Windows
Windows
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Primary Zone: In this, the file is saved as normal text file with filename
(.dns).
Secondary Zone: It maintains a read-only copy of zone database on
another DNS server. Also, it acts as a back-up server to the primary
server by providing fault tolerance and load balancing
Stub Zone: It consists of a copy of name server and SOA records which
is used for reducing the DNS search orders.
4) In the case when MSI file is not available, how you can install an app?
To add the application using the Software Installer.ZAP text file can be used
rather than the windows installer
“ Tattooing” the registry means user can modify and view user preference that
are not stored in the maintained portions of the Registry. Even if the group
policy is changed or removed, the user preference will still persist in the
registry.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Iterative Query
Recursive Query
To configure a TCP/PI client for an IPv4 client, you have to provide the IP
address and the subnet mask.
10) Explain what does it mean caching only server in terms of DNS?
The caching only DNS server provides information related to queries based on
the data it contains in its DNS cache.
11) Explain what is the way to configure the DHCP server such that it
allocates the same IP address to certain devices each time the address is
removed?
To configure the DHCP server, you can create a reservation for the device. To
create a reservation, you must know the MAC hardware address of the
device. To determine the MAC address for a network device you can use the
ipconfig or nbs tat command line utilities.
To look up for the information from the server, e-mail and another program
follows or uses the internet protocol. This protocol is referred as LDAP or
Lightweight Directory Access Protocol.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
It is a set of files and folders that is stored on the local hard disk of each
domain controller in a domain and are replicated by the FRS ( File Replication
Service). These files contain group or user policy information.
INODE holds the metadata of files; INODE is a pointer to a block on the disk,
and it is unique.
A local DNS server provides the local mapping of fully qualified domain names
to IP addresses. To resolve remote requests related to the domains names on
your network, local DNS servers can provide record information to remote
DNS servers.
18) To check TCP/IP configurations and IP connectivity, what are the two
command line utilities that can be used?
Ping: To check the connection between the local computer and any of the
other computer device on the network Ping command is used
ntds.dit
edb.log
res1.log
res2.log
edn.chk
21) Explain what is the major difference between NTFS ( New Technology
File System) or FAT (File Allocation Table) on a local server?
For local users FAT (File Allocation Table) and FAT32 provides security, while
NTFS ( New Technology File System) provides security for domain users as well
as local users. NTFS provides file level security which is not possible through
FAT32.
WDE ( Windows Deployment Services ) allows you to install client and server
operating systems over the network to any computer with a PXE enabled
network interface
Windows Server 2019 refers to the operating system used for bridging on-premises
environments with Azure services. This,
Firstly, has a storage Migration Service that helps in inventory and migrating
data, security, and configurations from legacy systems to Windows Server
2019.
Secondly, it has the capability to synchronize file servers to Azure. You can
collect an organization’s file shares in Azure Files while keeping the flexibility
and performance of an on-premises file server
Thirdly, it helps in bringing local predictive analytics capabilities native to
Windows Server. These predictive capabilities are backed by a machine
learning model which locally analyzes Windows Server system data for
providing high-accuracy predictions for reducing operational expenses.
It uses an Azure network adaptor for easily connecting to Azure virtual
networks.
Next, it provides cluster-wide monitoring, cluster sets for creating large
clusters, and Precision Time Protocol (PTP).
Lastly, it has VM protection that helps in repeating workloads running on VMs
from a primary location to a secondary.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
The role of the System Administrator depends on the type of organization they are
working in. However, they are responsible for installing, supporting, and maintaining
servers and computers. Their day to day tasks includes:
Firstly, installing patches & OS Updates and reviewing the system logs
access administration.
Secondly, providing permission access administration for users.
Thirdly, monitoring and planning for disaster recover
Then, building and Restoring system backups
After that, following the password requirements and accessing the control
Lastly, examining and performing the system audit logging
DNS stands for Domain Name System which refers to the phonebook of the Internet.
When users type domain names like ‘google.com’ into web browsers then, DNS finds
the correct IP address for those sites. After that, browsers use those addresses for
communicating with origin servers or CDN edge servers for accessing website
information.
9. Why it is important to deploy local DNS servers?
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
A local DNS server helps in providing the local mapping of domain names to IP
addresses. For resolving the remote requests related to the domain names on your
network, this also provides record details to remote DNS servers.
10. Define the following:
1. Domain
2. Tree
3. Forest
This refers to a collection of one or more domain trees sharing a familiar global catalog.
Moreover, this remains on top in the Active Directory structure.
11. What do you understand by Domain Controller?
Domain Controller refers to a server in windows based operating systems that provide
secure authentication of users, computers. However, this is the core of the database
for storing user’s account information and security enforcement. For example, using a
domain controller, the user gets permission to allow or deny access to a particular
folder in a particular domain.
12. Define Hyper-V.
Hyper-V refers to a virtualization tool provided by Microsoft. This is used for building
multiple virtual machines on a single physical server along with managing and
decreasing the cost of hardware and improving efficiency.
13. What is the role of LDAP?
LDAP stands for Lightweight Directory Access Protocol which is a directory service
similar to the database that is used for storing computers, users, objects, etc.
Moreover, it helps in adding, removing, and updating computer objects in the directory.
14. Define WDS.
WDS stands for Windows Deployment Services which is used in installing Windows
operating system(OS) remotely over the network. This is basically a server technology
from Microsoft that helps in the network-based installation of Windows operating
systems. This acts as a successor to Remote Installation Services.
15. What do you understand by WSUS?
WSUS stands for Windows Server Update Services (WSUS) which refers to a
computer program and network service developed by Microsoft. This helios the
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Replication refers to a method in the active directory that is used for keeping domain
controller syncs with other DC over the network.
18. Name the location of active directory databases operates.
The is include:
Firstly, NTDS.DIT
Secondly, Res1.log
Thirdly, Res2.log
Then, EDN.Chk
Lastly, EDB.Log
19. What do you understand by the non-authoritative and authoritative restore of an Active Directory (AD)?
For adding the application using the Software Installer, the dot ZAP text file can be
used rather than the windows installer.
21. What is tattooing in terms of Registry?
Tattooing in the registry can be defined as suggesting to the users that they can
change and view the preference of the customers that are not stored in the Registry
portions. Moreover, even if the group policy is removed or changed, the user
preference will still remain in the registry.
22. Name the DNS types of queries.
1. Computer Process
2. Thread
DHCP stands for Dynamic Host Configuration Protocol which is used for automatically
allocating the IP address across the network with a defined scope.
25. Name the types of FSMO roles?
Group Policy refers to a feature of Microsoft Windows NT which also belongs to the
family of OS. This helps in controlling the work setting of computer accounts and user
accounts. Further, it also provides the central configuration management of the
operating systems, user settings, and applications in an Active Directory setting.
27. Explain Group Policy Objects (GPO) and name its types.
GPO refers to the setting that manages the client records at the workplace, and also
at computer records. This helps in explaining the programming establishment, security
alternatives, upkeep choices and library-dependent arrangements, folder redirection
choices, and content choices. Further, there are two types of GPO:
Secondly, Non-local GPO. These can be accessed from the Active Directory
and are kept on a domain controller.
28. Is it possible to associate a third-party directory service to an Active Directory?
Yes, using the various versions of Microsoft. dirXML or LDAP it is possible to associate
third-party directory services to Active Directory.
29. Name the commands for checking TCP/IP configurations.
1. Ipconfig
This is for checking the IP setup of the computer. Moreover, you can also use it for
reestablishing the IP address of the users if it is defined by a DHCP server.
2. Ping
This is for checking the link between the computer in use and the other computers.
30. What is the role of IntelliMirror?
IntelliMirror helps in settling the settings of desktop, stored files, and applications for
users especially the one moving among workstations and who works offline.
31. Explain the basic functionality of the domain controller?
The domain controller is responsible for verifying the customer’s too many networks.
Moreover, it also brings a set of objects that are involved in the Active Directory.
32. Explaining the role of local DNS servers.
A local DNS server provides the local mapping of complete skillful domains to IP
addresses. They provide record data to remote DNS servers for resolving requests
concerning the domains on the network.
33. Define INODE.
The inode refers to a data structure in a Unix-style file system that explains a file-
system object like a file or a directory. Every inode can store the attributes and disk
block locations of the object’s data. However, the file-system object attributes may
include metadata including owner and permission data.
