101. How does system restore work?
Windows XP periodically records a snapshot
of your computer. These snapshots are called restore points. Windows XP also
creates restore points at the time of significant system events (such as when
an application or driver is installed) or you can create and name your own
restore points at any time. If you have installed a program that has made your
computer unstable, you can open system restore, choose a restore point, and
return your computer to its previous stable state.
102. How you will create restore point?
In windows XP go to start menu ,Programs, accessories ,
system tools ,system restore then we
will get an option to create a restore point or when an application or driver
is installed a system restore point will be created.
103. What is registry?
Microsoft
Windows XP Professional stores hardware and software settings centrally in a
hierarchical database called the registry.The registry contains a
variety of different types of data, including the following:
- The hardware installed on the computer, including the central
processing unit (CPU), bus type, pointing device or mouse, and keyboard.
- Installed device drivers.
- Installed applications.
- Installed network protocols.
- Network adapter card settings
104. What is OSPF ?
It is an Internet routing protocol that
scales well, can route traffic along multiple paths, and uses knowledge of an
Internet’s topology to make accurate routing decisions.
105. What is DiskQouta?
Windows
XP Professional disk quotas track and control disk usage on a per-user,
per-volume basis. Windows XP Professional tracks disk quotas for each volume,
even if the volumes are on the same hard disk. Because quotas are tracked on a
per-user basis, every user's disk space is tracked regardless of the folder in
which the user stores files
106. What is the difference between a thread and process?
A process is a collection of
virtual memory space, code, data, and system resources. A thread is code that
is to be serially executed within a process. A processor executes threads, not
processes, so each application has at least one process, and a process always
has at least one thread of execution, known as the primary thread. A process
can have multiple threads in addition to the primary thread. Prior to the
introduction of multiple threads of execution, applications were all designed
to run on a single thread of execution.
107. Tell the difference between assembler, loader, processor and
linker?
Processor: performs all the
functions for a program in execution i.e., ALU, MU, CU.
Assembler : converts High level to Assembly Language or Low level language.
Loader: Loads the program from hard disk to main memory for execution.
Linker: (dynamic and static) most OS supports only static linking, in which system language libraries are treated like any other object module and are combined with the loader into the binary program image. And DYAMIC linking is links the library files at the run time.
Assembler : converts High level to Assembly Language or Low level language.
Loader: Loads the program from hard disk to main memory for execution.
Linker: (dynamic and static) most OS supports only static linking, in which system language libraries are treated like any other object module and are combined with the loader into the binary program image. And DYAMIC linking is links the library files at the run time.
108. Differentiate between hardware RAID and software RAID
RAID Hardware is
always a disk controller to which you can cable up the disk drives. RAID
Software is a set of kernel modules coupled together with management
utilities that implement RAID in Software and require no additional hardware.
Software RAID is more flexible
than Hardware RAID. Software RAID is also considerably less expensive. On the
other hand, a Software RAID system requires more CPU cycles and power to run
well than a comparable Hardware RAID System. Also, because Software RAID
operates on a partition by partition basis where a number of individual disk
partitions are grouped together as opposed to Hardware RAID systems which
generally group together entire disk drives, Software RAID tends be slightly
more complicated to run. This is because it has more available configurations
and options. An added benefit to the slightly more expensive Hardware RAID
solution is that many Hardware RAID systems incorporate features that are specialized
for optimizing the performance of your system
there is very little difference
between hardware and software RAID. Ultimately, the difference comes down to
where the RAID processing is performed. It can either be performed in the host
server's CPU (software RAID), or in an external CPU (hardware RAID). For
hardware RAID, that CPU can be in a disk array or in a RAID controller.
Hardware RAID presents logical
disks that are already configured to the system (or the SAN), mirrored and ready to go. Configuration is still
required, but that configuration takes place outside the system. Under software
RAID, that configuration is performed in the system.
Since hardware RAID work is
done outside the system and the OS, it can support more kinds of systems. You
could, theoretically, connect a disk array that does RAID to a Palm device,
without the Palm knowing anything about RAID. (Don't try this at home, kids.)
Software RAI The biggest difference you are likely to see between the two is
that software RAID tends to be slower than hardware RAID. However, you are
likely to find that putting an additional CPU in your server to speed up software
RAID is less expensive than implementing hardware RAID on custom hardware.D is
limited to OSes on which the disk management application can run.
109. What is mean by disk de fragmentation and chkdsk?
The
process of finding and consolidating fragmented files and folders is called decrementing.
Disk defragmenter locates fragmented files and folders and defrayments them by
moving the pieces of each file or folder to one location so that each occupies
a single, contiguous space on the hard disk consequently, your system can
access and save files and folders more efficiently. By consolidating files and
folders disk defragmenter also consolidates free space
Check
disk attempts to repair file system errors, locate bad sectors, and recover
readable information from those bad sectors. All files must be closed for this
program to run. To access Check disk, select the drive you want to check in
Windows Explorer or My Computer. Click the File menu, click Properties, click
the Tools tab, and click Check Now. Select one of the options on the Check disk
dialog box
110. What is the difference between router and gateway?
Routers
send data to a specific location based on an address
for the network segment. The benefit is the ability for
a router to search routing tables and find the shortest path to the
destination. The downside to routers is that they are protocol dependent and
therefore can only route data between network segments using the same protocol.
Today this is a moot because everyone uses TCP/IP and has an open architecture.
