System Admin Interview questions

51
1) What is Active Directory? A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments. For example we can create, manage and administrator users, computers and printers in the network from active directory. 2) What is DNS? Why it is used? What is “forward lookup” and “reverse lookup” in DNS? What are A records and mx records? DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request. Forward lookup: Converting names to IP address is called forward lookup. Reverse lookup: Resolving IP address to names is called reverse lookup. ‘A’ record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of which DNS can find out the IP address of a name. ‘MX’ Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is also found in DNS. 3) What id DHCP? Why it is used? What are scopes and super scopes? DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy. Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network. Superscope: When we combine two or more scopes together its called super scope. 4) What are the types of LAN cables used? What is a cross cable? Types of LAN cables that are in use are “Cat 5″ and “Cat 6″. “Cat 5″ can support 100 Mbps of speed and “CAT 6″ can support 1Gbps of speed. Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.

Transcript of System Admin Interview questions

Page 1: System Admin  Interview  questions

1) What is Active Directory?A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments. For example we can create, manage and administrator users, computers and printers in the network from active directory.

2) What is DNS? Why it is used? What is “forward lookup” and “reverse lookup” in DNS? What are A records and mx records?

DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request.Forward lookup: Converting names to IP address is called forward lookup.Reverse lookup: Resolving IP address to names is called reverse lookup.‘A’ record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of which DNS can find out the IP address of a name.‘MX’ Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is also found in DNS.

3) What id DHCP? Why it is used? What are scopes and super scopes?DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy.Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network.Superscope: When we combine two or more scopes together its called super scope.

4) What are the types of LAN cables used? What is a cross cable?Types of LAN cables that are in use are “Cat 5″ and “Cat 6″. “Cat 5″ can support 100 Mbps of speed and “CAT 6″ can support 1Gbps of speed.Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.

5) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the LAN cable?The way the paired wires are connected to the connector (RJ45) is differentin cross cable and normal LAN cable.The theoretical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal.

6) What would you use to connect two computers without using switches?Cross cable.

7) What is IPCONFIG command? Why it is used?

Page 2: System Admin  Interview  questions

IPCONFIG command is used to display the IP information assigned to a computer. From the output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer.

What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available?When DHCP server is not available the Windows client computer assigns an automatic IP address to itself so that it can communicate with the network computers. This ip address is called APIPA. ITs in the range of 169.254.X.X.APIPA stands for Automatic private IP addressing. Its in the range of 169.254.X.X.

9) What is a DOMAIN? What is the difference between a domain and a workgroup?Domain is created when we install Active Directory. It’s a security boundary which is used to manage computers inside the boundary. Domain can be used to centrally administrator computers and we can govern them using common policies called group policies.We can’t do the same with workgroup.

10) Do you know how to configure outlook 2000 and outlook 2003 for a user?Please visit the link below to find out how to configure outlook 2000 and outlook 2003. http :// www . it . cmich . edu / quickguides / qg _ outlook 2003_ server . asp

11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express?PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express used odb file.

12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it?BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is “Last known good configuration”.If this doesn’t work than boot the computer in safe mode. If it boots up than the problems with one of the devices or drivers.

13) What is RIS? What is Imaging/ghosting?RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or imaging/ghosting because installing OS every time using a CD can be a very time consuming task. So to save that time we can go for RIS/Ghosting/imaging.

14) What is VPN and how to configure it?

Page 3: System Admin  Interview  questions

VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the resources like mail and files in the LAN. VPN can be configured using the steps mentioned in the KB: http://support.microsoft.com/kb/305550

15) Your computer slowly drops out of network. A reboot of the computerfixes the problem. What to do to resolve this issue?Update the network card driver.

16) Your system is infected with Virus? How to recover the data?Install another system. Install the OS with the lates patches, Antivirus with latest updates. Connect the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system.

17) How to join a system to the domain? What type of user can add a system to the domain?Please visit the article below and read “Adding the Workstation to the Domain” http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologi /directory/

18) What is the difference between a switch and a hub?Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.

19) What is a router? Why we use it?Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across but it uses the routing protocols to do so.

20) What are manageable and non manageable switches?Switches which can be administered are called manageable switches. For example we can create VLAN for on such switch. On no manageable switches we can’t do so.

Desktop interview questions

What is Router Latest Answer: A router is a OSI layer 3 device used to connect devices belonging to different networks ...

IIS in Client OS What is the role of IIS in client OS?

GatewayWhat is a gateway? How does it work? Latest Answer: In simple terms it will provide access of LAN to WANIt allows connection between LAN and WAN. ...

ACL and Firewall How does a firewall differ from ACL?

Page 4: System Admin  Interview  questions

Latest Answer: ACL Manager lets you control routers and firewalls from your PC . Deploy the same access list to different device types such as Cisco and Juniper. Save time and money in router ACL management. Manage thousands of routers from a single application. Minimize ...

ModulationHow does modulation help in data communication? Latest Answer: Modulation is a process to transmit the message along with the carrier signal. i.e. In the modulation process we convert the analog signal to Digital one and vice versa. As Data communication needs the digital quantity and signal so modulation process ...

Cache Mode What is Cache Mode? Wat is the use of Cache Mode? Latest Answer: While configuring Exchange mail client in outlook for the user. thereit shows two modes:1. Cache Exchange Mode2. Offline Mode1. Cache Exchange Mode: Cached mode is generally faster when you're connected and reduces network traffic

(especially ...

What is the advantage of subnetting an IP address ? Latest Answer: Subnetting is used to segment larger networks. Advantage is, it reduces unnecessary broadcast, bandwidth and waste of IP address. ...

EthernetWhat is the differnce b/w Ethernet And Internet? Latest Answer: Internet is global network or in other words we can say it is WAN. But Ethernet is a medium that is used to connect computers in a LAN. These computers may be hosts or clients. ...

What are port numbers for telnet , ftp , http and rpc Latest Answer: Telnet is listening on TCP Port Number 23,FTP Data is on TCP Port Number 20,FTP Control TCP Port Number 21,HTTP is on TCP Port Number 80, HTTPS is on TCP Port Number 443 andRPC is on TCP Port Number 135. ...

Role of Active Directory Explain what Active Directory is and what role it plays in a Windows network. Latest Answer: Active Directory will represent a major advance over NT 4.0's simple domain model, since the domains within Active Directory will be able to form a multi-level tree structure. Customers will be able to establish two-way transitive trust relationships ...

