71. What is RSoP?
It is the sum of group policies
applied to a user or computer. RSop queries can be generated by the three tools
which are
- Resultant
set of policy wizard
- Gpresult
command line tool
- Advanced
system information policy tool
What are the modes which are
used by RSoP wizard?
Logging mode and planning mode
Logging mode: It
enables to review the existing GPO settings, software installation applications
and security for the computer or user account. It can be used to
- Find
failed or overwritten policy settings
- See
how security groups affect policy settings
- Find
out how local policy is affecting group policies
Planning mode: It
enables to plan growth and re organization. Using RsoP planning mode we can
poll existing GPO’s for policy settings,software installation applications and
security.
72.What are the Group Policy troubleshooting tools?
- RSoP
wizard
- Gpresult
- Gpupdate
- Event
viewer
- Log
files
What is software installation extension?
The software installation
extension in the group policy object editor console is the key administrative
tool for deploying software allowing administrators to centrally store
- Initial
deployment of software
- Applying
patches and updates
- Removal
of the software
1.
Assign
& Publish the applications in GP & how?
Through Group policy you can Assign and
publish the applications by creating .msi package for that application
With Assign option you can apply policy for
both user and computer. If it is applied to computer then the policy will apply
to user who logs on to that computer. If it is applied on user it will apply
where ever he logs on to the domain. It will be appear in Start menu—Programs.
Once user click the shortcut or open any document having that extension then
the application install into the local machine. If any application program
files missing it will automatically repair.
- With Publish option you can apply only on users. It will
not install automatically when any application program files are corrupted
or deleted.
72. What are the commonly used types of RAID?
RAID 0, RAID 1 and RAID 5
75. What is the difference between OU and Group?
An authenticated set of users
classified by common traits such as job title or customer profile. Groups
are also associated with a set of roles, and every user that is a member of a
group inherits all the roles assigned to that group. An OU is a container used
to organize objects within a domain into logical administrative groups. An OU
can contain objects such as user accounts, groups, computers, printers,
applications, file shares, and other OU’s.
There
are three reasons for defining an OU
·
To
delegate administration: we can add Ou’s to other Ou’s to form a hierarchy of
administrative control.
·
To
administer group policy : Group policies can be linked to OU’s
·
To hide
objects: T o hide some objects from certain users.
76. What is DFS ?
The
Distributed File System, or DFS, allows shares
in multiple different locations to be logically grouped under one folder, or DFS
root. When users try to access a share that exists off the DFS root, the
user is really looking at a DFS link and the DFS server transparently
redirects them to the correct file server and share. A DFS root can only exist
on a Windows 2000 version that is part of the server family, and only one DFS
root can exist on that server.
77. What is EFS ?
The EFS
or Encrypting File System is a file system with file system-level
encryption available in Microsoft's Windows 2000, Windows XP
Professional Edition, Windows Server 2003,
and now Windows Media
Center 2005 operating systems. The technology transparently allows
files to be stored encrypted on NTFS
file systems
to protect confidential data from attackers with physical access to the
computer.
78. How many DFS
roots can be configured in Windows 2000?: One but in windows
server 2003 more than one root is possible
79. What is remote desktop protocol?: Remote Desktop Protocol (RDP)
is a multi-channel protocol that allows a user to connect to a computer running
Microsoft Terminal Services.
80. What is NS Lookup?: It is a command line tool and
it offers ability to perform query testing of DNS servers and to obtain
detailed response at command prompt.
81. What are the different types of backups?
Normal
During
a normal backup, all selected files and folders are backed up. A normal
backup does not rely on markers to determine which files to back up. During a
normal backup any existing marks are cleared and each file is marked as having
been backed up. Normal backups speed up the restore process because the backup
files are the most current and you do not need to restore multiple backup jobs.
Copy
During
a copy backup, all selected files and folders are backed up. It neither
looks for nor clears markers. If you do not want to clear markers and affect other
backup types, use a copy backup. For example, use a copy backup between a
normal and an incremental backup to create an archival snapshot of network
data.
Incremental
During
an incremental backup, only selected files and folders that have a
marker are backed up, and then the backup clears markers. Because an
incremental backup clears markers, if you did two consecutive incremental
backups on a file and nothing changed in the file, the file would not be backed
up the second time.
Differential
During
a differential backup, only selected files and folders that have a
marker are backed up, but the backup does not clear markers. Because a
differential backup does not clear markers, if you did two consecutive
differential backups on a file and nothing changed in the file, the entire file
would be backed up each time.
Daily
During
a daily backup, all selected files and folders that have changed during
the day are backed up. This backup neither looks for nor clears markers. If you
want to back up all files and folders that change during the day, use a daily
backup.
82. Explain booting process?
Pre boot Sequence
During
startup, a computer running Windows XP Professional initializes and then
locates the boot portion of the hard disk.