This is why, for example, data can be sent between a Windows NT network and a
Netware network.
Gateways are network points
that act as an entrance to another network. On the Internet, a node or stopping
point can be either a gateway node or a host (end-point) node. Both the computers
of Internet users and the computers that serve pages to users are host nodes.
The computers that control traffic within your company's network or at your
local Internet service provider (ISP) are gateway nodes.
In the network for an enterprise, a computer server acting as a gateway node is often also acting as a proxy server and a firewall server. A gateway is often associated with both a router, which knows where to direct a given packet of data that arrives at the gateway, and a switch, which furnishes the actual path in and out of the gateway for a given packet.
In the network for an enterprise, a computer server acting as a gateway node is often also acting as a proxy server and a firewall server. A gateway is often associated with both a router, which knows where to direct a given packet of data that arrives at the gateway, and a switch, which furnishes the actual path in and out of the gateway for a given packet.
111. What
is Encapsulation?
In computer science,
the principle of information hiding is the hiding of design decisions
in a computer program that are most likely to change, thus protecting other
parts of the program from change if the design decision is changed. Protecting
a design decision involves providing a stable interface
which shields the remainder of the program from the implementation (the details
that are most likely to change).
113. How you will combine backups?
- Normal and differential backups. On Monday a normal backup is performed, and on Tuesday through Friday
differential backups are performed. Differential backups do not clear
markers, which mean that each backup includes all changes since Monday. If
data becomes corrupt on Friday, you only need to restore the normal backup
from Monday and the differential backup from Thursday. This strategy takes
more time to back up but less time to restore.
- Normal and incremental backups. On Monday a normal backup is performed, and on Tuesday through Friday
incremental backups are performed. Incremental backups clear markers,
which mean that each backup includes only the files that changed since the
previous backup. If data becomes corrupt on Friday, you need to restore
the normal backup from Monday and all incremental backups, from Tuesday
through Friday. This strategy takes less time to back up but more time to
restore.
115. What is the difference between FAT and NTFS?
NTFS: File and folder level security,
Disk compression, Disk quota , Encryption
FAT: No file and folder level
security, Dual booting capability
117.what is the use
of LDAP (X.500 standard?): LDAP is a directory
access protocol, which is used to exchange directory information from server to
clients or from server to servers
118.what
is the use of terminal services: Terminal services can be used as Remote
Administration mode to administer remotely as well as Application Server Mode
to run the application in one server and users can login to that server to user
that application.
119.what
is the protocol used for terminal services:
RDP
120.
What are the problems that are generally come across DHCP
Scope is full with IP addresses
no IP’s available for new machines, If scope options are not configured
properly eg default gateway , Incorrect creation of scopes etc
121.What is the
role responsible for time synchronization
PDC Emulator is responsible for time
synchronization. Time synchronization is important because Kerberos
authentication depends on time stamp information
122.How to take DNS
and WINS,DHCP backup
%System root%/system32/dns
%System root%/system32/WINS
%System root%/system32/DHCP
123.What is
recovery console
Recovery console is a utility used to
recover the system when it is not booting properly or not at all booting. We
can perform fallowing operations from recovery console
We can copy, rename, or replace operating
system files and folders
Enable or disable service or device startup
the next time that start computer
Repair the file system boot sector or the
Master Boot Record
Create and format partitions on drives
124.what is DFS & its usage
There are two types of DFS domain DFS
and Stand alone DFS . We cannot
provide redundancy for stand alone DFS
in case of failure. Domain DFS is
used in a domain environment which can be accessed by /domain name/root1 (root
1 is DFS root name). Stand alone DFS can be used in workgroup environment which can
be accessed through /server name/root1 (root 1 is DFS
root name). Both the cases we need to create DFS
root ( Which appears like a shared folder for end users) and DFS links ( A logical link which is pointing to the
server where the folder is physically shared)
The maximum number of Dfs roots per server
is 1.
The maximum numbers of Dfs root replicas
are 31.
The maximum number of Dfs roots per domain
is unlimited.
The maximum number of Dfs links or shared
folders in a Dfs root is 1,000
128. What is an ACL?
An ACL is stored with every
file and folder on an NTFS volume and contains a list of all user accounts or
groups that have been assigned permissions to that file or folder. An ACE is an
entry in an ACL that contains the operations that a user or group is allowed or
specifically denied to perform on that file or folder.
129. What are Shadow copies?
Microsoft Windows
Server 2003 includes Shadow Copies of Shared Folders to help prevent
inadvertent loss of data. Shadow Copies of Shared Folders helps alleviate data
loss by creating shadow copies of files or folders that are stored on network
file shares at predetermined time intervals. A shadow copy is essentially a
previous version of the file or folder at a specific point in time.
131. What is the difference
between DNS and WINS?
WINS and DNS are
both name resolution services for TCP/IP networks. While WINS resolves names in
the NetBIOS namespace, DNS resolves names in the DNS domain namespace. WINS
primarily supports clients that run older versions of Windows and applications
that use NetBIOS. Windows 2000, Windows XP, and Windows Server 2003
use DNS names in addition to NetBIOS names. Environments that include some
computers that use NetBIOS names and other computers that use domain names must
include both WINS servers and DNS servers.
132. What is the difference between dynamic routing and Static
routing?