Investigate ACL A user is unable to access a network folder. Describe how you would investigate ACL-related issues. Latest Answer: First make sure theuser has access to the folder.Go to the folder and right click on a white space and select properties -> go to the security tab -> click on advance and select the effective permissions tab. Click the select and enter the user ...

Page 5: System Admin  Interview  questions

AD Replication How does Active Directory replication work? Latest Answer: Active Directory also includes a replication feature. Replication ensures that changes to a domain controller are reflected in all domain controllers within a domain. A domain controller stores a replica of the domain directory. Each domain can ...

Multiple Active Directory Forests What might be some valid reasons for maintaining multiple Active Directory Forests?

Latest Answer: The multiple active directory forests are implemented when there is abig environment with multiple domains. ...

Global Catalog How would you go about optimizing Global Catalog server placement in a campus environment? Latest Answer: usually you should have one per site if that is not possible you would

want it centered in your network ...

Mac Address and IP Address Why we want mac address as well as IP addressWhy one address is not enough in net work Latest Answer: IP Address : Its a 32-bit unique numeric identifier assigned to every host on the network. Its a logical address of any TCP/IP host or a machine (computer).IP address helps a system to be uniquely identified on the network. We can check the IP address ...

Advantage of wi - fi technology What is the advantage of wi-fi over cellular phone while both provide the wireless communication? Latest Answer: Wi: WirlessFi: Fidelity.It's name it self indicates that wireless data carring capicity so it's called wireless Fedility.And advantage is U get conncted wirelessly.No trouble shuting on wire....No cost of cable connection..... ...

Protocol Configuration What is meant by protocol configuration? What are the available types? Latest Answer: Protocol means set rules applying to system which is in network to communicate to another system. General protocol use in between PC-to-PC communication is TCP/IP.The other protocols are FTP,SMTP,POP,HTTP,HTTPS etc.The other protocols use in network are ...

What is RSA Latest Answer: Remote Supervisor Adapter.Allows remote control of hardware and operating systems. ...

What is Cutting Edge Technology ? Latest Answer: A loose term referring to technology at the frontiers of knowledge. Synonymous to state-of-the-art technology and high technology ...

Page 6: System Admin  Interview  questions

What is the network topology of the systems you are most used to dealing with ? Ring (token ring), Star (ethernet), Extended Star(Ethernet with extended switches), Hub and Spoke (Ethernet, Latest Answer: in most ISP, nomally use double star topology, used to provide load balance and redundency ...

You want to connect a cable modem to a switch . Which cable would you use ? Latest Answer: Straight-trough cablesswitch to Router, PC, ServerCrossover cablesSwitch to Switch, Hub ...

What is ADS & ADSL ? Latest Answer: ADSL stands for asynchronous digital subscriber line........ ...

Q. What is an operating system?A. Operating system works as an interpreter between computer Hardware and application. Operation system works as a userinterface.

Q. Types of Operating systems?A. There are two types of operating systems1. SOS: Simple Operating System as for example- Windows 95,98, ME2. NOS: Network Operating System as for example- Windows NT, 2000, 2003.

Q. What is server?A. Server are computer that provides the services. As for Example:-1. DNS Server2. WINS Server3. DHCP Server4. RAS Server5. VPN Server

Q. What is RAS Server?A. RAS stands for Remote Access Server. It is basically use for mobile user in the network. This server provides the accessconnectivity for mobile user. In this way all of the mobile users are connected to server through telephone line. This server alsoprovides the connectivity between two more offices in the network.

Q. What is VPN Server?A. VPN Stands for Virtual Private Network. It is basically use for mobile user in the network. This server provides the remoteaccess connectivity for mobile user. In this way all of the mobile users are connected to server through internet. This server alsoprovides the connectivity between two or more office in the network. VPN is cost effective (No Costly).

Q. What is IAS Server?A. IAS stands for Internet Authentication Services. IAS server is also known as RADIUS Server. IAS Server provides thecentralized management of multiple RAS & VPN Server in the Network. On this Server Remote Access Policy and Remote Access

Page 7: System Admin  Interview  questions

logging options are available.

Q. FAT/NTFS?A. there is major difference are available between FAT and NTFS file systems Such as:FAT:· FAT Stands for File Allocation Table· There are three categories in FAT file system. FAT FAT-16 FAT-32· In FAT Not up to folder level security is available· Compression option is not available· Encryption Option is not available· Disk Quota Option is not available· FAT supported by all of the Microsoft Based Operating Systems.NTFS:· NTFS stands for New Technology File Systems· There are three categories in NTFS file systems NTFS 4.0- NT Operating Systems NTFS 5.0- 2000 Operating Systems NTFS 6.0- 2003 Operating Systems· In NTFS up to File level security is available· Compression option is available· Encryption option is available· Disk Quota Option is available· NTFS supported by only limited Microsoft Based Operating System

Q. What is the difference between Windows NT/2000/2003?A. There is many differences are available between Windows NT, 2000 and 2003 O/S, such as NT:· There is no active directory· There is no tree/forest hierarchical structure is available· There is no site relationship· There is no parent domain and child domain concepts are available in the network/· NT support NTFS 4.0 file system· NT support NTLM version 2 LAN Authentication Protocol· In NT by default no trust relationship are configured· In NT we will use System Policy· In NT specific Client site Operation system is available i.e. NT Workstation 4.0 Edition· In NT we will use Exchange 5.5 Server· In NT we can create only one way trust relationship inside the network

2000:· There is Active Directory· Tree/Forest Hierarchical Structure are available· There is Site Relationship is available· There is parent domain and child domain concept are available· 2000 Support NTFS 5.0 file system· 2000 Support Kerberos version 5.0 authentication protocol· In 2000 by default Two-way Trust Relationship are configured· In 2000 we will use Group Policy· 2000 support maximum 32 Processor and 64 GB Ram· In 2000 Specific client site operating system is available i.e. 2000 Professional

Page 8: System Admin  Interview  questions

· In 2000 we will use Exchange 2000 server· In 2000 no stub zone is available in DNS· In 2000 Resultant Setup Policy is not available· In 2000 GPMC is not available· In 2000 Conditional forwarding option is not available· In 2000 Effective Permission option is not available· In 2000 only some Administrative Command Line Tools are available· Active Directory saved query option is not available· Shadow copy Option is not available in windows 2000 Operating System· ASR Option is not available in Windows 2000 operating System· In Windows 2000 we can create Maximum 1 DFS Root on a single DFS Server in the network.· In 2000 we can create two way trust relationship inside the network

