Interview System Admin

download Interview System Admin

of 16

Transcript of Interview System Admin

  • 7/28/2019 Interview System Admin

    1/16

    System Administrator Interview Questions & Answers

    Section 1: Hardware & Networking

    1. What are the reasons for Blue Dump error?*

    . 1. Failure of the compatibility of hardware and software.

    2. Running no of programs at a time.

    3. Windows registry issues.

    4. Viruses and Spyware activities.

    2. What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?**

    10Base2An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses

    baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2

    segments.

    10Base5An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses

    baseband signaling, with 5 continuous segments not exceeding 100 meters per segment.

    10BaseTAn Ethernet term meaning a maximum transfer rate of 10 Megabits per second that usesbaseband signaling and twisted pair cabling.

    3. What are the Booting files in XP & Windows 7?*In windows XP:

    1. NTLDR, 2.BOOT.IN 3.BOOTSECT.DOS 4.NTDETECT.COM 5.NTBOOTDD.SYS

    6.NTOSKRNL.EXE 7.WIN.COM 8.HAL.DLL

    In windows 7:

    1. OOTMGR 2.BCD 3.BOOTMGR 4.WINLOAD.EXE 5.NTOSKRNL.EXE 6.WIN.COM

    7. HAL.DLL

    4. What is Private IP Address & IP Ranges?*

    It is a non-routable IP address which is not used in Internet.

    Ranges are:

    10.0.0.0 - 10.255.255.255

    172.16.0.0 - 172.31.255.255

    192.168.0.0 - 192.168.255.255

    5.How would you Start or Stop a Windows Service?*

    Logon to Windows with Administrator rights.

    Click Start > Control Panel.

    Double-click Administrative Tools.

    Double-click the Services icon.

    Double-click the service that you want to stop or start.

    (OR) StartRunservices. mscEnter

  • 7/28/2019 Interview System Admin

    2/16

    When the Service Properties window appears do one of the following:

    * If the service is running, click Stop the service.

    * If the service is not running, click Start the service.

    Click OK.

    6.Where are the Temp files located and how would you remove them?*

    There are three different places that you can find temporary files on your computer. They are

    located in different place in Windows Vista and Windows Xp. In Windows Vista there are three file

    paths below to follow to view the temporary files.

    C:\Users\Username\AppData\Local\Temp (%temp)

    C:\Windows\Temp (temp)

    C:\Users\Username\AppData\Local\Microsoft\Windows\Temporary Internet Files

    7. What is Safe Mode?*

    Safe mode is an alternate boot method for Windows operating systems that makes it easier to

    diagnose problems. The only startup programs loaded are the operating system and drivers for the

    mouse, keyboard, and display modes display. It is often possible to get a system to start in safe

    mode when it won't start normally. To start in safe mode, press the F8 key while the system is

    booting and select "safe mode" (or the safe mode option you want) from the menu that appears.

    8. What is MSConfig? Explain about it.*

    Msconfig.exe is a file which helps to edit and administer text configuration files such as win.ini and

    autoexec.bat.Msconfig is used to control what programs and services start with your computer. Its vhelpful in troubleshooting startup problems as well as poor performance and getting rid of spyware a

    viruses.

    9.What would you do if your system is running slow?*

    1. Empty Recycle Bin.

    2. Empty Windows Temp folder.

    3. Run Scandisk.

    4. Run Defragmenter.

    5. Full System Virus scan.

    10. What is the port value of: RDP, DNS, SMTP, POP3, SQL, IMAP, and GC? **

    RDP -3389, DNS - 53, SMTP - 25, POP3 - 110, SQL - 1433, IMAP 143, GC 3268

  • 7/28/2019 Interview System Admin

    3/16

    11. What is the difference between MS outlook & MS outlook Express?

    MS outlook

    All files will be saved in *.pst format

    Having some additional features like Address book, Contact, Reminder.

    MS outlook Express

    File will be saved *.DBX

    Dont have any additional features

    12. How to create a PST File in MS outlook 2010?

    Open OutlookFileAccount Settings Data FilesAddthen OK

    13. How do you block the web site from local machine?

    1. Open the Operating system Drive with Administrator account (c drive)

    2. Open C:\windows\system32\driver\etc\hosts

    3. Edit hosts file

    4. Type 127.0.0.1www.websitename.comthen save it.

    14. What is a firewall?

    A firewall is software or hardware that checks information coming from the Internet or a

    network, and then either blocks it or allows it to pass through to your computer, depending

    on your firewall settings.

