V2, OSPF, IGMP and IGRP. Routing table gets changed automatically or dynamically as and when there is a change in routing i.e addition or removal of routers modification of routing table.
142. WHAT ARE THE ROUTING PROTOCOLS
A. OSPF, RIPVER2, NAT, IGMP
143. HOW TO ENABLE ROUTING
A. Start-Programs-Admin Tools-RRAS-R/c Server - configure and enabled
144. WHAT IS NATTING
A. Enabling one way communication i.e private network can communicate with public but public can’t communicate with private.
145. WHAT IS DIFF BETWEEN PRIVATE & PUBLIC IPS
A. IPs which are not accessible by all are called private IPs
B. IPs which are accessible are called public IPs.
146. WHO WILL ISSUE PUBLIC IPS
A. ICANN or IANA
147. WHAT IS SNMP
A. Simple Network Management Protocol: used for troubleshooting & managing the N/W.
148. WHAT IS SMTP
A. Simple mail Transfer Protocol : Used for sending mails
149. WHAT IS POP/POP3 & IMAP4
A. Post office protocol : used for receiving mails
B. Internet Mail Access Protocol : used for receiving mails

150. DIFF H/W DEVICES SUPPORTED BY RAS
A. PSTN Modems, ISDN Modems, X.25 PADS, RS232 interface and DSL Modems
151. WHAT IS DNS
A. Domain Naming Service or System : used for resolving host names to IPs and IPs to Host names
152. WHAT IS ‘NBNS’
A. NetBios naming system Ex: WINS
153. 2K ACCESS RESOURCES USING DNS NAMING CONVENTIONS

154. WHAT IS A FORWARD LOOKUP
A. Resolving Host names to IP addresses
155. WHAT IS A REVERSE LOOKUP
A. Resolving IP addresses to Host names
156. WHAT IS A HOST RECORD
A. It’s a file contains host names to IP mapping information
157. WHAT IS A RESOURCE RECORD
A. It is a record provides the information about the resources available in the N/W
infrastructure
158. WHAT ARE THE DIFF DNS ROLES
A. STANDARD PRIMARY, STANDARD SECONDARY & AD INTEGRATED
159. WHAT IS A ZONE
A. Zone is a sub tree of DNS database
160. WHAT IS PRIMARY, SECONDARY, STUB & AD INTEGRATED ZONE
A. Primary : Zone which is saved as normal text file with filename.dns in DNS folder. Maintains a read write copy of zone database
B. Secondary : Maintains a read only copy of zone database on another dns server. Provides fault tolerance and load balancing by acting as backup server to primary server
C. Stub : Contains a copy of name server and SOA records used for reducing the dns search orders. Provides fault tolerance and load balancing
161. WHAT DOES A ZONE CONSIST OF & WHY DO WE REQUIRE A ZONE
A. Zone consists of resource records and we require zone for representing sites
162. WHAT IS CACHING ONLY SERVER
A. When we install 2000 & 03 server it is configured as caching only server where it maintains the frequently accessed sites information and again when we access the same site for next time it is obtain from cached information instead of going to the actual site.
163. WHAT IS FORWARDER
A. When one DNS server can’t resolve the query it can be forwarded to another DNS once configured as forwarder.
164. WHATIS SECONDARY DNS SERVER
A. It is backup for primary DNS where it maintains a read only copy of DNS database.
165. HOW TO ENABLE DYNAMIC UPDATES IN DNS
A. S-P-AT-DNS-Zone Properties
166. WHAT ARE THE PROPERTIES OF DNS SERVER
A. INTERFACES, FORWARDERS, ADVANCED, ROOTHINTS, SECURITY,MONITORING,
LOGGING,DEBUG LOGINIG.
167. PROPERTIES OF A ZONE
A. GENERAL, SOA, NAMESERVER, WINS, SECURITY AND ZONE TRANSFER
168. WHAT IS SCAVENGING
A. Finding and deleting unwanted records
169. WHAT ARE SRV RECORDS
A. SRV are the service records, there are 6 service records. They are useful for locating the services
170. WHAT ARE THE TYPES OF SRV RECORDS
A. MSDCS : Contains DCs information
B. TCP : Contains Global Catalog, Kerberos and LDAP information
C. UDP : Contains Kerberos information
D. Sites : Contains Sites information
E. Domain DNS Zone : Contains domain’s DNS specific information
F. Forest DNS Zone : Contains Forest’s specific information
171. WHERE DOES A HOST FILE RESIDE
A. C:Windows\System32\drivers\etc
172. WHAT IS SOA
A. Start of Authority: Useful when a zone starts. Provides the zone startup information