34. What do you understand by RAID in Windows Server?
RAID stands for Redundant Array of Independent Disks which is used for storing the
same data at a different place. This strategy helps in creating fault tolerance and
increase storage capacity. However, on different drives, it provides access to combine
one or more volumes for accessing it by a single drive letter
35. Define the term Global Catalog.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
The Global Catalog refers to a database that consists of all the data relating to objects
in Active Directory environment domains.
36. Explain the following:
These are for allocating access approvals to international groups of domains for local
resources of the domain.
2. Global groups
3. Universal groups
Yes, you can restore the objects from the domain and configuration partition.
38. Name the types of partitions in the active directory.
This is for storing all the data of Active Directory. The data here consists of site-link,
Site, subnet, etc. Further, the partition duplicates all domain controllers that are
available in the Forest.
40. Explain the difference between application and scheme partition.
This is for storing the domain information like a computer, user, printer, group, etc.
Further, it duplicates to all domain controllers in the domain.
42. Explaining the DHCP server configuring process for assigning the same IP address to define devices whenever there is a
change or removing of the address?
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
For configuring the DHCP server, you can build a reservation for the device. However,
for creating a reservation, you must know the MAC hardware address of the
device. Further, for discovering the MAC address for a network device you can use
the IP config command-line utilities.
43. What do you understand by the SYSVOL folder?
This refers to a set of files and folders placed on the local hard disk of each domain
controller in a domain. They are replicated by the File Replication Service with having
files containing group or user policy details.
44. What is a Windows DNS server?
The Windows DNS server means an area name framework used as a kind of
perspective table for coordinating the space names to various IP addresses.
45. Explain the various zones in the Windows DNS server.
Firstly, Primary Zone. In this, the record is provided as a text file with the
typical extension “.DNS”
Secondly, Secondary Zone. This is a support for the important server that
goes about load adjusting and provides for non-critical failure.
Lastly, Stub Zone. This consists of the name server and SOA records that
help in reducing the DNS seek orders.
Windows Server OS was released for server systems like Workstation, Rack,
Tower, etc. This is capable of multiple users who can log in and work
continuously. Further, this has the support of CPU(64), cores(320), and
RAM(24TB).
Windows OS was released for user systems like desktop, Laptop, Tablet,
Mobile, X-box, etc. In this, multiple user accounts can be created, but, only
one user can log in at a time. Further, this has the support of limited CPU(2),
core(256), and RAM(2TB).
47. Define Visio diagram.
This refers to a computer that acts as a gateway between a local network and a larger-
scale system such as the Internet. Further, this also provides increased security and
performance as well as helps in monitoring the employees using outside resources.
49. Define WINS server?
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
WINS stands for Windows Internet Name Service servers that are used for mapping
the IP addresses to NetBIOS names. This allows employers to access resources by
name of the computer rather than the IP address. Further, for keeping a check on the
IP addresses and names of other computers network, this computer can be configured
as a WINS server.
50. What is the Dora process?
DORA stands for Discover, request, Offer, and acknowledgment. However, it is used
for automatically assigning an IP address to the systems of the client.
51. What is the major advantage of GPMC?
Group Policy Management Console (GPMC) provides easy management of all GPOs
diagonally the whole Active Directory Forest View of GPOs in one list. This allows to
perform GPOs backup and restore, Immigration of GPOs over many forest and
domains.
52. Explaining the process to backup Group policy?
For backing up one single GPO, then click the GPO, and select Back Up.
Further, for backup of all GPOs in the domain, click Group Policy Objects and
then, click Back Up All.
53. Define group nesting.
This refers to the process of adding one group as an element of another group. It also
helps in easy management and decreasing traffic replication.
54. Explain the types of Domain control?
Schema refers to a master database containing all the information about the object in
Active Directory.
56. Define Trust Relationship.
The trust relationship is used for providing access between various domains or forests.
57. Define NTDS.DIT.
This refers to the Active Directory database which contains all the AD objects.
However, the default location is %system root%nrdsnrds.dit. Further, it depends on
the Jet database.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
This file is used for tracking the transactions on the database. However, when
EDB.Log is full then, it gets renamed to EDB Num.log where num can be a number
starting from 1 like EDB1.log
59. Define EDB.Che.
This file is for checking the data that is not yet written to a database. However, this file
has the starting point to the data that can be retrieved during failures.
60. What is Res in Res1.log and Res2.log.
Res here stands for reserved transaction file which is used for providing the
transaction log file enough time for shutting down if the disk runs out of space.
61. Explain the role of Flexible Single Master Operations?
The role of FSMOs is that it follows the Schema Master and Domain Naming Master.
These both are available only on each forest and also in the Infrastructure Master, RID
Master, and PDC.
62. What will you do if an HTTP monitor warns that a website is down, and you can telnet to the port?
Firstly, I will figure the problem with the monitor if the web page is up. The other issues
can be flapping, or system overload.
63. Define Windows server backup.
The Windows Server Backup was released for Windows 2008 that works as a recycle
bin tool in the Active Directory. This offers you a large variety of solutions for backing
up data on your system. Moreover, it provides access to a large amount of data backup
and in this, you can access the server backup using command lines and the
management console.
64. What is KCC?
KCC refers to a built-in process used for running on all domain controllers and creating
replication topology for the Active Directory forest. This builds separate replication
topologies based on whether replication is occurring within a site () or between sites.
Further, it has the capability for dynamically adjusting the topology to:
SID is a security identifier that refers to a unique value of variable length used for
identifying a security principle in Windows operating systems.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
o DHCP Server
o DNS Server
o FAX Server
o File and Storage Services
o Hyper-V
o Print and Document Services
o Network Policy and Access Services
o Remote Access
o Remote Desktop Services
o Volume Activation Services
o Web Server (IIS)
o Windows Deployment Services (WDS)
o Windows Server Update Services (WSUS)
4. Question 4. What Is Dns?
Answer :
Domain Naming System(DNS) resolves IP address to the hostname(domain) and
hostname(domain name) to IP address.
Networking Tutorial
It is utility tool in Windows Servers for the administrator for managing servers
roles(like adding or removing server roles.
Windows Server is a series of different server operating systems that have been developed by the Microsoft
Corporation. It has a set of a very powerful version of various desktop operating systems that help users to
efficiently handle numerous functions, which include control and handling of networking, databases, etc. As
Windows Server makes the functioning of companies and institutions easy, organizations are thus looking for
individuals with thorough knowledge and hands-on experience in this field.
Read below some of the commonly asked Windows Server Interview Questions in order to make your entire
process of the interview preparation easy. This set of Windows Server Interview Questions also contains
various features, pros, and cons of using Windows Server that can give you an upper hand in comparison to
other candidates running in the competition in between you and your dream job.
Windows server is used for Hosting websites, APIs and enterprise applications.
Windows server is a series of enterprise-class server operating systems which is designed for
end-users to share resources/ services with multiple users and provide extensive
administrative control of data storage, applications, and corporate networks.
Windows Server 2019 is the latest release of window server that uses the long-term servicing
channel or shortened LTSC.
Active Directory (AD) is an inventory organization that is used in a library to collect objects
like customer profiles, computers, etc. It manages the framework effectively with the help of
Domain Controllers that are accessible at different zones with the Active Directory database.
A segment of the limits fuse essential association with various land zones, check of
customers and computers in the space provided by windows, copying Active Directory from
any Domain Controller. In addition to which these lines will be reverted to each and every
other Domain Controllers.
A local DNS server provides the local mapping of fully qualified domain names to IP
addresses. To resolve remote requests related to the domains names on your network, local
DNS servers can provide record information to remote DNS servers.
DIT
Che
log and Res2.log
Log
Not all the Active Directory changes are created truly to the NTDS.DIT database archive.
They are first formed to EDB.Log and hence form the log record to the database. EDB.Che is
acclimated with the following changes to the database and it undergoes as an updated log
record to keep a check on the tasks are performed to the database.
NTDS.DIT: This is referred to as an Active Directory database that contains all the AD
dissents. The default zone is %system root%nrdsnrds.dit. This database relies upon the Jet
database.
EDB.Log: This record is to pursue the trades on any particular database, at the time EDB.Log
is full it is retitled to EDB Num.log, in which a “num” is a number beginning from 1 such as
EDB1.log.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
EDB.Che: This report is used to cross – verify the data that has not yet been kept in contact
with the database. This record has the beginning stage to the data that can be recovered in
the midst of disillusionment.