    A firewall can help prevent hackers ormalicious software(such as worms) from gaining

    access to your computer through a network or the Internet. A firewall can also help stopyour computer from sending malicious software to other computers.

    15. Difference between domain and workgroup?

    Domain Work Group

    1. Centralized network model Decentralized network

    2. Domain is controlled by DC Control No centralized

    3. Centralized login Local login

    4. Centralized user database local user data based

    http://www.websitename.com/http://www.websitename.com/http://www.websitename.com/http://mshelp//windows/?id=85b8c3e6-28c4-464d-b883-7764d16f54a2#gtmt_malicious_software_defhttp://mshelp//windows/?id=85b8c3e6-28c4-464d-b883-7764d16f54a2#gtmt_malicious_software_defhttp://mshelp//windows/?id=85b8c3e6-28c4-464d-b883-7764d16f54a2#gtmt_malicious_software_defhttp://mshelp//windows/?id=33a9d478-ea9c-4bf3-83da-96819d601bf2#gtmt_worm_defhttp://mshelp//windows/?id=33a9d478-ea9c-4bf3-83da-96819d601bf2#gtmt_worm_defhttp://mshelp//windows/?id=33a9d478-ea9c-4bf3-83da-96819d601bf2#gtmt_worm_defhttp://mshelp//windows/?id=85b8c3e6-28c4-464d-b883-7764d16f54a2#gtmt_malicious_software_defhttp://www.websitename.com/
  • 7/28/2019 Interview System Admin

    4/16

    Section II: Windows Active Directory

    1. What is Active Directory? **

    Active directory is the hierarchical database. It stores all the Information about network

    resources, which makes the resources accessible to users and computers. It helps to centrally

    manage, Organize & control access to resources.

    It includes Groups, users, computers, printers servers, domains.

    2. Explain About ADS Data Base: **

    1. Ntds.dit: This is the main database file for active directory.

    2. Edb.log: When a transaction performed to ad database, like writing some data first the

    data will be stored to this file. And after that it will be sent to database. So the system

    performance will be depends on how this data from edb.log file will be written to ntds.dit

    3. res1.log: Used as reserve space in the case when drive had low space. It is basically 10MB

    in size and crated when we run dcpromo.

    4. Res2.log: Same as res1.log. It is also 10MB in size and the purpose also same.

    5. Edb.chk: This file records the transactions committed to ad database. During shutdown,shutdown statement is written to this file. If it is not found when the system rebooted, the

    ad database tries to check with edb.log for the updated information.

    3. What are the Roles used in Active Directory? ***

    1. Schema master (forest wide):

    The Schema Master controls all updates to the Schema within the forest.

    2. Domain Naming Master (forest wide):

    The Domain Naming Master role is responsible for the creation and deletion of domains in

    the forest.

    3. PDC Emulator (domain wide):

    The PDC emulator role provides backwards compatibility for Windows NT backup domain

    controllers (BDCs), the PDC emulator advertises itself as the primary domain controller for

    the domain. It also acts as the domain master browser and maintains the latest password for

    all users within the domain.

    4. Infrastructure Master (domain wide):

    The Infrastructure Manager role is responsible for updating references from objects within

    its domain with objects in other domains.

    5. RID Master (domain wide): The RID Master manages the Security Identifier (SID) for every

    object within the domain.

  • 7/28/2019 Interview System Admin

    5/16

    4. How to verify the ADS Installation? **

    1. Verifying the SRV records in DNs.

    2. Verifying the SYSVOL,Database & Log files folders.

    5. What is DNS (Domain Name Service) **

    Domain NameSystem (DNS) servers maintain a distributed database used to translate computer

    names to Internet Protocol (IP) addresses on Transmission Control Protocol/Internet Protocol(TCP/IP) networks which includes the internet.

    There are two different types of DNS lookup

    1. Forward Look up

    2. Reverse Look Up

    Forward lookup query resolves a DNS name to an IP address and is the most common DNS query.

    Reverse lookup query resolves an IP address to a name.

    A DNS name server can resolve a query only for a zone for which it has authority. When DNS

    servers receive a resolution request, they attempt to locate the requested information in

    their own database.

    6. What are the Records in DNS? ***

    NS Record:

    Name serverAll the servers that are listed in the NS record are stated as the authoritative

    name servers for a particular domain.

