Windows Server Interview Questions PDF
Windows Server Interview Questions PDF
Windows Server is a series of different server operating systems that have been developed by the Microsoft
Corporation. It has a set of a very powerful version of various desktop operating systems that help users to
efficiently handle numerous functions, which include control and handling of networking, databases, etc. As
Windows Server makes the functioning of companies and institutions easy, organizations are thus looking for
individuals with thorough knowledge and hands-on experience in this field.
Read below some of the commonly asked Windows Server Interview Questions in order to make your entire
process of the interview preparation easy. This set of Windows Server Interview Questions also contains
various features, pros, and cons of using Windows Server that can give you an upper hand in comparison to
other candidates running in the competition in between you and your dream job.
Active Directory (AD) is an inventory organization that is used in a library to collect objects like customer
profiles, computers, etc. It manages the framework effectively with the help of Domain Controllers that are
accessible at different zones with the Active Directory database. A segment of the limits fuse essential
association with various land zones, check of customers and computers in the space provided by windows,
copying Active Directory from any Domain Controller. In addition to which these lines will be reverted to each
and every other Domain Controllers.
Q2. What do you understand by the term “tattooing” in context of the Registry?
"Tattooing" the registry implies that clients can adjust and see client preference that is not put away in the
maintained portions of the prescribed Registry. Regardless of whether the assembly approach is changed or
evacuated, the client's preference will at present endure in the registry.
Q3. Differentiate between a thread and a computer process
Q4. List some of the roles of flexible single master operations (FSMO) by the Windows
Server?
PDC
Infrastructure Master
RID Master
Schema Master
Domain Naming Master
DIT
Che
log and Res2.log
Log
Not all the Active Directory changes are created truly to the NTDS.DIT database archive. They are first formed
to EDB.Log and hence form the log record to the database. EDB.Che is acclimated with the following changes
to the database and it undergoes as an updated log record to keep a check on the tasks are performed to the
database.
NTDS.DIT: This is referred to as an Active Directory database that contains all the AD dissents. The
default zone is %system root%nrdsnrds.dit. This database relies upon the Jet database.
EDB.Log: This record is to pursue the trades on any particular database, at the time EDB.Log is full it is
retitled to EDB Num.log, in which a “num” is a number beginning from 1 such as EDB1.log.
EDB.Che: This report is used to cross – verify the data that has not yet been kept in contact with the
database. This record has the beginning stage to the data that can be recovered in the midst of
disillusionment.
Res1.log; Res2.log: Res speaks to spared trade record, which gives the trade log archive sufficient time to
shut down in case the circle misses the mark on space.
Q6. List the locations where different active directory databases are held
The locations where the different active directory databases are held include:
NTDS.DIT
Res1.log
Res2.log
EDN.Chk
EDB.Log
Q7. Differentiate between File Allocation Table (FAT) and New Technology File System
(NFTS)
Q8. What do you understand by the term trees, forests and domains?
The logical sections of any Active Directory organization are normally named as a tree, forest, and domain.
Diverse articles inside the arrangement of a logical section incorporate the accompanying: computers,
customers, devices, etc. that share a comparable dynamic registry database, which is commonly acknowledged
as a “domain”.
The mix of somewhere around one domain is called a “tree”. This may likewise contain an abutting namespace
associated in a transitive order. The gathering of domains is frequently called a “forest” that shares overall
inventory, logical structure, registry setup and registry pattern. It also characterizes the security limits for
clients, groups, and devices such as computers.
Q9. Describe the non-authoritative and authoritative restore of an Active Directory (AD).
Through non-authoritative restore, there are many chances that the domain controller can be established back to
its underlying state (the time when a backup was performed). When it is set, it permits overwriting its
underlying condition with the progressions that were carried out preceding the underlying backup was achieved.
Presently in order to upgrade the Active Directory database, it is necessary that the particular domain controller
from duplication accomplices to guarantee that the AD is upgraded, precise and accurate to retrieve questions.
