0% found this document useful (0 votes)
51 views

Windows

Window profile

Uploaded by

KAPIL DEO YADAV
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views

Windows

Window profile

Uploaded by

KAPIL DEO YADAV
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 89

Name: Prathamesh Sawant

LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

1) Explain what is Windows Server?

Window server is a series of server operating system developed by Microsoft


Corporation.

2) Explain in windows DNS server what is Primary, Secondary and Stub


zone?

In windows DNS server,

 Primary Zone: In this, the file is saved as normal text file with filename
(.dns).
 Secondary Zone: It maintains a read-only copy of zone database on
another DNS server. Also, it acts as a back-up server to the primary
server by providing fault tolerance and load balancing
 Stub Zone: It consists of a copy of name server and SOA records which
is used for reducing the DNS search orders.

3) Explain what does IntelliMirror do?

IntelliMirror helps to reconcile desktop settings, applications and stored files


for users especially for those users who move between workstations or those
who works offline

4) In the case when MSI file is not available, how you can install an app?

To add the application using the Software Installer.ZAP text file can be used
rather than the windows installer

5) Explain how you can set up remote installation procedure without


giving access to user?

To do that, you have to go to,

gponameà User Configuration à Windows Settings à Remote Installation


Services à Choice Options

6) What does it mean by “tattooing” the Registry ?

“ Tattooing” the registry means user can modify and view user preference that
are not stored in the maintained portions of the Registry. Even if the group
policy is changed or removed, the user preference will still persist in the
registry.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

7) Mention how many types of queries DNS does?

The types of queries DNS does are

 Iterative Query
 Recursive Query

8) Explain what is the primary function of the domain controller?

Primary function of the domain controller is to validate users to the networks,


it also provide a catalog of Active Directory Objects.

9) What information is required when TCP/IP is configured on Window


Server?

To configure a TCP/PI client for an IPv4 client, you have to provide the IP
address and the subnet mask.

10) Explain what does it mean caching only server in terms of DNS?

The caching only DNS server provides information related to queries based on
the data it contains in its DNS cache.

11) Explain what is the way to configure the DHCP server such that it
allocates the same IP address to certain devices each time the address is
removed?

To configure the DHCP server, you can create a reservation for the device. To
create a reservation, you must know the MAC hardware address of the
device. To determine the MAC address for a network device you can use the
ipconfig or nbs tat command line utilities.

12) Explain what is LDAP?

To look up for the information from the server, e-mail and another program
follows or uses the internet protocol. This protocol is referred as LDAP or
Lightweight Directory Access Protocol.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

13) Explain what is SYSVOL folder?

It is a set of files and folders that is stored on the local hard disk of each
domain controller in a domain and are replicated by the FRS ( File Replication
Service). These files contain group or user policy information.

14) Explain what is the difference between a thread and a computer


process?

Computer Process: In computing, a process is an instance of a computer


program that is executed sequentially by a computer system which can run
several computer programs concurrently.

Thread: A thread is a several executable program that work together as a


single process. For instance, one thread might send an error message to the
user; another might handle error signals while the third thread might be
executing the original action.

15) Explain what is INODE?

INODE holds the metadata of files; INODE is a pointer to a block on the disk,
and it is unique.

In simple words, it is a unique number allocated to a file in UNIX-like OS.

16) Explain what is RAID in Windows Server?

For storing same data at a different place RAID or Redundant Array of


Independent Disks strategy is used. It is a strategy for building fault tolerance
and increase the storage capacity. On separate drives it allows you to combine
one or more volumes so that they are accessed by a single drive letter

17) Explain what is the purpose of deploying local DNS servers?

A local DNS server provides the local mapping of fully qualified domain names
to IP addresses. To resolve remote requests related to the domains names on
your network, local DNS servers can provide record information to remote
DNS servers.

18) To check TCP/IP configurations and IP connectivity, what are the two
command line utilities that can be used?

Ipconfig: To check the computer’s IP configuration, command ipconfig can be


used and also it can be used to renew the client’s IP address if it is provided by
a DHCP server.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Ping: To check the connection between the local computer and any of the
other computer device on the network Ping command is used

19) Explain if it is possible to connect Active Directory to other 3rd party


Directory services?

Yes, you can connect other vendors directory services


with Microsoft version. By using dirXML or LDAP to connect to other
directories.

20) Explain where is the AD database is held?

AD database is saved in %systemroot%/ntds. Files that controls the AD


structure are

 ntds.dit
 edb.log
 res1.log
 res2.log
 edn.chk

21) Explain what is the major difference between NTFS ( New Technology
File System) or FAT (File Allocation Table) on a local server?

For local users FAT (File Allocation Table) and FAT32 provides security, while
NTFS ( New Technology File System) provides security for domain users as well
as local users. NTFS provides file level security which is not possible through
FAT32.

22) Mention what windows server 2008 service is used to install


client operating system over the network?

WDE ( Windows Deployment Services ) allows you to install client and server
operating systems over the network to any computer with a PXE enabled
network interface

Top Windows Server Interview Questions


Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

1. Explain Windows Server.

Windows server refers to is a sequence of enterprise-class server operating systems


specifically designed for end-users for sharing resources or services with multiple
users. This offers extensive administrative control of data storage, applications, and
corporate networks.
2. List out the various versions of Windows Server.

The version of windows servers are as follow:

 Firstly, Windows Server 2003 (April 2003)


 Secondly, Windows Server 2003 R2 (December 2005)
 Thirdly, Windows Server 2008 (February 2008)
 Windows Server 2008 R2 (October 2009)
 Then, Windows Server 2012 (September 2012)
 Windows Server 2012 R2 (October 2013)
 After that, Windows Server 2016 (September 2016)
 Lastly, Windows Server 2019 (October 2018)

3. What is Windows Server 2019?

Windows Server 2019 refers to the operating system used for bridging on-premises
environments with Azure services. This,

 Firstly, enables hybrid scenarios for maximizing existing investments.


 Secondly, enhance security level and reduce business risk using the multiple
layers of protection created into the operating system.
 Thirdly, helps in evolving data center infrastructure for achieving greater
efficiency and scale with Hyper-converged Infrastructure (HCI).
 Lastly, helps developers and IT professional for building cloud-native
applications using containers and micro-services.
4. What are the main features of Windows Server 2019?

 Firstly, has a storage Migration Service that helps in inventory and migrating
data, security, and configurations from legacy systems to Windows Server
2019.
 Secondly, it has the capability to synchronize file servers to Azure. You can
collect an organization’s file shares in Azure Files while keeping the flexibility
and performance of an on-premises file server
 Thirdly, it helps in bringing local predictive analytics capabilities native to
Windows Server. These predictive capabilities are backed by a machine
learning model which locally analyzes Windows Server system data for
providing high-accuracy predictions for reducing operational expenses.
 It uses an Azure network adaptor for easily connecting to Azure virtual
networks.
 Next, it provides cluster-wide monitoring, cluster sets for creating large
clusters, and Precision Time Protocol (PTP).
 Lastly, it has VM protection that helps in repeating workloads running on VMs
from a primary location to a secondary.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

5. What does a System Administrator do?

The role of the System Administrator depends on the type of organization they are
working in. However, they are responsible for installing, supporting, and maintaining
servers and computers. Their day to day tasks includes:

 Firstly, installing patches & OS Updates and reviewing the system logs
access administration.
 Secondly, providing permission access administration for users.
 Thirdly, monitoring and planning for disaster recover
 Then, building and Restoring system backups
 After that, following the password requirements and accessing the control
 Lastly, examining and performing the system audit logging

6. Explain the types of roles in the Windows Server.

The roles include:

 Firstly, Active Directory Lightweight Directory Services (ADLDS)


 Secondly, Active Directory Rights Management Services (ADRMS)
 Thirdly, Application Server
 Fourthly, Active Directory Certificate Services (ADCS)
 Active Directory Domain Services (ADDS)
 Then, Active Directory Federation Services (ADFS)
 DHCP Server
 Next, DNS Server and FAX Server
 After that, File and Storage Services
 Hyper-V, Print and Document Services
 Then, Network Policy and Access Services
 After that, Remote Access and Remote Desktop Services
 Next, Volume Activation Services
 Web Server (IIS)
 Lastly, Windows Deployment Services (WDS) and Windows Server Update
Services (WSUS)
7. What is Active Directory?

Active Directory (AD) refers to an inventory organization that performs library


operations for collecting objects like customer profiles, computers, etc. This controls
the framework using Domain Controllers that are accessible at several zones with the
Active Directory database.
8. Define DNS.

DNS stands for Domain Name System which refers to the phonebook of the Internet.
When users type domain names like ‘google.com’ into web browsers then, DNS finds
the correct IP address for those sites. After that, browsers use those addresses for
communicating with origin servers or CDN edge servers for accessing website
information.
9. Why it is important to deploy local DNS servers?
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

A local DNS server helps in providing the local mapping of domain names to IP
addresses. For resolving the remote requests related to the domain names on your
network, this also provides record details to remote DNS servers.
10. Define the following:

1. Domain

Domain refers to an Azure directory logical structure which is a collection of users,


objects, and computers sharing a familiar AD.

2. Tree

This refers to a collection of one or more domains.

3. Forest

This refers to a collection of one or more domain trees sharing a familiar global catalog.
Moreover, this remains on top in the Active Directory structure.
11. What do you understand by Domain Controller?

Domain Controller refers to a server in windows based operating systems that provide
secure authentication of users, computers. However, this is the core of the database
for storing user’s account information and security enforcement. For example, using a
domain controller, the user gets permission to allow or deny access to a particular
folder in a particular domain.
12. Define Hyper-V.

Hyper-V refers to a virtualization tool provided by Microsoft. This is used for building
multiple virtual machines on a single physical server along with managing and
decreasing the cost of hardware and improving efficiency.
13. What is the role of LDAP?

LDAP stands for Lightweight Directory Access Protocol which is a directory service
similar to the database that is used for storing computers, users, objects, etc.
Moreover, it helps in adding, removing, and updating computer objects in the directory.
14. Define WDS.

WDS stands for Windows Deployment Services which is used in installing Windows
operating system(OS) remotely over the network. This is basically a server technology
from Microsoft that helps in the network-based installation of Windows operating
systems. This acts as a successor to Remote Installation Services.
15. What do you understand by WSUS?

WSUS stands for Windows Server Update Services (WSUS) which refers to a
computer program and network service developed by Microsoft. This helios the
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

managing and handling of the distribution of updates of products in the Windows


environment.
16. Explain PowerShell.

Windows PowerShell refers to Command-Line Shell developed by Microsoft. This is


used for automating the administrative tasks that work both for local and remote
Windows machines. However, on .NET Framework, PowerShell is built.
17. Define Replication.

Replication refers to a method in the active directory that is used for keeping domain
controller syncs with other DC over the network.
18. Name the location of active directory databases operates.

The is include:

 Firstly, NTDS.DIT
 Secondly, Res1.log
 Thirdly, Res2.log
 Then, EDN.Chk
 Lastly, EDB.Log

19. What do you understand by the non-authoritative and authoritative restore of an Active Directory (AD)?

 A non-authoritative restoration refers to a process in which the domain


controller is restored. And after that, the Active Directory (AD) objects are
brought up to date by replicating the latest version of those objects from other
domain controllers in the domain.
 On the other hand, an authoritative restore refers to an operation in which the
data that has been restored supersedes the data existing on other domain
controllers in the domain. However, while performing an authoritative restore,
the current versions of objects in the Active Directory are overwritten by the
versions of the objects which were restored.

20. What is the process of installing an application if MSI is not available?

For adding the application using the Software Installer, the dot ZAP text file can be
used rather than the windows installer.
21. What is tattooing in terms of Registry?

Tattooing in the registry can be defined as suggesting to the users that they can
change and view the preference of the customers that are not stored in the Registry
portions. Moreover, even if the group policy is removed or changed, the user
preference will still remain in the registry.
22. Name the DNS types of queries.

The types of queries in DNS are:


Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

 Firstly, Iterative Query


 Secondly, Recursive Query
23. Explain the following:

1. Computer Process

Computer process refers to a computer program case that is executed repeatedly by


a computer. This is capable of running numerous programs on a computer at the same
time.

2. Thread

A thread consists of many executable programs that combine as a solitary process.


For example, a thread can send a notification error to the customer. Therefore, an
alternative can contract with the signals of error even though the third thread may
execute the primary action.
24. Define DHCP.

DHCP stands for Dynamic Host Configuration Protocol which is used for automatically
allocating the IP address across the network with a defined scope.
25. Name the types of FSMO roles?

 Firstly, Primary Domain Controller (PDC)


 Secondly, Infrastructure master
 Thirdly, Relative ID (RID) master
 Then, Schema master
 Lastly, Domain naming master

26. What do you understand by Group Policy?

Group Policy refers to a feature of Microsoft Windows NT which also belongs to the
family of OS. This helps in controlling the work setting of computer accounts and user
accounts. Further, it also provides the central configuration management of the
operating systems, user settings, and applications in an Active Directory setting.
27. Explain Group Policy Objects (GPO) and name its types.

GPO refers to the setting that manages the client records at the workplace, and also
at computer records. This helps in explaining the programming establishment, security
alternatives, upkeep choices and library-dependent arrangements, folder redirection
choices, and content choices. Further, there are two types of GPO:

 Firstly, Local GPO. These are kept on close devices.


Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

 Secondly, Non-local GPO. These can be accessed from the Active Directory
and are kept on a domain controller.
28. Is it possible to associate a third-party directory service to an Active Directory?

Yes, using the various versions of Microsoft. dirXML or LDAP it is possible to associate
third-party directory services to Active Directory.
29. Name the commands for checking TCP/IP configurations.

There are two commands for checking the TCP/IP configurations:

1. Ipconfig

This is for checking the IP setup of the computer. Moreover, you can also use it for
reestablishing the IP address of the users if it is defined by a DHCP server.

2. Ping

This is for checking the link between the computer in use and the other computers.
30. What is the role of IntelliMirror?

IntelliMirror helps in settling the settings of desktop, stored files, and applications for
users especially the one moving among workstations and who works offline.
31. Explain the basic functionality of the domain controller?

The domain controller is responsible for verifying the customer’s too many networks.
Moreover, it also brings a set of objects that are involved in the Active Directory.
32. Explaining the role of local DNS servers.

A local DNS server provides the local mapping of complete skillful domains to IP
addresses. They provide record data to remote DNS servers for resolving requests
concerning the domains on the network.
33. Define INODE.

The inode refers to a data structure in a Unix-style file system that explains a file-
system object like a file or a directory. Every inode can store the attributes and disk
block locations of the object’s data. However, the file-system object attributes may
include metadata including owner and permission data.
34. What do you understand by RAID in Windows Server?