    MX Record:

    MX record is considered as the Mail Exchange Record. This MX record states the location where

    the mail is being sent. Apart from IP address MX records contains fully qualified domain names.

    A Record:

    A record is the Address Record. This assigns an IP address for a domain or a subdomain name.

    Usually A record will be an IP address.

    CNAME Record:Canonical Name Record makes one domain name as an alias of another domain name. Usually

    the aliased domain acquires all the subdomains and DNS record of the original domain. CNAME

    redirects request to another record. CNAME will be fully qualified domain name.

    TXT Record:

    TXT Record allows inserting arbitrary text into a DNS record. These TEXT Record adds SPF

    records to a domain.

    TIL Record:

    TIL is nothing but Time to Live. This TIL value sets the tenure of information which will be good

    when a recursive DNS server queries for your domain name information Usually the value is set

    in seconds.SOA Record:

    This State of Authority record specifies the DNS server that provides authoritative information

    about the domain name, domain administrator email, domain serial number, along with several

    timers in relation to refreshing the zone.

  • 7/28/2019 Interview System Admin

    6/16

    7. Different types of Groups in AD 2003? ***

    Domain Local Group

    Domain Local groups can only be used in the domain in which they were created. A Domain

    Local group allows membership from any other group as well as any user or computer. Domain

    Local groups from other domains cannot be used as members because they are limited in their

    use outside of the domain in which they were created. Universal groups can only be used as

    members when the Universal group exists in the same forest as the Domain Local group.

    Global Group

    Global groups have the most restrictive membership requirements, only allowing users,

    computers, and other Global groups from the same domain to be used as members. However,

    Global groups can be used as members of any other group, including other forest and external

    domains. This means a Global group has the most restrictive membership requirements of all

    the groups but is the most flexible when being used as members of other groups.

    Universal Group

    the Universal group is replicated via the global catalog server. For this reason, it is available to

    any domain in the forest but not to other forests or external domains. Since the Universal groupis available forest wide, it does not allow Domain Local groups to be members even when the

    Universal group has been created in the same domain as the Domain Local group.

    8. What is RAID? Explain about Raid 1 & 5 Model. **

    RAID is a technology of grouping disk in order to provide more space and redundancy. There are

    total 54 RAID method. Windows 2003 support RAID 0, 1& 5.

    RAID-1:

    1. Min. and max. 2 hard disk

    2. If anyone disk fails data can be recovered from other disk.

    3.50% space wastage.

    4. No read/write performance improvement.

    5. Good for storing Operating system.

    RAID-5:

    1. Data is stored in distributed format across the entire disk

    2. Min 3 max. 32

    3. If anyone disk fails data can be recovered using parity.

    4. Parity space wastage e.g. Parity = total space \ no of disk.

    5. Good for storing data.

    9.What is DHCP DORA process? **

    1. Discover: Client sends the request for IP.

    2. Offer: DHCP server send & offer with IP address.

    3. Request: If client accept the IP it sends a request to DHCP.

    4. Acknowledgement: DHCP server sends Ack for the same.

  • 7/28/2019 Interview System Admin

    7/16

    10. What are the different types of profile? **

    1. Local Profile: stored on local machine where the user log on. User gets different profile

    when he logs on to different machine.

    2. Roaming Profile: Stored in shared folder of server. User gets same profile when he

    logs on to different machine. User can modify his profile.

    3. Mandatory profile: Stored in shared folder of server. User gets same profile when he

    logs on to different machine. User cannot modify his profile.

    11.What is domain controller? **

    A Domain controller (DC) is a server that responds to security authentication requests

    (logging in, checking permissions, etc.) within the Windows Server domain. A domain is a concept

    introduced in Windows NT whereby a user may be granted access to a number of computer

    resources with the use of a single username and password combination.

    12. What is REPADMIN? **

    This command-line tool assists administrators in diagnosing replication problems between

    windows domain conrollers. Administrators can use Repadmin to view the replication topology as

    seen from the perspective of each domain contrsoller.

    13.You want to standardize the desktop environments (wallpaper, My Documents, Start menu,

    printers etc.) on the computers in one department. How would you do that? **

    1. Go to Start->programs->Administrative tools->Active Directory Users and Computers

    2. Right Click on Domain->click on properties

    3. On New windows Click on Group Policy

    4. Select Default Policy->click on Edit on group Policy console go to User Configuration-Administrative Template->Start menu and Taskbar Select each property you want to modify and do

    the same.

    14.What is a Stub zone and what is the use of it.