Res1.log; Res2.log: Res speaks to spared trade record, which gives the trade log archive
sufficient time to shut down in case the circle misses the mark on space.
6) List the locations where different active directory databases are held
The locations where the different active directory databases are held include:
NTDS.DIT
Res1.log
Res2.log
EDN.Chk
EDB.Log
7) Differentiate between File Allocation Table (FAT) and New Technology File System (NFTS)
The logical sections of any Active Directory organization are normally named as a tree,
forest, and domain. Diverse articles inside the arrangement of a logical section incorporate
the accompanying: computers, customers, devices, etc. that share a comparable dynamic
registry database, which is commonly acknowledged as a “domain”.
The mix of somewhere around one domain is called a “tree”. This may likewise contain an
abutting namespace associated in a transitive order. The gathering of domains is frequently
called a “forest” that shares overall inventory, logical structure, registry setup and registry
pattern. It also characterizes the security limits for clients, groups, and devices such as
computers.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Through non-authoritative restore, there are many chances that the domain controller can be
established back to its underlying state (the time when a backup was performed). When it is
set, it permits overwriting its underlying condition with the progressions that were carried out
preceding the underlying backup was achieved. Presently in order to upgrade the Active
Directory database, it is necessary that the particular domain controller from duplication
accomplices to guarantee that the AD is upgraded, precise and accurate to retrieve questions.
At whatever point there is any corruption or information loss in the AD, this technique is
utilized. The succeeding step after any particular non-authoritative restore is a definitive
authoritative process. The most important highlights of authoritative restore include that it
can augment the form quantities of the traits or an article in a whole directory. This sort of
restore is employed to reinstate a solitary erased client/object. In case of any disparity in the
variant numbers, the subsequent precaution and carefulness must be adhered to while
restoring and utilizing any authoritative restore procedures.
10) What do you understand by the term Group Policy Objects (GPO) and list the different
types of GPO
The setting that manages the workplace of client records, as well as computer records, are
known as Group Policy Object (GPO). This assistance is characterizing the security
alternatives, programming establishment, library-based arrangements and upkeep choices,
content choices and folder redirection choices. There are generally two types of Group Policy
Objects:
Nonlocal Group Policy objects: These are accessible just in an Active Directory condition and
are put away on a domain controller.
Local Group Policy Objects: These are put away on nearby computes.
Yes, it is possible to connect Active Directory to other third-party directory services with the
help of various Microsoft versions. LDAP or dirXML can be used to connect Active
Directory to other vendors.
12) In order to check TCP/IP configurations, list commands that have been frequently utilized
Ping: In order to check the connection between the computer in use as well as other
computers, the Ping command is utilized.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Ipconfig: In order to check the computer's IP setup, command Ipconfig can be utilized and
furthermore it can also be very well utilized to restore the user's IP address in the case it is
given by a DHCP server.
Application Partition: Application partitions stores various data related to applications in the
Active Directory. For instance – ForestDNSZones and DomainDNSZones
Configuration Partition: Configuration Partition stores all necessary data about the Active
Directory. The data incorporates Site, site-interface, subnet and so forth. This parcel likewise
replicates all domain controllers that are available in the Forest.
Domain Partitions: Domain Partitions stores the data of the domain that incorporates client,
group, computer, printer and so forth. This partition also replicates all domain controllers
that might be available in the domain just like Configuration Partition.
Schema Partition: Schema Partition stores every one of the details of the various items and
their respective properties. It additionally replicates other domain controllers that are
available in the Forest.
The function of the domain controller is to authenticate clients to various networks and
deliver a set of objects that are included in the Active Directory.
15) With respect to the Windows DNS server, explain Primary, Secondary and Stub Zones.
The Windows DNS server represents an area name framework, which is utilized as a kind of
perspective table to coordinate the space names to various IP addresses. Listed below are the
three important categories of zones characteristically used in Windows DNS server:
Primary Zone: Within the primary zone, the record is spared as a text file with the typical
extension being .DNS
Secondary Zone: This is a reinforcement for the essential server that goes about as load
adjusting and furthermore gives adaptation to non-critical failure. This is generally perused
just record which is set in another DNS server
Stub Zone: This comprises of the name server and SOA records that helps in lessening the
DNS seek orders
Windows
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Linux
Linux is the GPL-licensed operating system, you are free to modify that software and use and
even republish or sell it.
17) List some of the roles of flexible single master operations (FSMO) by the Windows
Server?
PDC
Infrastructure Master
RID Master
Schema Master
Domain Naming Master
Windows Server OS
It is mainly released for servers grade systems like Workstation, Rack, Tower, etc
Multiple users can log in and work simultaneously.
Supports more CPU(64), cores(320) and RAM(24TB)
Windows OS
It's mainly released for user grade systems like desktop, Laptop, Tablet, Mobile, X-box, Halo-
lens, etc
You can create multiple user accounts, but, only one user can log in at a time.
Support limited CPU(2), core(256) and RAM(2TB)
21) What do you understand by the term “tattooing” in context of the Registry?
"Tattooing" the registry implies that clients can adjust and see client preference that is not put
away in the maintained portions of the prescribed Registry. Regardless of whether the
assembly approach is changed or evacuated, the client's preference will at present endure in
the registry.
Visio is a diagramming software on Microsoft Windows that allows users to create floor
plans, flowcharts, infographics, network diagrams, organizations charts, mind maps, and
others. It is incorporated with Microsoft Office software, suite. Visio diagram is made
available for sale as a program or software that stands alone. It was initially launched in 1992
by Shapewear Corp. but known as Visio Corporation as of present. In the year 2000,
Microsoft acquired it. Visio diagram is sold primarily as a software one can easily download.
In the year 2017, an online version of the software was made available.
“Tattooing” the registry suggests that customers can change and view the
preference of the customers that are not placed away in the preserved prescribed
Registry portions. Irrespective of the assembly approach is evacuated or
changed, the preference of the client will currently be kept in the registry.
Computer Process
Thread
Infrastructure Master
Schema Master
PDC
RID Master
Domain Naming Master
The rational units of any organization of Active Directory are usually called
tree, domain, and forest. Various articles in the procedure of a rational section
join accompanying: customers, computers, devices, etc. that share an analogous
active database registry that is normally known as a “domain”.
A tree is an assortment of domains in the Active Directory that starts at one root
and branches out into child domains, peripheral. This might similarly comprise
an adjoining namespace linked in a transitive order.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
The domains collection is often known as “forest” that shares general logical
structure, inventory, registry pattern and registry setup. It typifies the limits of
security for groups, clients, and devices for example computers.
8. What is Group Policy Objects (GPO) and list different kinds of GPO?
The setting that controls the client records the workplace, and also computer
records, are called Group Policy Object (GPO). This help is describing the
programming establishment, security alternatives, upkeep choices and library-
based arrangements, folder redirection choices and content choices. There are
usually 2 categories of GPO:
Nonlocal GPO: These are available on Active Directory and are put away on a
domain controller.
Ipconfig: To check the IP setup of the computer, we can use the command
Ipconfig and additionally it can be very well applied to reestablish the IP
address of the users if it is specified by a DHCP server.
Ping: To check the link among the computer in use and the other computers, we
can use the Ping command.
12. How you can install an app MSI file when the is not available?
To install the application without using the MSI file, the Software Installer.
ZAP text file can be used in its place.
A local DNS server offers the local mapping of fully competent domains to IP
addresses. To resolve requests concerning the domains on network, local DNS
servers can offer record data to distant DNS servers.
It is the latest window server version that uses the shortened LTSC or long-term
servicing channel. Some of the most dominant features if the new windows
server 2019 are:
The file’s metadata are kept by INODE holds; INODE is said to be a unique
pointer to a disk block. You can also say that it is a unique number owed to a
file in UNIX-like Operating system.
For storing the same data at a different place RAID or Redundant Array of
Independent Disks strategy is used. It is a strategy for building fault tolerance
and increase storage capacity. On separate drives it allows you to combine one
or more volumes so that they are accessed by a single drive letter
The System Administrator role varies in the organization. The 2 key System
Admin tasks are Supporting, Installing and maintaining computers & servers.