173. WHAT IS A QUERY
A. A request made by the DNS client to provide the name server information
174. WHAT ARE THE DIFFERENT TYPES OF QURIES
A. RECURSION, ITERATION
175. TOOLS FOR TROUBLESHOOTING DNS
A. DNS CONSOLE,NSLOOKUP,DNSCMD,IPCONFIG,LOGS ,PM
176. WHAT IS DHCP
A. Dynamic Host Configuration Protocol : Assigns IPs to the clients requested dynamically or automatically
177. PROCESS OF DHCP (DORA)
A. Discover : The client discovers DHCP
B. Offer : The DHCP server offers a group of IPs to the clients to pick any
C. Request : The client selects an IP and request DHCP to confirm it
D. Acknowledgement : The DHCP server makes a confirmation by sending an
DHCPACK to the client
178. WHAT IS A SCOPE
A. Range of IP addresses
179. WHAT IS AN IP LEASE
A. DHCP server offers an IP to the client for a period of 8 days. This offer is called IP lease
180. WHAT IS THE DEFAULT DURATION OF A LEASE
A. 8 days
181. WHAT IS AUTHORIZING DHCP SERVER
A. Enabling AD know the availability of DHCP server. Useful when we have multiple DHCP
Servers and you want to designate one particular DHCP server to be active. Then we should authorize.
182. WHAT IS IP RESERVATION
A. Reserving a particular dynamic IP for a particular system
183. WHAT IS EXCLUSION
A. Omitting assigning from the range selected IPs.
184. WHAT IS A SUPER SCOPE
A. Group of scopes is called as super scope.
185. PURPOSE OF DHCP RELAY AGENT
A. DHCP server is available on another N/W and you want another N/W to obtain IPs from the DHCP server. Then the DHCP Relay Agent has to be configured on the router so that the DHCP RA can forward the requests from the clients to the DHCP server to obtain IPs for the clients it act like a mediator between clients and dhcp.
186. HOW TO GIVEUP AN IP OBTAINED FROM DHCP
A. S-R-CMD- IPCONFIG /RELEASE
187. HOW TO OBTAIN A NEW IP FROM DHCP SERVER
A. S-R-CMD- IPCONFIG /RENEW
188. SWITCHES USED WITH IPCONFIG
A. IPCONFIG /ALL, RELEASE, RENEW, FLUSHDNS
189. IF THE CLIENT IS UNABLE TO CONTACT DHCP SERVER, WHAT HAPPENS
A. Obtains an IP from APIPA
190. WHAT IS APIPA
A. Automatic Private IP addressing, when a client machine unable to contact dhcp then apipa assigns an IP to the client. This enables the N/W availability.
191. WHAT ARE THE IP RANGES PROVIDED BY APIPA
A. 169.254.0.0 to 169.254.255.255
192. WHAT IS WINS
A. Window Internet Naming Service : Useful in windows N/W only. Resolves NetBios names to IP addresses and IPs to NetBios names.
193. WINS IS USED IN WHICH ENVIRONMENTS
A. When the N/W has OS like 95, WKS, NT, 98
194. WINS SUPPORTS NBNS CONVENTIONS