Static routing algorithms are
hardly algorithms at all, but are table mappings established by the network
administrator before the beginning of routing. These mappings do not change
unless the network administrator alters them. Algorithms that use static routes
are simple to design and work well in environments where network traffic is
relatively predictable and where network design is relatively simple. Because static routing systems cannot react to network
changes, they generally are considered unsuitable for today's large, constantly
changing networks. Most of the dominant routing algorithms today are dynamic
routing algorithms, which adjust to changing network circumstances by
analyzing incoming routing update messages. If the message indicates that a
network change has occurred, the routing software recalculates routes and sends
out new routing update messages. These messages permeate the network,
stimulating routers to rerun their algorithms and change their routing tables
accordingly.
Dynamic routing algorithms can be
supplemented with static routes where appropriate. A router of last resort (a
router to which all un routable packets are sent), for example, can be
designated to act as a repository for all un routable packets, ensuring that
all messages are at least handled in some way.
133. Tell about Windows 2003 family?
·
Windows Server 2003, Web Edition: This
is a new type of server for Microsoft. This server is optimized for hosting Web
sites and is the only Windows Server 2003 that installs IIS 6.0 as a default
component.
·
Windows Server 2003, Standard Edition: This
server is the same level of server as Windows 2000 — just a normal network
server capable of establishing and managing a domain.
·
Windows Server 2003, Enterprise Edition: This server
is a bit more robust. It demands more computing horsepower, but can return it
in spades. Enterprise Edition is designed to support infrastructure servers
that require high reliability and superior performance.
·
Windows Server 2003, Datacenter Edition: This
is the granddaddy of all servers from Microsoft. It's designed to offer
mission-critical fault-tolerance for demanding applications by providing a
scalable clustering architecture that offers high availability.
134. What are the name resolution methods available in windows?
Windows 2000 Professional provides four methods for resolving
names to IP addresses:
- Domain Name
System (DNS) for applications and services that require host-to-IP name
resolution, such as Active Directory
- Windows
Internet Name Service (WINS), for compatibility with applications and
services that require NetBIOS-to-IP name resolution, such as browsing
functions of previous versions of Windows
- Hosts and
Lmhosts files, which provide host-to-IP and NetBIOS-to-IP name resolution
via manually-maintained local files
- b-node
broadcasts, which can be used for NetBIOS name resolution within the local
subnet.
135.What is the min and max no of disks participate in RAID 0,
RAID 1 and RAID 5?
- RAID 0 - 2
, RAID 1- 2, RAID 5- 3
136.What is IPSec?
IPSec (IP
security) is a suite of protocols for securing Internet Protocol (IP) communications by encrypting and/or authenticating each IP packet in a data stream. IPSec also includes protocols for
cryptographic key establishment. There are two modes of IPSec operation: transport
mode and tunnel mode. Transport mode is used for
host-to-host communications. Tunnel
mode is used for network-to-network communications.
137.Which are the ports to be blocked to ensure security over
TCP/IP?
TCP ports 135, 139, and 445, and
UDP ports 135, 137, and 445 should be blocked
as well as all the other unused ports
138.What is mean by Server Hardening?
Hardening
the system means zero tolerance. Or Hardening is setting system
config settings to make it more resilient to attack. Hardening is
"configuring a system for better security." Deactivating unnecessary
programs, using file permissions and ACL’s, and tweaking OS parameters to limit
access to what's needed, Using Least Privilege: giving just what they
need and a little bit more. Using Minimalism: turning stuff off you're
not using. Hardening can be achieved through the following steps.
1. Use Firewalls
2. Applying Service Packs and
security patches
3. Account Considerations for
e.g. Create another Admin account with restricted privileges makes the intruder
the job very difficult
4. Apply Antivirus (Don’t
browse from servers, don’t download the patches or other software’s directly
from servers and don’t install it directly to servers unless it is applied in
the test lab)
5. Policies should be designed
in such a way that user activity will be traced.
6. Strong Password practices
7. Disable unnecessary services
running in the machine
8. File system should be
secured type such as NTFS
9. Bios should be locked
10. Booting drive should be C
drive
11. The system running IIS has
to be installed on a separate network segment or with no network cable attached
until the latest service packs are applied.
139. Procedure to apply patches in production servers
§
Updates
obtained from a vendor are tightly controlled and managed. For example, they
might be kept in a secure repository that few individuals in MIS are authorized
to access. Copying or downloading updates into the repository might be subject
to rigorous approval, scheduling, auditing, and logging procedures.
§
Updates
are promoted to production systems in specific stages during which they are
thoroughly tested. For example, an update might first be installed on a single
machine, separated from the production environment, in which production
applications are tested to ensure that the update works as expected and does
not introduce regressions. Before being rolled out into the production
environment, the updates may be tested in an intermediate staging area, where
it is subject to loads that mimic expected usage in the production environment.
§
When an
update is introduced into the production environment itself, all machines on
which the update is installed must run the updated product software at
precisely the same maintenance level. For example, the domain configuration,
product version, and patch level of Web Logic Server 9.1 used in all machines
is identical.
§
Machines
in the production environment may not obtain updates from the Internet. In
fact, the machines may not be connected to the Internet at all, and possibly
not to the same Local Area Network shared by machines that have an Internet
connection. Instead, updates are made available only from a specific location,
or set of locations, in the enterprise. And the downloading of updates to the
production machines are regulated by several business practices and procedures
140. What you will do if a virus affects your PC?
1. Disable
System Restore (Windows Me/XP).