RAID stands for Redundant Array of Independent Disks which is used for storing the
same data at a different place. This strategy helps in creating fault tolerance and
increase storage capacity. However, on different drives, it provides access to combine
one or more volumes for accessing it by a single drive letter
35. Define the term Global Catalog.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

The Global Catalog refers to a database that consists of all the data relating to objects
in Active Directory environment domains.
36. Explain the following:

1. Domain local groups

These are for allocating access approvals to international groups of domains for local
resources of the domain.

2. Global groups

These provide access to other trusted domains’ resources.

3. Universal groups

This helps in providing access to all trusted domain resources.


37. Is it possible to restore Active Directory Partitions?

Yes, you can restore the objects from the domain and configuration partition.
38. Name the types of partitions in the active directory.

There are four types of partitions:

 Firstly, the Configuration partition


 Secondly, the Application partition
 Thirdly, Schema partition
 Lastly, Domain partition

39. Define Configuration Partition.

This is for storing all the data of Active Directory. The data here consists of site-link,
Site, subnet, etc. Further, the partition duplicates all domain controllers that are
available in the Forest.
40. Explain the difference between application and scheme partition.

 Application partition is for storing the information of applications in Active


Directory. For example, ForestDNSZones and DomainDNSZones.
 Schema Partition is for storing all the information of the objects and their
qualities. Further, this duplicates to other domain controllers in the Forest.
41. Define Domain Partitions.

This is for storing the domain information like a computer, user, printer, group, etc.
Further, it duplicates to all domain controllers in the domain.
42. Explaining the DHCP server configuring process for assigning the same IP address to define devices whenever there is a
change or removing of the address?
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

For configuring the DHCP server, you can build a reservation for the device. However,
for creating a reservation, you must know the MAC hardware address of the
device. Further, for discovering the MAC address for a network device you can use
the IP config command-line utilities.
43. What do you understand by the SYSVOL folder?

This refers to a set of files and folders placed on the local hard disk of each domain
controller in a domain. They are replicated by the File Replication Service with having
files containing group or user policy details.
44. What is a Windows DNS server?

The Windows DNS server means an area name framework used as a kind of
perspective table for coordinating the space names to various IP addresses.
45. Explain the various zones in the Windows DNS server.

 Firstly, Primary Zone. In this, the record is provided as a text file with the
typical extension “.DNS”
 Secondly, Secondary Zone. This is a support for the important server that
goes about load adjusting and provides for non-critical failure.
 Lastly, Stub Zone. This consists of the name server and SOA records that
help in reducing the DNS seek orders.

46. Differentiate Windows and Windows Server.

 Windows Server OS was released for server systems like Workstation, Rack,
Tower, etc. This is capable of multiple users who can log in and work
continuously. Further, this has the support of CPU(64), cores(320), and
RAM(24TB).
 Windows OS was released for user systems like desktop, Laptop, Tablet,
Mobile, X-box, etc. In this, multiple user accounts can be created, but, only
one user can log in at a time. Further, this has the support of limited CPU(2),
core(256), and RAM(2TB).
47. Define Visio diagram.

Visio refers to a diagramming software on Microsoft Windows that provides users


access for creating floor plans, flowcharts, infographics, network diagrams,
organization charts, mind maps, and others. It is included with Microsoft Office
software, suite.
48. What do you understand by a Proxy Server?

This refers to a computer that acts as a gateway between a local network and a larger-
scale system such as the Internet. Further, this also provides increased security and
performance as well as helps in monitoring the employees using outside resources.
49. Define WINS server?
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

WINS stands for Windows Internet Name Service servers that are used for mapping
the IP addresses to NetBIOS names. This allows employers to access resources by
name of the computer rather than the IP address. Further, for keeping a check on the
IP addresses and names of other computers network, this computer can be configured
as a WINS server.
50. What is the Dora process?

DORA stands for Discover, request, Offer, and acknowledgment. However, it is used
for automatically assigning an IP address to the systems of the client.
51. What is the major advantage of GPMC?

Group Policy Management Console (GPMC) provides easy management of all GPOs
diagonally the whole Active Directory Forest View of GPOs in one list. This allows to
perform GPOs backup and restore, Immigration of GPOs over many forest and
domains.
52. Explaining the process to backup Group policy?

 For backing up one single GPO, then click the GPO, and select Back Up.
 Further, for backup of all GPOs in the domain, click Group Policy Objects and
then, click Back Up All.
53. Define group nesting.

This refers to the process of adding one group as an element of another group. It also
helps in easy management and decreasing traffic replication.
54. Explain the types of Domain control?

 Firstly, the primary domain controller. This emphasis on services of the


domain for avoiding the system possibility of a crash or slowing down
because of the overtasking from handling other security requests and
functionality.
 Secondly, a backup domain controller is promoted and becomes the
primary domain controller for preserving the server systems working
appropriately.

55. Define Schema.

Schema refers to a master database containing all the information about the object in
Active Directory.
56. Define Trust Relationship.

The trust relationship is used for providing access between various domains or forests.
57. Define NTDS.DIT.

This refers to the Active Directory database which contains all the AD objects.
However, the default location is %system root%nrdsnrds.dit. Further, it depends on
the Jet database.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

58. What is EDB.Log?

This file is used for tracking the transactions on the database. However, when
EDB.Log is full then, it gets renamed to EDB Num.log where num can be a number
starting from 1 like EDB1.log
59. Define EDB.Che.

This file is for checking the data that is not yet written to a database. However, this file
has the starting point to the data that can be retrieved during failures.
60. What is Res in Res1.log and Res2.log.

Res here stands for reserved transaction file which is used for providing the
transaction log file enough time for shutting down if the disk runs out of space.
61. Explain the role of Flexible Single Master Operations?

The role of FSMOs is that it follows the Schema Master and Domain Naming Master.
These both are available only on each forest and also in the Infrastructure Master, RID
Master, and PDC.
62. What will you do if an HTTP monitor warns that a website is down, and you can telnet to the port?

Firstly, I will figure the problem with the monitor if the web page is up. The other issues
can be flapping, or system overload.
63. Define Windows server backup.

The Windows Server Backup was released for Windows 2008 that works as a recycle
bin tool in the Active Directory. This offers you a large variety of solutions for backing
up data on your system. Moreover, it provides access to a large amount of data backup
and in this, you can access the server backup using command lines and the
management console.
64. What is KCC?

KCC refers to a built-in process used for running on all domain controllers and creating
replication topology for the Active Directory forest. This builds separate replication
topologies based on whether replication is occurring within a site () or between sites.
Further, it has the capability for dynamically adjusting the topology to:

 Firstly, accommodating the addition of a new domain controller


 Secondly, the removal of existing domain controllers
 Thirdly, the movement of domain controllers to and from sites
 Then, changing costs and schedules
 Lastly, domain controllers, which are temporarily unavailable or in an error
state.

65. Deine SID.

SID is a security identifier that refers to a unique value of variable length used for
identifying a security principle in Windows operating systems.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

1. Question 1. What Are The Roles Of System Administrator?


Answer :
The role of System Administrator differs in the organization. The three main task
of a System Admin is Installing, Supporting and maintaining servers & computers.

o Install patches & OS Updates


o Review system logs access administration
o Access administration for users
o Disaster recovery planning
o Creating and Restoring system backups
o Comply with password requirements
o Access control
o System audit logging
2. Question 2. What Is The Different Version Of Windows Server?
Answer :
The following are are the different version of windows servers:
o Windows Server 2003 (2003)
o Windows Server 2003 R2 (2005)
o Windows Server 2008 (2008)
o Windows Server 2008 R2 (2009)
o Windows Server 2012 (2012)
o Windows Server 2012 R2 (2013)
o Windows Server 2016 (upcoming – 2016)
Network Technical Support Interview Questions

3. Question 3. What Are The Different Roles In Windows Server?


Answer :
The following are the different roles in Windows server:
o Active Directory Certificate Services (ADCS)
o Active Directory Domain Services (ADDS)
o Active Directory Federation Services (ADFS)
o Active Directory Lightweight Directory Services (ADLDS)
o Active Directory Rights Management Services (ADRMS)
o Application Server
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

o DHCP Server
o DNS Server
o FAX Server
o File and Storage Services
o Hyper-V
o Print and Document Services
o Network Policy and Access Services
o Remote Access
o Remote Desktop Services
o Volume Activation Services
o Web Server (IIS)
o Windows Deployment Services (WDS)
o Windows Server Update Services (WSUS)
4. Question 4. What Is Dns?
Answer :
Domain Naming System(DNS) resolves IP address to the hostname(domain) and
hostname(domain name) to IP address.

Networking Tutorial

5. Question 5. What Is Dhcp?


Answer :
Dynamic Host Configuration Protocol (DHCP) helps in automatically allocation IP
address over the network with defined scope.

Computer Technical Support Interview Questions

6. Question 6. What Are The Types Fsmo Roles?


Answer :
The are five FSMO roles:
o Primary Domain Controller (PDC)
o Infrastructure master
o Relative ID (RID) master
o Schema master
o Domain naming master
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

7. Question 7. What Is Active Directory?


Answer :
Active Directory is Microsoft directory services used on Windows servers. Active
directory is a centralized database for users, computers, networks, printers, files
etc.

Networking Interview Questions

8. Question 8. What Do Forests, Trees, And Domains Mean?


Answer :
Domain, tree and forest are a logical structure in Active Directory.

Domain: A domain is a collection of computers, users, and objects which share


common AD and has trust relationships.
Tree: A tree collection of one or more domain.
Forest: The forest is the top of the Active Directory structure. It is consists of
multiple trees which share a common global catalog.
9. Question 9. What Is Domain Controller?
Answer :
Domain Controller is used in windows based operating systems for security
authentication of users, computers etc. It is a central database for storing users
account information and security enforcement. For example, DC helps which users
to allow or deny the access to a particular folder in a particular domain.

Exchange Server 2010 Interview Questions

10. Question 10. Explain About Hyper-v?


Answer :
Hyper-V is Microsoft’s virtualization tool for creating multiple virtual machines
on a single physical server, thus reducing the cost of hardware and improving
efficiency.

11. Question 11. What Is Ldap?


Answer :
LDAP is a Lightweight Directory Access Protocol. The directory services are just
like a database for storing computers, users, objects etc. which helps in adding,
removing and updating computer objects in the directory.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Active Directory Interview Questions

12. Question 12. What Is Wds?


Answer :
Windows Deployment Services helps for installing Windows operating
system(OS) remotely over the network

Network Technical Support Interview Questions

13. Question 13. What Is Wsus?


Answer :
Windows Server Update Services (WSUS) is developed by Microsoft to manage
the distribution of updates in Windows environment.

14. Question 14. What Is Powershell?


Answer :
Windows PowerShell is Command-Line Shell developed by Microsoft. The main
purpose of the PowerShell is to automate administrative tasks which work both
local and remote windows machines. PowerShell is built on .NET Framework.

15. Question 15. What Is Replication?


Answer :
Replication is a process in active directory which keeps domain controller syncs
with other DC over the network.

Desktop Support Interview Questions

16. Question 16. What Is Schema?


Answer :
Schema is a master database which contains all the information about the object in
Active Directory.

17. Question 17. What Is Trust Relationship?


Answer :
Trust relationship allows access between different domains or forest.

VMware Infrastructure with ESX Server and VirtualCenter Interview Questions

18. Question 18. What Is Server Manager?


Answer :
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

It is utility tool in Windows Servers for the administrator for managing servers
roles(like adding or removing server roles.

Windows Server is a series of different server operating systems that have been developed by the Microsoft
Corporation. It has a set of a very powerful version of various desktop operating systems that help users to
efficiently handle numerous functions, which include control and handling of networking, databases, etc. As
Windows Server makes the functioning of companies and institutions easy, organizations are thus looking for
individuals with thorough knowledge and hands-on experience in this field.

Read below some of the commonly asked Windows Server Interview Questions in order to make your entire
process of the interview preparation easy. This set of Windows Server Interview Questions also contains
various features, pros, and cons of using Windows Server that can give you an upper hand in comparison to
other candidates running in the competition in between you and your dream job.

Quick Questions About Windows Server

Windows server is series of server os.

Windows server is used for Hosting websites, APIs and enterprise applications.

Windows Server is developed By Microsoft Corporation

Official website https://windowsserver.com

User Interface Command-Line and Graphical

Window Server Licence Trialware, SaaS or volume licensing

Windows server Current version Windows Server, version 1903

Windows Interview Questions


DOWNLOAD WINDOWS SERVER INTERVIEW QUESTIONS PDF
Below are the list of Best Windows Server Interview Questions and Answers

1) What is Windows Server?

Windows server is a series of enterprise-class server operating systems which is designed for
end-users to share resources/ services with multiple users and provide extensive
administrative control of data storage, applications, and corporate networks.

2) What's new in Windows Server 2019 ?

Windows Server 2019 is the latest release of window server that uses the long-term servicing
channel or shortened LTSC.

Its comes with the following features:


Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

 Windows Subsystem for Linux


 Support for Kubernetes
 Other GUI new features from Win10 version 1809
 Storage Space Direct
 Storage Migration Service
 Storage Replica
 System Insights
 Improved Windows Defender

3) Describe an Active Directory in Server?

Active Directory (AD) is an inventory organization that is used in a library to collect objects
like customer profiles, computers, etc. It manages the framework effectively with the help of
Domain Controllers that are accessible at different zones with the Active Directory database.
A segment of the limits fuse essential association with various land zones, check of
customers and computers in the space provided by windows, copying Active Directory from
any Domain Controller. In addition to which these lines will be reverted to each and every
other Domain Controllers.

4) What is the purpose of deploying local DNS servers?

A local DNS server provides the local mapping of fully qualified domain names to IP
addresses. To resolve remote requests related to the domains names on your network, local
DNS servers can provide record information to remote DNS servers.

5) List the various Active Directory Database files

The numerous Active Directory Database files comprise of the following:

 DIT
 Che
 log and Res2.log
 Log

Not all the Active Directory changes are created truly to the NTDS.DIT database archive.
They are first formed to EDB.Log and hence form the log record to the database. EDB.Che is
acclimated with the following changes to the database and it undergoes as an updated log
record to keep a check on the tasks are performed to the database.

 NTDS.DIT: This is referred to as an Active Directory database that contains all the AD
dissents. The default zone is %system root%nrdsnrds.dit. This database relies upon the Jet
database.
 EDB.Log: This record is to pursue the trades on any particular database, at the time EDB.Log
is full it is retitled to EDB Num.log, in which a “num” is a number beginning from 1 such as
EDB1.log.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

 EDB.Che: This report is used to cross – verify the data that has not yet been kept in contact
with the database. This record has the beginning stage to the data that can be recovered in
the midst of disillusionment.
 Res1.log; Res2.log: Res speaks to spared trade record, which gives the trade log archive
sufficient time to shut down in case the circle misses the mark on space.