195. DIFF BETWEEN NBNS & DNS CONVENTIONS
A. Wins uses NBNS conventions and DNS uses DNS conventions
196. WHAT ARE THE PORT NUMBERS FOR:
FTP,TELNET,SMTP,DNS,HTTP,POP3,IMAP,SNMP,NNTP,LDAP,L2TP,PPTP,KERBEROS, DNS,HOSTNAME,RADIUS,LDAP, AND WINS
A. FTP-21,TELNET=23, SMTP-25,DNS-53,HTTP-80,POP3-110,IMAP-143,
SNMP-161,NNTP-119,LDAP-389,L2TP-1701,PPTP-1723,KERBEROS-88,DHCP67, HOSTNAME-42,RADIUS-1812,WINS-1512, router-520
197. WHAT IS IIS
A. It is a Web server from microsoft
198. WHAT ARE THE SERVICES OFFERED BY IIS
A. www,http,ftp,nntp,smtp,frontpage,asp.net services
199. WHICH VER OF IIS IS WITH 2K & 03
A. Win 2K-IIS 5.0 and Win03- IIS 6.0
200. WHAT IS A VIRTUAL DIRECTORY
A. Using virtual directory we can have child websites or links to parent websites
201. WHAT IS REGISTRY
A. Registry is a configuration database about system, hardware & software
202. ICMP AND ITS IMPORTANCE
A. Internet Control Message Protocol : Responsible for generating messages like requested time out, destination not reachable, TTL, and other echo messages.
203. WHAT ARE THE BOOTABLE FILES
A. NTLDR, NTdetect.com, Boot.Ini, NTOSKRNL.exe, Bootsect.dos,
204. WHAT IS A PAGE FILE
A. A page file is used as virtual memory.
205. HOW TO INCREASE THE SIZE OF PAGING FILE
A. System properties-Advanced-Performance settings-advanced-change
206. WHAT IS THE ADVANTAGE OF SPLITTING A PAGE FILE AMONG DRIVES
A. Improves the I/O performance
207. WHAT IS A FILE REPLICATION
A. Replication is process of duplicating files of one server to another server.
208. WHAT IS A SYSVOL
209. It is a public folder gets replicated on to all DCs and contain information user information
like policies and profiles.
210. WHAT IS A DEFAULT TIME FOR REPLICATION TO TAKE PLACE B/W DC AND ADC
A. 5 seconds and 3 seconds for immediate change

ACTIVE DIRECTORY SERVICES

ACTIVE DIRECTORY

AD: Is a centralized database where it contains the information about the objects like users, groups, computers, printers etc.
AD is a centralized hierarchical Directory Database.
AD is a searchable Database.

2003 O/S. when installed (gets installed as a stand alone server) to promoting to D.C. We have to install A.D.
Domain Controller (D.C.)
A server where A.D. is installed is called D.C.
Functionality of A.D.:
Using A.D. we can organize, manage and control resources.
It provides single point of administration.

Purpose of A.D.:
Provides user logon authentication services.
To organize and manage user A/Cs, computers, groups and n/w resources.
Enables authorized users to easily locate n/w resources.

Features of A.D.:

Fully integrated security system with the help of Kerberos.
Easy administration using group policy.
Scalable to any size n/w
Flexible (install/uninstall)
Extensible (modify the schema)
New features in 2003
Rename computer name & Domain names.
Cross –forest trust relationship.
Site-to-Site replication is faster.

Evolution of LDAP:

Earlier we had no database standard; hence TTU & ISO introduced X-500

LDAP (Light Weight Directory Access Protocol): It is an industry standard directory access protocol used for querying and providing communication among the objects in A.D.
It is directory access protocol.
It runs on the port no. 389.

DAP: It is based on OSI model.
LDAP: Is based on TCP/IP model

Installing A.D:
Requirements: Windows 2003 O.S.- A static IP-NTFS partition with 250 MB of free HDD space-DNS (Domain Naming System)

Step1: on 2003 machine
Start > Run> dcpromo>next>next>Select domain controller for a new domain
>Domain in a new forest >next>Specify the domain name (Ex: zoom.com)
>Net bios name (do nothing)>Next>database>next>Sysvol>next>Select middle one>next>Provide pwd>next>Restart - when it prompts

After installing A.D.
Go to
Start>programs> administration tools
We should notice 5 options like ADUC, ADDT, ADSS, DCSP, and DSP
1. Active Directory users and Computers
2. Active Directory domains and trusts
3. Active Directory sites and services
4. Domain control security policy and
5. Domain security policy.