    Stub zones are a new feature of DNS in Windows Server 2003 that can be used to streamline

    name resolution, especially in a split namespace scenario. They also help reduce the amount of DNS

    traffic on your network, making DNS more efficient especially over slow WAN links.

    15.What is Domain Policy, Domain controller policy, Local policy and Group Policy?

    Domain Policy will apply to all computers in the domain, because by default it will be

    associated with domain GPO.

    Domain controller policy will be applied only on domain controller. By default domain

    controller security policy will be associated with domain controller GPO.

    Local policy will be applied to that particular machine only and effects to that computer only.

  • 7/28/2019 Interview System Admin

    8/16

    16. What is PPTP protocol for VPN in windows 2003?

    Point-to-Point-Tunneling Protocol (PPTP) is a networking technology that supports

    multiprotocol virtual private networks (VPN), enabling remote users to access corporate networks

    securely across the Microsoft Windows NT Workstation, Windows 95, and Windows 98 operating

    systems and other point-to-point protocol (PPP)-enabled systems to dial into a local Internet service

    provider to connect securely to their corporate network through the Internet.

    17. What are the additional tools found after installing a DC?

    1. Active Directory User and Computers,

    2. Active Directory Sites and Services,

    3. Active Directory Domain & Trust,

    4. Domain Controller Security Policy,

    5. Domain Security Policy

    18. What are some of the new tools and features provided by Windows Server 2008?

    Windows Server 2008 now provides a desktop environment similar to MicrosoftWindows Vista and includes tools also found in Vista, such as the new backup snap-in and

    The Bit Locker drive encryption feature. Windows Server 2008 also provides the new IIS7

    Web server and the Windows Deployment Service.

    19.How do you deal with Group Policy inheritance issues?

    GPOs are inherited down through the Active Directory tree by default. You can block the

    Inheritance of settings from up line GPOs (for a particular container such as an OU or a local

    Computer) by selecting Block Inheritance for that particular object. If you want to enforce a

    Higher-level GPO so that it overrides directly linked GPOs, you can use the Enforce

    Command on the inherited (or up line) GPO.

    20.What System State data contains?

    1. Contains Startup files,

    2. Registry

    3. Com + Registration Database

    4. Memory Page file

    5. System files

    6. AD information

    7. Cluster Service information

    8. SYSVOL Folder

  • 7/28/2019 Interview System Admin

    9/16

    Section III: System Test:

    1. How to Install the IIS in windows 7 Operating System:

    Install IIS 7 or Above

    1. To open the Windows Features dialog box, click Start, and then click Control Panel.

    Figure 1: Windows Vista Start menu

    http://i1.iis.net/media/7187748/installing-iis-on-windows-vista-and-windows-7-707-image002.jpg?cdn_id=2013-05-01-001
  • 7/28/2019 Interview System Admin

    10/16

    2. In the Control Panel, clickPrograms.

    Figure 2: Control Panel Home

    3. Click Turn Windows features on or off.

    Figure 3: Control Panel install options

    http://i2.iis.net/media/7187736/installing-iis-on-windows-vista-and-windows-7-707-image004.jpg?cdn_id=2013-05-01-001http://i3.iis.net/media/7187742/installing-iis-on-windows-vista-and-windows-7-707-image003.jpg?cdn_id=2013-05-01-001http://i2.iis.net/media/7187736/installing-iis-on-windows-vista-and-windows-7-707-image004.jpg?cdn_id=2013-05-01-001http://i3.iis.net/media/7187742/installing-iis-on-windows-vista-and-windows-7-707-image003.jpg?cdn_id=2013-05-01-001
  • 7/28/2019 Interview System Admin

    11/16

    4. You may receive the Windows Security warning. Click Allow to continue. The Windows Features dialog

    box is displayed.

    Figure 4: Windows Security dialog box

    5. Expand Internet Information Services. Additional categories of IIS features are displayed.

    Select Internet Information Services to choose the default features for installation.

    Figure 5: Windows Features dialog box - IIS

    http://i2.iis.net/media/7187724/installing-iis-on-windows-vista-and-windows-7-707-image006.jpg?cdn_id=2013-05-01-001http://i3.iis.net/media/7187730/installing-iis-on-windows-vista-and-windows-7-707-image005.jpg?cdn_id=2013-05-01-001http://i2.iis.net/media/7187724/installing-iis-on-windows-vista-and-windows-7-707-image006.jpg?cdn_id=2013-05-01-001http://i3.iis.net/media/7187730/installing-iis-on-windows-vista-and-windows-7-707-image005.jpg?cdn_id=2013-05-01-001
  • 7/28/2019 Interview System Admin

    12/16

    6. Expand the additional categories displayed, and select any additional features you want to install, such

    as Web Management Tools.