Download Free : Windows Server Interview Questions PDF

6) List the locations where different active directory databases are held

The locations where the different active directory databases are held include:

 NTDS.DIT
 Res1.log
 Res2.log
 EDN.Chk
 EDB.Log

7) Differentiate between File Allocation Table (FAT) and New Technology File System (NFTS)

Characteristic File Allocation Table New Technology File System


Security Only Network Local and network

Maximum file size 4GB 16TB


Maximum file name 8.3 Characters 255 characters
Conversion Possible Not allowed
Fault Tolerance No Auto Repair
Compression No Yes
File/Folder Encryption No Yes
Compatibility Win 95/98/2k/2k3/XP Win NT/2K/XP/Vista/7

8) What do you understand by the term trees, forests and domains?

The logical sections of any Active Directory organization are normally named as a tree,
forest, and domain. Diverse articles inside the arrangement of a logical section incorporate
the accompanying: computers, customers, devices, etc. that share a comparable dynamic
registry database, which is commonly acknowledged as a “domain”.

The mix of somewhere around one domain is called a “tree”. This may likewise contain an
abutting namespace associated in a transitive order. The gathering of domains is frequently
called a “forest” that shares overall inventory, logical structure, registry setup and registry
pattern. It also characterizes the security limits for clients, groups, and devices such as
computers.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

9) Describe the non-authoritative and authoritative restore of an Active Directory (AD).

Through non-authoritative restore, there are many chances that the domain controller can be
established back to its underlying state (the time when a backup was performed). When it is
set, it permits overwriting its underlying condition with the progressions that were carried out
preceding the underlying backup was achieved. Presently in order to upgrade the Active
Directory database, it is necessary that the particular domain controller from duplication
accomplices to guarantee that the AD is upgraded, precise and accurate to retrieve questions.

At whatever point there is any corruption or information loss in the AD, this technique is
utilized. The succeeding step after any particular non-authoritative restore is a definitive
authoritative process. The most important highlights of authoritative restore include that it
can augment the form quantities of the traits or an article in a whole directory. This sort of
restore is employed to reinstate a solitary erased client/object. In case of any disparity in the
variant numbers, the subsequent precaution and carefulness must be adhered to while
restoring and utilizing any authoritative restore procedures.

10) What do you understand by the term Group Policy Objects (GPO) and list the different
types of GPO

The setting that manages the workplace of client records, as well as computer records, are
known as Group Policy Object (GPO). This assistance is characterizing the security
alternatives, programming establishment, library-based arrangements and upkeep choices,
content choices and folder redirection choices. There are generally two types of Group Policy
Objects:

 Nonlocal Group Policy objects: These are accessible just in an Active Directory condition and
are put away on a domain controller.
 Local Group Policy Objects: These are put away on nearby computes.

11) Is it possible to connect a third party Directory service to an Active Directory?

Yes, it is possible to connect Active Directory to other third-party directory services with the
help of various Microsoft versions. LDAP or dirXML can be used to connect Active
Directory to other vendors.

12) In order to check TCP/IP configurations, list commands that have been frequently utilized

The two frequently used commands to check TCP/IP configurations include:

 Ping: In order to check the connection between the computer in use as well as other
computers, the Ping command is utilized.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

 Ipconfig: In order to check the computer's IP setup, command Ipconfig can be utilized and
furthermore it can also be very well utilized to restore the user's IP address in the case it is
given by a DHCP server.

13) Explain the different types of Directory Partitions in Window Server.

The different types of Directory Partitions include the following:

 Application Partition: Application partitions stores various data related to applications in the
Active Directory. For instance – ForestDNSZones and DomainDNSZones
 Configuration Partition: Configuration Partition stores all necessary data about the Active
Directory. The data incorporates Site, site-interface, subnet and so forth. This parcel likewise
replicates all domain controllers that are available in the Forest.
 Domain Partitions: Domain Partitions stores the data of the domain that incorporates client,
group, computer, printer and so forth. This partition also replicates all domain controllers
that might be available in the domain just like Configuration Partition.
 Schema Partition: Schema Partition stores every one of the details of the various items and
their respective properties. It additionally replicates other domain controllers that are
available in the Forest.

14) What is the basic function of the domain controller?

The function of the domain controller is to authenticate clients to various networks and
deliver a set of objects that are included in the Active Directory.

15) With respect to the Windows DNS server, explain Primary, Secondary and Stub Zones.

The Windows DNS server represents an area name framework, which is utilized as a kind of
perspective table to coordinate the space names to various IP addresses. Listed below are the
three important categories of zones characteristically used in Windows DNS server:

 Primary Zone: Within the primary zone, the record is spared as a text file with the typical
extension being .DNS
 Secondary Zone: This is a reinforcement for the essential server that goes about as load
adjusting and furthermore gives adaptation to non-critical failure. This is generally perused
just record which is set in another DNS server
 Stub Zone: This comprises of the name server and SOA records that helps in lessening the
DNS seek orders

16) What is the difference between Linux and Windows?

The major difference between Windows and Linux:

Windows
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

 Source code for windows is not available.


 You can modify or redistribute the Window operating system.
 In Windows, you are bounded to use one license in One PC only. If you have to install it on
other PC you need another License.
 Paid to help desk support.

Linux

 Linux is open-source; the complete source code for Linux is available.

Linux is the GPL-licensed operating system, you are free to modify that software and use and
even republish or sell it.

 Download once and install it on as many PC you want.


 Online peer support from the community via forums and online search.

17) List some of the roles of flexible single master operations (FSMO) by the Windows
Server?

Some of the roles of FSMO include the following:

 PDC
 Infrastructure Master
 RID Master
 Schema Master
 Domain Naming Master

18) What is difference between Windows and Windows Server?

Difference between Windows and Windows Server

Windows Server OS

 It is mainly released for servers grade systems like Workstation, Rack, Tower, etc
 Multiple users can log in and work simultaneously.
 Supports more CPU(64), cores(320) and RAM(24TB)

Windows OS

 It's mainly released for user grade systems like desktop, Laptop, Tablet, Mobile, X-box, Halo-
lens, etc
 You can create multiple user accounts, but, only one user can log in at a time.
 Support limited CPU(2), core(256) and RAM(2TB)

19) Differentiate between a thread and a computer process


Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Thread Computer Process


A thread includes the different executable program In computing, a procedure is a case of a
that cooperates as a solitary procedure. For example, computer program that is executed
one thread may send an error notification to the client; consecutively by a computer framework,
another might deal with the error signals while the which can run various computer programs
third thread may execute the first activity. simultaneously.

20) What are default user interface used in Windows Server ?

Powershell and Windows shell are default available in Windows Server.

21) What do you understand by the term “tattooing” in context of the Registry?

"Tattooing" the registry implies that clients can adjust and see client preference that is not put
away in the maintained portions of the prescribed Registry. Regardless of whether the
assembly approach is changed or evacuated, the client's preference will at present endure in
the registry.

22) What is a Visio diagram?

Visio is a diagramming software on Microsoft Windows that allows users to create floor
plans, flowcharts, infographics, network diagrams, organizations charts, mind maps, and
others. It is incorporated with Microsoft Office software, suite. Visio diagram is made
available for sale as a program or software that stands alone. It was initially launched in 1992
by Shapewear Corp. but known as Visio Corporation as of present. In the year 2000,
Microsoft acquired it. Visio diagram is sold primarily as a software one can easily download.
In the year 2017, an online version of the software was made available.

Features of Windows Server

 Has a multi-server management facility


 Provides deployment of friction-free servers
 Has good control over the management of IP address
 Delivers great access control

Pros of Windows Server

 Provides documentation of patches with exceptional features


 The entire community of Windows Server is very strong and with abundant knowledge
 Very reliable
 Windows server provides great security to different domain operations

Cons of Windows Server

 Requires various addition hardware resources


Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

 It is a little on the expensive side of the capital

1. In the context of the Registry, how do you define “tattooing”?

“Tattooing” the registry suggests that customers can change and view the
preference of the customers that are not placed away in the preserved prescribed
Registry portions. Irrespective of the assembly approach is evacuated or
changed, the preference of the client will currently be kept in the registry.

2. What is an Active Directory?

Active Directory is an organization of the inventory in a library to gather


objects such as computers, customer profiles, etc. It effectively controls the
framework through Domain Controllers that are available at many zones with
the database of the Active Directory. A section of the limits fuse dynamic
association with numerous land zones, check of computers and customers in the
space offered by windows, using the Domain Controller to copy Active
Directory. In accumulation to that these lines will be returned to every Domain
Controllers.

3. Distinguish between a computer process and a thread.

Computer Process

In computing, a process is a computer program case that is performed


repeatedly by a computer, that can run numerous programs on computer at the
same time.

Thread

A thread comprises the many executable programs that collaborate as a solitary


process. For instance, a thread might send a notification error to the customer;
an alternative might contract with the signals of error although the third thread
may perform the primary action.

4. What do you know about authorizing DHCP Servers in Active


Directory?

In case, a DHCP server is to function in an Active Directory domain (and the


domain controller is not used to running it) it should first be approved to Active
directory.

5. What Is Group Policy?


Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Group Policy is a Microsoft Windows NT feature that is also a family of OS


that manages the work setting of computer accounts and user accounts. Group
Policy offers the central configuration management and of OS, users’ settings,
and applications in an Active Directory setting.

6. List flexible single master operations (FSMO) roles by Windows Server?

Following are some of the roles of FSMO:

 Infrastructure Master
 Schema Master
 PDC
 RID Master
 Domain Naming Master

7. What do you understand by domains, forests and trees?

The rational units of any organization of Active Directory are usually called
tree, domain, and forest. Various articles in the procedure of a rational section
join accompanying: customers, computers, devices, etc. that share an analogous
active database registry that is normally known as a “domain”.

A tree is an assortment of domains in the Active Directory that starts at one root
and branches out into child domains, peripheral. This might similarly comprise
an adjoining namespace linked in a transitive order.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

The domains collection is often known as “forest” that shares general logical
structure, inventory, registry pattern and registry setup. It typifies the limits of
security for groups, clients, and devices for example computers.

8. What is Group Policy Objects (GPO) and list different kinds of GPO?

The setting that controls the client records the workplace, and also computer
records, are called Group Policy Object (GPO). This help is describing the
programming establishment, security alternatives, upkeep choices and library-
based arrangements, folder redirection choices and content choices. There are
usually 2 categories of GPO:

Local GPO: These are put away on close devices.

Nonlocal GPO: These are available on Active Directory and are put away on a
domain controller.

9. Can we link third-party Directory service to an Active Directory?

Yes, why not, it is possible to link third-party directory services to Active


Directory with by using different versions of Microsoft. dirXML or LDAP can
be used to link Active Directory to other retailers.

10. What commands you will use to check TCP/IP configurations?

The 2 most often used check TCP/IP configurations commands are:

Ipconfig: To check the IP setup of the computer, we can use the command
Ipconfig and additionally it can be very well applied to reestablish the IP
address of the users if it is specified by a DHCP server.

Ping: To check the link among the computer in use and the other computers, we
can use the Ping command.

11. What do you know about working of IntelliMirror?

IntelliMirror supports to settle settings of desktop, stored files and applications


for users especially the one who move among workstations and works offline.

12. How you can install an app MSI file when the is not available?

To install the application without using the MSI file, the Software Installer.
ZAP text file can be used in its place.

What is the domain controller’s basic function?


Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

The domain controller function is to verify customers to many networks and


bring a set of objects that involved the Active Directory.

13. What is the goal of installing local DNS servers?

A local DNS server offers the local mapping of fully competent domains to IP
addresses. To resolve requests concerning the domains on network, local DNS
servers can offer record data to distant DNS servers.

14. What’s new in Windows Server 2019?

It is the latest window server version that uses the shortened LTSC or long-term
servicing channel. Some of the most dominant features if the new windows
server 2019 are:

 Support for Kubernetes


 Storage Space Direct
 Storage Replica
 Improved Windows Defender
 Windows Subsystem for Linux
 Other GUI new features from Win10 version 1809
 Storage Migration Service
 System Insights

15. What is Windows Server’s default user interface?


Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Windows PowerShell is said to be the default user interface and command-Line


Shell made by Microsoft. The main goal of the PowerShell is to systematize
administrative tasks that work both remote and local windows machines. .NET
Framework is used to build PowerShell.

16. What is INODE?

The file’s metadata are kept by INODE holds; INODE is said to be a unique
pointer to a disk block. You can also say that it is a unique number owed to a
file in UNIX-like Operating system.

17. Explain what is RAID in Windows Server?

For storing the same data at a different place RAID or Redundant Array of
Independent Disks strategy is used. It is a strategy for building fault tolerance
and increase storage capacity. On separate drives it allows you to combine one
or more volumes so that they are accessed by a single drive letter

18. What Are the System Administrator Roles?

The System Administrator role varies in the organization. The 2 key System
Admin tasks are Supporting, Installing and maintaining computers & servers.

 Install patches & OS Updates


 Access user’s administration
 Creating and Restoring system backups
 Access control
 Review system logs access administration
 Planning Disaster recovery
 Comply with password needs
 System audit logging

19. Can you name Different Version of Windows Server?

The version of windows servers till now are:

 Windows Server 2003 (2003)


 Windows Server 2003 R2 (2005)
 Windows Server 2008 (2008)
 Windows Server 2008 R2 (2009)
 Windows Server 2012 (2012)
 Windows Server 2012 R2 (2013)
 Windows Server 2016 (2016)
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

20. What is the global catalog?

The Global Catalog is a kind of database that comprises all of the data relating
to objects in Active Directory environment domains.

21. Explain the difference between local, universal and global groups?

Domain local groups allocate access approvals to international groups of


domains for local resources of the domain. Global groups offer access to other
trusted domains’ resources. The Universal groups grant access to all trusted
domains resources.

22. Can Active Directory Partitions Be Restored?

We can authoritatively restore the objects from domain and configuration


partition. Authoritative restores of schema-naming are not supported here.

23. Explain different types of active directory partitions.

Configuration Partition– it is a partition that stores all the data of Active


Directory. The data comprises site-link, Site, subnet etc. This partition copies all
domain controllers that are available in the Forest.

Application Partition– it stores the information of applications in Active


Directory. For examples DomainDNSZones and ForestDNSZones.

Schema Partition–It stores all the information of the objects and their qualities;
it copies to other domain controllers in the Forest

Domain Partitions– it stores the domain information that includes a computer,


user, printer, group, etc. It also copies to all domain controllers in the domain.