The
following four steps occur during the pre boot sequence:
- The computer runs power-on
self test (POST) routines to determine the amount of physical memory,
whether the hardware components are present, and so on. If the computer
has a Plug and Play BIOS, enumeration and configuration of hardware
devices occurs at this stage.
- The computer BIOS locates the
boot device and loads and runs the master boot record (MBR).
- The MBR scans the partition
table to locate the active partition, loads the boot sector on the active
partition into memory, and then executes it.
- The computer loads and
initializes the NTLDR file, which is the operating system loader.
Boot Sequence
After the computer loads NTLDR into memory,
the boot sequence gathers information about hardware and drivers in preparation
for the Windows XP Professional load phases. The boot sequence uses the
following files: NTLDR, BOOT.INI, BOOTSECT.DOS (optional), NTDETECT.COM, and
NTOSKRNL.EXE. The boot sequence has four phases: initial boot loader phase,
operating system selection, hardware detection, and configuration selection.
Kernel Load
After
configuration selection, the Windows XP Professional kernel (NTOSKRNL.EXE)
loads and initializes. NTOSKRNL.EXE also loads and initializes device drivers
and loads services. If you press Enter when the Hardware
Profile/Configuration Recovery menu appears, or if NTLDR makes the
selection automatically, the computer enters the kernel load phase. The screen
clears and a series of white rectangles appears across the bottom of the screen
Kernel Initialization
When
the kernel load phase is complete, the kernel initializes, and then NTLDR
passes control to the kernel. At this point, the system displays a graphical
screen with a status bar indicating load status. Four tasks are accomplished during
the kernel initialization stage:
- The
Hardware key is created
- The
Clone control set is created
- Device
drivers are loaded and initialized
- Services
are started
83. What are the three classes of IP address?
A
|
The first network ID is
1.0.0.0 and the last is 126.0.0.0. This allows for 126 networks and
16,777,214 hosts per network. The class A address 127.x.y.z is
reserved for loop back testing and inter process communications on the local
computer. For class A addresses, the network ID is always the first octet in
the address and the host ID is the last three octets.
|
B
|
The first network ID is
128.0.0.0 and the last is 191.255.0.0. This allows for 16,384 networks and
65,534 hosts per network. For class B addresses, the network ID is always the
first two octets in the address and the host ID is the last two octets.
|
C
|
The first network ID is
192.0.0.0 and the last is 223.255.255.0. This allows for 2,097,152 networks
and 254 hosts per network. For class C addresses, the network ID is always
the first three octets in the address and the host ID is the last octet.
|
84. How many types of accounts are there in windows 2003?
Local User Accounts : Local user accounts allow users to log on
only to the computer on which the local user account has been created and to
access resources on only that computer. When you create a local user account,
Windows XP Professional creates the account only in that computer's security
database, called the local security database
Domain User Accounts : Domain user accounts allow you to log on to
the domain and access resources anywhere on the network. When you log on, you
provide your logon information-your user name and password. Microsoft Windows
2000 Server uses this logon information to authenticate your identity and build
an access token that contains your user information and security settings. The
access token identifies you to the computers in the domain on which you try to
access resources. The access token is valid throughout the logon session.
Built-In User Accounts : Windows XP Professional automatically creates
built-in accounts. Two commonly used built-in accounts are Administrator
and Guest.
Administrator : Use the built-in Administrator
account to manage the overall computer. You can perform tasks to create and modify
user accounts and groups, manage security policies, create printer resources,
and assign the permissions and rights that allow user accounts to access
resources.
Guest : Use the
built-in Guest account to allow occasional users to log on and access resources.
For example, an employee who needs access to resources for a short time can use
the Guest account.
85.What are the types of Groups?
2
types Security Group and Distribution Group
Security
Group: It is used to assign permissions to gain
access to resources
Distribution
Groups: It is used for non security related functions
such as sending E-mail messages to a group of users at the same time.
86. What are the group scopes in Windows 2003?
Groups, whether a security
group or a distribution group, are characterized by a scope that identifies the
extent to which the group is applied in the domain tree or forest. There are
three group scopes: universal, global, and domain local.
•
|
Members of universal groups
can include other groups and accounts from any domain in the domain tree or
forest and can be assigned permissions in any domain in the domain tree or
forest.
|
•
|
Members of global groups can
include other groups and accounts only from the domain in which the group is
defined and can be assigned permissions in any domain in the forest.
|
•
|
Members of domain local
groups can include other groups and accounts from Windows Server 2003,
Windows 2000, or Windows NT domains and can be assigned permissions
only within a domain.
|
87. What is router?
A router
is a computer
networking device that forwards data packets across a network toward
their destinations, through a process known as routing. Routing occurs at Layer 3 (the network layer i.e. Internet Protocol (IP))
88. What is Firewall?
A
firewall protects a network against external threats from another network,
including the Internet. firewall prevent an organization's networked computers
from communicating directly with computers that are external to the network and
prevent computers external to the network from communicating directly with the
computers in the organization's network. All incoming and outgoing
communication is routed through a proxy server outside the organization's
network. Firewall also audit network activity, recording the volume of traffic
and information about attempts to gain unauthorized access
90. How many OSI layers appear in TCP/IP?: Application, Transport, Internet and Network
Layers
91. When you ping a system how many times it will reply?: 4 Times
92. What Is DFS root
and DFS link?