2003:· There is Active Directory· Tree/Forest Hierarchical Structure are available· There is site relationship is available· There is parent domain and child domain concept are available· 2003 support NTFS 6.0 File system· 2003 support Kerberos 5.0 Authentication Protocol· In 2003 we will use group policy· 2003 support maximum 64 Processor and 64 GB RAM· In 2003 no specific client site Operating System is available you can use either windows 2000 Professional either WindowsXP Professional in the network· In 2003 we will use Exchange 2003 Server· In 2003 Stub Zone is available in DNS· In 2003 GPMC is available· In 2003 Resultant Setup Policy is available· In 2003 Conditional Forwarding option is available· In 2003 Effective Permission option is available· Active Directory Saved Query option is available· Shadow Copy option is available in Windows 2003 Operating System· ASR Option is available in Windows 2003 Operating System· In Windows 2003, we can create more than 1 DFS Root on A single DFS Server in the Network· In 2003 we can create two way Trust Relationship inside the network

Q. What is Active Directory?A. Active Directory is the main concept of Windows 2000/2003 Network. it stores all of the information about the whole networksuch as users, printers, computers etc.

Q. What is tree?A. A group of domain is called tree and sharing a contiguous Name Space.

Q. What is forest?A. A group of tree is called forest and does not sharing a contiguous name space but sharing a common configuration (Schema).

Q. Difference between D.C. and A.D.C.?A. D.C. stands for Domain Controller and A.D.C. stands for Additional Domain Controller. A.D.C. is a backup of D.C. Only one

Page 9: System Admin  Interview  questions

different is available between D.C. and A.D.C. i.e. – Operation master Role. On D.C. all of five Operation Master Roles areavailable-1. Schema Master2. Domain Naming Master3. RID Master4. PDC Emulator5. Infrastructure MasterBut on A.D.C. only Three Operation Master Role are Available:1. RID Master2. PDC Emulator3. Infrastructure Master

Q. What is the benefit of Child Domain?A. There are many benefits of Child Domain Such As:1. Security Boundary2. Administrative Overhead Low3. Network Traffic Low

Q. What is Group?A. Group is a collection of user account. It provides the simplified administration in the network.

Q. What is OU?A. OU stands for Organizational Unit. On OU we define group Policy in the network. Group policy is basically assigned on activedirectory container i.e. Site, domain, OU. When ever we want some users then we put that user in the OU and assign theappropriate Group Policy on that OU.

Q. What is Group Policy?A. Group Policy provides the stream line access to all of the users in the network. Group policy is basically assigned on activedirectory container i.e. Site, Domain and O.U. When ever we want some users in the network do not use shut down the system,do not use run command, do not use Control Panel, then we put that user in the OU and assign the appropriate Group Policy onthat OU.

Q. Difference between permission, rights and policy?A. Permission: permission is basically assigned on network resources as for example – file, folder, share folder, printer.Right: Right is basically assign to users and groups.Policy: Policy is basically assigned on active directory container i.e. – Site, Domain, OU.

Q What is ISA Server?A. ISA stands for Internet Security Acceleration. ISA server provides the internet connectivity for all of the users in network ISAServer also works as proxy Server in the network. With the help of ISA Server Administrator can filtering a client request for aspecific web site in the network.

Q. What is Default Gateway?

Page 10: System Admin  Interview  questions

A. Default Gateway is the IP address of router in the network. When ever any clients want to go to another network that query willforward to default gateway.

Q. What is site?A. A site is a geographical area where all of the domains are available. Site manages the replication traffic between two or moredifferent sites in the network.

Q. What is Operation Master Role?A. Operation Master Role is available on Domain Controller in the Network. There are five types of operation master roles:-1. Schema master2. Domain Naming Master3. RID Master4. PDC Emulator5. Infrastructure Master

Q. Difference between Mixed Mode and Native Mode?A. There are two types of domain mode:1. Mixed Mode: In this mode NT, win 2000 and win 2003 D.C. are available.2. Native Mode: there are two types of native mode.i. Win 2000 Native Mode: In this mode win 2000 and win 2003 DC are available.ii. Win 2003 Native mode: in this mode only win 2003 DC are available.Q. What is SCSI?A. SCSI stands for Small Computer System Interface. In SCSI the rate of data transmission is fast. SCSI Hard Disk Speed R.P.M.is fast in SCSI Data Transmission speed is 320 MBPS in the Network. In SCSI Controller We can connect Maximum 15 PhysicalDevices in the System.

Q. What are A-Host Record and PTR Record?A. A record is also called host record. This record is basically created in forward lookup ZonePTR record is also called a Pointer record. This record is basically created in reverse lookup Zone

Q. What is reservation?A. Reservation is basically used in DHCP Server. When Ever we want this computer is always received this IP address from DHCPServer in the network, in the network, in that case we create a reservation in DHCP Server of that particular computer in thenetwork.

Q. IP Address Range/Classes?A. There are two types of IP address:-1. Class Full IP Address2. Class Less IP Address

Class Full IP Address – There are five classes:1. Class A - 0 - 126(127 is reserved for Loop back)2. Class B - 128 – 191

Page 11: System Admin  Interview  questions

3. Class C - 192 – 2234. Class D - 224 - 2395. Class E - 240 – 255

Q. Difference between Hardware Router & Software Router?A. Hardware Router: Hardware Router is a dedicated Router. It’s having a lot of feature such as Security, dedicated routing inthe networking. As for Example Cisco Router.Software Router: Software Router is not a dedicated router. It provides the different services also such as DNS Server, DHCPServer i.e. Windows Based Router.

Q. Difference between Hardware Firewall and Software Firewall?A. Hardware Firewall: It is a dedicated firewall. A lots of security features are available on hardware based firewall. As forExample- Cisco Pix Firewall.Software Firewall: It is a dedicated firewall. It provides the normal security in the network- Check Point.

Q. What is Domain Controller?A. D.C. stands for Domain Controller. It provides the centralized management of entire domain in the network. When ever we willinstall active directory database on a server side operating system, then after that system becomes a D.C. Domain controllermanages all security related interaction between users and computers in the network.

Q. What is B Router?A. B Router stands for Bridge Router. We can say this is a layer three bridge that provides the communication between two ormore different network ID.

Q. What is a Bridge?A. Bridge is a layer 2 network device that provides the communication within the same network ID. In bridge maximum 16 portsare available.

Q. Difference between Gateway and Router?A. Router works on same network architecture but Gateway works on different network architecture.