    Figure 6: Windows Features dialog box - IIS feature selection

    7. If you are installing IIS for evaluation purposes, you may want to select additional features to install.

    Select the check boxes for all IIS features you want to install, and then click OK to start installation.

    http://i3.iis.net/media/7187712/installing-iis-on-windows-vista-and-windows-7-707-image008.jpg?cdn_id=2013-05-01-001http://i3.iis.net/media/7187718/installing-iis-on-windows-vista-and-windows-7-707-image007.jpg?cdn_id=2013-05-01-001http://i3.iis.net/media/7187712/installing-iis-on-windows-vista-and-windows-7-707-image008.jpg?cdn_id=2013-05-01-001http://i3.iis.net/media/7187718/installing-iis-on-windows-vista-and-windows-7-707-image007.jpg?cdn_id=2013-05-01-001
  • 7/28/2019 Interview System Admin

    13/16

    Figure 7: Windows Features dialog box - Installation selection

    8. The progress indicator appears.

    Figure 8: Progress indicatorWhen the installation completes, the Windows Features dialog box closes, and the Control Panel is

    displayed.

    Figure 9: Control Panel Home page

    10. IIS is now installed with a default configuration on Windows Vista or Windows 7. To confirm that the

    installation succeeded, type the following URL into your browser,http://localhost.

    http://localhost/http://localhost/http://localhost/http://i3.iis.net/media/7187700/installing-iis-on-windows-vista-and-windows-7-707-image010.jpg?cdn_id=2013-05-01-001http://i1.iis.net/media/7187706/installing-iis-on-windows-vista-and-windows-7-707-image009.jpg?cdn_id=2013-05-01-001http://i3.iis.net/media/7187700/installing-iis-on-windows-vista-and-windows-7-707-image010.jpg?cdn_id=2013-05-01-001http://i1.iis.net/media/7187706/installing-iis-on-windows-vista-and-windows-7-707-image009.jpg?cdn_id=2013-05-01-001http://localhost/
  • 7/28/2019 Interview System Admin

    14/16

    Figure 10: Default Web site11. Next, you can use Internet Information Services Manager to manage and configure IIS. To open IIS Manager,

    click Start, typeinetmgr in the Search Programs and Files box, and then press ENTER.

    Figure 11: Default Web Site Home pageIf you want to use ASP, Microsoft ASP.NET, or PHP, install the modules needed to host these pages; this can be

    done during the installation of IIS or after the installation is complete.

    http://i3.iis.net/media/7187688/installing-iis-on-windows-vista-and-windows-7-707-image012.jpg?cdn_id=2013-05-01-001http://i2.iis.net/media/7187694/installing-iis-on-windows-vista-and-windows-7-707-image011.jpg?cdn_id=2013-05-01-001http://i3.iis.net/media/7187688/installing-iis-on-windows-vista-and-windows-7-707-image012.jpg?cdn_id=2013-05-01-001http://i2.iis.net/media/7187694/installing-iis-on-windows-vista-and-windows-7-707-image011.jpg?cdn_id=2013-05-01-001
  • 7/28/2019 Interview System Admin

    15/16

    2. How to create a FTP account & Permissions?

    I. Create FTP User

    1. Log into Windows 2003 Server using MS Terminal Service or login from local.

    2. Right Click "My Computer", choose "Manage"

    3. Expand the "Computer Management" console: Local > Local Users and Groups > Users

    4. Right Click on "Users", Add Users

    II. Create FTP Virtual Directory

    1. Open IIS 6.0

    2. Expand IIS Console Local > FTP Sites > Default FTP Site

    3. Right Click on "Default FTP Site", new virtual directory

    4. Enter "Alias" name, put it as exactly the same as the username you have just created and click

    Next.

    5. Browse to the directory where you wish to allow this FTP user to access to.

    6. Click next, enable "Read" and "Write" privileges.

    7. Click Finish

    III. Create Permissions on FTP Folder

    1. Right click on your FTP folder and add the FTP user you have just created above to this folder.

    2. Enable full permissions or any permission set you wish to create.

    Done!

  • 7/28/2019 Interview System Admin

    16/16

    3.