The Global Catalog is a kind of database that comprises all of the data relating
to objects in Active Directory environment domains.
21. Explain the difference between local, universal and global groups?
Schema Partition–It stores all the information of the objects and their qualities;
it copies to other domain controllers in the Forest
rather than the IP address. To keep a check on the IP addresses and names of
other computers network, this computer can be configured as a WINS server.
We may not able to connect to a remote network through its NetBIOS name, in
case you are not using WINS in a network,
One of the major benefits of GPMC is its easy management of all GPOs
diagonally the whole Active Directory Forest View of GPOs in one list. We can
do the GPOs backup and restore, Immigration of GPOs across many forest and
domains.
1. For back up, one single GPO, right-click the GPO and then click Back
Up.
2. For backup, all GPOs in the domain, right-click Group Policy Objects
and click Back Up All.
A domain controller is a server that manages the security requests from other
servers and computers in the Windows Server domain. There are two kinds of
the domain controller that is a backup domain controller and a primary domain
controller. The primary domain controller emphasis on services of the domain
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
objects like user profiles, network information, computers. It helps to manage the
network effectively with the help of Domain Controllers which are present at
different locations with the Active Directory database. Some of the functions
any Domain Controller which in turn will be replicated to all other Domain
Controller’s.
Domain Naming Master, like Schema Mater this too is a forest-wide role
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Infrastructure Master
RID Master
PDC
DIT
Log
Che
All the Active Directory changes are not written directly to the NTDS.DIT
database file. They are first written to EDB.Log and thereon from the log file to the
database.
EDB.Che is used to tracking the updates to the database it acts as an update log file
Related Courses
JWS Java Web Services Training (4 Courses, 11 Projects)Java Training (40 Courses, 29 Projects, 4
Quizzes)
NTDS.DIT: This is the Active Directory database and contains all the AD
EDB.Che: This file is used to check for the data that is not yet written to a
database. This file has the starting point to the data can be recovered during
failures.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Res1.log and Res2.log: Res stands for reserved transaction file which provides
the transaction log file enough time to shut down if the disk runs out of
space.
Schema Partition–This partition stores all the details of the objects and their
the Forest
Configuration Partition– This partition stores all the information about the
Active Directory. The information includes Site, site-link, subnet etc. this
partition also replicates to all domain controllers which are present in the
Forest
Domain Partitions– This partition stores the information of the domain which
includes user, computer, group, printer etc. this partition also replicates to all
This is the frequently asked Windows Server Interview Questions. The settings
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
that control the working environment of user accounts and computer accounts are
known as Group Policy Object (GPO). This help is defining the security options,
Nonlocal Group Policy objects: These are available only in an Active Directory
Local Group Policy Objects: These are stored on local computers (individual
computers)
The logical divisions of an Active Directory network are known as forests, trees,
and domains.
A logical group of network objects for example computers, users, devices etc
The collection of one or more domains is known as a tree. This may also include a
The collection of domains is known as the forest which shares a common global
During non-authoritative restore, the domain controller is set back to its initial state
(the state at the time of backup was taken). Once it’s done it allows overwriting its
initial state with the changes that were done after the initial backup was taken.
Now for updating the Active Directory database, queries are fetched by the domain
controller from replication partners to ensure that the Active Directory is up to date
and accurate. Whenever there is data loss or corruption in the Active Directory this
One of the key features of authoritative restore is that it can increment the version
used to restore a single deleted user/object. There will be a mismatch in the version
numbers and hence care must be taken while restoring using authoritative restore
process
DNS stands for domain name system, which is used as a reference table to match
The below are the three types of zones in Windows DNS server:
Primary Zone: In the primary zone, the file is saved as a text file with
Secondary Zone: This is a backup for the primary server which acts as load
balancing and also provides fault tolerance. This is usually read-only file
Stub Zone: This consists of the name server and SOA records which help in
Compression No Yes
local server?
Answer:
Answer
Answer
Answer:
Answer:
Answer:
Answer:
Group Policy allows you to implement specific configurations for users and
computers.
Answer:
Answer:
Answer:
It is a shared folder that stores the group policies info along with login
scripts.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Answer:
Answer:
Question 12: What are the windows default ports used for Email?
Answer:
SMTP – port 25
HTTP – port 80
Answer:
Question 14: What are Lingering Objects and how we can remove them?
Answer:
Windows Server 2003 and 2008 have the ability to manually remove
lingering objects by using utility command “ REPADMIN.EXE”.
Question 16: Why Should You Not Restore A DC that was Backed Up 6
Months Ago?
Answer:
When restoring a backup file, Active Directory generally requires that the
backup file be no more than 180 days old. If you attempt to restore a
backup that is expired, you may face problems due to lingering objects.
Answer:
Windows Server 2003: You can backup Active Directory by using the
NTBACKUP tool that comes built-in with Windows Server 2003 or uses any
3rd-party tool that supports this feature.
When the backup process has finished you should get a message that the
backup completed successfully. If it did not complete properly you will
need to troubleshoot.
Question 18: What kind of servers and systems you have been working as
an Admin.
Answer:
Name here all the servers and services you currently manging in your
current role.
Answer:
NTFS stands for the New Technology File System which is used as the
primary file system of Windows for its system drive and, by default, for
most non-removable drives.
Answer:
Answer:
Answer:
Answer:
Answer:
Answer:
Question 32: How often should you check for Microsoft Updates?
Answer:
Question 33: How does Microsoft classify security threats to its software?
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Answer:
Low
Moderate
Important
Critical
Answer:
The hotfix is files that are distributed by Microsoft Customer Service and
are intended to address issues such as bugs and errors within existing
software.
Answer:
DLL is short for Dynamic Link Library. These are shared library files that
contain usable codes and routines that other applications can utilize to
create other new applications.
Answer:
FAT12,
FAT16,
FAT32
Answer:
Answer:
Question 39: What is the advantage of NTFS over FAT and FAT32?
DHCP problems can be resolved by the Super Scope in different ways like
the following:
a) on a physical network like a LAN network where multiple logical IP
networks exist Super Scope is very useful here. These types of networks
are also named multinets.
b) there is also need for a Super Scope when the address pool for the
current scope becomes empty and there is a need for new computers on the
physical network.
c) when clients have to move on another scope.
d) when DHCP clients from the other side of the relay agents (BOOTP) or
the network has many logical subnets.
e) when standard networks are limited to leasing addresses for the clients.
7) What main file is used for Active Directory backup and how it is
made?
Ans: Active Directory backup is made using NTbackup utility. The
backup is made once with the system state and they are restored also
together because they depend on each other. The system state has different
components like:
a) The registry
b) Boot files or startup files (files required by the operating system to
start).
c) The component services
d) The system volume or the SYSVOL folder this is a folder that
contains files that are shared on a domain.
e) The Active Directory
Ans: Yes and I can explain how. A system administrator is responsible for
an entire network which means he/she must take care of multiple things in
the same time which is not an easy task. In order to achieve this, an
administrator must have high organization skills and a high technical
knowledge and he/she must prevent the problems from happening so that
he/she won’t have to be forced to fix them.
9)In what way is forward lookup zone different from the reverse
lookup zone in NDS?
Ans: There is one difference between these two: the forward lookup
means name to IP and reverse lookup means IP to name.
11) What is the meaning of DHCP and what is the port used by it to
work?
Ans: DHCP or Dynamic Host Configuration Protocol has the ability to
assign an IP automatically, this is done in fact by the server and has a
number range. When the system starts an IP is assigned automatically. The
DHCP server has port number 68, while the client has 67.
12) Can you ensure an updated system all the time and perform
market research?
Ans: Staying up-to-date is another strong point of a professional
administrator, technology evolves and we must keep up with the flow,
otherwise we can’t do our job in a professional way. Market research is the
key to an up-to –date work.
with the IP. It’s not a real problem but when somebody tries to access the
machine by its name it become one.
17) In how much time are the security changes applied on the domain
controllers?
Ans: Including policies for personal and public lockout, the changes apply
immediately. The changes also include passwords and LSA or Local
Security Authority.
20) What are the classes that we can find in the Active Directory of
Windows Server 2003?
Ans: We can find:
a) the abstract class which can be made to look like a template and create
other templates, no matter if they are abstract, auxiliary or structural.
b) the structural class is the important type of class that is made from
multiple abstract classes or an existing structural class. They are the only
ones that can make Active Directory objects.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
22) Can you explain to us about you experience in the past regarding
windows administration?