2. Update
the virus definitions.
3. Restart
the computer in Safe mode or VGA mode.
4. Run a
full system scan and delete all the files detected by Virus..
5. Edit
the registry and look for references to the Trojan.
141. Difference between Router and Switch
• Router understands IP head, and switch deal with MAC address
• Router has its own IP address, and switch don’t
• Router has an operating system running inside, and allow
administrator to login into the system.
• You must configure routing table to make it works. Switch is usually ready to use.
• Router has routing software running inside, including route
discovery protocol.
• Routing software know how to deal with different IP packet, such
as ICMP and other IP option
functionality. Switches don’t.
• Multiple routers can be connected together as a network. But we
can’t connect multiple switches
143 Windows Registry
The Registry contains information that Windows continually
references during operation, such as profiles for each user, the applications
installed on the computer and the types of documents that each can create,
property sheet settings for folders and application icons, what hardware exists
on the system, and the ports that are being used.
144.
What is the difference between Regedit .exe and regedit32.exe?
Regedit.exe is the registration editor for 16-bit Windows. It is
used to modify the Windows registration database. The database is located in
the Windows directory as Reg.dat.
Regedt32.exe is the configuration editor for Windows NT. It is
used to modify the Windows NT configuration database, or the Windows NT
registry. This editor allows you to view or modify the Windows NT registry
145.
How to backup and restore registry?
Click start, run, Regedit and Locate and then click the sub key
that contains the value that you want to edit. On the file menu click export.
In the save in box select the location you want to save the registration
entries.
To restore registry sub keys that you exported, double-click the
Registration Entries (.reg) file that you saved. To restore the whole registry,
restore the system state from a backup.
146.
What are the five keys in windows registry?
HKEY_CURRENT_USER
|
Contains the root of the
configuration information for the user who is currently logged on. The user's
folders, screen colors, and Control Panel settings are stored here.
|
HKEY_USERS
|
Contains all the actively
loaded user profiles on the computer. HKEY_CURRENT_USER is a sub key of
HKEY_USERS
|
HKEY_LOCAL_MACHINE
|
Contains configuration
information particular to the computer
|
HKEY_CLASSES_ROOT
|
Is a sub key of
HKEY_LOCAL_MACHINE\Software. The information stored here makes sure that the
correct program opens when you open a file by using Windows Explorer
|
HKEY_CURRENT_CONFIG
|
Contains information about
the hardware profile that is used by the local computer at system startup
|
147. What is clustering and whether windows 2000 supports
clustering?
Connecting two or more
computers together in such a way that they behave likes a single computer.
Clustering is used for parallel processing, load balancing and fault tolerance
148.What
is Quorum:
A shared storage need to provide for all servers which keeps information about
clustered application and session state and is useful in FAILOVER situation.
This is very important if Quorum disk fails entire cluster will fails
149.What
is Heartbeat:
Heartbeat is a private connectivity between the servers in the cluster, which
is used to identify the status of other servers in cluster.
150.what is Active
Directory De-fragmentation
De-fragmentation
of AD means separating used space and empty space created by deleted objects
and reduces directory size (only in offline De-fragmentation)
151.Difference
between online and offline de-fragmentation
Online
De-fragmentation will be performed by garbage collection process, which runs
for every 12 hours by default which separate used space and white space (white
space is the space created because of object deletion in AD eg User) and
improves the efficiency of AD when the domain controller up and running
Offline
defragmentation can be done manually by taking domain controller into
Restoration mode. We can only reduce the file size of directory database where
as the efficiency will be same as in online defragmentation
152.What is
tombstone period
Tombstones
are nothing but objects marked for deletion. After deleting an object in AD the
objects will not be deleted permanently. It will be remain 60 days by default
(which can be configurable) it adds an entry as marked for deletion on the
object and replicates to all DC’s. After 60 days object will be deleted
permanently from all Dc’s.
153.What is ASR (Automated System Recovery) and how to
implement it
You can access the restore portion by pressing F2 when prompted in the text-mode portion of setup. ASR reads the disk configurations from the file that it creates. It restores all the disk signatures, volumes, and partitions on (at a minimum) the disks that you need to start the computer.
154. What are the
different levels that we can apply Group Policy
We
can apply group policy at SITE
level---Domain Level---OU level
155. What is Domain
Policy, Domain controller policy, Local policy and Group policy?
Domain
Policy will apply to all computers in the domain, because by default it will be
associated with domain GPO, Where as Domain controller policy will be applied
only on domain controller. By default domain controller security policy will be
associated with domain controller GPO. Local policy will be applied to that
particular machine only and effects to that computer only.
156. What is the
use of SYSVOL folder
Policies
and scripts saved in SYSVOL folder will be replicated to all domain controllers
in the domain. FRS (File
replication service) is responsible for replicating all policies and scripts
157.What is folder
redirection?
Folder
Redirection is a User group policy. Once you create the group policy and link
it to the appropriate folder object, an administrator can designate which
folders to redirect and where to do this, the administrator needs to navigate
to the following location in the Group
Policy Object: User Configuration\Windows
Settings\Folder Redirection
In
the Properties of the folder, you can choose Basic or Advanced folder
redirection and you can designate the server file system path to which the
folder should be redirected.
The %USERNAME% variable may be used as part of the redirection path, thus allowing the system to dynamically create a newly redirected folder for each user to whom the policy object applies.