Q. What is POP Server/SMTP Server?A. POP Stands for Post Office Protocol. It is basically use for mail receiving purpose in the network.SMTP Stands for Simple Mail Transfer Protocol. It is basically use for sending a mail as well as receiving a mail in the network.

Q. What is Active Directory Partitions?A. Active Directory Partition is a logical Partition of Active Directory. This Partition is basically use for replication from D.C. to A.D.C. & D.C. to G.C.S. (Global Catalog Server) in the network. There are three Types of Active Directory Partition:1. Schema Partition2. Configuration Partition3. Domain Partition

Page 12: System Admin  Interview  questions

Q. Types of Active Directory Partitions?A. There are Three types of Active Directory Partitions:1. Schema Partition2. Configuration Partition3. Domain Partition

Q. What is the function of Ping Command?A. Ping provides to check the Physical IP Connectivity between two or more devices in the network. Ping sends an ICMP requestfrom source Computer to destination computer and destination computer sends an ICMP reply.

Q. What are Broadcasting, Multicasting and unicasting?A. Broadcasting – one to allMulticasting - one to many not allUnicasting - One to One.

Q. What is Group Nesting?A. When we add two or more Groups within a Single Group. It is called Group Nesting.

Q. What is FIXMBR?A. FIXMBR Repair the Master boot record of the Partition Boot Sector.

Q. What is FIXBOOT?A. FIXBOOT write a new partition boot sector on to the system partition.

Q. What is SID?A. SID stands for Security Identifier. Every object has a unique ID, it is called SID.

Q. What is RADIUS Server?A. RADIUS Stands for Remote Authentication Dial-in User Service, RADIUS Server Provides the Centralized Management ofMultiple RAS & VPN Server in the network. On this Server Remote Access Policy and Remote Access Logging Options are available.

Q. What is Trusting Domain?A. In Trusting Domain Resources are available.

Q. What is Trusted Domain?A. In Trusted Domain User Account’s are available.Q. What is Microsoft Exchange Server?A. Microsoft Exchange Server is Software that provides the services such as sending & receiving the Mail.

Q. What is Printer?A. Printer is a Software that Governing the print Device. There are two types of Printer:1. Local PrinterChatting is a Real Time Conversation between two or more people in the network.2. Network Printer

Page 13: System Admin  Interview  questions

Q. What is Directory Services restore mode?A. When our Active Directory Database is not working properly, then we restart the domain Controller and press f8 key. Then afterSelecting the Directory services restore mode and then after restoring the active directory database from the last backup.

Q. What is Normal Backup?A. Just like a normal backup by default Backup.

Q. What is incremental backup?A. In incremental backup only incremental parts are backup not full backup.

Q. What is differential backup?A. In differential backup, we take full backup after the normal backup.

Q. What is packet?A. A packet is a logical grouping of information that includes a header which contains location information and user data.

Q. What is forwarder?A. It is basically use in DNS Server. When client query to the DNS Server. In that case if the DNS is having a best results thenDNS Server give the best result. To the client computer in the network otherwise DNS

CORE NETWORKING QUESTIONS

1.Open Systems Interconnection (OSI) model is a reference model developed by ISO (International Organization for Standardization) in 1984, as a conceptual framework of standards for communication in the network across different equipment and applications by different vendors. It is now considered the primary architectural model for inter-computing and internetworking communications.Communication process has been divided into 7 layers.1.physical2.Datalink3.network4.transport5.session6.presentation7.application

2.In all the above layers differnt works are performed according to the work divided among these layers.

ATM is the short form for Asynchonous Transfer Mode.

Currently ATM is used in places where we require high speed data transfer. The ATM is a technology of sending and recieving the packets and so it

Page 14: System Admin  Interview  questions

requires carriers such as SONET/SDH etc. The packet size of the ATM packet is fixed and is 53 bytes.

Advantages**********

1. As the packet size is fixed switching can be implemented in Hardware and so it is very fast.2. The packet size small and constant so the latency is too small so that it can support real time data transfer.3. The ATM supports Quality of Service (QOS).

Disadvantages.*************

The packet size is too small and if u take the additional header that is attached then it will be huge. So the header size to the actual data send is less and so overhead is too much.

End to end is not ATM and so we still require ATM adapters and other equipments.

3. Repeaters, bridges, and routers are devices used to link individual LANs together to form larger internetworks. each one operates within a specific layer of the OSI model.Repeaters operate at the Physical Layer of the OSI model. They simply listen to all network traffic on one port and send it back out through one or more ports, extending smaller networks into a larger, single network. A repeater simply receives frames, regenerates them, and passes them along. It performs no processing of the frames or the data they contain.Relation to OSI Layer Functions

Because repeaters operate at the Physical Layer, they do not need any addressing data from the frame. Repeaters do not even look at the frames they are forwarding, passing along even damaged frames. This can be especially problematic if one segment malfunctions and begins a broadcast storm. All those erroneous broadcasts are forwarded faithfully by the repeater!

Bridges operate at the Data Link Layer. They use the Data Link Layer and its physical addressing to join several networks into a single network efficiently.Bridges join two or more network segments together, forming a larger individual network. They function similarly to a repeater, except a bridge looks to see whether data it receives is destined for the same segment or another connected segment. If the data is destined for a computer on the same segment, the bridge does not pass it along. If that data is going to a computer on another segment, the bridge sends it along.

Bridges use a routing table to determine whether data is destined for the local network or not. On a bridge, the routing table contains MAC addresses. Each time the bridge receives data, it looks in its routing table to see whether or

Page 15: System Admin  Interview  questions

not the data is destined for a node on the local network. If it belongs to the local network, it does not forward the data. If it is not destined for the local network, it looks in the routing table to determine which physical network the destination address resides on, and sends the data out onto that network.

Bridges can not join dissimilar networks. If you have an Ethernet network and a Token Ring network, you cannot use a bridge; you must use a router. However, a bridge can join networks that use the same frame type but different media, just like a repeater.Relation to OSI Layer Functions

Bridges work with the MAC sublayer of the Data Link Layer. Remember that the Data Link Layer is concerned with communicating on the local network only. Bridges use information from the MAC sublayer to make decisions on whether a packet is destined for the same network or another network. The MAC address is used by bridges to determine first if the destination is local or not, then to choose which connected network it must go to.Router:The Network Layer is concerned with network addressing for larger networks that consist of many physical networks, often with multiple paths between them. Routers operate at the Network Layer. They use the addressing information provided at the network level to join the many networks together to form an internetwork.Functions

Routers divide larger networks into logically designed networks. Routers may seem a lot like bridges, but they are much smarter. Bridges cannot evaluate possible paths to the destination to determine the best route. This can result in inefficient use of network resources. Bridges also cannot use redundant paths. While two bridges can connect two networks, they risk sending packets in an endless loop between the two networks. This behavior eventually saturates the network, rendering it unusable.