24. What is a Proxy Server?

It is a computer that is actually a doorway between a local network (such as all


computers in one organization or in a building) and a larger-scale system such
as the Internet. Proxy servers offer increased security and performance. In most
of the cases, they monitor employees using outside resources.

25. What is WINS server?

Windows Internet Name Service (WINS) servers map the IP addresses to


NetBIOS names. This lets employers access resources by name of the computer
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

rather than the IP address. To keep a check on the IP addresses and names of
other computers network, this computer can be configured as a WINS server.

We may not able to connect to a remote network through its NetBIOS name, in
case you are not using WINS in a network,

26. Define Dora Procedure & its usage.

Discover, request, Offer and acknowledgement. it is used to automatically


allocate an IP address to systems of the client.

27. In which order the GPOs are applied?

We can apply the GPO is an order of

 Local Group Policy object site,


 Domain and
 organizational units.

28. Can you state a few benefits of GPMC?

One of the major benefits of GPMC is its easy management of all GPOs
diagonally the whole Active Directory Forest View of GPOs in one list. We can
do the GPOs backup and restore, Immigration of GPOs across many forest and
domains.

29. How you will do the backup for Group policy?

1. For back up, one single GPO, right-click the GPO and then click Back
Up.
2. For backup, all GPOs in the domain, right-click Group Policy Objects
and click Back Up All.

30. What is the group nesting?

When we add one group as an element of another group is known as ‘group


nesting’. It also helps in easy management and reduced traffic replication.

31. What is Domain control?

A domain controller is a server that manages the security requests from other
servers and computers in the Windows Server domain. There are two kinds of
the domain controller that is a backup domain controller and a primary domain
controller. The primary domain controller emphasis on services of the domain
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

to avoid the system possibility of a crash or slowing down because of the


overtasking from handling other security requests and functionality. If the
primary domain controller goes down, a backup domain controller is promoted
and become the primary domain controller to preserve the server systems
working appropriately.

32. What is tree?

A tree is actually a collection of domains in the Active Directory that starts at


one root and branches out into child domains, peripheral. This can similarly
comprise an adjoining namespace linked in a transitive order. An Active
Directory forest is an assortment of Active Directory trees, just like a real-world
forest.

1. What is an Active Directory?


Answer:

Active Directory (AD) is a directory service which is used in a directory to store

objects like user profiles, network information, computers. It helps to manage the

network effectively with the help of Domain Controllers which are present at

different locations with the Active Directory database. Some of the functions

include central administration with multiple geographical locations, authentication

of users and computers in a windows domain, replicating Active Directory from

any Domain Controller which in turn will be replicated to all other Domain

Controller’s.

2. What are some of the roles of FSMO (flexible single master


operations)?
Answer:

 Schema Master is a forest-wide role and is available only on each forest

 Domain Naming Master, like Schema Mater this too is a forest-wide role
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

 Infrastructure Master

 RID Master

 PDC

Let us move to the next Windows Server Interview Questions

3. Tell me about Active Directory Database And List The


Active Directory Database Files?
Answer:

The Active Directory database files as follows:

 DIT

 Log

 Che

 log and Res2.log

All the Active Directory changes are not written directly to the NTDS.DIT

database file. They are first written to EDB.Log and thereon from the log file to the

database.

EDB.Che is used to tracking the updates to the database it acts as an update log file

to check what operations are performed to the database.

Popular Course in this category


Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Windows 10 Training (4 Courses, 4+ Projects) 4 Online Courses | 4 Hands-On


Projects | 26+ Hours | Verifiable Certificate of Completion | Lifetime Access
4.5 (8,040 ratings)
Course Price
₹4999 ₹27999
View Course

Related Courses
JWS Java Web Services Training (4 Courses, 11 Projects)Java Training (40 Courses, 29 Projects, 4
Quizzes)

 NTDS.DIT: This is the Active Directory database and contains all the AD

objects. The default location is %system root%nrdsnrds.dit, this database is

based upon the Jet database.

 EDB.Log: This file is to track the transactions on the database, when

EDB.Log is full it gets renamed to EDB Num.log where a num is a number

starting from 1 like EDB1.log

 EDB.Che: This file is used to check for the data that is not yet written to a

database. This file has the starting point to the data can be recovered during

failures.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

 Res1.log and Res2.log: Res stands for reserved transaction file which provides

the transaction log file enough time to shut down if the disk runs out of

space.

4. What is the use of Active Directory Partitions? And How to


Find the Active Directory Partitions and there Location?
Answer:

The different type’s of active directory partitions are as below:

 Schema Partition–This partition stores all the details of the objects and their

attributes, it also replicates to other domain controllers which are present in

the Forest

 Configuration Partition– This partition stores all the information about the

Active Directory. The information includes Site, site-link, subnet etc. this

partition also replicates to all domain controllers which are present in the

Forest

 Domain Partitions– This partition stores the information of the domain which

includes user, computer, group, printer etc. this partition also replicates to all

domain controllers which are present in the domain.

 Application Partition– This partition stores the applications information in

Active Directory.Exampels– ForestDNSZones and DomainDNSZones

5. What are GPOs (Group Policy Objects)?


Answer:

This is the frequently asked Windows Server Interview Questions. The settings
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

that control the working environment of user accounts and computer accounts are

known as Group Policy Object (GPO). This help is defining the security options,

software installation, registry-based policies and maintenance options, script

options and folder redirection options

There are two types of Group Policy Objects:

 Nonlocal Group Policy objects: These are available only in an Active Directory

environment and are stored on a domain controller

 Local Group Policy Objects: These are stored on local computers (individual

computers)

Part 2 – Windows Server Interview Questions


(Advanced)
Let us now have a look at the advanced Windows Server Interview Questions.

6. What do Forests, Trees, and Domains mean?


Answer:

The logical divisions of an Active Directory network are known as forests, trees,

and domains.

A logical group of network objects for example computers, users, devices etc

which share the same active directory database is known as a domain.

The collection of one or more domains is known as a tree. This may also include a

contiguous namespace linked in a transitive trust hierarchy.


Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

The collection of domains is known as the forest which shares a common global

catalog, logical structure, directory configuration and directory schema. It also

defines the security boundaries for users, groups, and computers.

7. Non-authoritative Restore of Active Directory?


Answer:

During non-authoritative restore, the domain controller is set back to its initial state

(the state at the time of backup was taken). Once it’s done it allows overwriting its

initial state with the changes that were done after the initial backup was taken.

Now for updating the Active Directory database, queries are fetched by the domain

controller from replication partners to ensure that the Active Directory is up to date

and accurate. Whenever there is data loss or corruption in the Active Directory this

method is used (default).

Let us move to the next Windows Server Interview Questions


Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

8. Authoritative Restore of Active Directory?


Answer:

The second step after a non-authoritative restore is an authoritative restore process.

One of the key features of authoritative restore is that it can increment the version

numbers of the attributes or an object in an entire directory. This type of restore is

used to restore a single deleted user/object. There will be a mismatch in the version

numbers and hence care must be taken while restoring using authoritative restore

process

9. Explain in windows DNS server What is Primary,


Secondary and Stub zone?
Answer:

DNS stands for domain name system, which is used as a reference table to match

the domain names to the ip addresses

The below are the three types of zones in Windows DNS server:

 Primary Zone: In the primary zone, the file is saved as a text file with

extension being (.dns)

 Secondary Zone: This is a backup for the primary server which acts as load

balancing and also provides fault tolerance. This is usually read-only file

which is placed in another DNS server

 Stub Zone: This consists of the name server and SOA records which help in

reducing the DNS search orders


Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

10. Explain what is the major difference between NTFS (New


Technology File System) or FAT (File Allocation Table) on a
Feature FAT32 NTFS

Maximum file name 8.3 Characters 255 characters

Maximum file size 4GB 16TB

File/Folder Encryption No Yes

Fault Tolerance No Auto Repair

Security Only Network Local and network

Compression No Yes

Conversion Possible Not allowed

Compatibility Win 95/98/2k/2k3/XP Win NT/2K/XP/Vista

local server?
Answer:

The major differences between FAT32 and NTFS are as below:

Question 1: What are the minimum system requirements to install and


use Windows Server 2019 Essentials:

Answer

 Processor: 1.4 GHz 64-bit EMT64 or AMD64 processor required. ...


 Disk space: 96 GB (Three times the RAM size limited to 32 GB)
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

 Disk controller: PCI Express Compliant Disk Controller.


 RAM: 512 MB ECC supported Memory Modules.

Question 2: What is the difference between Windows Server 2019 and


Windows Server 2016

Answer

 Features related to hybrid capabilities: Only Windows Server 2019


supports hybrid cloud, Storage Migration Service, and System
Insights. However, both OSes support Storage Replica. Features
related to better security: Only Windows Server 2019 supports
shielded VMs for Windows Server and Linux, whereas both OSes
support Microsoft Defender Advanced Threat Protection (ATP),
Device Guard, and Credential Guard. Features related to
optimization of performance: Only Windows Server 2019 supports
Linux containers and the Kubernetes platform, whereas both OSes
support Windows Server containers including Docker.
 Features related to infrastructure management: Only Windows
Server 2019 supports cluster-wide monitoring and deduplication for
Resilient File System (ReFS), whereas both OSes support storage
health monitoring and VM Storage Resiliency.

Question3: What is the Windows Registry and what does it do?

Answer:

All Windows operating systems stores their setting information in a


database. This database is called the “Windows Registry”. The Windows
Registry contains profiles with configuration options for each user account
on your Windows computer or device, to separate settings between users.

Question 4: What is Active Directory?

Answer:

Active Directory allows administrators to control policies for instance


rights and settings, in an organization's network. Active Directory stores
settings related to an object centrally in a database.

Question 5: What is A Domain name?

Answer:

The Internet is a giant network of computers connected to each other


through a network globally. Each computer on this network can
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

communicate with other computers. To identify them, each computer is


assigned an IP address. It is a series of numbers that identify a computer
on the internet. Now an IP address like this is quite difficult to remember.
Imagine if you had to use such numbers to visit again your favorite
websites. So, the domain name is invented to solve this problem.

A domain controller allows system administrators to grant or deny users


access to system resources, such as printers, documents, folders,
network locations, etc., via a single username and password.

Question 6. What is Group Policy?

Answer:

Group Policy allows you to implement specific configurations for users and
computers.

You can perform remotely and on any number of computers.

Question 7: What is GPO (Group Policy Objects)?

Answer:

A Group Policy Object (GPO) is a collection of settings that control the


working environment of user accounts and computer accounts. GPOs
define registry-based policies, security options, software installation and
maintenance options, script options, and folder redirection options.

There are two kinds of Group Policy objects:

 Local Group Policy objects are stored on individual computers.


 Nonlocal Group Policy objects, which are stored on a domain
controller, are available only in an Active Directory environment.

Question 8: Where is the AD Database Stored?

Answer:

The AD database is stored in C:WindowsNTDSNTDS.DIT.

Question 9: What is the Sysvol Folder?

Answer:

It is a shared folder that stores the group policies info along with login
scripts.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

The default location is C:\Windows\SYSVOL but it can be changed during


installation.

Question 10: What is Garbage Collection?

Answer:

It runs every 12 hours; Garbage collection is the online defragmentation


of the Active Directory.

Question11: What is the purpose of WDS?

Answer:

Windows Deployment Services is a server role to deploy Windows OS


remotely. WDS is mainly used for network-based OS installations to set
up new computers.

Question 12: What are the windows default ports used for Email?

Answer:

The main email ports are:

POP3 – port 110

IMAP – port 143

SMTP – port 25

HTTP – port 80

Secure SMTP (SSMTP) – port 465

Secure IMAP (IMAP4-SSL) – port 585

IMAP4 over SSL (IMAPS) – port 993

Secure POP3 (SSL-POP) – port 995

Question 13: Why do we use DHCP?

Answer:

DHCP stands for Dynamic Host Configuration Protocol is a network


management protocol used to automate the process of configuring
devices/servers on IP networks, thus permitting them to use network
services such as DNS and NTP.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

However, few services or applications for example licenses can be bound


to IP address so in this case, we must use the static IP address instead.

DHCP also plays a prominent role in cloud computing, especially for IP


allocation.

Question 14: What are Lingering Objects and how we can remove them?

Answer:

A lingering object is a deleted AD object that re-appears “lingers” on the


restored domain controller in its local copy of Active Directory. This can
happen if, after the backup was made, the object was deleted on another
DC more than 180 days ago.

Windows Server 2003 and 2008 have the ability to manually remove
lingering objects by using utility command “ REPADMIN.EXE”.

Question 16: Why Should You Not Restore A DC that was Backed Up 6
Months Ago?

Answer:

When restoring a backup file, Active Directory generally requires that the
backup file be no more than 180 days old. If you attempt to restore a
backup that is expired, you may face problems due to lingering objects.

Question 17: How Do You Backup Ad?

Answer:

Backing up is essential to maintain and running seamless production.

Windows Server 2003: You can backup Active Directory by using the
NTBACKUP tool that comes built-in with Windows Server 2003 or uses any
3rd-party tool that supports this feature.

Windows Server 2008: In Server 2008, there isn’t an option to backup


the System State data through the normal backup utility. We need to use
the command line to backup Active Directory.

1. Click Start, typing “cmd” and then hit Enter.


2. In your command prompt, type “wbadmin start systemstatebackup
-backuptarget:e:” and press Enter.
3. Input “y” and press Enter to start the backup process.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

When the backup process has finished you should get a message that the
backup completed successfully. If it did not complete properly you will
need to troubleshoot.

Question 18: What kind of servers and systems you have been working as
an Admin.

Answer:

Name here all the servers and services you currently manging in your
current role.

On server’s hardware side you can name HP Proliant DL/BL etc.

Question 19: What is the difference between NTFS & FAT?

Answer:

NTFS stands for the New Technology File System which is used as the
primary file system of Windows for its system drive and, by default, for
most non-removable drives.

Fat32 stands for File Allocation Table. It is a universal file system,


meaning it is accepted by any operating system. This file system is
usually pre-installed on any USB drive you buy from the store. The
biggest limitation of the Fat32 file system is that it has a file size limit of
4GB, which can be a problem for high-size files.

Question 25: What is a loop back?

Answer:

Loopback address is 127.0.0.1, An address that sends outgoing signals


back to the same server for testing.

It is very useful for network troubleshooting.

Question 27: What is a proxy server?

Answer:

A proxy server is a computer that acts as a gateway between a local


network and outside world network. It is used as a line of defense. Proxy
servers provide increased performance and security.

Question 28. What is APIPA?


Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Answer:

APIPA Stands for Automatic Private IP Addressing. APIPA is a DHCP


mechanism of failover for local networks. APIPA exists in all modern
versions of Windows except Windows NT. When a DHCP server fails,
APIPA allocates IP addresses in the private range 169.254.XX.X to
169.254.255.254.

Question 29. What is the WINS Server?

Answer:

Windows Internet Name Service (WINS) servers dynamically map IP


addresses to computer names. This allows users to access resources by
computer name instead of by IP address. If you want this computer to
keep track of the names and IP addresses of other computers in your
network, configure this computer as a WINS server.

If you do not use WINS in such a network, you cannot connect to a


remote network resource by using its NetBIOS name.

Question 30: What is the Windows Registry?

Answer:

The Windows Registry usually referred to as "the registry," is a collection


of databases of configuration settings in Microsoft Windows operating
systems.

Question 31: What are Microsoft security patches?

Answer:

Microsoft security patches are aimed to solve certain security loopholes,


while at the same time upgrading any existing security features. This
would provide better protection by reducing vulnerabilities in the security
of the operating system.

Question 32: How often should you check for Microsoft Updates?

Answer:

I try to do as often as possible and I love to enable the auto-update


feature of the Microsoft operating system that would allow regular
monitoring from the Microsoft site for available updates.

Question 33: How does Microsoft classify security threats to its software?
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Answer:

Microsoft classifies such threats into 4 indicators:

 Low
 Moderate
 Important
 Critical

These indicators are available as references under the Microsoft bulletin.

Question 34: What is a Hotfix?

Answer:

The hotfix is files that are distributed by Microsoft Customer Service and
are intended to address issues such as bugs and errors within existing
software.

Question 35: What are the DLLs?

Answer:

DLL is short for Dynamic Link Library. These are shared library files that
contain usable codes and routines that other applications can utilize to
create other new applications.

Question 36: What File system is supported by Windows XP?

Answer:

Windows XP supports four major file systems:

 FAT12,
 FAT16,
 FAT32

Windows XP can be installed on these file systems. The use of NTFS is


preferred when using a larger hard drive space.

Question 37: What is the purpose of a Service Pack?

Answer:

A service pack is a collection of updates and fixes, called patches, for an


operating system or a software program. Many of these patches are often
released before a larger service pack, but the service pack allows for an
easy, single installation.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Question 38: What is COM?

Answer:

COM is short for the Component Object Model. It is a Microsoft technology


that allows us to make use of reusable components and services provided
by Microsoft. COM technology includes COM+, DCOM, and ActiveX.

Question 39: What is the advantage of NTFS over FAT and FAT32?

NTFS was built for better performance, especially when it comes to


managing the way files are stored. It supports encryption, compression
and enhanced metadata support. As a result, NTFS is more robust, safe
and has better utilization of hard drive space.

1) What does Active Directory mean?


Ans: The active Directory means a service that identifies and handles
resources, making them visible for different groups or members that are
authorized. It has the role of an object store. The Active directory sees as
objects workstations, people, servers devices or documents and they all
have their own characteristics and access control list or ACL.

2) What is the meaning of Global Catalog?


Ans: A Global Catalog is something that each domain has, and it is used
for authenticating the user on the network, on windows 2000 network
logon’s were protected from failures by assigning a Global Catalog to
every site.

3) What is the use for DHCP?


Ans: DHCP is used for the DHCP servers, personal computers can get
their configuration from a DHCP server on an IP configuration. The server
knows nothing about the personal computers until they make a request for
information. Usually the most common information sent is IP address and
DHCP is used to make a large network administration easier.

4) What does a Super Scope do in DHCP?


Ans: The Super Scope gives the DHCP server the possibility to have
leases to multiple clients on the same physical network. The leases come
from multiple scopes. All scopes must be defined using DHCP manager
before the Super Scope creation and they are named member scopes. The
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

DHCP problems can be resolved by the Super Scope in different ways like
the following:
a) on a physical network like a LAN network where multiple logical IP
networks exist Super Scope is very useful here. These types of networks
are also named multinets.
b) there is also need for a Super Scope when the address pool for the
current scope becomes empty and there is a need for new computers on the
physical network.
c) when clients have to move on another scope.
d) when DHCP clients from the other side of the relay agents (BOOTP) or
the network has many logical subnets.
e) when standard networks are limited to leasing addresses for the clients.

5) How can we switch the roles in an Active Directory?


Ans: Switching or transferring roles in an Active Directory can be made
with the use of Ntdsutil.exe.

6) What is the purpose of a Stub zone DNS?


Ans: The copy of a zone that has only the needed resources for finding the
authoritative DNS servers in that specific zone (DNS= Domain Name
Servers) is called a Stub zone. It also resolves names for DNS namespaces,
thing required when names must be resolved from two different DNS
namespaces. The Stub zone contains: the master server’s IP that is used for
updating the Stub zone and the SOA (Start of Authority), the NS (name
server) and the glue A delegated zone records.

7) What main file is used for Active Directory backup and how it is
made?
Ans: Active Directory backup is made using NTbackup utility. The
backup is made once with the system state and they are restored also
together because they depend on each other. The system state has different
components like:
a) The registry
b) Boot files or startup files (files required by the operating system to
start).
c) The component services
d) The system volume or the SYSVOL folder this is a folder that
contains files that are shared on a domain.
e) The Active Directory

8) Does a windows administrator have to be critical?


Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Ans: Yes and I can explain how. A system administrator is responsible for
an entire network which means he/she must take care of multiple things in
the same time which is not an easy task. In order to achieve this, an
administrator must have high organization skills and a high technical
knowledge and he/she must prevent the problems from happening so that
he/she won’t have to be forced to fix them.

9)In what way is forward lookup zone different from the reverse
lookup zone in NDS?
Ans: There is one difference between these two: the forward lookup
means name to IP and reverse lookup means IP to name.

10) As a system administrator can you make backup and recovery of


data?
Ans: This is a responsibility that any system administrator must have
assume as a basic skill. Of course there are many types of backup that can
be made but all must be known for a successful career.

11) What is the meaning of DHCP and what is the port used by it to
work?
Ans: DHCP or Dynamic Host Configuration Protocol has the ability to
assign an IP automatically, this is done in fact by the server and has a
number range. When the system starts an IP is assigned automatically. The
DHCP server has port number 68, while the client has 67.

12) Can you ensure an updated system all the time and perform
market research?
Ans: Staying up-to-date is another strong point of a professional
administrator, technology evolves and we must keep up with the flow,
otherwise we can’t do our job in a professional way. Market research is the
key to an up-to –date work.

13) Is it possible for a computer to be able to browse the internet


without having a default gateway?
Ans: Yes it is as long as we use a public IP address. The gateway is
required as a router or firewall when using an intranet address.

14) What are the advantages or disadvantages of using DHCP?


Ans: The advantage is that the DHCP server configures all IP’s
automatically and the disadvantage is that when you receive a new IP
address the machine name remains the same because of its association
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

with the IP. It’s not a real problem but when somebody tries to access the
machine by its name it become one.

15) Are you familiar with monitoring?


Ans: Yes, monitoring is a base activity of a system administrator, he/she
manages all the access rights and the server space, security of the user
accounts is one of the most important things here. Also an administrator
must make sure that the user’s activity doesn’t affect in any way the
integrity of the server.

16) How can we create a SRV record in DNS?


Ans: To do this we must open the DNS then we must select the abc.local
domain the right click and we must go to Other New Records and the SRV
( choose location).

17) In how much time are the security changes applied on the domain
controllers?
Ans: Including policies for personal and public lockout, the changes apply
immediately. The changes also include passwords and LSA or Local
Security Authority.

18) What do you do if a an end user states that a file is gone?


Ans: Files are deleted constantly by end users but the backup can restore
them. Anyhow before using the backup we must check if the user didn’t
move the file by mistake in another place.

19) Where is the storage place of the environmental settings and


documents from the roaming profile?
Ans: These documents and settings are deposited locally until the user’s
log off, when they are moved into the shared folder from the server so the
log on at a fresh system may take a while because of this.

20) What are the classes that we can find in the Active Directory of
Windows Server 2003?
Ans: We can find:
a) the abstract class which can be made to look like a template and create
other templates, no matter if they are abstract, auxiliary or structural.
b) the structural class is the important type of class that is made from
multiple abstract classes or an existing structural class. They are the only
ones that can make Active Directory objects.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

c) the auxiliary class is used as a replace for many attributes of a


structural class, it is a list of attributes.
d) The 88 class is used for objects classes that were defined before 1993
and it is not a common class, it doesn’t use abstract, structural or auxiliary
classes.

21) When is a good time for creating a forest?


Ans: Certain companies that have different bases require different trees
and separate namespaces. And unique names sometimes give birth to
different identities of DNS. Also companies are sometimes acquired and
get under other influences but the continuity must be preserved for the
names.

22) Can you explain to us about you experience in the past regarding
windows administration?
Ans: I have ten years of experience in this field, I was passionate about
computers since childhood and I installed many operating systems at home
and inside organizations including these versions of windows: 95, 98, 98
SE, NT, Millenium, 2000, 2003 Server, XP, Seven, Vista. I also managed
these systems and performed maintenance, I worked with different
applications from the windows environment.

23) How can you handle a situation in which for instance if you have
an application that is not running on Windows 2003 because it’s
older?
Ans: In this situation the application has to be started in the compatibility
mode with a previously windows operating system. This is made by right
clicking the application icon and choosing another Windows from the
compatibility menu.

24) What is the meaning of Repadmin.exe from Windows Server


2008?
Ans: Repadmin.exe means Replication Diagnostics Tool and helps for the
diagnostic of domain controllers in the Windows system. This tool is used
by administrators to see the replication topology from the perspective of
every domain controller. The active Directory forest can also be
supervised by Repadmin.exe and replication problems can be tracked.

25) What difference can we find in the usage of CSVDE versus


LDIFDE?
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Ans: CSVDE and LDIFDE are both commands and are used for importing
and exporting objects but they are different in the way that CSVDE uses
the format CSV (Comma Separated Value) which is an Excel file for files
and LDIFDE uses LDIF (LDAP Data Interchange Format) file type which
can be viewed with a simple text editor. LDIFDE can be also used for
editing or deleting objects unlike CSVDE.

26) What big differences exist between these two operating systems:
Windows 2000 and Windows XP?
Ans: Windows 2000 has more capabilities than Windows XP especially
regarding features like DHCP, Terminal Services or DNS. It has all the
advantages for server usage. Windows 2000 is a little more professional
than XP, but they are both coming with different versions for every user
taste. While XP has Home version, Professional or Enterprise, Windows
2000 has Professional and Server editions. The Home version of XP
comes with minimal features because the target clients are beginners.

27) What are the things that make Unix different from Windows?
Ans: The code loading runtime of Unix is different from the one that
Windows has. We must become aware of how the system exactly works
before we make a dynamically loading module. Unix has the shared
objects with the .so extension that encapsulate lines of code that the
programs will use and the functions names. These function names become
the references of those functions in the memory of the program when the
file is combined with the program. In Windows the .dll file (dynamic-link
library file) doesn’t have references and the code of the files does not link
to the memory of the program but they get through a lookup table which
points to data or functions. Unix has just one type of library file, with the
.a extension and the code of many object file is contained within with the
.o extension. When the link is created for a shared object file the definition
of the identifier may not be found, so the object code from the library will
be included.

.What is the purpose of having AD?

Answer: Active directory is a directory service that identifies all resources on a network
and makes that information available to users and services. The Main purpose of AD
is to control and authenticate network resources.

Q.Explain about sysvol folder?


Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Answer: The sysvol folder stores the server's copy of the domain's public files. The
contents such as group policy, users, and groups of the sysvol folder are replicated to
all domain controllers in the domain. The sysvol folder must be located on an NTFS
volume.

Q.Differentiate between NTFS & FAT.

Answer: NTFS is the current file system used by Windows. It offers features like
security permissions (to limit other users' access to folders), quotas (so one user can't
fill up the disk), shadowing (backing up) and many other features that help Windows.
FAT32 is the older Microsoft filesystem, primarily used by the Windows 9X line and
Window could be installed on a FAT32 parition up to XP. In comparision, FAT32 offers
none of what was mentioned above, and also has a maximum FILE (not folder) size of
4GB, which is kind of small these days, especially in regards to HD video.

Q.Explain Functions of Active Directory?

Answer: AD enables centralization in a domain environment. The Main purpose of AD


is to control and authenticate network resources.

Q.What is the name of AD database?

Answer: AD database is NTDS.DIT

Q.What is loop back.

Answer: Loopback address is 127.0.0.1, An address that sends outgoing signals back
to the same computer for testing.

Q.What is Proxy Server.

Answer: A proxy server is a computer that acts as a gateway between a local network
(e.g., all the computers at one company or in one building) and a larger-scale network
such as the Internet. Proxy servers provide increased performance and security. In
some cases, they monitor employees' use of outside resources.

Q.Differentiate between FIREWALL/ANTIVIRUS.

Answer: Antivirus: The prime job of an anivirus is protect your system from computer
viruses. Your computer may be standalone or part of network or connected to Internet
you need an antivirus program. It actively monitors when you are using your system
for any virus threat from different sources. if it found one it tries to clean or quarantine
the virus ultimately keeping your system and data safe.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Firewall: Firewall is in other hand a program which protects your system from
outsider/intruder/hacker attacks. These attacks may not be virus type. In some cases
hackers can take control of your system remotely and steal your data or important
information from system. If your system is directly connected to internet or a large
network than you can install a software firewall in your PC to protect your self from
unauthorized access. Firewall is available either in software or in hardware form. For a
single PC you may need a software firewall while a large corporate implements
hardware firewall to protect all of their systems from such attacks.

Q.Differentiate between Frond end & Back End Server. Backend server?

Answer: A back end server is a computer resource that has not been exposed to the
internet. In this regard the computing resource does not directly interact with the
internet user. It can also be described as a server whose main function is to store and
retrieve email messages.

Frontend server: A frontend server is a computer resources that has exposed to the
internet.

Q.What is APIPA?

Answer: Stands for Automatic Private IP Addressing APIPA is a DHCP fail over
mechanism for local networks. With APIPA, DHCP clients can obtain IP addresses when
DHCP servers are non-functional. APIPA exists in all modern versions of Windows
except Windows NT. When a DHCP server fails, APIPA allocates IP addresses in the
private range 169.254.0.1 to 169.254.255.254.

Q.How Release and renew IP address from Command prompt.

Answer: Ipconfig / release ipconfig / renew

Q.What is wins server?

Answer: Windows Internet Name Service (WINS) servers dynamically map IP


addresses to computer names (NetBIOS names). This allows users to access resources
by computer name instead of by IP address. If you want this computer to keep track
of the names and IP addresses of other computers in your network, configure this
computer as a WINS server. If you do not use WINS in such a network, you cannot
connect to a remote network resource by using its NetBIOS name.