The %USERNAME% variable may be used as part of the redirection path, thus allowing the system to dynamically create a newly redirected folder for each user to whom the policy object applies.
158. RIS/RAS Concepts
|
|
A server that is dedicated to handling users those
are not on a LAN but need remote access to it. The remote access server allows users to gain access to files and
print services on the LAN from a remote location. For example, a user who dials
into a network from home using an analog modem or an ISDN
connection will dial into a remote access server. Once the user is authenticated he can access shared drives and
printers as if he were physically connected to the office LAN.
159.
What is metadata?
Schema Class objects
and schema attribute objects are collectively known as metadata
160.What are the drawbacks of existing Backup?
·
It does
not support writable DVD and CD formats
·
The target
media be in a device physically attached to the system.(ie) we cannot backup data
to a tape drive attached to a remote server
161.What are the restore options?
Original location , Alternate
location, Single folder
162.What are the
media pool types?
Unrecognised : Tape
media that is completely blank
Free : Newly formatted
tape
Backup : Already
backed up
Import : Contains
media that are not catalogued
163.What are the advanced backup options?
Verify data after
backup, If possible compress data to save space, Disable Volume Shadow Copy
IIS
164.What are the advanced options in IIS?
Front page server
extension, FTP service, NNTP, SMTP
165.What is the physical path to Home directory? C:\inetpub\wwwroot
166.What is the authentication method used in IIS?
1. Anonymous authentication
2. Basic authentication
3. Digest authentication
4. Advanced digest authentication
5. Integrated windows authentication
6. Certificate authentication
7. Passport authentication
167 What are the services that run after the installation
of Symantec Antivirus?
1. SAV ROM
2. Symantec Antivirus
3. Symantec Antivirus Defenition Watcher
4. Symantec Event Manager
5. Symantec Network Drivers Service
6. Symantec Password Validation
7. Symantec Settings Manager
168.How to troubleshoot a printer?
1.Check
whether is it possible to print from other applications
2.Verify
that print client can connect to print server
3.Verify
that the printer is operational
4.verify
that the printer is accessible from print server
5.Verify
that print servers services are running
·
Commands
used for starting the printee spooler service
are Net Start Spooler and Net Stop Spooler.
169. what is Software Update Services
SUS is a client server
application that enables a server on the intranet to act as a point of
administration for updates.We can approve updates which then download and
install automatically without local administrator interaction.
169. What are the Installation requirements and steps?
SUS is not included in
the Windows CD but it is a free download from Microsoft’s website.
Installation steps
Choose file locations
Partition should be
NTFS and It needs 6 GB of free space.
It installs the
following three components
The software updates
synchronisation service which downloads the contents to the SUS server.
An IIS website that
services update requests from Automatic update clients
An SUS administration
webpagefrom which we can synchronise the SUS server and approve updates.
Administrative tasks
related to SUS are: Configuring SUS settings, synchronizing the
content, approving the content
These tasks are
performed using the SUS website. this can be accessed by navigating to http://SUS_servername/SUSAdmin.
The configuration
settings are as follows:
1.Proxy server
configuration
2.DNS name of the SUS
server
3.Content Source
4.New versions of
approved updates
5.File storage.
170.What are the SUS topologies are given below
Multiple server topology: Each SUS server synchronises content from windows update,
and manages its own list of approved updates.and each SUS server administrator
have control over that servers list of approved updates.
Strict Parent Child topology: A Parent SUS server synchronises the content from windows
update and stores update in a lcoal folder.The SUS administrator then approves
the updates.Other SUS servers synchronise from the parent and are configured.
Loose Parent/Child topology: A parent server synchronises the content from windows
update and stores update in a local folder.Other SUS servers synchronise from
parent.Unlike the strict configuration these additional SUS servers do not
synchronise the list of approved updates.so administrators of these servers can
approve or disapprove the updates independently.
Test/Production topology: This model allows an organistion to create a testing or
staging of updates.The parent SUS server downloads updates from windows update
and an administrator approves the updates to be tested.
Synchronisation can be
done in two ways: Manual Synchronization
and Automatic Scheduled Synchronisation.In case synchronisation fails it
retries after 30 minutes.
Approving updates: To approve updates for distributing to client machines
Click approve updates in the left navigation bar.If we are unsure about the
applicatbility of the patch we can click the details link.
The automatic update
client of Windows server 2003 is configured to connect automatically to the
microsoft windows update server and downlaod updates and then prompt the user
to install them.
Automatic updates support two behaviours: Automatic, Manual
If it is configured to
notify the user before downloading updates, it registers the notification of an
update in the system event log and to be logged on administrator.If an
administrator is not logged on Automatic updates wait for the user with
administrator credentials before offering notification by means of a balloon
icon in the tray.
Installation behaviour,
Notification and Automatic, We can monitor the SUS with the help of log files, Synchronisation
log, Approval log, Windows update log, Wutrack.bin
171.Explain about backing up SUS
The backup should
contain
1. The folder that contains the SUS content
2. The SUS administration website
3. IIS metabase
First backup the
metabase –an XML database containig the configuration of IIS.Using the IIS-MMC
snap in select all tasks, then backup/restore configuration .Click create
backup.then backup the following using Ntbackup
The default website
located at C;/inetpub/wwwroot
The SUS administration
website
The metabase backup
directory.