The drawback to a router’s inherent intelligence is their speed. Because they process so much information, routers tend to be slower than bridges.Relation to OSI Layer Functions

Routers operate at the Network Layer of the OSI model. The Network Layer provides addressing for internetworks, and routers use this addressing information to determine how to pass along packets of data. Because routers operate at the Network Layer, they can link different physical network topologies.

4. Difference between UDP and TCP. UDP is much faster, used for streaming video and audio files on the net. TCP is slower, because it contains the main factor UDP does not have, which is flow/error control.

TCP is used by most users on the net because data transferred needs to be verified. Error correction allows data to be effectively received

5. Vlan is virtual lan it used to put some interface in one broadcast domain and some interfaces in another,it used for security purpose and group

Page 16: System Admin  Interview  questions

departments, based on the mac address the vlan is configured in the switch ports

6. TCP/IP is a set of Protocol, which is use to communicate data(packet)between to host and destination PCs.TCP(Transmission control protocol)IP (Internet Protocol)Tcp/IP work on OSI Model. and Its port is 80.

7. Repeater is a network device which is use to regenerate packet(data) out of 100m distance of server.

Bridge: it is also a network device which is use to connect multiple Pc in the network. it is use in small or LANs Network. It work on Layer 2 or 3(some times)of OSI Model.it is connect pc through HUB.

Router: Router is electronic machine and network device which is work as gateway.Router connect multiple Network or wireless network between two office.it base on Layer 3 of OSI Model.

8.VLAN — Virtual Local Area Network

ELAN — Emulated Local Area NetworkDifference between these two are as follows:-An ELAN is a type of VLAN over an ATM network. However, it is defined at the MAC layer while VLANs may be defined by a MAC layer or by a IP address, including by protocols.

9. state in which a message that has been broadcast across a network results in even more responses, and each response results in still more responses in a snowball effect. A severe broadcast storm can block all other network traffic, resulting in a network meltdown. Broadcast storms can usually be prevented by carefully configuring a network to block illegal broadcast messages.

10. HSRP:Hot Standby Routing Protocol, a proprietary protocol from Cisco. HSRP is a routing protocol that provides backup to a router in the event of failure. Using HSRP, several routers are connected to the same segment of an Ethernet, FDDI or token-ring network and work together to present the appearance of a single virtual router on the LAN. The routers share the same IP and MAC addresses, therefore in the event of failure of one router, the hosts on the LAN are able to continue forwarding packets to a consistent IP and MAC address. The process of transferring the routing responsibilities from one device to another is transparent to the user.

VRRP :Virtual Router Redundancy Protocol, an election protocol that dynamically assigns responsibility for one or more virtual router(s) to the VRRP router(s) on a LAN, allowing several routers on a multiaccess link to utilize the same virtual IP address. A VRRP router is configured to run the VRRP protocol in conjunction with one or more other routers attached to a LAN. In a VRRP setup, one router is elected as the master router with the other routers acting as backups in case of the failure of the master router.

Page 17: System Admin  Interview  questions

11. Multilayer switching

Multilayer switching is simply the combination of traditional Layer 2 switching with Layer 3 routing in a single product. Multilayer switching is new, and there is no industry standard yet on nomenclature. Vendors, analysts, and editors don’t agree about the specific meaning of terms such as multilayer switch, Layer 2 router, Layer 3 switch, IP switch, routing switch, switching router, and wirespeed router. The term multilayer switch seems to be the best and most widely used description of this class of product that performs both Layer 3 routing and Layer 2 switching functions.

Multilayer switching is usually implemented through a fast hardware such as a higher-density ASICs (Application-Specific Integrated Circuits), which allow real-time switching and forwarding with wirespeed performance, and at lower cost than traditional software-based routers built around general-purpose CPUs.

The following are some basic architecture approaches for the multiplayer switches:

Generic Cut-Through Routing: In the multi-layer switching architecture Layer 3 routing calculations are done on the first packet in a data flow. Following packets belonging to the same flow are switched at Layer 2 along the same route. In other words, route calculation and frame forwarding are handled very differently here.

ATM-Based Cut-Through Routing - This is a variation of generic cut-through routing which is based on ATM cells rather than frames. ATM-based cut-through routing offers several advantages such as improved support of LAN emulation and multi-vendor support in the form of the Multiprotocol Over ATM (MPOA) standard. Products referred to as IP switches and tag switches generally fall into this category.

Layer 3 Learning Bridging CIn this architecture, routing is not provided. Instead, it uses IP “snooping” techniques to learn the MAC/IP address relationships of endstations from true routers that must exist elsewhere in the network. Then it redirects traffic away from the routers and switches it based on its Layer 2 addresses.

Wirespeed Routing - Wirespeed architecture routes every packet individually. It is often referred to as packet-by-packet Layer 3 switching. Using advanced ASICs to perform Layer 3 routing in hardware, it implements dynamic routing protocols such as OSPF and RIP. In addition to basic IP routing, it supports IP multicast routing, VLAN segregation, and multiple priority levels to assist in quality of service.

12. TCP is a connection oriented protocol which works on ACK based communication. It provides error recovery & detection under Layer 4 of OSI model. Also, the TCP works in reliable network which offers secured communication and no loss of data.

Page 18: System Admin  Interview  questions

UDP is a User Datagram Protocol, used in a faster network. No ACK is required for the data sent to the network. Also, the application like TFTP prefers using UDP for its transport layer communication. Its a connectionless protocol.

14. Hub= anything that comes in one port is sent out to the others.Switch= it can “learn” where particular addresses are,forward the frame to a specific destination port

15. TCP/IP, the Transmission Control Protocol / Internet Protocol, is one of the fundamental technologies that power the Internet. As computer networking continues to grow in popularity, a basic understanding of TCP/IP becomes crucial. Accomplished author and editor Pete Loshin provides this up-to-date text for computer professionals as well as those with merely a casual interest in the subject.Learning about TCP/IP and similar technical topics can seem intimidating at first. The author offers this sensible caution in his introduction: “If you are entirely new to networking, don’t expect to ‘get it’ in a single reading.” Clear, thorough explanations insure that all but the most advanced networkers will find this book a useful reference.