DFS root: You can
think of this as a share that is visible on the network, and in this share you
can have additional files and folders.
DFS link: A
link is another share somewhere on the network that goes under the root. When a
user opens this link they will be redirected to a shared folder.
93. What is IIS: Internet Information Services (IIS) allows you to easily
publish information on the Internet or on your or your company's intranet. You
place your Web files in directories on your server and users establish HTTP
connections and view your files with a Web browser.
94. What is PING ,
PATHPING, TRACERT commands?
Ping is a computer network tool used to test whether a
particular host is
reachable across an IP
network. Ping works by sending ICMP
“echo request” packets ("Ping?") to the target host and listening
for ICMP “echo response”
replies (sometimes dubbed "Pong!" as an analog from the Ping Pong table tennis sport.) Using interval
timing and response rate, ping estimates the round-trip time (generally in milliseconds although the unit is often omitted)
and packet loss (if any) rate between hosts
Path ping
Path ping is a tool that detects packet loss over
multiple hop trips.
Trace route (trace
path on modern Linux systems, tracert on Windows operating system)
is a computer network
tool used to determine the route taken by packets across an IP network
95. What is the difference between a work group and domain?
Workgroup is a logical grouping of networked computers that share
resources, such as files and printers. A workgroup is also called a peer-to-peer
network because all computers in the workgroup can share resources as
equals (peers) without a dedicated server
Because
workgroups have decentralized administration and security, the following are
true:
- A user must have a user account on each computer to which he or
she wants to gain access.
- Any changes to user accounts, such as changing a user's password or
adding a new user account, must be made on each computer in the workgroup.
If you forget to add a new user account to one of the computers in your
workgroup, the new user will not be able to log on to that computer and
will be unable to access resources on it.
A
workgroup provides the following advantages:
- It does not require inclusion of a domain controller in the
configuration to hold centralized security information.
- It is simple to design and implement. It does not require the
extensive planning and administration that a domain requires.
- It is a convenient networking environment for a limited number of
computers in close proximity. However, a workgroup becomes impractical in
environments with more than 10 computers.
Domains
A domain
is a logical grouping of network computers that share a central directory
database. A directory database contains user accounts and security
information for the domain. This database is known as the directory and is the
database portion of Active Directory service, the Windows 2000 directory
service.
The
benefits of a domain include the following:
- Centralized administration, because all user information is stored
centrally.
- A single logon process for users to gain access to network resources
(such as file, print, and application resources) for which they have
permissions. In other words, you can log on to one computer and use
resources on another computer in the network as long as you have
appropriate permissions to access the resource.
- Scalability, so that you can create very large networks.
96. What is the difference between router and gateway?
Routers are machines that
direct a packet through the maze of networks that stand between its source and
destination. Normally a router is used for internal networks while a gateway
acts a door for the packet to reach the ‘outside’ of the internal network
97. What is default gateway: The exit-point from one network
and entry-way into another network, often the router of the network.
98. What is the difference between TFTP and FTP?
The Trivial File Transfer
Protocol (TFTP) allows a local host to obtain files from a remote host but does
not provide reliability or security. It uses the fundamental packet delivery
services offered by UDP. The File Transfer Protocol (FTP) is the standard
mechanism provided by TCP / IP for copying a file from one host to another. It
uses the services offer by TCP and so is reliable and secure. It establishes
two connections (virtual circuits) between the hosts, one for data transfer and another for control
information.
99. What is Virtual memory?
Virtual memory or
virtual memory addressing is a memory management technique, used by computer operating systems, more common in multitasking
OSes, wherein non-contiguous memory is presented to a software as contiguous
memory. This contiguous memory is referred to as the virtual address space.
Virtual memory addressing is typically used in paged memory systems. This in turn is often combined with memory
swapping (also known as anonymous memory paging), whereby memory
pages stored in primary storage
are written to secondary storage
(often to a swap file or swap partition), thus freeing faster
primary storage for other processes to use.
100. What is VLAN?
A virtual LAN,
commonly known as a VLAN or as a VLAN, is a method of creating
independent logical networks within a
physical network. Several VLAN’s can co-exist within such a network. This helps
in reducing the broadcast domain.
A VLAN consists of a network of computers that behave as if connected to
the same wire - even though they may actually be physically connected to
different segments of a LAN.
Network administrators configure VLAN’s through software rather than hardware,
which make them extremely flexible
No comments:
Post a Comment