Maximum number of
users in a group =5000
Architectural limit
of Objects in a forest=2^32
Maximum number of
groups per user =32
Active Directory
service Functionality
Organise,
manage and control resources
Single
point of administration
172.Active
Directory supported technologies are given below
·
TCP/IP
·
DHCP
·
DNS
·
SNTP
·
LDAP
·
Kerberos
173.What is the physical structure of Active Directory? Sites , Domain Controllers
174.What is the logical structure of Active Directory? Domains, OU’s, Trees and Forests
175.What are the
Specific Domain Controller roles? Global catalogue, Operation
Masters
176.When you need
to modify schema?
- When we use
active directory schema to create, modify or deactivate classes or
attributes.
- Write scripts
to automate the schema modification
- Install
software applications that add classes or attributes
177.Is it possible to have two schema masters in a forest? - No.
178.Is it possible to apply GPO to a forest? - Yes.
179.Is it possible to apply Group Policies to a forest?: Basically in Windows 2000 and
2003 it is possible to create a group policy object that can be used anywhere
in the forest. Group policy settings are linked to
Coputers,sites ,domains and OU’s.
180.What is the Maximum size of pst file ? - 2
GB.
181.What is the default size of pst file? - 32
KB (Office 2000)
182. What are Lingering
Objects?
When you
restore AD from an expired
backup, a lingering object is a deleted AD object that re-appears (“lingers”)
on the restored domain controller (DC) in its local copy of Active Directory.
This can happen if, after the backup was made, the object was deleted on
another DC more than than 60 (or 180) days ago.When a DC deletes an object it replaces the object with a tombstone object. The tombstone object is a placeholder that represents the deleted object. When replication occurs, the tombstone object is transmitted to the other DCs, which causes them to delete the AD object as well.
Tombstone objects are kept for 60 (or 180) days, after which they are garbage-collected and removed.
If a DC is restored from a backup that contains an object deleted elsewhere, the object will re-appear on the restored DC. Because the tombstone object on the other DCs has been removed, the restored DC will not receive the tombstone object (via replication), and so it will never be notified of the deletion. The deleted object will “linger” in the restored local copy of Active Directory.
183.How to Remove
Lingering Objects
Windows
Server 2003 has the ability to manually remove lingering objects using the repadmin
console utility from the Windows Server 2003 Support Tools, located on the
Windows Server CD. Use the option /removelingeringobjects. See below for
more information.
184. What is the difference between multicast and
broadcast?
Broadcast: To all
connected recipients
Multicast: To the
designated recepients
185. What are the object data problems you will face in
active directory?
1) Lingering Objects:
If
a domain controller remains disconnected for a longer period than the tombstone
lifetime, an object that has been deleted from the directory can remain on the
disconnected domain controller. For this reason, such objects are called
"lingering objects.
2) Lost objects:
If
an object is created on one domain controller, and the container in which it
was created is deleted on another domain controller before the object has a
chance to replicate, it becomes a lost object. Lost objects are automatically
placed in a domain container where you can find them and either move or delete
them.
Troubleshooting
Lost Domain Objects
In some
cases, an administrator might create or move an object into a container on one
domain controller and another administrator might delete that same container on
a different domain controller before the object is replicated. In such cases,
the object is added to the LostAndFound container for the domain. The
LostAndFoundConfig container in the configuration directory partition serves
the same purpose for forest-wide objects.
1)
Object name conflicts:
If an object is created on
one domain controller and an object with the same name is created in the same
container on another domain controller before replication occurs, it creates an
object name conflict. Active Directory automatically changes the relative
distinguished name of the object with the earlier timestamp to a unique
name. Active Directory supports multi
master replication of directory objects between all domain controllers in the
domain. When replication of objects results in name conflicts (two objects have
the same name within the same container), the system automatically renames one
of these accounts to a unique name. For example, object ABC is renamed to be
*CNF:guid, where "*" represents a reserved character,
"CNF" is a constant that indicates a conflict resolution, and "guid"
represents a printable representation of the objectGuid attribute value.
186.What is RPC?
RPC is a
powerful technique for constructing distributed, client-server based
applications. It is based on extending the notion of conventional, or local
procedure calling, so that the called procedure need not exist in the same
address space as the calling procedure. The two processes may be on the same
system, or they may be on different systems with a network connecting them. By
using RPC, programmers of distributed applications avoid the details of the
interface with the network. The transport independence of RPC isolates the
application from the physical and logical elements of the data communications
mechanism and allows the application to use a variety of transports.
187.What is a Service Pack?
Service pack is a
consolidate package of critical updates, security rollups, hit fixes, driver
updates, and feature enhancements.
188.Explain ATA,SATA,SCSI
ATA is Advanced Technology Attachment: It is used for connecting
storage devices such as Hard disk and CD ROM.
SATA : Serial Advacned Technology attachment.
It defines cables using 7 conductors.(of which 4 are
active data lines).They are easier to fit and do not obstruct the air cooling
but chances of accidental unplugging of the cable is more compare to PATA.It
also specifies a new power connector.
The Accelerated Graphics Port (also
called Advanced Graphics Port, often shortened to AGP) is a
high-speed point-to-point channel for attaching a graphics card
to a computer's motherboard, primarily to assist in the
acceleration of 3D computer graphics.