At whatever point there is any corruption or information loss in the AD, this technique is utilized. The
succeeding step after any particular non-authoritative restore is a definitive authoritative process. The most
important highlights of authoritative restore include that it can augment the form quantities of the traits or an
article in a whole directory. This sort of restore is employed to reinstate a solitary erased client/object. In case of
any disparity in the variant numbers, the subsequent precaution and carefulness must be adhered to while
restoring and utilizing any authoritative restore procedures.
Q10. What do you understand by the term Group Policy Objects (GPO) and list the
different types of GPO
The setting that manages the workplace of client records, as well as computer records, are known as Group
Policy Object (GPO). This assistance is characterizing the security alternatives, programming establishment,
library-based arrangements and upkeep choices, content choices and folder redirection choices. There are
generally two types of Group Policy Objects:
Nonlocal Group Policy objects: These are accessible just in an Active Directory condition and are put
away on a domain controller.
Local Group Policy Objects: These are put away on nearby computes.
Yes, it is possible to connect Active Directory to other third-party directory services with the help of various
Microsoft versions. LDAP or dirXML can be used to connect Active Directory to other vendors.
Q12. In order to check TCP/IP configurations, list commands that have been frequently
utilized
Ping: In order to check the connection between the computer in use as well as other computers, the Ping
command is utilized.
Ipconfig: In order to check the computer's IP setup, command Ipconfig can be utilized and furthermore it
can also be very well utilized to restore the user's IP address in the case it is given by a DHCP server.
Application Partition: Application partitions stores various data related to applications in the Active
Directory. For instance – ForestDNSZones and DomainDNSZones
Configuration Partition: Configuration Partition stores all necessary data about the Active Directory.
The data incorporates Site, site-interface, subnet and so forth. This parcel likewise replicates all domain
controllers that are available in the Forest.
Domain Partitions: Domain Partitions stores the data of the domain that incorporates client, group,
computer, printer and so forth. This partition also replicates all domain controllers that might be available
in the domain just like Configuration Partition.
Schema Partition: Schema Partition stores every one of the details of the various items and their
respective properties. It additionally replicates other domain controllers that are available in the Forest.
The function of the domain controller is to authenticate clients to various networks and deliver a set of objects
that are included in the Active Directory.
Q15. With respect to the Windows DNS server, explain Primary, Secondary and Stub
Zones.
The Windows DNS server represents an area name framework, which is utilized as a kind of perspective table to
coordinate the space names to various IP addresses. Listed below are the three important categories of zones
characteristically used in Windows DNS server:
Primary Zone: Within the primary zone, the record is spared as a text file with the typical extension being
.DNS
Secondary Zone: This is a reinforcement for the essential server that goes about as load adjusting and
furthermore gives adaptation to non-critical failure. This is generally perused just record which is set in
another DNS server
Stub Zone: This comprises of the name server and SOA records that helps in lessening the DNS seek
orders
Windows
Linux
A local DNS server provides the local mapping of fully qualified domain names to IP addresses. To resolve
remote requests related to the domains names on your network, local DNS servers can provide record
information to remote DNS servers.
Windows Server OS
It is mainly released for servers grade systems like Workstation, Rack, Tower, etc
Multiple users can log in and work simultaneously.
Supports more CPU(64), cores(320) and RAM(24TB)
Windows OS
It's mainly released for user grade systems like desktop, Laptop, Tablet, Mobile, X-box, Halo-lens, etc
You can create multiple user accounts, but, only one user can log in at a time.
Support limited CPU(2), core(256) and RAM(2TB)
Windows Server 2019 is the latest release of window server that uses the long-term servicing channel or
shortened LTSC.
Windows server is a series of enterprise-class server operating systems which is designed for end-users to share
resources/ services with multiple users and provide extensive administrative control of data storage,
applications, and corporate networks.