Ans: I have ten years of experience in this field, I was passionate about
computers since childhood and I installed many operating systems at home
and inside organizations including these versions of windows: 95, 98, 98
SE, NT, Millenium, 2000, 2003 Server, XP, Seven, Vista. I also managed
these systems and performed maintenance, I worked with different
applications from the windows environment.
23) How can you handle a situation in which for instance if you have
an application that is not running on Windows 2003 because it’s
older?
Ans: In this situation the application has to be started in the compatibility
mode with a previously windows operating system. This is made by right
clicking the application icon and choosing another Windows from the
compatibility menu.
Ans: CSVDE and LDIFDE are both commands and are used for importing
and exporting objects but they are different in the way that CSVDE uses
the format CSV (Comma Separated Value) which is an Excel file for files
and LDIFDE uses LDIF (LDAP Data Interchange Format) file type which
can be viewed with a simple text editor. LDIFDE can be also used for
editing or deleting objects unlike CSVDE.
26) What big differences exist between these two operating systems:
Windows 2000 and Windows XP?
Ans: Windows 2000 has more capabilities than Windows XP especially
regarding features like DHCP, Terminal Services or DNS. It has all the
advantages for server usage. Windows 2000 is a little more professional
than XP, but they are both coming with different versions for every user
taste. While XP has Home version, Professional or Enterprise, Windows
2000 has Professional and Server editions. The Home version of XP
comes with minimal features because the target clients are beginners.
27) What are the things that make Unix different from Windows?
Ans: The code loading runtime of Unix is different from the one that
Windows has. We must become aware of how the system exactly works
before we make a dynamically loading module. Unix has the shared
objects with the .so extension that encapsulate lines of code that the
programs will use and the functions names. These function names become
the references of those functions in the memory of the program when the
file is combined with the program. In Windows the .dll file (dynamic-link
library file) doesn’t have references and the code of the files does not link
to the memory of the program but they get through a lookup table which
points to data or functions. Unix has just one type of library file, with the
.a extension and the code of many object file is contained within with the
.o extension. When the link is created for a shared object file the definition
of the identifier may not be found, so the object code from the library will
be included.
Answer: Active directory is a directory service that identifies all resources on a network
and makes that information available to users and services. The Main purpose of AD
is to control and authenticate network resources.
Answer: The sysvol folder stores the server's copy of the domain's public files. The
contents such as group policy, users, and groups of the sysvol folder are replicated to
all domain controllers in the domain. The sysvol folder must be located on an NTFS
volume.
Answer: NTFS is the current file system used by Windows. It offers features like
security permissions (to limit other users' access to folders), quotas (so one user can't
fill up the disk), shadowing (backing up) and many other features that help Windows.
FAT32 is the older Microsoft filesystem, primarily used by the Windows 9X line and
Window could be installed on a FAT32 parition up to XP. In comparision, FAT32 offers
none of what was mentioned above, and also has a maximum FILE (not folder) size of
4GB, which is kind of small these days, especially in regards to HD video.
Answer: Loopback address is 127.0.0.1, An address that sends outgoing signals back
to the same computer for testing.
Answer: A proxy server is a computer that acts as a gateway between a local network
(e.g., all the computers at one company or in one building) and a larger-scale network
such as the Internet. Proxy servers provide increased performance and security. In
some cases, they monitor employees' use of outside resources.
Answer: Antivirus: The prime job of an anivirus is protect your system from computer
viruses. Your computer may be standalone or part of network or connected to Internet
you need an antivirus program. It actively monitors when you are using your system
for any virus threat from different sources. if it found one it tries to clean or quarantine
the virus ultimately keeping your system and data safe.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Firewall: Firewall is in other hand a program which protects your system from
outsider/intruder/hacker attacks. These attacks may not be virus type. In some cases
hackers can take control of your system remotely and steal your data or important
information from system. If your system is directly connected to internet or a large
network than you can install a software firewall in your PC to protect your self from
unauthorized access. Firewall is available either in software or in hardware form. For a
single PC you may need a software firewall while a large corporate implements
hardware firewall to protect all of their systems from such attacks.
Q.Differentiate between Frond end & Back End Server. Backend server?
Answer: A back end server is a computer resource that has not been exposed to the
internet. In this regard the computing resource does not directly interact with the
internet user. It can also be described as a server whose main function is to store and
retrieve email messages.
Frontend server: A frontend server is a computer resources that has exposed to the
internet.
Q.What is APIPA?
Answer: Stands for Automatic Private IP Addressing APIPA is a DHCP fail over
mechanism for local networks. With APIPA, DHCP clients can obtain IP addresses when
DHCP servers are non-functional. APIPA exists in all modern versions of Windows
except Windows NT. When a DHCP server fails, APIPA allocates IP addresses in the
private range 169.254.0.1 to 169.254.255.254.
Answer: Windows XP includes a folder named System Volume Information on the root
of each drive that remains hidden from view even when you choose to show system
files. It remains hidden because it is not a normally hidden folder you can say it is a
Super Hidden Folder. Windows does not shows Super Hidden Folders even when you
select "Show Hidden Files."
Q.What is MBR?
Answer: Short form Master Boot Record, a small program that is executed when a
computer boots up. Typically, the MBR resides on the first sector of the hard disk. The
program begins the boot process by looking up the partition table to determine which
partition to use for booting
Answer: IDE and SATA are different types of interfaces to connect storage devices (like
hard drives) to a computer's system bus. SATA stands for Serial Advanced Technology
Attachment (or Serial ATA) and IDE is also called Parallel ATA or PATA. SATA is the
newer standard and SATA drives are faster than PATA (IDE) drives. For many years ATA
provided the most common and the least expensive interface for this application. But
by the beginning of 2007, SATA had largely replaced IDE in all new systems.
Answer: Start Task manager,and select Performance tab . In performance tab we can
see system up time Method 2: By typinag systeminfo in command prompt we can find
out up time of your server In system boot time.
Answer: First the computer looks up the destination host. If it exists in local DNS cache,
it uses that information. Otherwise, DNS querying is performed until the IP address is
found. Then, your browser opens a TCP connection to the destination host and sends
the request according to HTTP 1.1 (or might use HTTP 1.0, but normal browsers don't
do it any more). The server looks up the required resource (if it exists) and responds
using HTTP protocol, sends the data to the client (=your browser) The browser then
uses HTML parser to re-create document structure which is later presented to you on
screen. If it finds references to external resources, such as pictures, css files, javascript
files, these are is delivered the same way as the HTML document itself.
Answer: DHCP Stands for Dynamic host configuration protocol. DHCP is a protocol
used for automatic configuration IP address in client computers connected to IP
networks. DHCP operates on a client server model in four phases. Discover: A client
broadcasts DHCP Discover message when it comes alive on the network. Offer: When
a DHCP server receives the DHCP Discover message from the client, it reserves an I P
address for the client and sends a DHCP Offer message to the client offering the
reserved IP address. Request: The client receives the DHCP offer message and
broadcasts a DHCP request message to show its consent to accept the offered IP
address. Acknowledge: When the DHCP server receives the DHCP Request message
from the client, it sends a DHCP Ack packet to the client. At this point the IP
configuration process is complete.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Answer: A range of IP address that the DHCP server can assign to clients that are on
one subnet .
Answer: A DHCP lease is the amount of time that the DHCP server grants to the DHCP
client permission to use a particular IP address. A typical server allows its administrator
to set the lease time.
Answer: In Windows Server 2008, backup of DHCP database and settings has gotten
simpler. You may want to backup your DHCP server from time to time to prepare for
disaster recovery scenarios or when migrating DHCP server role to a new hardware.
Q.Define DNS .
Answer: Domain Name System, DNS is an Internet service that translates domain
names into IP addresses. Because domain names are alphabetic, they're easier to
remember. Two types of lookup in DNS. Forward lookup : it converts Domain name to
ip address. Reverse lookup: it converts ip address to Domain name. Three types of
zone. Primary zone secandary zone and stub zone.
Q.What is NSlookup.
Answer: LDAP is the Lightweight Directory Access Protocol. Its an active directory
protocal ,Basically, it's a protocol used to access data from a database
Answer: Local Group Policy object site , Domain and organizational units.
Answer: Assign Users : The software application is advertised when the user logs on.