Safe removal of A.D.
>Start >run >dcpromo or dcpromo /safe removal

Forceful removal of A.D.
>Start >run > dcpromo / force removal

Tools used for
Active Directory Domains and Trusts:
.Implementing trusts .Raising domain/forest functional levels .Adding user logon suffixes

Active Directory Sites and Services:
.Configuring intrasite/intersite replication. Configuring global catalog . Creation of sites, site links, subnets. Scheduling replication

Active Directory Users and Computers:
Ø Managing users/groupsØ Managing computers.Ø Managing OUs
Ø Managing Group Policy (Domain Level)
Ø Managing Operations masters.
Ø Raising domain functional level.

Domain controller security policy:
Ø Set account, audit and password policies
Ø Set user rights
Ø Permissions or policies Pertains only to the DC where you set.

Domain security policy:
Ø Set account, audit and password policies
Ø Set user rights
Ø Permissions or policies Pertain to the DC as well as to all the domains within.

Installing ADC (Additional Domain Controller):
Requirements:
D.C.
Static .P.
DNS
Stand-alone or Member Server.

Step1: on Stand alone machine or member server
Ø Specify I.P.
Ø Specify prefer DNS as servers IP.
Ø Start > run >ping server’s IP.
Step2: >start >run >dcpromo>next>next>select ADC for an existing domain
Ø Specify administrator’s name & pwd.
Ø Domain name of DC (eg.zoom.com)
Ø Browse the domain
Ø Next>next> restore pwd.


ADC is a back up for DC
Ø ADC maintains a back up copy of A.D., which will be in read only format.
Ø ADCs provide fault tolerance & load balancing
Ø There can be any no. of ADCs for a DC.
Ø ADCs should be placed and maintained offsite away from the DC.
Ø ADC maintains same domain name.

Verifying whether the server is configured as DC or ADC.
Ø Start>run>cmd>net accounts
Ø For DC we will find “primary”
Ø For ADC we will find “Backup”

ACTIVE DIRECTORY COMPONENTS
LOGICAL STRUCTURE
PHYSICAL STRUCTURE
Domains
Trees
Forest
Organizational units

Sites
Domain controllers
\

A D. Components:
Logical structure is useful for organizing the network.
Logical components cannot be seen
Physical structure is useful for representing our organization for developing the organizational structure.
It reflects the organization (mirrors)
Physical structure can be seen. Ex. Site – India, US, UK etc.

TREE:
A tree is a group of domains which share contiguous name space.
If more than one domain exits we can combine the multiple domains into hierarchical tree structures.
The first domain created is the root domain of the first tree.
Additional domains in the same domain tree are child domains.
A domain immediately above another domain in the same domain tree is its parent.

FOREST:
Multiple domain trees within a single forest do not form a contiguous namespace. i.e. they have non-contiguous DNS domain names
Although trees in a forest do not share a name space, a forest does have a single root domain, called the forest root domain
The forest root domain is, by definition, the first domain created in the forest.
The two forest wide predefined groups – Enterprise.
Administrators and schema administrators reside in this domain.

Physical structure
SITES:
Site is a combination of TCP/IP, subnets, connected with high-speed links.
Sites provide replication


There are 2 types of replications
Intrasite replication
Intersite replication

Intrasite Replication: It is a replication with in the same site. It offers full time replication between DC & ADC when they are within the same site.

Intersite Replication: It is a replication between two different sites.
Intersite replication is implemented when the sites are away from each other.


-It requires a site link
-Site link is a logical connection between sites, which can be created & scheduled.
-Site link offers communication only at scheduled intervals.

Implementing sites:
Forceful replication:
On DC
Start >programs> admin tools > ADSS > expand sites > default first site>servers
>Expand DC server > NTDS settings >right click on automatically generated>replicate now>ok.
Repeat the same for DC & ADC

Creating a site:
Open ADSS>Right click on sites>New site>Site name (e.g. UK, US)
Select default site link>Ok

Moving ADC into another site:
Select ADC>Right click on ADC>Select move>Select site.

Creating a Site link:
Expand inter site transports>Right click on IP>Select new site link
Link name (ex. Link US –UK)

Scheduling a site link:
Expand inter site transport>IP>Double click on site link>Change schedule
Click on replication not available>set the timings>click on replication available.

KCC: (Knowledge Consistency Checker): It is a service of A.D., which is responsible for intimating, or updating the changes made either in DC or ADC.
Active Directory is saved in a file called NTDS.DIT
C:\windows\ntds\ntds.dit