Some motherboards have been built with multiple independent AGP slots
The Peripheral Component Interconnect,
or PCI Standard (in practice almost always shortened to PCI)
specifies a computer bus for
attaching peripheral
devices to a computer motherboard. These devices can take any one of
the following forms
SCSI
(Small
Computer System Interface) is a set of standards for physically connecting and
transferring data between computers and peripheral devices. The SCSI standards define commands, protocols,
and electrical
and optical interfaces.
SCSI is most commonly used for hard disks and tape drives, but it can connect a wide range of
other devices, including scanners, printers, and optical drives (CD, DVD, etc.).
189.Run menu Commands
- Add Hardware Wizard - hdwwiz.cpl
- Add/Remove Programs - appwiz.cpl
- Administrative Tools - control
admintools
- Automatic Updates - wuaucpl.cpl
- Certificate Manager - certmgr.msc
- Clipboard Viewer - clipbrd
- Computer Management - compmgmt.msc
- Date and Time Properties -
timedate.cpl
- Device Manager - devmgmt.msc
- Direct X Troubleshooter - dxdiag
- Disk Cleanup Utility - cleanmgr
- Disk Defragment - dfrg.msc
- Disk Management - diskmgmt.msc
- Disk Partition Manager - diskpart
- Display Properties - control desktop
- Driver Verifier Utility - verifier
- Event Viewer - eventvwr.msc
- Folders Properties - control folders
- Internet Connection Wizard - icwconn1
- Internet Explorer - iexplore
- Internet Properties - inetcpl.cpl
- Local Security Settings - secpol.msc
- Local Users and Groups - lusrmgr.msc
- Logs You Out Of Windows - logoff
- Malicious Software Removal Tool - mrt
- Network Connections - control
netconnections
- Network Connections - ncpa.cpl
- Network Setup Wizard - netsetup.cpl
- Outlook Express - msimn
- Performance Monitor - perfmon
- Phone and Modem Options - telephon.cpl
- Regional Settings - intl.cpl
- Registry Editor - regedit32
- Remote Desktop - mstsc
- Removable Storage - ntmsmgr.msc
- Removable Storage Operator Requests -
ntmsoprq.msc
- Resultant Set of Policy (for xp
professional) - rsop.msc
- Shared Folders - fsmgmt.msc
- Shuts Down Windows - shutdown
- Sounds and Audio - mmsys.cpl
- System Configuration Editor - sysedit
- System Information - msinfo32
- System Properties - sysdm.cpl
- Task Manager - taskmgr
- Wordpad - write
191.Explain Terminal Services.
Terminal
Services or Terminal Server Edition (TSE)
is a component of Microsoft Windows
operating systems (both client and server versions) that allows a user to
access applications or data stored on a remote computer over a network
connection. Terminal Services is Microsoft's take on server centric
computing. Based on the Remote Desktop
Protocol (RDP), Terminal Services was first introduced in Windows NT 4.0 (Terminal Server Edition). The
products Windows 2000 Server, Windows 2000
Advanced Server, Windows 2000
Datacenter Server and Windows Server 2003
have introduced several improvements and new features. Microsoft used Terminal
Services in Windows XP to allow someone to assist the user (Remote
Assistance) and to allow a user to take control of his/her computer
remotely (Remote Desktop). Remote Assistance works in all
editions of Windows XP, while Remote Desktop requires Professional Edition
or Media Center Edition 2005 or earlier.
Microsoft provides the
client software Remote Desktop Connection
(formerly called Terminal Services Client), available for most 32-bit versions of their Windows operating systems and Apple's Mac OS X, that allows a user to connect to a
server running Terminal Services. Third-party developers have created client
software for other platforms, including the open source rdesktop client for common Unix
platforms. Both Terminal Services and Remote Desktop
Protocol use TCP port 3389 by default,
which is editable in the Windows registry.
User must be a member
of Administrator or Remote desktop users grou to successfully connect to the
server using Remote desktop administration. Service Packs Service
Packs are consolidation of critical updates,security
roll ups,hot fixes,driver updates and feature enhancements.
192.Explain
about Configure Your Server Wizard
If we select Typical configuration For a first server “Configure
your server wizard”will promote the server to a domain cpntroller in a new
domain,installs active directory services and if neededDNS,DHCP adnd Routing
and Remote access services.
If we select Custom Configuration the configure your server wizard can configure
the following roles.
1.File Server: Disk quota management,Indexing services.
2.Print Server
3.Application Server: IIS 6.0,ASP.NET,and COM+
4.Mail Server:POP3,SMTP
5.Terminal Server
6.Domain controller
7.DNS Server
8.DHCP Server
193. Automated
System recovery Wizard
Automated System recovery
wizard is a new feature in windows server 2003 that replaces Emergency repair
disk feature of previous versions of Windows.
The prompt will be displayed to press F2 at the time of booting
from CD to continue with ASR.
During Set up of Windows server 2003 we need to press F8 to accept
the Licence agreement.
- Manage
your server :Administrative tools
The default account
policies in Windows server 2003 domain set the default policy requires complex
passwords that have min 7 characters.Also the password must contain 3 of 4 character
types.Uppercase,lowercase,numeric,non-alpha numeric.
194 MMC’s
What is a MMC?
That provides a standardized, common interface for one or more
applications, called snap ins,that is used to configure the elements of the
environment.
MMC consoles run on Server 2003, 2000, NT4, XP and 98.
There are two type of snap-ins
Stand alone : they are provided by the developer of an
application.
Extension snap ins : are designed to work with one or more stand
alone snap ins based on the functionality of the stand alone.