Q.What is the Windows Registry?

Answer: The Windows Registry, usually referred to as "the registry," is a collection of


databases of configuration settings in Microsoft Windows operating systems.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Q.System Volume Information (SVI) Folder?

Answer: Windows XP includes a folder named System Volume Information on the root
of each drive that remains hidden from view even when you choose to show system
files. It remains hidden because it is not a normally hidden folder you can say it is a
Super Hidden Folder. Windows does not shows Super Hidden Folders even when you
select "Show Hidden Files."

Q.What is MBR?

Answer: Short form Master Boot Record, a small program that is executed when a
computer boots up. Typically, the MBR resides on the first sector of the hard disk. The
program begins the boot process by looking up the partition table to determine which
partition to use for booting

Q.What is Bit Locker.

Answer: BitLocker is an encryption feature available in Ultimate and Enterprise


versions of Windows 7 and Vista, To encrypt an entire drive, simply right-click on the
drive and select Turn on BitLocker from the context menu.

Q.Difference b/w sata and IDE.

Answer: IDE and SATA are different types of interfaces to connect storage devices (like
hard drives) to a computer's system bus. SATA stands for Serial Advanced Technology
Attachment (or Serial ATA) and IDE is also called Parallel ATA or PATA. SATA is the
newer standard and SATA drives are faster than PATA (IDE) drives. For many years ATA
provided the most common and the least expensive interface for this application. But
by the beginning of 2007, SATA had largely replaced IDE in all new systems.

Q.Main Difference Between Windows server 2008 and 2012

Answer: 1).New Server Manager: Create, Manage Server Groups 2).Hyper-V


Replication : The Hyper-V Replica feature allows you to replicate a virtual machine from
one location to another with Hyper-V and a network connection—and Without any
shared storage required. This is a big deal in the Microsoft world for disaster recovery,
high availability and more. VMware does this, too, but the vendor charges new
licensees extra for the capability. 3) Expanded PowerShell Capabilities 4)IIS 8.0 and IIS
7 in 2008 5)Hyper-V 3.0 6)PowerShell 3.0

Get practical explanation on Windows Server at Windows Server Online Training

Q.How Long My Computer Has Been Running? Get to Know My Computer’s


Uptime.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Answer: Start Task manager,and select Performance tab . In performance tab we can
see system up time Method 2: By typinag systeminfo in command prompt we can find
out up time of your server In system boot time.

Q.Event viewer in Windows serverControl panel - Administrative tools - Computer


Management - event Viewer Three types events Error. Warning. Information.

Q.Manage Multiple, Remote Servers with Server Manager.

Answer: Server Manager is a management console in Windows Server® 2012 R2


Preview and Windows Server® 2012 that helps IT professionals provision and manage
both local and remote Windows-based servers from their desktops, without requiring
either physical access to servers, or the need to enable Remote Desktop protocol (RDP)
connections to each server. Although Server Manager is available in Windows Server
2008 R2 and Windows Server 2008, Server Manager was updated in Windows Server
2012, to support remote, multi-server management, and help increase the number of
servers an administrator can manage.

Q.What happens when we type URL in browser?

Answer: First the computer looks up the destination host. If it exists in local DNS cache,
it uses that information. Otherwise, DNS querying is performed until the IP address is
found. Then, your browser opens a TCP connection to the destination host and sends
the request according to HTTP 1.1 (or might use HTTP 1.0, but normal browsers don't
do it any more). The server looks up the required resource (if it exists) and responds
using HTTP protocol, sends the data to the client (=your browser) The browser then
uses HTML parser to re-create document structure which is later presented to you on
screen. If it finds references to external resources, such as pictures, css files, javascript
files, these are is delivered the same way as the HTML document itself.

Q.How DHCP work?

Answer: DHCP Stands for Dynamic host configuration protocol. DHCP is a protocol
used for automatic configuration IP address in client computers connected to IP
networks. DHCP operates on a client server model in four phases. Discover: A client
broadcasts DHCP Discover message when it comes alive on the network. Offer: When
a DHCP server receives the DHCP Discover message from the client, it reserves an I P
address for the client and sends a DHCP Offer message to the client offering the
reserved IP address. Request: The client receives the DHCP offer message and
broadcasts a DHCP request message to show its consent to accept the offered IP
address. Acknowledge: When the DHCP server receives the DHCP Request message
from the client, it sends a DHCP Ack packet to the client. At this point the IP
configuration process is complete.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Q.What is DHCP Scope?

Answer: A range of IP address that the DHCP server can assign to clients that are on
one subnet .

Q.What protocol and port does DHCP use ?

Answer: UDP protocol and 67 port in client and 68 port in server.

Q.What is a DHCP lease ?

Answer: A DHCP lease is the amount of time that the DHCP server grants to the DHCP
client permission to use a particular IP address. A typical server allows its administrator
to set the lease time.

Q.Can DHCP support statically defined addresses.

Answer: Yes.Q.Define Dora Process & why it is used.

Answer: Discover, Offer, request and acknowledgement. it is used to assign ip address


automatically to client systems.

Q.What is Authorizing DHCP Servers in Active Directory.Answer: If a DHCP server


is to operate within an Active Directory domain (and is not running on a domain
controller) it must first be authorized to Active directory. Windows Admin Interview
Questions Windows Admin Training

Q.How to Backup and Restore DHCP in Windows Server 2008

Answer: In Windows Server 2008, backup of DHCP database and settings has gotten
simpler. You may want to backup your DHCP server from time to time to prepare for
disaster recovery scenarios or when migrating DHCP server role to a new hardware.

Backup DHCP Server 1).Open Server Manager > DHCP role

2).Right click server name, choose Backup..

3).Choose a location for backup, click OK

Restore DHCP Server 1).Open Server Manager > DHCP role

2).Right Click server name, choose Restore

3).Choose the location of the backup, click OK


Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

4).Restart the DHCP Service DHCP Databse location: C:\WINDOWS\System32\DHCP


directory

Q.Define DNS .

Answer: Domain Name System, DNS is an Internet service that translates domain
names into IP addresses. Because domain names are alphabetic, they're easier to
remember. Two types of lookup in DNS. Forward lookup : it converts Domain name to
ip address. Reverse lookup: it converts ip address to Domain name. Three types of
zone. Primary zone secandary zone and stub zone.

Q.what is the port no of DNS.

Answer: UDP and port number - 53

Q.What is NSlookup.

Answer: Nslookup.exe is a command-line administrative tool for testing and


troubleshooting DNS servers. This tool is installed along with the TCP/IP protocol
through Control Panel. MS-DOS utility that enables a user to look up an IP address of
a domain or host on a network.

Q.What is LDAP? Why it is used.

Answer: LDAP is the Lightweight Directory Access Protocol. Its an active directory
protocal ,Basically, it's a protocol used to access data from a database

Q.What is Active Directory? Why it used?

Answer: Active Directory is a Directory Service created by Microsoft. It is included with


most Windows Server operating systems. Active Directory is primarily used to store
directory objects like users and groups and computers printers. Using Active Directory
brings a number of advantages to your network, Centralized user account
management Centralized policy management (group policy) Better security
management

Get practical explanation on Windows Server at Windows Server Online Courses

Q.What Is Group Policy.

Answer:Group Policy is a feature of the Microsoft Windows NT family of operating


systems that control the working environment of user accounts and computer
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

accounts. Group Policy provides the centralized management and configuration of


operating systems, applications, and users' settings in an Active Directory environment.

Q.What is the order in which GPOs are applied .

Answer: Local Group Policy object site , Domain and organizational units.

Q.What is the difference between software publishing andassigning.

Answer: Assign Users : The software application is advertised when the user logs on.
It is installed when the user clicks on the software application icon via the start menu,
or accesses a file that has been associated with the software application. Assign
Computers :The software application is advertised and installed when it is safe to do
so, s uch as when the computer is next restarted. Publish to users : The software
application does not appear on the start menu or desktop. This means the user may
not know that the software is available. The software application is made available via
the Add/Remove Programs option in control panel, or by clicking on a file that has
been associated with the application. Published applications do not reinstall
themselves in the event of accidental deletion, and it is not possible to publish to
computers.

Q.Can I deploy non-MSI software with GPO.

Answer: Create the file in .zap extension.

Get practical explanation at Windows Server Online Courses

Q.Name some GPO settings in the computer and user parts.Answer: Computer
Configuration, User ConfigurationNameQ.Name a few benefits of using
GPMC. Answer: Easy administration of all GPOs across the entire Active Directory
Forest View of all GPOs in one single list Backup and restore of GPOs Migration of
GPOs across different domains and forest.Q.How frequently is the client policy
refreshed ?Answer: 90 minutes give or take.Q.Where are group policies stored
?Answer: C:\Windows\System32\GroupPolicy.Q.How to Do Group policy
backup Answer: To backup a single GPO, right-click the GPO, and then click Back Up.
To backup all GPOs in the domain, right-click Group Policy Objects and click Back Up
All.Q.Define DSRM Mode?Directory Services Restore Mode (DSRM) is a special boot
mode for repairing or recovering Active Directory. It is used to log on to the computer
when Active Directory has failed or needs to be restored. To manually boot in Directory
Services Restore Mode, press the F8 key repeatedly. Do this immediately after BIOS
POST screen, before the Windows logo appears. (Timing can be tricky; if the Windows
logo appears you waited too long.) A text menu menu will appear. Use the up/down
arrow keys to select Directory Services Restore Mode or DS Restore Mode. Then press
the Enter key.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Q.Where is the AD database held? What other folders are related to AD?

Answer: The AD data base is stored in c:\windows\ntds\NTDS.DIT .

Q.How you ever Installed AD?

Answer: To Install Microsoft Active Directory: Ensure that you log on to the computer
with an administrator account to perform installation. Click electing Start
> Administration Tools >Server manager > Configure your Server. In the
Welcome page, click Next. In the Operating system compatibility panel, click Next. On
the Domain Controller Type panel, select Domain controller for a new domain and
click Next. On the Create New Domain panel, select Domain in a new forest and click
Next. On the New Domain Name panel, enter the DNS suffix for your new Active
Directory. This name will be used during Tivoli Provisioning Manager installation, so
make a note of it. Click Next. On the NetBIOS Domain Name panel, enter theNetBIOS
name of the domain. The first part of the DNS name is usually sufficient. Click Next.
On the Database and Logs panel, select the desired folders for the Database and
Logs.C:\Windows\NTDS is the default. Click Next. On the Shared System Volume
panel, enter a valid directory for the system volume.C:\Windows\Sysvol is the
default. Click Next to continue. If you configured DNS successfully, the Permissions
setting panel is displayed. Select Permissions compatible only with Windows 2000 or
Windows Server 2003. Click Next. On the Directory Services Restore Mode
Administrator Password panel, enter a valid password to be used when running the
Directory Services in Restore Mode. Click Next Verify the settings and Click Next to
begin the Active Directory configuration. The server will be rebooted as part of the
process.

Q.What is the use of SYSVOL folder? Answer: All active directory data base security
related information store in SYSVOL folder and it’s only created on NTFS partition.

Q.What is global catalog?Answer: The Global Catalog is a database that contains all
of the information pertaining to objects within all domains in the Active Directory
environment

Q.What is the difference between local, global and universal


groupsAnswer: Domain local groups assign access permissions to global domain
groups for local domain resources. Global groups provide access to resources in other
trusted domains. Universal groups grant access to resoures in all trusted domains.

Q.What is group nesting.Answer: Adding one group as a member of another group


is called 'group nesting'. This will help for easy administration and reduced replication
traffic
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Q.What is Domain control?Answer: A domain controller (DC) is a server that handles


all the security requests from other computers and servers within the Windows Server
domain there was a primary domain controller and a backup domain controller. The
primary DC focused on domain services only to avoid the possibility of a system slow
down or crash due to overtasking from managing other functionality and security
requests. In the event of a primary DC going down, a backup DC could be promoted
and become the primary DC to keep the rest of the server systems functioning correctly

Q.What is domain?Answer: A domain is a set of network resources (applications,


printers, and so forth) for a group of users. The user needs only to log in to the domain
to gain access to the resources, which may be located on a number of different servers
in the network. The ‘domain’ is simply your computer address not to confuse with an
URL. A domain address might look something like 211.170.469.

Q.What is Forest? Answer: collection of one or more Active Directory domains that
share a common schema, configuration, and global catalog.

Q.What is global catalog. Answer: The Active Directory Global Catalog is the central
storage of information about objects in an Active Directory forest. A Global Catalog is
created automatically on the first domain controller in the first domain in the forest.
The Domain Controller which is hosting the Global Catalog is known as a Global
catalog server.

Q.What is tree. Answer: An Active Directory tree is a collection of Active Directory


domains that begins at a single root and branches out into peripheral, child domains.
Domains in an Active Directory tree share the same namespace. An Active Directory
forest is a collection of Active Directory trees, similar to a real world forest. Catalog
Server.

Q.What is site.Answer: A Site object in Active Directory represents a geographic


location that hosts networks.

Q.Flexable Single Master Operation Roles (FSMO)Answer: The 5 FSMO server role

Schema Master Forest Level One per forest

Domain Naming
Forest Level One per forest
Master

PDC Emulator Domain Level One per domain


Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

RID Master Domain Level One per domain

Infrastructure Master Domain Level One per domain

Q.Cmmand to Add client to DomainAnswer: NETDOM /Domain:MYDOMAIN


/user:adminuser /password:apassword MEMBER MYCOMPUTER
/JOINDOMAINQ.Setting File Permissions on a Folder Using Group
Policy Answer: The setting is located under Computer Configuration, Windows
Settings, Security Settings, File System. Here's the procedure: Go to the location in the
Group Policy listed above. Right-click File System. Click Add File. In the "Add a file or
folder" window, select the folder (or file) for which you want the permissions to be set,
and click OK. In the security box that pops up, you can add a user or a group that
needs permission to the folder.

Q.Define virtualization.Answer: Hyper-V virtualization will provide an environment


in which we can run multiple operating systems at the same time on one physical
computer, by running each operating system in its own virtual machine.

Q.What are the benefits of virtualization ?Answer: Reduce the number of physical
servers Reduce the infrastructure needed for your data center

Q.What is a Hypervisor.Answer: You can think of a Hypervisor as the kernel or the


core of a virtualization platform. The Hypervisor is also called the Virtual Machine
Monitor. The Hypervisor has access to the physical host hardware.