It is installed when the user clicks on the software application icon via the start menu,
or accesses a file that has been associated with the software application. Assign
Computers :The software application is advertised and installed when it is safe to do
so, s uch as when the computer is next restarted. Publish to users : The software
application does not appear on the start menu or desktop. This means the user may
not know that the software is available. The software application is made available via
the Add/Remove Programs option in control panel, or by clicking on a file that has
been associated with the application. Published applications do not reinstall
themselves in the event of accidental deletion, and it is not possible to publish to
computers.
Q.Name some GPO settings in the computer and user parts.Answer: Computer
Configuration, User ConfigurationNameQ.Name a few benefits of using
GPMC. Answer: Easy administration of all GPOs across the entire Active Directory
Forest View of all GPOs in one single list Backup and restore of GPOs Migration of
GPOs across different domains and forest.Q.How frequently is the client policy
refreshed ?Answer: 90 minutes give or take.Q.Where are group policies stored
?Answer: C:\Windows\System32\GroupPolicy.Q.How to Do Group policy
backup Answer: To backup a single GPO, right-click the GPO, and then click Back Up.
To backup all GPOs in the domain, right-click Group Policy Objects and click Back Up
All.Q.Define DSRM Mode?Directory Services Restore Mode (DSRM) is a special boot
mode for repairing or recovering Active Directory. It is used to log on to the computer
when Active Directory has failed or needs to be restored. To manually boot in Directory
Services Restore Mode, press the F8 key repeatedly. Do this immediately after BIOS
POST screen, before the Windows logo appears. (Timing can be tricky; if the Windows
logo appears you waited too long.) A text menu menu will appear. Use the up/down
arrow keys to select Directory Services Restore Mode or DS Restore Mode. Then press
the Enter key.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Q.Where is the AD database held? What other folders are related to AD?
Answer: To Install Microsoft Active Directory: Ensure that you log on to the computer
with an administrator account to perform installation. Click electing Start
> Administration Tools >Server manager > Configure your Server. In the
Welcome page, click Next. In the Operating system compatibility panel, click Next. On
the Domain Controller Type panel, select Domain controller for a new domain and
click Next. On the Create New Domain panel, select Domain in a new forest and click
Next. On the New Domain Name panel, enter the DNS suffix for your new Active
Directory. This name will be used during Tivoli Provisioning Manager installation, so
make a note of it. Click Next. On the NetBIOS Domain Name panel, enter theNetBIOS
name of the domain. The first part of the DNS name is usually sufficient. Click Next.
On the Database and Logs panel, select the desired folders for the Database and
Logs.C:\Windows\NTDS is the default. Click Next. On the Shared System Volume
panel, enter a valid directory for the system volume.C:\Windows\Sysvol is the
default. Click Next to continue. If you configured DNS successfully, the Permissions
setting panel is displayed. Select Permissions compatible only with Windows 2000 or
Windows Server 2003. Click Next. On the Directory Services Restore Mode
Administrator Password panel, enter a valid password to be used when running the
Directory Services in Restore Mode. Click Next Verify the settings and Click Next to
begin the Active Directory configuration. The server will be rebooted as part of the
process.
Q.What is the use of SYSVOL folder? Answer: All active directory data base security
related information store in SYSVOL folder and it’s only created on NTFS partition.
Q.What is global catalog?Answer: The Global Catalog is a database that contains all
of the information pertaining to objects within all domains in the Active Directory
environment
Q.What is Forest? Answer: collection of one or more Active Directory domains that
share a common schema, configuration, and global catalog.
Q.What is global catalog. Answer: The Active Directory Global Catalog is the central
storage of information about objects in an Active Directory forest. A Global Catalog is
created automatically on the first domain controller in the first domain in the forest.
The Domain Controller which is hosting the Global Catalog is known as a Global
catalog server.
Q.Flexable Single Master Operation Roles (FSMO)Answer: The 5 FSMO server role
Domain Naming
Forest Level One per forest
Master
Q.What are the benefits of virtualization ?Answer: Reduce the number of physical
servers Reduce the infrastructure needed for your data center
Q.What are a host, guest, and virtual machine.Answer: A host system (host
operating system) would be the primary & first installed operating system. If you are
using a bare metal Virtualization platform like Hyper-V or ESX, there really isn’t a host
operating system besides the Hypervisor. If you are using a Type-2 Hypervisor like
VMware Server or Virtual Server, the host operating system is whatever operating
system those applications are installed into. A guest system (guest operating system)
is a virtual guest or virtual machine (VM) that is installed under the host operating
system. The guests are the VMs that you run in your virtualization platform. Some
admins also call the host & guest the parent and child.
Answer: Just select the Virtual machine in Hyper-V Manager and select Snapshot from
the Actions pane. The status of the virtual machine will change to “Taking Snapshot”
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
and show the progress of the action using a percentage value File extension =
.avhd Virtual Machine files The first thing to know is what files are used to create a
virtual machine: .XML files These files contain the virtual machine configuration details.
There is one of these for each virtual machine and each snapshot of a virtual machine.
They are always named with the GUID used to internally identify the virtual machine
or snapshot in question. .BIN files This file contains the memory of a virtual machine
or snapshot that is in a saved state. .VSV files This file contains the saved state from
the devices associated with the virtual machine. .VHD files These are the virtual hard
disk files for the virtual machine .AVHD files These are the differencing disk files used
for virtual machine snapshots
Ans:
Ans:
IntelliMirror helps to reconcile desktop settings, applications and stored files for users
especially for those users who move between workstations or those who works offline
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
3) Explain how you can set up remote installation procedure without giving access to
user?
Ans:
Ans:
Iterative Query
Recursive Query
Ans:
To configure a TCP/PI client for an IPv4 client, you have to provide the IP address and
the subnet mask.
Ans:
The caching only DNS server provides information related to queries based on the
data it contains in its DNS cache.
Ans:
To look up for the information from the server, e-mail and another program follows or
uses the internet protocol. This protocol is referred as LDAP or Lightweight Directory
Access Protocol.
Ans:
INODE holds the metadata of files; INODE is a pointer to a block on the disk, and it is
unique.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
9) To check TCP/IP configurations and IP connectivity, what are the two command
line utilities that can be used?
Ans:
Ping: To check the connection between the local computer and any of the other
computer device on the network Ping command is used
Ans:
ntds.dit
edb.log
res1.log
res2.log
edn.chk
11) Mention what windows server 2008 service is used to install client operating
system over the network?
Ans:
WDE ( Windows Deployment Services ) allows you to install client and server operating
systems over the network to any computer with a PXE enabled network interface
Ans:
The application partitions are a part of the Active Directory system and having said
so, they are directory partitions which are replicated to domain controllers. Usually,
domain controllers that are included in the process of directory partitions hold a replica
of that directory partition. The attributes and values of application partitions is that
you can replicate them to any specific domain controller in a forest, meaning that it
could lessen replication traffic. While the domain directory partitions transfer all their
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
data to all of the domains, the application partitions can focus on only one in the
domain area. This makes application partitions redundant and more available.
Ans:
To give some time for the deployment and realization of one Terminal Server license
server, the server will provide a licensing grace period. This license grace period is
acquired so that you don’t have to have a license server. This grace period will allow
you and the server to accept unlicensed clients without requiring further permission
from the licensed server. The period will automatically start when you receive your
first client and the licensing period will extend until you get a licensing server. That is
when a licensing period will end and the licensing server can accept new clients and
store their information in the server and this is called the CAL or the client’s access
license.
Ans:
The RD gateway is a remote-desktop gateway. If gateway was the access point to the
internet, the remote-desktop gateway allows users from a private network to join it
through the RD-gateway, using the remote-desktop connection.
Ans:
Windows Server Backup is a feature released for the Windows 2008 that provides a
number of solutions on backing up the data on your computer in case of a system
failure or any other issue. Windows Server Backup can backup a few files to a whole
server. The server backup is accessible through command lines and a management
console.
Ans:
Synthetic drives are different and better than the emulation ones in their functions.
They don’t imitate another program but, create another hardware complex device on
a virtual platform.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Ans:
Direct Access enables users to access the websites, applications and internal network
file shares securely without the need to connect to a virtual private network (VPN).
An internal network is also called a private network or intranet. Every time a Direct
Access-enabled computer connects to the Internet, even if this happens before the
user logs on, Direct Access sets up bi-directional connectivity with an internal network.