16. Each A-Net component in a system can have up to 500 feet (150 meters) of Category 5e cable (UTP, Unshielded Twisted Pair) between it and the next A-Net component (for example, from a Input Module to a Personal Mixer, or from one Personal Mixer to another in series). Cat-5e cable comes in two varieties, stranded and solid. Stranded wire is more flexible, but may not perform as well as solid wire at extreme distances. The number of components in the system is unlimited.

What is ping? Why you use ping?

PING Stands for Packet InterNet Gopher. PING is used for connectivity checking of any network or any host or device of any or other networks.

Routers are always preferable for routing services. Routers work at which OSI layers?

Router works at network layer for providing routing services between or among several networks.

A gateway works in which layer?

Transport layer of OSI model.

How can you check the connectivity of any network?

By using ping command.

What is a gateway?

Page 19: System Admin  Interview  questions

A gateway acts a door for the packet to reach the ‘outside’ of the internal network.

What are the differences among router, switch, bridge and hub?

Router, switch, bridge and hub are network devices. Yet there are some differences among them. The main differences are:

Router: A layer 3 device, can work on physical, data and network layer. Switch: A layer 2 device, can work on data link layer

Bridge: A layer 2 device, can work on data link layer.

Hub: A layer 1device, just a multi-port repeater and works on physical layer

What is the range of class A address?

0-127 is the range of class A address.

Tell an IP which has class C range. Also tell why that IP is an class C address.

IP of Class C: 193.1.1.1 Why this is a class C address: Class C addresses have the range of 192 - 223

Name a device which can operate at physical layer of OSI model.

Hub.

Note: Remember, hub is the device that can work only into the physical layer of OSI model. But switch, router can also be used instead of a hub. So, all the answers hub, switch or router are all correct.

What is the major differences between a router and a switch?

A router can divide the broadcast domain and collision domain. But a switch can only divide the collision domain. Router can communicate among different networks where as the switch can not communicate different networks.

Hub operates at which layers of OSI model? Is it wise to use a hub for huge networks? Why or why not?

Hub  operates at only physical layer of OSI model. No, it's not so wise to use hub for a huge network.

Hubs can't divide the broadcast domain or the collision domain. So, if we use hubs then there creates huge broadcast domain. When there are huge broadcast, the network gets problem time to time. So, it's not wise to use hubs to support a huge network.

How many layers are in OSI model? Name them

There are seven layers of OSI model. The layers are:

Page 20: System Admin  Interview  questions

1. Application layer2. Presentation layer

3. Session layer

4. Transport layer

5. Network layer

6. Data link layer

7. Physical layer

Note: You can remember the seven layer model by a simple sentence. P lease D o N ot T ouch S teven's P et A lligator . See, the starting of each word forms the layer.

Why do you need to use a router?

Router can easily divide the broadcast domain and collision domain. So, to communicate among several networks, routers are used.

What is the second layer of OSI model?

Data Link layer.

Name two network devices which can work as layer 2 device.

Switch and router

What is OSI model?

OSI revers for Open System Interconnection Reference Model. It is an abstract model for layered communications and computer network protocol design. There are seven layers of OSI model which, from top to bottom, are the Application, Presentation, Session, Transport, Network, Data-Link, and Physical Layers.

OSI model also referred as OSI layered model, OIS layered technology, 7 layer model, OSI seven layer model, OSI reference model.

What is the data unit of Data Link layer?

Frame

What are the difference between TCP and UDP? TCP: Connection oriented protocol, acknowledged one, Point to point

communication. UDP: Connection less protocol, unreliable, less traffic

What is the port no of DNS and Telnet? DNS port no: 53 Telnet port no: 23

Page 21: System Admin  Interview  questions

What is the port no of SMTP and POP3? SMPT port no: 25 POP3 port no: 110

What is the functionality of network layer? Name the data unint of network layer.

Functionality of network layer: Path determination and logical addressing Data unit of network layer: Packet

Which three layers of OSI model is treated as "Media Layers"?

Physical layer, data link layer and network layer are treated as "Media Layers".

What is deadlock?

Deadlock is a situation when two or more processes are waiting indefinitely for an event that can be caused by only one of the waiting processes. The implementation of a semaphore with a waiting queue may result in this situation.

Mention the advantages and disadvantages of a router.

Advantages:

Router can limit the collision domain and broadcast domain Router can function both on LAN & WAN.

Different media & architectures can be connected among themselves through router.

Router can determine best path/route for data to reach

the destination.

Router can filter the broadcasts.

For communicating different networks, routers must be used.

Disadvantage:

Router is more expensive than any other networking devices like Hub, Bridge & Switch.

Router only work with routable protocols.

Routing updates consume some bandwidth.

Increase latency due to greater degree of packet

filtering.

Routers function as software based and so it's slower compared to switch.

Mention the private IP address rannge of class B and C. For Class B: 172.16.0.0 – 172.31.255.255

Page 22: System Admin  Interview  questions

For Class C: 192.168.0.0 – 192.168.255.255

What is the IP range of class C IP address?

240.0.0.0      255.255.255.255

What is the default subnet mask of class C IP address?

255.255.255.0

Why do you need subnet mask?

Subnet mask is required to divide a large network into several small networks.

Tell the full name: DNS, FTP DNS: Domain Name System FTP: File Transfer Protocol

What is the functionality or ARP?

ARP refers to Address Resolution Protocol. ARP is a computer networking protocol for determining a network host's link layer or hardware address when only its Internet Layer (IP) or Network Layer address is known.

Which one is reliable: TCP or UDP?

TCP is reliable and UDP is an unreliable service.

How DHCP works?

DHCP works by four-steps: (1) IP request, (2) IP offer (3) IP selection and (d) Acknowledgement.

What is POP3? Why you require POP3?

POP stands for Post Office Protocol. This is used to describe how e-mail clients interact with mail servers. The POP3 Server is a type of mail server used for incoming mail. POP is only used to receive messages.

What is the difference between Layer 2 Switch and Layer 3 Switch?

Layer 2 switch is based on MAC addresses which operates on Data Link Layer of OSI mode. And Layer 3 switching is based on network topology table populated and works on Network layer.

Active Directory Partitions

The Active Directory database is logically separated into directory partitions:

Page 23: System Admin  Interview  questions

Schema partition Configuration partition

Domain partition

Application partition

Each partition is a unit of replication, and each partition has its own replication topology. Replication occurs between replicas of directory partition. Minimum two directory partitions are common among all domain controllers in the same forest: the schema and configuration partitions. All domain controllers which are in the same domain, in addition, share a common domain partition.

