Windows Admin: CHKDSK (Volume ( (Path) Filename) ) ) (/F) (/V) (/R) (/X) (/I) (/C) (/L (:size) )
Windows Admin: CHKDSK (Volume ( (Path) Filename) ) ) (/F) (/V) (/R) (/X) (/I) (/C) (/L (:size) )
The options and switches for Check Disk are used as follows:
Volume Sets the volume to work with.
filename FAT/FAT32 only: Specifies files to check for fragmentation.
/F Fixes errors on the disk.
/V On FAT/FAT32, this displays the full path and name of every file on the disk. On NTFS, this
displays cleanup messages, if any.
/R Locates bad sectors and recovers readable information (implies /F).
/L: size NTFS only. Changes the log file size.
/X Forces the volume to dismount first if necessary (implies /F).
/I NTFS only. Performs a minimum check of index entries.
/C NTFS only. Skips checking of cycles within the folder structure.
To look up for the information from the server, e-mail and another program follows or uses the
internet protocol. This protocol is referred as LDAP or Lightweight Directory Access Protocol.
A common use of LDAP is to provide a central place to store usernames and passwords. This
allows many different applications and services to connect to the LDAP server to validate users.
This has a major benefit that allows a central place to update and change user passwords. [4]
IntelliMirror helps to reconcile desktop settings, applications and stored files for users especially
for those users who move between workstations or those who works offline
Explain in windows DNS server what is Primary, Secondary and Stub zone?
In windows DNS server,
Primary Zone: In this, the file is saved as normal text file with filename (.dns).
Secondary Zone: It maintains a read-only copy of zone database on another DNS server.
Also, it acts as a back-up server to the primary server by providing fault tolerance and load
balancing
Stub Zone: It consists of a copy of name server and SOA records which is used for
reducing the DNS search orders.
22 SSH
23 Telnet
25 SMTP
53 DNS
143 IMAP2
67 & 68 DHCP
RAID
RAID is a technology that is used to increase the performance and/or reliability of data storage.
The abbreviation stands for Redundant Array of Inexpensive Disks. A RAID system consists of
two or more drives working in parallel. These disks can be hard discs, but there is a trend to also
use the technology for SSD (solid state drives). There are different RAID levels, each optimized
for a specific situation. These are not standardized by an industry group or standardization
committee. This explains why companies sometimes come up with their own unique numbers
and implementations. This article covers the following RAID levels:
RAID 0 striping
RAID 1 mirroring
RAID 0 offers great performance, both in read and write operations. There is no overhead
caused by parity controls.
Disadvantages
RAID 0 is not fault-tolerant. If one drive fails, all data in the RAID 0 array are lost. It should
not be used for mission-critical systems.
RAID level 5
RAID 5 is the most common secure RAID level. It requires at least 3 drives but can work with up
to 16. Data blocks are striped across the drives and on one drive a parity checksum of all the
block data is written. The parity data are not written to a fixed drive, they are spread across all
drives, as the drawing below shows. Using the parity data, the computer can recalculate the data
of one of the other data blocks, should those data no longer be available. That means a RAID 5
array can withstand a single drive failure without losing data or access to data. Although RAID 5
can be achieved in software, a hardware controller is recommended. Often extra cache memory
is used on these controllers to improve the write performance.
Advantages
Read data transactions are very fast while write data transactions are somewhat slower
(due to the parity that has to be calculated).
If a drive fails, you still have access to all data, even while the failed drive is being
replaced and the storage controller rebuilds the data on the new drive.
Disadvantages
This is complex technology. If one of the disks in an array using 4TB disks fails and is
replaced, restoring the data (the rebuild time) may take a day or longer, depending on the
load on the array and the speed of the controller. If another disk goes bad during that
time, data are lost forever.
Advantages
If two drives fail, you still have access to all data, even while the failed drives are being
replaced. So RAID 6 is more secure than RAID 5.
Disadvantages
Write data transactions are slowed down due to the parity that has to be calculated.
This is complex technology. Rebuilding an array in which one drive failed can take a long
time.
Ideal use
RAID 6 is a good all-round system that combines efficient storage with excellent security and
decent performance. It is preferable over RAID 5 in file and application servers that use many
large drives for data storage.
Advantages
If something goes wrong with one of the disks in a RAID 10 configuration, the rebuild time
is very fast since all that is needed is copying all the data from the surviving mirror to a
new drive. This can take as little as 30 minutes for drives of 1 TB.
Disadvantages
Half of the storage capacity goes to mirroring, so compared to large RAID 5 or RAID 6
arrays, this is an expensive way to have redundancy.
ntds.dit
edb.log
res1.log
res2.log
edn.chk
Mention what windows server 2008 service is used to install client operating system
over the network?
WDE ( Windows Deployment Services ) allows you to install client and server operating systems
over the network to any computer with a PXE enabled network interface
Important commands :
http://www.howtogeek.com/168896/10-useful-windows-commands-you-should-know/
VPN means Virtual Private Network, a technology that allows a secure tunnel to be created
across a network such as the Internet. For example, VPNs allow you to establish a secure dial-up
connection to a remote server.
What is RIP?
RIP, short for Routing Information Protocol is used by routers to send data from one network to
another. It efficiently manages routing data by broadcasting its routing table to all other routers
within the network. It determines the network distance in units of hops.
What is ICMP?
ICMP is Internet Control Message Protocol. It provides messaging and communication for
protocols within the TCP/IP stack. This is also the protocol that manages error messages that are
used by network tools such as PING.
What is DNS?
DNS is Domain Name System. The main function of this network service is to provide host names
to TCP/IP address resolution.
What are the different network protocols that are supported by Windows RRAS
services?
There are three main network protocols supported: NetBEUI, TCP/IP, and IPX.
Explain what is PowerShell?
Power shell is an extendable command shell and a scripting language for Windows.