Q.What are a host, guest, and virtual machine.Answer: A host system (host
operating system) would be the primary & first installed operating system. If you are
using a bare metal Virtualization platform like Hyper-V or ESX, there really isn’t a host
operating system besides the Hypervisor. If you are using a Type-2 Hypervisor like
VMware Server or Virtual Server, the host operating system is whatever operating
system those applications are installed into. A guest system (guest operating system)
is a virtual guest or virtual machine (VM) that is installed under the host operating
system. The guests are the VMs that you run in your virtualization platform. Some
admins also call the host & guest the parent and child.

Q.How to create Hyper v Snap shot?

Answer: Just select the Virtual machine in Hyper-V Manager and select Snapshot from
the Actions pane. The status of the virtual machine will change to “Taking Snapshot”
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

and show the progress of the action using a percentage value File extension =
.avhd Virtual Machine files The first thing to know is what files are used to create a
virtual machine: .XML files These files contain the virtual machine configuration details.
There is one of these for each virtual machine and each snapshot of a virtual machine.
They are always named with the GUID used to internally identify the virtual machine
or snapshot in question. .BIN files This file contains the memory of a virtual machine
or snapshot that is in a saved state. .VSV files This file contains the saved state from
the devices associated with the virtual machine. .VHD files These are the virtual hard
disk files for the virtual machine .AVHD files These are the differencing disk files used
for virtual machine snapshots

In simple words, it is a unique


number allocated to a file in
UNIX-like OS.
For storing same data at a
different place RAID or
Redundant Array of
Independent Disks strategy is
used. It is a strategy for
building fault tolerance and
increase the storage capacity.
On separate drives
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

it allows you to combine one or


more volumes so that they are
accessed by a single drive letter
A local DNS server provides the
local mapping of fully qualified
domain names to IP addresses.
To
resolve remote requests related
to the domains names on your
network, local DNS servers can
provide record information to
remote DNS servers.
used to renew the client’s IP
address if it is provided by a
DHCP server.
the network Ping command is
used
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Yes, you can connect other


vendors directory services with
Microsoft version. By using
dirXML or
LDAP to connect to other
directories.
AD database is saved in
%systemroot%/ntds. Files that
controls the AD structure are
For local users FAT (File
Allocation Table) and FAT32
provides security, while NTFS (
New Technology
File System) provides security
for domain users as well as
local users. NTFS provides file
level
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

security which is not possible


through FAT32.
WDE ( Windows Deployment
Services ) allows you to install
client and server operating
systems over
the network to any computer
with a PXE enabled network
interface

1) Explain what is Windows Server?

Ans:

Window server is a series of server operating system developed by Microsoft


Corporation.

2) Explain what does IntelliMirror do?

Ans:

IntelliMirror helps to reconcile desktop settings, applications and stored files for users
especially for those users who move between workstations or those who works offline
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

3) Explain how you can set up remote installation procedure without giving access to
user?

Ans:

To do that, you have to go to,

gponameà User Configuration à Windows Settings à Remote Installation Services à


Choice Options

4) Mention how many types of queries DNS does?

Ans:

The types of queries DNS does are

 Iterative Query
 Recursive Query

5) What information is required when TCP/IP is configured on Window Server?

Ans:

To configure a TCP/PI client for an IPv4 client, you have to provide the IP address and
the subnet mask.

6) Explain what does it mean caching only server in terms of DNS?

Ans:

The caching only DNS server provides information related to queries based on the
data it contains in its DNS cache.

7) Explain what is LDAP?

Ans:

To look up for the information from the server, e-mail and another program follows or
uses the internet protocol. This protocol is referred as LDAP or Lightweight Directory
Access Protocol.

8) Explain what is INODE?

Ans:

INODE holds the metadata of files; INODE is a pointer to a block on the disk, and it is
unique.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

In simple words, it is a unique number allocated to a file in UNIX-like OS.

9) To check TCP/IP configurations and IP connectivity, what are the two command
line utilities that can be used?

Ans:

Ipconfig: To check the computer’s IP configuration, command ipconfig can be used


and also it can be used to renew the client’s IP address if it is provided by a DHCP
server.

Ping: To check the connection between the local computer and any of the other
computer device on the network Ping command is used

10) Explain where is the AD database is held?

Ans:

AD database is saved in %systemroot%/ntds. Files that controls the AD structure are

 ntds.dit
 edb.log
 res1.log
 res2.log
 edn.chk

11) Mention what windows server 2008 service is used to install client operating
system over the network?

Ans:

WDE ( Windows Deployment Services ) allows you to install client and server operating
systems over the network to any computer with a PXE enabled network interface

12) What’s The Essence Of Application Partitions?

Ans:

The application partitions are a part of the Active Directory system and having said
so, they are directory partitions which are replicated to domain controllers. Usually,
domain controllers that are included in the process of directory partitions hold a replica
of that directory partition. The attributes and values of application partitions is that
you can replicate them to any specific domain controller in a forest, meaning that it
could lessen replication traffic. While the domain directory partitions transfer all their
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

data to all of the domains, the application partitions can focus on only one in the
domain area. This makes application partitions redundant and more available.

13) What Is Licensing Grace Period?

Ans:

To give some time for the deployment and realization of one Terminal Server license
server, the server will provide a licensing grace period. This license grace period is
acquired so that you don’t have to have a license server. This grace period will allow
you and the server to accept unlicensed clients without requiring further permission
from the licensed server. The period will automatically start when you receive your
first client and the licensing period will extend until you get a licensing server. That is
when a licensing period will end and the licensing server can accept new clients and
store their information in the server and this is called the CAL or the client’s access
license.

14) What Is An Rd Gateway?

Ans:

The RD gateway is a remote-desktop gateway. If gateway was the access point to the
internet, the remote-desktop gateway allows users from a private network to join it
through the RD-gateway, using the remote-desktop connection.

15) What Is Windows Server Backup?

Ans:

Windows Server Backup is a feature released for the Windows 2008 that provides a
number of solutions on backing up the data on your computer in case of a system
failure or any other issue. Windows Server Backup can backup a few files to a whole
server. The server backup is accessible through command lines and a management
console.

16) What Are Synthetic Drivers?

Ans:

Synthetic drives are different and better than the emulation ones in their functions.
They don’t imitate another program but, create another hardware complex device on
a virtual platform.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

17) What Is Direct Access?

Ans:

Direct Access enables users to access the websites, applications and internal network
file shares securely without the need to connect to a virtual private network (VPN).
An internal network is also called a private network or intranet. Every time a Direct
Access-enabled computer connects to the Internet, even if this happens before the
user logs on, Direct Access sets up bi-directional connectivity with an internal network.
Users do not have to think about connecting to the intranet. The remote computers
can be managed outside the office by the IT administrators, even when the computers
are not connected to the VPN.

18) What Is Dac?

Ans:

Microsoft Dynamic Access Control or DAC is a data governance tool in Windows Server
2012 that allows administrators control access settings. It uses centralized policies to
permit administrators to review who has access to individual files. Files can be
classified manually or automatically.

19) What are Pass Through Discs?

Ans:

A pass through disc is a physical disc used for storing virtual discs and it has a disc
format and file system.

20) What is Desktop Virtualization?

Ans:

Desktop virtualization is a logical procedure to isolate and extract the OS or system


from the client that is ready to access it. There are many types of desktop
virtualizations some of which include virtual machines while some do not. If the
operating system is locally controlled, users have to access their desktop through a
network relating to a remote display protocol. The processing of the desktop
virtualization is done in a data center. So, applications like tablets can join Host virtual
machine. This virtual machine can be accessed by an individual and can be
personalized the way he wants it. This is the most common and simplest way of
accessing and using a desktop virtualization.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Subscribe For Free Demo

SUBSCRIBE
21) What is Branch Cache?

Ans:

BranchCache™ is designed to improve application responsiveness and reduce WAN


link utilization so that the servers can be accessed from remote locations easily. The
remote computer uses cache of data that is maintained locally to reduce traffic over a
LAN link. The cache can be stored on a server in the branch (Hosted Cache mode) or
can be distributed across client computers (Distributed Cache mode).

22) Can we have more than one RID master in the domain?

Ans:

We cannot have more than one RID master per domain. By defau

lt primary is RID mastre where as if primary fails you can transfer FSMO roles to
another DC in the domain.

23) What is group type and group scope? Explain types group types?

Ans:

When we create group we are supposed to define type and scope for group. Type will
define wheathere group can be used to assign permissions on resources or not. We
can create a group of type security and distributed wherein security group can be used
to assign permission and distributed group used for listing purposes.

24) In which situations do we use authoritative and non authoritative restore?

Ans:

We do take backups to provision fault tolerance . There are two ways to restore active
directory backup- authoritative and non authoritative. When there is a hardware or
software failure we can restore the backup and let other DCs to replicate the restored
one. This is non authoritative backup. Which is a default one.

If some object gets deleted by mistake and the changes not yet propagated to all DCs
then we pick one DC where e can still find this object. Making this DC as authoritative
we can allow other DCs to be replicated from this DC.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

But here not whole directory is not restored instead the specific object can be made
authoritative.

25) What are lingering objects?

Ans:

Suppose if I delete some objects and the domain controller is offline, then it wont
receive any replication because of which the object still persist in offline DC . If server
is down for the period of tombstone lifetime then it will be termed as lingering object.

26) What is active directory defragmentation?

Ans:

Active directory database is stored in ntds.dit. In order to optimize data storage ,


active directory automatically performs defragmentation every 12 hrs. Which will allow
reclaiming space to store new objects.

27) What are related commands related to active directory replication ?

Ans:

Repadmin tool by microsoft used to check replication between domain controllers.

Repadmin /replsummary- To check current replication health and summary state for
DCs.

Repadmin /showrepl- will display the last replication for specific DC.

Repadmin /syncall- Forcefully initiating replication to sync with other DCs.(This can
cause a lot of traffic so run it carefully )

Repadmin /replicate – This command will immediately replicate directory partition


from source to destination.

28) What is ADSIEDIT ?

Ans:

It is a tool which provides access to active directory objects and its attributes. We can
manage using this tool.

29) What are superseded updates?

Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Microsoft sometimes provides a complete replacement for multiple updates called


superseded updates. You may need this update when you are installing new PC and
want to patch it with latest updates. WSUS does not by default decline superseded
updates. We need to make sure that superseded updates are no longer needed by
your machines and then you can decline them .

30) What are express updates?

Ans:

When you enable express updates it will only download the changes between current
month CU and previous updates. Using express update feature reduces bandwidth
while downloading updates.

Take Your Career to Next Level with MCSA Training By Domain


Experts
 Instructor-led Sessions

 Real-life Case Studies


 Assignments
Explore Curriculum
31) What are Cumulative updates?

Ans:

Cumulative updates includes previously released ( bundle of updates). If cumulative


updates is installed you won’t need to install previous updates (as they are now the
part of CU) .

32) What is USN ?

Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

USN is called as Update sequence Number. When we make changes to the object USN
increments and during AD replication higher version only will retain.

33) When do the non authoritative restore is done?

Ans:

It is default restore method. When there is a server crash, we can simply restore the
latest backup of server. When server comes up it gets replicated by other DCs and
gets sync.

34) What is blue screen error?

Ans:

Blue screen error will cause system to restart or shutdown unexpectedly. It will display
the blue screen with indication of some kernel module fault. I can be caused by wrong
device drivers, or malfunctioning of hardware components.

35) What is active directory federation service?

Ans:

It is single sign on service which provides authentication for the users who want to
access applications outside the forest. We use federation service when we want to
provide access to users from other organizations without the need to create their
account in our directory.

36) What is RAID?

Ans:

RAID is Redundant Array of Independent Disk. It is fault tolerance technique used to


provide redundancy which ultimately provide protection from data loss. We have
several RAID levels in through which we can achieve fault tolerance. There are two
types of RAID configuration – Hardware RAID , in which we need RAID card and it can
be configured with BIOS. where other is software RAID which RAID configuration can
be done which the help of operating system.

37) What is break mirror vs Remove Mirror option in RAID?

Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

If we want to stop mirroring on selected volume then we should say Break Mirror. It
will not erase data on volume. If you want to get extra space then simply use remove
mirror option as it will flush data on selected disk.

38) What is sysprep Tool?

Ans:

Sysprep Tool is used while capturing image of machine which will be deployed on
multiple machines without creating duplicate SIDs.

39) What is active directory?

Ans:

Active directory is a service available in windows server by using which we can create
domain. It allows the user accounts to be created on server in active directory
database. And it allows central management of users and devices in the domain.

40) What is tombstone object?

Ans:

When we delete any object from active directory , it still remain it database for 180
days and can be easily restored before getting deleted permanently.

41) What is difference between fsmo role transfer and seize role?

Ans:

When PDC fails, we perform seize role on ADC (forcefully transferring FSMO roles).
But if PDC is alive and we want to isolate server for some reason we can transfer
FSMO roles from PDC to ADC . This operation is performed on PDC .

42) What is certificate revocation means?

Ans:

Certificate Authority can Revoke (cancel) certificate before expiration so that they can
not be trusted any longer. The certification Revocation list can be published by
Certificate Authority.

43) I am having 8 GB pen drive and trying to copy win server 2012 R2 iso, but it is
showing error. What is the reason?

Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

The iso file is around 4GB and the space in pen drive is more but if the pen drive is
formatted with FAT then it won’t allow the file size more than 4 GB. So format it with
NTFS or else if there is some data which you don;t want to lose then just convert it to
NTFS using convert <drive name> /fs:ntfs command.

44) What are different files of HyperV?

Ans:

The HyperV Virtual Machine file formats are as follows:

VHD/VHDX- Virtual Hard disk file

BIN- HyperV machine saved state file. (Pre server 2016 HyperV)

AVHD/AVHDX- These are differencing disk format and created when


checkpoint(snapshot) is taken for VM.

VSV- is saved state file. (Available in win 2016 )

VMCX- Virtual Machine Configuration File. (Available in win 2016) It replaces XML file
used in pre server 2016 HyperV.

VMRS- VM runtime state file. This file replaces the pre- srever 2016 BIn and VSV files.

45) What is nano server?

Ans:

Nano server is smallest version of windows specially developed by Microsoft for cloud
applications and for containers.

46) What is HyperV shielding feature?

Ans:

HyperV shielding is feature which protects VMs from getting tampered by unauthorized
access. It used secure boot and Bitlocker features.

47) I have standard primary DNS zone for my abc.com domain configured on server
DC1 in Mumbai. For Ans: the same domain I am having another server DC2 at Pune
location on which DNS is installed. If both locations are connected by a WAN link and
I want to make sure that DNS should resolve and update even if the WAN link is down.
What can be done in this situation?

Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

When we use standard primary DNS , we need to manually configure secondary DNS
server which only can resolve DNS queries but wont update DNS database. But if we
use active directory integrated DNS it replicates on DC’s hence maintain redundancy
and also support write operations on any server. Hence in the given example We
should convert standalone DNS to AD integrated Zone.