Schema PartitionOnly one schema partition exists per forest. The schema partition is stored on all domain controllers in a forest. The schema partition contains definitions of all objects and attributes that you can create in the directory, and the rules for creating and manipulating them. Schema information is replicated to all domain controllers in the attribute definitions.

Configuration PartitionThere is only one configuration partition per forest. Second on all domain controllers in a forest, the configuration partition contains information about the forest-wide active directory structure including what domains and sites exist, which domain controllers exist in each forest, and which services are available. Configuration information is replicated to all domain controllers in a forest.

Domain PartitionMany domain partitions can exist per forest. Domain partitions are stored on each domain controller in a given domain. A domain partition contains information about users, groups, computers and organizational units. The domain partition is replicated to all domain controllers of that domain. All objects in every domain partition in a forest are stored in the global catalog with only a subset of their attribute values.

Application PartitionApplication partitions store information about application in Active Directory. Each application determines how it stores, categorizes, and uses application specific information. To prevent unnecessary replication to specific application partitions, you can designate which domain controllers in a forest host specific application partitions. Unlike a domain partitions, an application partition cannot store security principal objects, such as user accounts. In addition, the data in an application partition is not stored in the global catalog.

As an example of application partition, if you use a Domain Name System (DNS) that is integrated with Active Directory you have two application partitions for DNS zones — ForestDNSZones and DomainDNSZones:

ForestDNSZones is part of a forest. All domain controllers and DNS servers in a forest receive a replica of this partition. A forest-wide application partition stores the forest zone data.

Page 24: System Admin  Interview  questions

DomainDNSZones is unique for each domain. All domain controllers that are DNS servers in that domain receive a replica of this partition. The application partitions store the domain DNS zone in the DomainDNSZones.

Each domain has a DomainDNSZones partition, but there is only one ForestDNSZones partition. No DNS data is replicated to the global catalog server.

Windows Server Questions

1.What are the Features of windows2003?ACTIVE DIRECTORYEasier Deployment and ManagementADMT version 2.0—migrates password from NT4 to 2000 to 20003 or from 2000 to 2003Domain Rename--- supports changing Domain Name System and/or NetBios nameSchema Redefine--- Allows deactivation of attributes and class definitions in the Active directory schemaAD/AM--- Active directory in application mode is a new capability of AD that addresses certain deployment scenarios related to directory enabled applicationsGroup Policy Improvements----introduced GPMC tool to manage group policyUI—Enhanced User Interface

Grater SecurityCross-forest AuthenticationCross-forest AuthorizationCross-certification EnhancementsIAS and Cross-forest authenticationCredential ManagerSoftware Restriction Policies

Improved Performance and DependabilityEasier logon for remote officesGroup Membership replication enhancementsApplication Directory PartitionsInstall Replica from mediaDependability Improvements--- updated Inter-Site Topology Generator (ISTG) that scales better by supporting forests with a greater number of sites than Windows 2000.

FILE AND PRINT SERVICESVolume shadow copy serviceNTFS journaling file systemEFSImproved CHDSK Performance

Page 25: System Admin  Interview  questions

Enhanced DFS and FRSShadow copy of shared foldersEnhanced folder redirectionRemote document sharing (WEBDAV)

IISFault-tolerant process architecture----- The IIS 6.0 fault-tolerant process architecture isolates Web sites and applications into self-contained units called application poolsHealth Monitoring---- IIS 6.0 periodically checks the status of an application pool with automatic restart on failure of the Web sites and applications within that application pool, increasing application availability. IIS 6.0 protects the server, and other applications, by automatically disabling Web sites and applications that fail too often within a short amount of timeAutomatic Process Recycling--- IIS 6.0 automatically stops and restarts faulty Web sites and applications based on a flexible set of criteria, including CPU utilization and memory consumption, while queuing requestsRapid-fail Protection---- If an application fails too often within a short amount of time, IIS 6.0 will automatically disable it and return a "503 Service Unavailable" error message to any new or queued requests to the applicationEdit-While-Running

2.What are the Difference between NT & 2000? NT SAM database is a flat database. Where as in windows 2000 active directory database is a hierarchical database. In windows NT only PDC is having writable copy of SAM database but the BDC is only read only database. In case of Windows 2000 both DC and ADC is having write copy of the database Windows NT will not support FAT32 file system. Windows 2000 supports FAT32 Default authentication protocol in NT is NTLM (NT LAN manager). In windows 2000 default authentication protocol is Kerberos V5. Windows 2000 depends and Integrated with DNS. NT user Netbios namesActive Directory can be backed up easily with System state data

3.What Difference between 2000 & 2003? Application Server mode is introduced in windows 2003 Possible to configure stub zones in windows 2003 DNS Volume shadow copy services is introducedWindows 2003 gives an option to replicate DNS data b/w all DNS servers in forest or All DNS servers in the domain. Refer Question 1 for all Enhancements

4.What Difference between PDC & BDC? PDC contains a write copy of SAM database where as BDC contains read only copy of SAM database. It is not possible to reset a password or create objects with out PDC in Windows NT.

5.What are Difference between DC & ADC?

Page 26: System Admin  Interview  questions

There is no difference between in DC and ADC both contains write copy of AD. Both can also handles FSMO roles (If transfers from DC to ADC). It is just for identification. Functionality wise there is no difference.

6.What is DNS & WINS DNS is a Domain Naming System, which resolves Host names to IP addresses. It uses fully qualified domain names. DNS is a Internet standard used to resolve host namesWINS is a Windows Internet Name Service, which resolves Netbios names to IP Address. This is proprietary for Windows

7.How may Types of DNS Servers Primary DNS Secondary DNSActive Directory Integrated DNSForwarderCaching only DNS

8.If DHCP is not available what happens to the client ?Client will not get IP and it cannot be participated in network . If client already got the IP and having lease duration it use the IP till the lease duration expires.