2 modes:Author mode(Default) and User mode:
Author mode : Enable full access to all of the MMC functionality
includes.
Adding or removing snap ins
Creating windows
Saving consoles etc
User modes:
If we are planning to distribute an MMC with specific functions
you can set the desired user mode then save the console.
Terminal Services trouble shooting
1. Network failure
2. DNS failure
3. Terminal services port in client machine is mis configured
4. Credentials
5. Policy
6. Too many concurrent connections.
195. How
many simultaneous connections are possible to terminal server running in the
remote administration mode?
Three. Two remote
connections and one at the console.
196.Tell
me about Password Policies
1.Enforce password history: When this policy is enabled
the active directory maintains a list of recently used passwords and will not
allow a user to create a password that matches a password in that history.the
users wont be able to use the same password while changing the password.The maximum
value is 24 and many organizations use 6 to 12.
2.Maximum Password Age : This policy determines when
users will be forced to change their password.Passwords that are unchanged or
infrequently changed are more vulnerable to attacks.The default is 42 days
.Most of the companies set it as 30 to 90 days.
3.Minimum Password age: This policy prevents the frequent change of
password Specified number of days must pass between password changes. Of course
a password can be reset at any time in Active Directory by an administrator or
support person with sufficient permissions.
4.Minimum Password length: In Windows 2003 default is 7
characters.
5.Complexity requirements.
The default password filter in windows 2003 (Passfilt.dll)requires
a password
1. Is not based on user account name
2. at least 6 characters long
3. Contains uppercase,
lower case, numeric ,special character
1. Account lock out policy
After several logon attempts system assumes that the hacker is
trying different passwords and it will trigger the account lock out,
2 .Account lockout threshold: This configures the no
of invalid logon attempts, Value is 0 to 999. A value of 0 will result in
accounts never being locked out.
3 .Account lockout duration
This policy determines the period of time that must pass after a
lock out before active directory will automatically unlock a user’s account.
Ranges from 0 99999minutes.But normally 5 to 15 minutes is enough.
Windows 95, 98 and ME supports only 14 characters and Windows
2000, XP Professional, 2003 support 127 characters,
Active Directory client can be downloaded from Microsoft website
and to participate in many active directory features available to other
operating systems such as Site awareness
ADSI, Dfs
197.what
are the modifications that can be done to a user account
1. Disabling and enabling a user account
2. Deleting a user
3. Renaming a user: - We will rename a user if the user changes
their name or replacing that user with a user who want to maintain the same
rights, permissions, group memberships and most of the user properties of the
previous user.
198.How
to set password policy?
1. Open AD users and computers.
2. Select domain node
3. From the action menu choose properties
4. On the group policy tab select default domain policy and then
click edit.
5. Navigate to computer configuration, Windows settings, Security
settings, Account policies and finally account lock out policy.
199. GROUPS
Windows server 2003 has two group types.Security and distribution.
Security groups are used to assign permissions for access to
network resources
Distribution groups are used to combine users for E-mail
distribution lists.Security groups can be added as a distribution groups but distribution groups
cannot be used as security groups
200. What
is group scope?
Group scope defines how permissions are assigned to the group members.
Windows Server 2003 groups, both security and distribution groups are
classifieds into one of three group scopes.
- Domain
local
- Global
- Universal.
Local groups
Local are used primarily for backward compatibility with Windows
NT4.Domain controllers do not use local groups.
Local groups can include members from any domain within a forest.
The local group has only machine wide scope. It can grant
permissions only on the machine on which it exists.
Domain local groups
Domain local groups are used primarily to assign access
permissions to global groups for local domain resources.
Exists in all mixed ,native and interim afunctional level domains
and forests.
Can be used to grant resource permission for members on the domain
in which the group exists.
Global groups
Global groups are used primarily to provide categorized member
ship in domain local groups for individual security principals or for direct
permission assignment.
Can only include members from within their domain
Can be granted permission in any domain, Can contain global
groups.
Universal groups
Used primarily to grant access to resources in all trusted domains
but can be used only as security principals.
Universal groups can include members from any domain in the
forest.
In windows 2000 native or Windows server 2003 domain functional
level, universal groups can be granted permissions in any domain, including
domains in other forests with which a trust exists.
Group conversion
In windows 2000 native or windows server 2003 domain fuctional
level domain,domain local and global groups can be converted to universal
groups if the groups are not members of other groups of the same scope
Special identities
There are some special groups called special identities,that are
managed by operating system.The special identities cant be created or
deleted.nor can their memberships modified by administrators.Special identities
do not appear in the acitive directory users and computers snap in or in any
other computer management tool.But can be assigned permissions in an ACL.
Everyone: Represent all network users including guest and users from other
domains. When ever a user logs on to the network the user is automatically
added to everyone group.
Network: represents users currently accessing a given resource over the network.
Whenever a user accesses a given resources over the network, the user is
automatically added to the network group.
Interactive: Represents all users currently logged into
a particular computer and accessing a given resource located on that computer.
Anonymous logon: Any user who uses network
resource but didn’t go through authentication process.
Authenticated users: It includes all users who are
authenticated into the network by using a valid user account. When assigning
permissions we can use the authenticated users group in place of everyone group
to prevent anonymous access to resources.
Creator owner: It represents the user who created or who
took owner ship of the resource
|
Dsget user UserDN –member of [-expand]
|
No comments:
Post a Comment