Users do not have to think about connecting to the intranet. The remote computers
can be managed outside the office by the IT administrators, even when the computers
are not connected to the VPN.
Ans:
Microsoft Dynamic Access Control or DAC is a data governance tool in Windows Server
2012 that allows administrators control access settings. It uses centralized policies to
permit administrators to review who has access to individual files. Files can be
classified manually or automatically.
Ans:
A pass through disc is a physical disc used for storing virtual discs and it has a disc
format and file system.
Ans:
SUBSCRIBE
21) What is Branch Cache?
Ans:
22) Can we have more than one RID master in the domain?
Ans:
We cannot have more than one RID master per domain. By defau
lt primary is RID mastre where as if primary fails you can transfer FSMO roles to
another DC in the domain.
23) What is group type and group scope? Explain types group types?
Ans:
When we create group we are supposed to define type and scope for group. Type will
define wheathere group can be used to assign permissions on resources or not. We
can create a group of type security and distributed wherein security group can be used
to assign permission and distributed group used for listing purposes.
Ans:
We do take backups to provision fault tolerance . There are two ways to restore active
directory backup- authoritative and non authoritative. When there is a hardware or
software failure we can restore the backup and let other DCs to replicate the restored
one. This is non authoritative backup. Which is a default one.
If some object gets deleted by mistake and the changes not yet propagated to all DCs
then we pick one DC where e can still find this object. Making this DC as authoritative
we can allow other DCs to be replicated from this DC.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
But here not whole directory is not restored instead the specific object can be made
authoritative.
Ans:
Suppose if I delete some objects and the domain controller is offline, then it wont
receive any replication because of which the object still persist in offline DC . If server
is down for the period of tombstone lifetime then it will be termed as lingering object.
Ans:
Ans:
Repadmin /replsummary- To check current replication health and summary state for
DCs.
Repadmin /showrepl- will display the last replication for specific DC.
Repadmin /syncall- Forcefully initiating replication to sync with other DCs.(This can
cause a lot of traffic so run it carefully )
Ans:
It is a tool which provides access to active directory objects and its attributes. We can
manage using this tool.
Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Ans:
When you enable express updates it will only download the changes between current
month CU and previous updates. Using express update feature reduces bandwidth
while downloading updates.
Ans:
Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
USN is called as Update sequence Number. When we make changes to the object USN
increments and during AD replication higher version only will retain.
Ans:
It is default restore method. When there is a server crash, we can simply restore the
latest backup of server. When server comes up it gets replicated by other DCs and
gets sync.
Ans:
Blue screen error will cause system to restart or shutdown unexpectedly. It will display
the blue screen with indication of some kernel module fault. I can be caused by wrong
device drivers, or malfunctioning of hardware components.
Ans:
It is single sign on service which provides authentication for the users who want to
access applications outside the forest. We use federation service when we want to
provide access to users from other organizations without the need to create their
account in our directory.
Ans:
Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
If we want to stop mirroring on selected volume then we should say Break Mirror. It
will not erase data on volume. If you want to get extra space then simply use remove
mirror option as it will flush data on selected disk.
Ans:
Sysprep Tool is used while capturing image of machine which will be deployed on
multiple machines without creating duplicate SIDs.
Ans:
Active directory is a service available in windows server by using which we can create
domain. It allows the user accounts to be created on server in active directory
database. And it allows central management of users and devices in the domain.
Ans:
When we delete any object from active directory , it still remain it database for 180
days and can be easily restored before getting deleted permanently.
41) What is difference between fsmo role transfer and seize role?
Ans:
When PDC fails, we perform seize role on ADC (forcefully transferring FSMO roles).
But if PDC is alive and we want to isolate server for some reason we can transfer
FSMO roles from PDC to ADC . This operation is performed on PDC .
Ans:
Certificate Authority can Revoke (cancel) certificate before expiration so that they can
not be trusted any longer. The certification Revocation list can be published by
Certificate Authority.
43) I am having 8 GB pen drive and trying to copy win server 2012 R2 iso, but it is
showing error. What is the reason?
Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
The iso file is around 4GB and the space in pen drive is more but if the pen drive is
formatted with FAT then it won’t allow the file size more than 4 GB. So format it with
NTFS or else if there is some data which you don;t want to lose then just convert it to
NTFS using convert <drive name> /fs:ntfs command.
Ans:
BIN- HyperV machine saved state file. (Pre server 2016 HyperV)
VMCX- Virtual Machine Configuration File. (Available in win 2016) It replaces XML file
used in pre server 2016 HyperV.
VMRS- VM runtime state file. This file replaces the pre- srever 2016 BIn and VSV files.
Ans:
Nano server is smallest version of windows specially developed by Microsoft for cloud
applications and for containers.
Ans:
HyperV shielding is feature which protects VMs from getting tampered by unauthorized
access. It used secure boot and Bitlocker features.
47) I have standard primary DNS zone for my abc.com domain configured on server
DC1 in Mumbai. For Ans: the same domain I am having another server DC2 at Pune
location on which DNS is installed. If both locations are connected by a WAN link and
I want to make sure that DNS should resolve and update even if the WAN link is down.
What can be done in this situation?
Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
When we use standard primary DNS , we need to manually configure secondary DNS
server which only can resolve DNS queries but wont update DNS database. But if we
use active directory integrated DNS it replicates on DC’s hence maintain redundancy
and also support write operations on any server. Hence in the given example We
should convert standalone DNS to AD integrated Zone.
Ans:
Online certificate status protocol determines status of digital certificate without the
need of downloading certificate revocation list.
Ans:
Ans:
The Global Catalog is distributed data which holds information about every little thing
in all the domain controllers in all the domains in Active Directory domain services.
Simply said, the global catalog is a domain controller which holds all the data from
Active Directory elements in one forest. The global catalog is usually located on the
domain controllers and every domain controller can be set up to maintain a function
of becoming a global catalog server. If you are searching, browsing through to the
global catalog your search would be faster and in general more broad, because you
don’t have to attach referrals for different domain controllers, rather just use the
catalog and it’s universal function will transfer you or find you the domain controller
right away.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Ans:
GPO is short for Group Policy Objects, but before explaining group policy objects, first
we must focus on group policy in general. What is group policy? Well, group policy is
one hierarchically built infrastructure and this infrastructure is built in a way that an
administrator can access it from the Active directory system and change settings for
different users, configure also settings for the computers and so on. Using the group
policy, a network administrator can put limits or choose what you as a user or what a
computer can access and use on the network itself. This comes down even to files and
folders. If the network administrator wishes to have control of both the user’s web
browsing and set up the computer settings for when connecting to a network, it can
be done through the Group Policy Management Console and through this console he
can have control over all the objects – the Group Policy Objects (GPO).
52) What are the modifications made in Active Directory in Windows 2008?
Ans:
One of the first modifications made to Active Directory in Windows 2008 is renaming
the Active Directory to a different name, Active Directory Domain Service. Other then
the name, no other changes have been made in it’s specifications, settings and tools.
Then what is the purpose of Active Directory Domain Services? The “domain service”
part identifies the directory as a service which can provide authorization and policy
management control. It is called a service because the Active Directory could be
brought to a full stop and then re-activated. Using the active directory as a service
allows easier maintenance of the domain controllers.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
53) What is Active Directory’s recycle bin and what is it’s purpose?
Ans:
The Active Directory’s recycle bin is a modified tool that came in the Windows 2008
pack and is very user-friendly and a very helpful tool for restoring or even storing
items in the recycle bin. How does the directory’s recycle bin work you may ask? For
example, you may find yourself in a situation where you’ve accidentally deleted an
item that you now wish to restore. Even as a network administrator, grabbing the
objects from the Active Directory is a wonderful action that Windows 2008 released,
because mistakes are often made. This tool enhances the efficiency of the Active
Directory service by the several actions this tool provides, like the restoration of
objects, putting unneeded items in the recycle bin and using data space more
resourcefully and efficiently.
Ans:
To give some time for the deployment and realization of one Terminal Server license
server, the server will provide a licensing grace period. This license grace period is
acquired so that you don’t have to have a license server. This grace period will allow
you and the server to accept unlicensed clients without requiring further permission
from the licensed server. The period will automatically start when you receive your
first client and the licensing period will extend until you get a licensing server. That is
when a licensing period will end and the licensing server can accept new clients and
store their information in the server and this is called the CAL or the clients access
license.