48) What is role of OCSP in certificate Authority?

Ans:

Online certificate status protocol determines status of digital certificate without the
need of downloading certificate revocation list.

49) What is the location of the Active Directory database?

Ans:

The AD database is stored on domain controllers and can be accessed by network


applications. All domains can be domain controllers and have a copy of the AD
database.

50) What is a Global Catalog?

Ans:

The Global Catalog is distributed data which holds information about every little thing
in all the domain controllers in all the domains in Active Directory domain services.
Simply said, the global catalog is a domain controller which holds all the data from
Active Directory elements in one forest. The global catalog is usually located on the
domain controllers and every domain controller can be set up to maintain a function
of becoming a global catalog server. If you are searching, browsing through to the
global catalog your search would be faster and in general more broad, because you
don’t have to attach referrals for different domain controllers, rather just use the
catalog and it’s universal function will transfer you or find you the domain controller
right away.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Best MCSA Certification Course & Get Hired By TOP MNCs


Weekday / Weekend BatchesSee Batch Details
51) GPO – definition and meaning.

Ans:

GPO is short for Group Policy Objects, but before explaining group policy objects, first
we must focus on group policy in general. What is group policy? Well, group policy is
one hierarchically built infrastructure and this infrastructure is built in a way that an
administrator can access it from the Active directory system and change settings for
different users, configure also settings for the computers and so on. Using the group
policy, a network administrator can put limits or choose what you as a user or what a
computer can access and use on the network itself. This comes down even to files and
folders. If the network administrator wishes to have control of both the user’s web
browsing and set up the computer settings for when connecting to a network, it can
be done through the Group Policy Management Console and through this console he
can have control over all the objects – the Group Policy Objects (GPO).

52) What are the modifications made in Active Directory in Windows 2008?

Ans:

One of the first modifications made to Active Directory in Windows 2008 is renaming
the Active Directory to a different name, Active Directory Domain Service. Other then
the name, no other changes have been made in it’s specifications, settings and tools.
Then what is the purpose of Active Directory Domain Services? The “domain service”
part identifies the directory as a service which can provide authorization and policy
management control. It is called a service because the Active Directory could be
brought to a full stop and then re-activated. Using the active directory as a service
allows easier maintenance of the domain controllers.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

53) What is Active Directory’s recycle bin and what is it’s purpose?

Ans:

The Active Directory’s recycle bin is a modified tool that came in the Windows 2008
pack and is very user-friendly and a very helpful tool for restoring or even storing
items in the recycle bin. How does the directory’s recycle bin work you may ask? For
example, you may find yourself in a situation where you’ve accidentally deleted an
item that you now wish to restore. Even as a network administrator, grabbing the
objects from the Active Directory is a wonderful action that Windows 2008 released,
because mistakes are often made. This tool enhances the efficiency of the Active
Directory service by the several actions this tool provides, like the restoration of
objects, putting unneeded items in the recycle bin and using data space more
resourcefully and efficiently.

54) What is licensing’s grace period?

Ans:

To give some time for the deployment and realization of one Terminal Server license
server, the server will provide a licensing grace period. This license grace period is
acquired so that you don’t have to have a license server. This grace period will allow
you and the server to accept unlicensed clients without requiring further permission
from the licensed server. The period will automatically start when you receive your
first client and the licensing period will extend until you get a licensing server. That is
when a licensing period will end and the licensing server can accept new clients and
store their information in the server and this is called the CAL or the clients access
license.

55) What are the areas of virtualization?

Ans:

The five branches or major areas of virtualization are application, desktop (the one
mentioned above in question 9), storage, network and server. Giving a brief definition
for all of these terms will not only be better for an answer of this question, but also
will give out that you are actually involved in the technology. The application
virtualization in simple terms means controlling or running an application from a
remote desktop. The application is delivered and manipulated through application
streaming. Desktop virtualization is the involvement of the individual accessing a
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

desktop on a local network through a remote display protocol. This differs much from
the server virtualization (which are the big savings in the IT world). The server
virtualization is all about covering and hiding a physical part or a hardware part, so
that a server instance would function or appear as everything is stable when it really
isn’t. This saves up allot of hardware repair and costs as well as maintenance. The
network virtualization configures network resources and splits bandwith into individual
channels, while the storage virtualization concerns hardware parts by “pulling them
together” physically, only to fool the host-operating system that all the hardware parts
are well connected, complying with each other and responding well, to one another.

56) What is the function of a virtual disc?

Ans:

The virtual disc is some sort of a disk image. This disk image is created to work with
a guest-operating system which is running on top of your basic, standard system.
Using the virtual disc, means creating it so it can replace a physical disc or partition
that is there but cannot be recognized by the guest-operating system or is not there
at all. Wherever there’s a physical gap in between discs or in hardware parts, the
virtual disc can help and replace that part, so the guest-operating system can continue
to function without noticing the difference.

57) Explain emulation drivers.

Ans:

The emulation drivers are mainly devices that imitate another program. In simple
terms, emulation drivers are a trick to fool the device that it is some other sort of a
device.

58) What is an active directory?

Ans:

Active Directory is a consolidated and the condensed system that stores various
information about objects in a given network and avails the users to make use of this
information carried on to the network administrators and users.

59) Explain Domain Controller?

Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

The domain controller is a server system that incorporates the written copy that
belongs to Active Directory database in an Active Directory environmental settings.

60) Describe Global catalog server

Ans:

If a domain controller contains whole objects in the forest, then it is a global catalog
server.

Like every domain controllers, a global catalog server stores thorough and writable
copies of the schema and configuration directory separations and a full, writable copy
of the domain directory separation for the domain that it is hosting.

61) What is OU?

Ans:

Organizational Units (OU) are containers on a computer with the level of sophistication
as in an administrative setting. It supports administrators to organize set of users
together so that any alterations occur, security settings and any other administrative
works could be fulfilled more effectively.

62) What does Forest do?

Ans:

A Windows forest is, in general, a set of one or more reliable Windows trees. The trees
do not necessarily require an adjacent Domain Name System (DNS) names. A forest
allocates a work plan and global catalogue servers. A lone tree can also be named a
forest.

63) What is a Tree in MCSA?

Ans:

A Windows tree is a usually a set of one or more trusted Windows domains with
adjoining DNS domains. In this case, “Trusted” connotes the idea that a validated
account from one domain is not eliminated by another domain. “Contiguous DNS
domains” is simply that they all have the similar root DNS name.

64) Explain Site and Schema.

Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Site:

Sites are manually described associations of subnets. Objects in a site divide between
them the exact global catalogue servers and can have a customary set of group
planning applied to them.

Schema:

The schema describes the attributes, objects, classes, and rules that are available in
the Active Directory.

65) Why SID (Security Identifier)?

Ans:

The SID is a peculiar name (alphanumeric character string) that is used to figure out
an object, namely a user or a set of users.

66) What are GPO, GPC, and GPT?

Ans:

Group Policy objects (GPO):

A GPO is a collective Group Policy settings that are stored at the domain level as a
virtual object comprised of a Group Policy container (GPC) and a Group Policy template
(GPT).

Password history will store as follows:

Computer Configuration\Windows Settings\Security Settings\Account


Policies\Password Policy.

Group Policy Container (GPC)

The Group Policy container (GPC) is an Active Directory container that has included
GPO attributes, like version information, GPO status, and moreover a list of other
element settings.

Group Policy Template (GPT)

The Group Policy template (GPT) is a file system folder that contains policy data
mentioned by .adm files, script files, security settings, and information about
applications that are accessible for installation. The GPT is situated in the system
volume folder (SysVol) in the domain \Policies sub-folder.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

67) How to filter the Scope of a GPO?

Ans:

By default settings, GPO conditions all users and computers that are included in the
connected domain, site, and organizational unit. The administrator can additionally
point out the computers and users that are influenced by a GPO by using membership
in security groups.

Ever since the arrival of Windows 2000, the administrator can append both computers
and users to security groups. Then the administrator can mention which security pool
is affected by the GPO with the help of the Access Control List editor.

68) Explain Knowledge Consistency Checker (KCC).

Ans:

The Knowledge Consistency Checker (KCC) is a Windows element that instinctively


creates and manages the intra-site and inter-site copying topology.

69) What is Intra, Inter, and Active Directory replication?

Ans:

Intra-site Replication

The process of copying that takes place between controllers inside a single site. All of
the subnets within the site must be linked by high speed network cables.

Inter-site Replication

Inter-site replication is a process of copying between sites and should be set up by an


administrator. Simple Mail Transfer Protocol (SMTP) have to be used for replication
between these sites.

Active Directory Replication

Replication must usually happen both (intra-site) within sites and (Inter-site) between
sites to keep domain and forest data standardized and customized among domain
controllers that store the similar directory partitions.

70) What is USE?

Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

When Microsoft Exchange Server is positioned in an organization, Exchange Server


uses Active Directory as a data store and it stretches out the Windows 2000 Active
Directory schema to equip it to store objects peculiar to certain Exchange Server.

The ldapDisplayName of the attribute schema ms-Exch-Assistant-Name, ms-Exch-


LabeledURI, and ms-Exch-House-Identifier described by Exchange Server contradicts
with the iNetOrgPerson schema that Active Directory uses in Windows Server 2003.
When Windows Server 2003 Service Pack 1 is located and placed, Adprep.exe will be
able to find out the existence of the schema conflict and hinders the updating of the
schema until the problem has been restored.
MCSA Sample Resumes! Download & Edit, Get Noticed by Top
Employers! DOWNLOAD

71) How GUID works?

Ans:

When a new domain user or group account is generated, Active Directory stores the
account’s SID in the Object-SID (objectSID) property of a User or Group object. It
also allocates the new object a universally unique identifier (GUID), which is a 128-
bit value that is distinctive not only in the endeavour but also across the globe. GUIDs
are specifically aligned to every object made by Active Directory, not just User and
Group objects. Each object’s GUID is stored in its Object-GUID (objectGUID) property.
Active Directory uses GUIDs internally to figure out objects.

72) What is the full form of MCSA?

Ans:

MCSA is abbreviated as Microsoft Certified Solution Associate.

73) What is a Microsoft Certified Solution Associate (MCSA)?

Ans:

It is a certification program that is mainly designed and developed by Microsoft to


enhance your skills in various technologies. Previously this certification is abbreviated
as Microsoft Certified System Administrator.

74) What are the exams offered by the MCSA certification program?

Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

The following are the exams that are offered by the MCSA certification program, and
they are:

MCSA Windows Server 2012:

Configuring Advanced Windows Server 2012 services

Administration on Windows Server 2012

Installation of Windows Server 2012

MCSA Windows Server 2008:

Server Administrator

Network Infrastructure

Configuring MCSA Windows Server 2008, Active Directory

MCSA Windows 10:

Configuration of Window Devices

MCSA Windows 8:

Configuration of Windows 8.1

Supporting Windows 8.1

MCSA SQL Server:

Querying SQL Server 2012

Administrating Databases

Implementation of Datawarehouse with SQL Server 2012

MCSA Azure or Linux:

Implementation of Azure Infrastructure Solutions

System Administrator for Linux Foundation Certification

75) What is the primary objective of MCSA Windows Server 2012?

Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

To validate your expertise in Windows Server 2012 is the primary objective of MCSA
Windows Server 2012. This certification makes you excel your knowledge in computer
system administration and computer networks.

76) What does Windows Server 2008 provide?

Ans:

The MCSA Windows Server 2008 will provide you with a way to excel in your in-depth
knowledge of network infrastructure, Server administration, and active directory
configuration.

77) Define Active Directory?

Ans:

Active Directory is a directory service that is released and developed by Microsoft for
the Windows domain network. It is also present in many of the server operating
systems as a set of services and processes. Many of the organizations depend on
Active Directory to maintain proper order in arranging that is file servers, users,
computers, and many more. The functioning of the locator service is the exclusive
purpose of Active Directory.

78) What makes MCSA SQL Server more effective?

Ans:

Validates and evaluates your skills in the database and provides methods to develop
critical mission solutions to databases. By getting certified with this certification you
can able to build your career top MNCs as a database analyst and database developer.

79) What is Domain Controller?

Ans:

Domain controller is one of the most crucial servers designed by Microsoft. This is a
computer server that is responsible for responding to security authentication requests
within a Windows domain. It is also defined as a centerpiece of the Windows Active
Directory service. There are three roles in domain controllers, and they are:

Domain Controller

Operation Server
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

Global Catalog Server

80) Define Global Catalog Server?

Ans:

The distributed data storage that is stored in the domain controller is called the Global
Catalog Server. This allows applications and users to find objects in the domain of
active directory. Global Catalog Server is used to hold a replica of every object in the
directory with a small number of their attributes.

81) What is the importance of MCSA Windows Server 2016?

Ans:

It provides you with a way to master in various Windows Server 2016 skills that are
required to reduce costs and increase business value. An individual certified in
Windows Server 2016 will have a chance for the positions including computer network
specialist, computer network engineer, and network analyst.

82) What Is Passing Through Discs?

Ans:

A pass through disc is a physical disc used for storing virtual discs and it has a disc
format and file system.

83) What Is Application Partition?

Ans:

Application partitions are directory partitions that are replicated to domain controllers.
These are part of the Active Directory system. Domain controllers included in the
process of directory partitions have a replica of that partition. The values and
attributes of application partitions can lessen replication traffic. The application
partitions can focus only on one domain in the domain area unlike the domain directory
partitions. This makes them more available and redundant.

84) Explain what is the major difference between NTFS ( New Technology File System)
or FAT (File Allocation Table) on a local server?

Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882

For local users FAT (File Allocation Table) and FAT32 provides security, while NTFS (
New Technology File System) provides security for domain users as well as local users.
NTFS provides file level security which is not possible through FAT32.

85) Explain if it is possible to connect Active Directory to other 3rd party Directory
services?

Ans:

Yes, you can connect other vendors directory services with Microsoft version. By using
dirXML or LDAP to connect to other directories.

86) Explain what is SYSVOL folder?

Ans:

It is a set of files and folders that is stored on the local hard disk of each domain
controller in a domain and are replicated by the FRS ( File Replication Service). These
files contain group or user policy information.

87) What does it mean by “tattooing” the Registry ?

Ans:

“ Tattooing” the registry means user can modify and view user preference that are
not stored in the maintained portions of the Registry. Even if the group policy is
changed or removed, the user preference will still persist in the registry.

88) Define Forests, Trees, and Domains.

Ans:

A logical group of network objects for example computers, users, devices, etc which
share the same active directory database is known as a domain.

The collection of one or more domains is known as a tree. This may also include a
contiguous namespace linked in a transitive trust hierarchy

You might also like