0% found this document useful (0 votes)
42 views

Windows Admin: CHKDSK (Volume ( (Path) Filename) ) ) (/F) (/V) (/R) (/X) (/I) (/C) (/L (:size) )

The document provides information about the Check Disk (chkdsk) command in Windows, including its options and switches. It can be used to fix errors on a disk (/F), display file information (/V), locate and recover data from bad sectors (/R), force a volume to dismount if needed (/X), perform minimal checks (/I), skip folder structure checks (/C), and change the log file size (/L).

Uploaded by

Syed Shamsudeen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views

Windows Admin: CHKDSK (Volume ( (Path) Filename) ) ) (/F) (/V) (/R) (/X) (/I) (/C) (/L (:size) )

The document provides information about the Check Disk (chkdsk) command in Windows, including its options and switches. It can be used to fix errors on a disk (/F), display file information (/V), locate and recover data from bad sectors (/R), force a volume to dismount if needed (/X), perform minimal checks (/I), skip folder structure checks (/C), and change the log file size (/L).

Uploaded by

Syed Shamsudeen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Windows Admin

chkdsk [volume[[path]filename]]] [/F] [/V] [/R] [/X] [/I] [/C] [/L[:size]]

The options and switches for Check Disk are used as follows:
Volume Sets the volume to work with.
filename FAT/FAT32 only: Specifies files to check for fragmentation.
/F Fixes errors on the disk.
/V On FAT/FAT32, this displays the full path and name of every file on the disk. On NTFS, this
displays cleanup messages, if any.
/R Locates bad sectors and recovers readable information (implies /F).
/L: size NTFS only. Changes the log file size.
/X Forces the volume to dismount first if necessary (implies /F).
/I NTFS only. Performs a minimum check of index entries.
/C NTFS only. Skips checking of cycles within the folder structure.

explain what is SYSVOL folder?


It is a set of files and folders that is stored on the local hard disk of each domain controller in a
domain and are replicated by the FRS ( File Replication Service). These files contain group or
user policy information.

Explain what is LDAP?

To look up for the information from the server, e-mail and another program follows or uses the
internet protocol. This protocol is referred as LDAP or Lightweight Directory Access Protocol.
A common use of LDAP is to provide a central place to store usernames and passwords. This
allows many different applications and services to connect to the LDAP server to validate users.
This has a major benefit that allows a central place to update and change user passwords. [4]

Explain what does IntelliMirror do?

IntelliMirror helps to reconcile desktop settings, applications and stored files for users especially
for those users who move between workstations or those who works offline

Explain in windows DNS server what is Primary, Secondary and Stub zone?
In windows DNS server,

Primary Zone: In this, the file is saved as normal text file with filename (.dns).

Secondary Zone: It maintains a read-only copy of zone database on another DNS server.
Also, it acts as a back-up server to the primary server by providing fault tolerance and load
balancing

Stub Zone: It consists of a copy of name server and SOA records which is used for
reducing the DNS search orders.

Important port numbers ?

20 & 21 File server

22 SSH

23 Telnet

25 SMTP

53 DNS

123 NTP ( Network time protocol)

143 IMAP2

161 SNMP ( SIMPLE NETWORK MANAGEMENT PROTOCOL

389 LDAP ( Lightweight directory protocol)

443 HTTPS ( Secure)

67 & 68 DHCP

What does it mean by tattooing the Registry ?


Tattooing the registry means user can modify and view user preference that are not stored in
the maintained portions of the Registry. Even if the group policy is changed or removed, the
user preference will still persist in the registry.

Explain if it is possible to connect Active Directory to other 3 rd party Directory


services?
Yes, you can connect other vendors directory services with Microsoft version. By using dirXML or
LDAP to connect to other directories.

Explain what is RAID in Windows Server?


For storing same data at a different place RAID or Redundant Array of Independent Disks
strategy is used. It is a strategy for building fault tolerance and increase the storage capacity. On
separate drives it allows you to combine one or more volumes so that they are accessed by a
single drive letter

RAID
RAID is a technology that is used to increase the performance and/or reliability of data storage.
The abbreviation stands for Redundant Array of Inexpensive Disks. A RAID system consists of
two or more drives working in parallel. These disks can be hard discs, but there is a trend to also
use the technology for SSD (solid state drives). There are different RAID levels, each optimized
for a specific situation. These are not standardized by an industry group or standardization
committee. This explains why companies sometimes come up with their own unique numbers
and implementations. This article covers the following RAID levels:

RAID 0 striping

RAID 1 mirroring

RAID 5 striping with parity

RAID 6 striping with double parity

RAID 10 combining mirroring and striping

RAID level 0 Striping


In a RAID 0 system data are split up in blocks that get written across all the drives in the array.
By using multiple disks (at least 2) at the same time, this offers superior I/O performance. This
performance can be enhanced further by using multiple controllers, ideally one controller per
disk.
Advantages

RAID 0 offers great performance, both in read and write operations. There is no overhead
caused by parity controls.

All storage capacity is used, there is no overhead.

The technology is easy to implement.

Disadvantages

RAID 0 is not fault-tolerant. If one drive fails, all data in the RAID 0 array are lost. It should
not be used for mission-critical systems.

RAID level 5
RAID 5 is the most common secure RAID level. It requires at least 3 drives but can work with up
to 16. Data blocks are striped across the drives and on one drive a parity checksum of all the
block data is written. The parity data are not written to a fixed drive, they are spread across all
drives, as the drawing below shows. Using the parity data, the computer can recalculate the data
of one of the other data blocks, should those data no longer be available. That means a RAID 5
array can withstand a single drive failure without losing data or access to data. Although RAID 5
can be achieved in software, a hardware controller is recommended. Often extra cache memory
is used on these controllers to improve the write performance.