Ans:
The five branches or major areas of virtualization are application, desktop (the one
mentioned above in question 9), storage, network and server. Giving a brief definition
for all of these terms will not only be better for an answer of this question, but also
will give out that you are actually involved in the technology. The application
virtualization in simple terms means controlling or running an application from a
remote desktop. The application is delivered and manipulated through application
streaming. Desktop virtualization is the involvement of the individual accessing a
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
desktop on a local network through a remote display protocol. This differs much from
the server virtualization (which are the big savings in the IT world). The server
virtualization is all about covering and hiding a physical part or a hardware part, so
that a server instance would function or appear as everything is stable when it really
isn’t. This saves up allot of hardware repair and costs as well as maintenance. The
network virtualization configures network resources and splits bandwith into individual
channels, while the storage virtualization concerns hardware parts by “pulling them
together” physically, only to fool the host-operating system that all the hardware parts
are well connected, complying with each other and responding well, to one another.
Ans:
The virtual disc is some sort of a disk image. This disk image is created to work with
a guest-operating system which is running on top of your basic, standard system.
Using the virtual disc, means creating it so it can replace a physical disc or partition
that is there but cannot be recognized by the guest-operating system or is not there
at all. Wherever there’s a physical gap in between discs or in hardware parts, the
virtual disc can help and replace that part, so the guest-operating system can continue
to function without noticing the difference.
Ans:
The emulation drivers are mainly devices that imitate another program. In simple
terms, emulation drivers are a trick to fool the device that it is some other sort of a
device.
Ans:
Active Directory is a consolidated and the condensed system that stores various
information about objects in a given network and avails the users to make use of this
information carried on to the network administrators and users.
Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
The domain controller is a server system that incorporates the written copy that
belongs to Active Directory database in an Active Directory environmental settings.
Ans:
If a domain controller contains whole objects in the forest, then it is a global catalog
server.
Like every domain controllers, a global catalog server stores thorough and writable
copies of the schema and configuration directory separations and a full, writable copy
of the domain directory separation for the domain that it is hosting.
Ans:
Organizational Units (OU) are containers on a computer with the level of sophistication
as in an administrative setting. It supports administrators to organize set of users
together so that any alterations occur, security settings and any other administrative
works could be fulfilled more effectively.
Ans:
A Windows forest is, in general, a set of one or more reliable Windows trees. The trees
do not necessarily require an adjacent Domain Name System (DNS) names. A forest
allocates a work plan and global catalogue servers. A lone tree can also be named a
forest.
Ans:
A Windows tree is a usually a set of one or more trusted Windows domains with
adjoining DNS domains. In this case, “Trusted” connotes the idea that a validated
account from one domain is not eliminated by another domain. “Contiguous DNS
domains” is simply that they all have the similar root DNS name.
Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Site:
Sites are manually described associations of subnets. Objects in a site divide between
them the exact global catalogue servers and can have a customary set of group
planning applied to them.
Schema:
The schema describes the attributes, objects, classes, and rules that are available in
the Active Directory.
Ans:
The SID is a peculiar name (alphanumeric character string) that is used to figure out
an object, namely a user or a set of users.
Ans:
A GPO is a collective Group Policy settings that are stored at the domain level as a
virtual object comprised of a Group Policy container (GPC) and a Group Policy template
(GPT).
The Group Policy container (GPC) is an Active Directory container that has included
GPO attributes, like version information, GPO status, and moreover a list of other
element settings.
The Group Policy template (GPT) is a file system folder that contains policy data
mentioned by .adm files, script files, security settings, and information about
applications that are accessible for installation. The GPT is situated in the system
volume folder (SysVol) in the domain \Policies sub-folder.
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Ans:
By default settings, GPO conditions all users and computers that are included in the
connected domain, site, and organizational unit. The administrator can additionally
point out the computers and users that are influenced by a GPO by using membership
in security groups.
Ever since the arrival of Windows 2000, the administrator can append both computers
and users to security groups. Then the administrator can mention which security pool
is affected by the GPO with the help of the Access Control List editor.
Ans:
Ans:
Intra-site Replication
The process of copying that takes place between controllers inside a single site. All of
the subnets within the site must be linked by high speed network cables.
Inter-site Replication
Replication must usually happen both (intra-site) within sites and (Inter-site) between
sites to keep domain and forest data standardized and customized among domain
controllers that store the similar directory partitions.
Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Ans:
When a new domain user or group account is generated, Active Directory stores the
account’s SID in the Object-SID (objectSID) property of a User or Group object. It
also allocates the new object a universally unique identifier (GUID), which is a 128-
bit value that is distinctive not only in the endeavour but also across the globe. GUIDs
are specifically aligned to every object made by Active Directory, not just User and
Group objects. Each object’s GUID is stored in its Object-GUID (objectGUID) property.
Active Directory uses GUIDs internally to figure out objects.
Ans:
Ans:
74) What are the exams offered by the MCSA certification program?
Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
The following are the exams that are offered by the MCSA certification program, and
they are:
Server Administrator
Network Infrastructure
MCSA Windows 8:
Administrating Databases
Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
To validate your expertise in Windows Server 2012 is the primary objective of MCSA
Windows Server 2012. This certification makes you excel your knowledge in computer
system administration and computer networks.
Ans:
The MCSA Windows Server 2008 will provide you with a way to excel in your in-depth
knowledge of network infrastructure, Server administration, and active directory
configuration.
Ans:
Active Directory is a directory service that is released and developed by Microsoft for
the Windows domain network. It is also present in many of the server operating
systems as a set of services and processes. Many of the organizations depend on
Active Directory to maintain proper order in arranging that is file servers, users,
computers, and many more. The functioning of the locator service is the exclusive
purpose of Active Directory.
Ans:
Validates and evaluates your skills in the database and provides methods to develop
critical mission solutions to databases. By getting certified with this certification you
can able to build your career top MNCs as a database analyst and database developer.
Ans:
Domain controller is one of the most crucial servers designed by Microsoft. This is a
computer server that is responsible for responding to security authentication requests
within a Windows domain. It is also defined as a centerpiece of the Windows Active
Directory service. There are three roles in domain controllers, and they are:
Domain Controller
Operation Server
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
Ans:
The distributed data storage that is stored in the domain controller is called the Global
Catalog Server. This allows applications and users to find objects in the domain of
active directory. Global Catalog Server is used to hold a replica of every object in the
directory with a small number of their attributes.
Ans:
It provides you with a way to master in various Windows Server 2016 skills that are
required to reduce costs and increase business value. An individual certified in
Windows Server 2016 will have a chance for the positions including computer network
specialist, computer network engineer, and network analyst.
Ans:
A pass through disc is a physical disc used for storing virtual discs and it has a disc
format and file system.
Ans:
Application partitions are directory partitions that are replicated to domain controllers.
These are part of the Active Directory system. Domain controllers included in the
process of directory partitions have a replica of that partition. The values and
attributes of application partitions can lessen replication traffic. The application
partitions can focus only on one domain in the domain area unlike the domain directory
partitions. This makes them more available and redundant.
84) Explain what is the major difference between NTFS ( New Technology File System)
or FAT (File Allocation Table) on a local server?
Ans:
Name: Prathamesh Sawant
LinkedIn: https://www.linkedin.com/in/prathamesh-sawant7882
For local users FAT (File Allocation Table) and FAT32 provides security, while NTFS (
New Technology File System) provides security for domain users as well as local users.
NTFS provides file level security which is not possible through FAT32.
85) Explain if it is possible to connect Active Directory to other 3rd party Directory
services?
Ans:
Yes, you can connect other vendors directory services with Microsoft version. By using
dirXML or LDAP to connect to other directories.
Ans:
It is a set of files and folders that is stored on the local hard disk of each domain
controller in a domain and are replicated by the FRS ( File Replication Service). These
files contain group or user policy information.
Ans:
“ Tattooing” the registry means user can modify and view user preference that are
not stored in the maintained portions of the Registry. Even if the group policy is
changed or removed, the user preference will still persist in the registry.
Ans:
A logical group of network objects for example computers, users, devices, etc which
share the same active directory database is known as a domain.
The collection of one or more domains is known as a tree. This may also include a
contiguous namespace linked in a transitive trust hierarchy