Advantages

Read data transactions are very fast while write data transactions are somewhat slower
(due to the parity that has to be calculated).

If a drive fails, you still have access to all data, even while the failed drive is being
replaced and the storage controller rebuilds the data on the new drive.

Disadvantages

Drive failures have an effect on throughput, although this is still acceptable.

This is complex technology. If one of the disks in an array using 4TB disks fails and is
replaced, restoring the data (the rebuild time) may take a day or longer, depending on the
load on the array and the speed of the controller. If another disk goes bad during that
time, data are lost forever.

RAID level 6 Striping with double parity


RAID 6 is like RAID 5, but the parity data are written to two drives. That means it requires at least
4 drives and can withstand 2 drives dying simultaneously. The chances that two drives break
down at exactly the same moment are of course very small. However, if a drive in a RAID 5
systems dies and is replaced by a new drive, it takes hours to rebuild the swapped drive. If
another drive dies during that time, you still lose all of your data. With RAID 6, the RAID array will
even survive that second failure.

Advantages

Like with RAID 5, read data transactions are very fast.

If two drives fail, you still have access to all data, even while the failed drives are being
replaced. So RAID 6 is more secure than RAID 5.

Disadvantages

Write data transactions are slowed down due to the parity that has to be calculated.

Drive failures have an effect on throughput, although this is still acceptable.

This is complex technology. Rebuilding an array in which one drive failed can take a long
time.

Ideal use
RAID 6 is a good all-round system that combines efficient storage with excellent security and
decent performance. It is preferable over RAID 5 in file and application servers that use many
large drives for data storage.

RAID level 10 combining RAID 1 & RAID 0


It is possible to combine the advantages (and disadvantages) of RAID 0 and RAID 1 in one single
system. This is a nested or hybrid RAID configuration. It provides security by mirroring all data on
secondary drives while using striping across each set of drives to speed up data transfers.

Advantages

If something goes wrong with one of the disks in a RAID 10 configuration, the rebuild time
is very fast since all that is needed is copying all the data from the surviving mirror to a
new drive. This can take as little as 30 minutes for drives of 1 TB.

Disadvantages

Half of the storage capacity goes to mirroring, so compared to large RAID 5 or RAID 6
arrays, this is an expensive way to have redundancy.

Explain where is the AD database is held?


AD database is saved in %systemroot%/ntds. Files that controls the AD structure are

ntds.dit

edb.log

res1.log

res2.log

edn.chk

Mention what windows server 2008 service is used to install client operating system
over the network?
WDE ( Windows Deployment Services ) allows you to install client and server operating systems
over the network to any computer with a PXE enabled network interface

Important commands :

ipconfig /flushdns Flush Your DNS Resolver Cache


recimg Create Custom Recovery Images
wbadmin start backup Create System Recovery Images

sfc /scannow Scan System Files for Problems


telnet Connect to Telnet Servers
cipher Permanently Delete and Overwrite a Directory
netstat -an List Network Connections and Ports

http://www.howtogeek.com/168896/10-useful-windows-commands-you-should-know/

What are the layers of the OSI reference model?


There are 7 OSI layers: Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session
Layer, Presentation Layer and Application Layer.
What is VPN?

VPN means Virtual Private Network, a technology that allows a secure tunnel to be created
across a network such as the Internet. For example, VPNs allow you to establish a secure dial-up
connection to a remote server.

What is RIP?
RIP, short for Routing Information Protocol is used by routers to send data from one network to
another. It efficiently manages routing data by broadcasting its routing table to all other routers
within the network. It determines the network distance in units of hops.

What are MAC addresses?


MAC, or Media Access Control, uniquely identifies a device on the network. It is also known as
physical address or Ethernet address. A MAC address is made up of 6-byte parts.

Describe star topology


Star topology consists of a central hub that connects to nodes. This is one of the easiest to setup
and maintain.
What is the disadvantage of a star topology?
One major disadvantage of star topology is that once the central hub or switch get damaged, the
entire network becomes unusable.
What are gateways?
Gateways provide connectivity between two or more network segments. It is usually a computer
that runs the gateway software and provides translation services. This translation is a key in
allowing different systems to communicate on the network.
Give some examples of private network addresses.
10.0.0.0 with a subnet mask of 255.0.0.0
172.16.0.0 with subnet mask of 255.240.0.0
192.168.0.0 with subnet mask of 255.255.0.0
What is SLIP?
SLIP, or Serial Line Interface Protocol, is actually an old protocol developed during the early UNIX
days. This is one of the protocols that are used for remote access.
What is DHCP?
DHCP is short for Dynamic Host Configuration Protocol. Its main task is to automatically assign
an IP address to devices across the network. It first checks for the next available address not yet
taken by any device, then assigns this to a network device.
What common software problems can lead to network defects?
Software related problems can be any or a combination of the following:
client server problems
application conflicts
error in configuration
protocol mismatch
security issues
user policy and rights issues

What is ICMP?
ICMP is Internet Control Message Protocol. It provides messaging and communication for
protocols within the TCP/IP stack. This is also the protocol that manages error messages that are
used by network tools such as PING.
What is DNS?
DNS is Domain Name System. The main function of this network service is to provide host names
to TCP/IP address resolution.
What are the different network protocols that are supported by Windows RRAS
services?
There are three main network protocols supported: NetBEUI, TCP/IP, and IPX.
Explain what is PowerShell?
Power shell is an extendable command shell and a scripting language for Windows.

You might also like