9.what are the different types of trust relationships ?Implicit TrustsExplicit Trusts—NT to Win2k or Forest to Forest

10.what is the process of DHCP for getting the IP address to the client ?There is a four way negotiation process b/w client and serverDHCP Discover (Initiated by client)DHCP Offer (Initiated by server)DHCP Select (Initiated by client)DHCP Acknowledgment (Initiated by Server)DHCP Negative Acknowledgment (Initiated by server if any issues after DHCP offer)

11.Difference between FAT,NTFS & NTFSVersion5 ?NTFS Version 5 featuresEncryption is possibleWe can enable Disk QuotasFile compression is possibleSparse filesIndexing ServiceNTFS change journal In FAT file system we can apply only share level security. File level protection is not possible. In NTFS we can apply both share level as well as file level securityNTFS supports large partition sizes than FAT file systemsNTFS supports long file names than FAT file systems

12.What are the port numbers for FTP, Telnet, HTTP, DNS ?FTP-21, Telnet – 23, HTTP-80, DNS-53, Kerberos-88, LDAP-389

Page 27: System Admin  Interview  questions

13.what are the different types of profiles in 2000 ?Local ProfilesRoaming profilesMandatory Profiles

14.what is the database files used for Active Directory ? ?The key AD database files—edb.log, ntds.dit, res1.log, res2.log, and edb.chk—all of which reside in \%systemroot%\ntds on a domain controller (DC) by default. During AD installation, Dcpromo lets you specify alternative locations for these log files and database files NTDS.DIT

15.What is the location of AD Database ? %System root%/NTDS/NTDS>DIT

16.What is the authentication protocol used in NT ? NTLM (NT LAN Manager)

17.What is subnetting and supernetting ? Subnetting is the process of borrowing bits from the host portion of an address to provide bits for identifying additional sub-networks Supernetting merges several smaller blocks of IP addresses (networks) that are continuous into one larger block of addresses. Borrowing network bits to combine several smaller networks into one larger network does supernetting

18.what is the use of terminal services ?Terminal services can be used as Remote Administration mode to administer remotely as well as Application Server Mode to run the application in one server and users can login to that server to user that application.

19.what is the protocol used for terminal services ? RDP

20.what is the port number for RDP ? 3389

Windows Server2000 Administration Questions

1.Explain hidden shares.

Hidden or administrative shares are share names with a dollar sign ($) appended to their names. Administrative shares are usually created automatically for the root of each drive letter. They do not display in the network browse list.

2.How do the permissions work in Windows 2000?

Page 28: System Admin  Interview  questions

What permissions does folder inherit from the parent?

When you combine NTFS permissions based on users and their group memberships, the least restrictive permissions take precedence. However, explicit Deny entries always override Allow entries.

3.Why can’t I encrypt a compressed file on Windows 2000?

You can either compress it or encrypt it, but not both.

4.If I rename an account, what must I do to make sure the renamed account has the same permissions as the original one?

Nothing, it’s all maintained automatically.

5.What’s the most powerful group on a Windows system?

Administrators.

6.What are the accessibility features in Windows 2000?

Sticky Keys, Filter Keys Narrator, Magnifier, and On-Screen Keyboard.

7.Why can’t I get to the Fax Service Management console?

You can only see it if a fax had been installed.

8.What do I need to ensure before deploying an application via a Group Policy?

Make sure it’s either an MSI file, or contains a ZAP file for Group Policy.

9.How do you configure mandatory profiles?

Rename ntuser.dat to ntuser.man

10.How to get multiple displays to work in Windows 2000?

Multiple displays have to use peripheral connection interface (PCI) or Accelerated Graphics Port (AGP) port devices to work properly with Windows 2000.

11.What’s a maximum number of processors Win2k supports?

2

12.I had some NTFS volumes under my Windows NT installation. What happened to NTFS after Win 2k installation?

It got upgraded to NTFS 5.

13.How do you convert a drive from FAT/FAT32 to NTFS from the command line?

convert c: /fs:ntfs

Page 29: System Admin  Interview  questions

14. Explain APIPA.

Auto Private IP Addressing (APIPA) takes effect on Windows 2000 Professional computers if no DHCP server can be contacted. APIPA assigns the computer an IP address within the range of 169.254.0.0 through 169.254.255.254 with a subnet mask of 255.255.0.0.

15.How does Internet Connection Sharing work on Windows 2000?

Internet Connection Sharing (ICS) uses the DHCP Allocator service to assign dynamic IP addresses to clients on the LAN within the range of 192.168.0.2 through 192.168.0.254. In addition, the DNS Proxy service becomes enabled when you implement ICS.

16What is Active Directory schema?

The Active Directory schema contains formal definitions of every object class that can be created in an Active Directory forest it also contains formal definitions of every attribute that can exist in an Active Directory object.

Active Directory stores and retrieves information from a wide variety of applications and services.

16.What is Global Catalog Server?

A global catalog server is a domain controller it is a master searchable database that contains information about every object in every domain in a forest. The global catalog contains a complete replica of all objects in Active Directory for its host domain, and contains a partial replica of all objects in Active Directory for every other domain in the forest. It have two important functions:

•Provides group membership information during logon and authentication

•Helps users locate resources in Active Directory

17.What is the ntds.tit file default size?

40 MB

18.Describe how the DHCP lease is obtained.

It’s a four-step process consisting of

(a) IP request

(b) IP offer

(C) IP selection

(d) acknowledgement.

19. We’ve installed a new Windows-based DHCP server, however, the users do not seem to be getting DHCP leases off of it.

Page 30: System Admin  Interview  questions

The server must be authorized first with the Active Directory.

20.How can you force the client to give up the dhcp lease if you have access to the client PC?

ipconfig /release

21. What authentication options do Windows 2000 Servers have for remote clients?

PAP, SPAP, CHAP, MS-CHAP and EAP.

22. What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP/IP?

NWLink (Novell), NetBEUI, AppleTalk (Apple).

23. What is data link layer in the OSI reference model responsible for?

Data link layer is located above the physical layer, but below the network layer. Taking raw data bits and packaging them into frames. The network layer will be responsible for addressing the frames, while the physical layer is reponsible for retrieving and sending raw data bits.

24.What is binding order?

The order by which the network protocols are used for client-server communications. The most frequently used protocols should be at the top.

25.How do cryptography-based keys ensure the validity of data transferred across the network?

Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.

26.Should we deploy IPSEC-based security or certificate-based security?

They are really two different technologies. IPSec secures the TCP/IP communication and protects the integrity of the packets. Certificate-based security ensures the validity of authenticated clients and servers.

27.What is LMHOSTS file?

It’s a file stored on a host machine that is used to resolve NetBIOS to specific IP addresses.

28.What’s the difference between forward lookup and reverse lookup in DNS?

Forward lookup is name-to-address, the reverse lookup is address-to-name.

29.How can you recover a file encrypted using EFS?

Page 31: System Admin  Interview  questions

Use the domain recovery agent.

Windows Server 2003 Interview Questions

1. How do you double-boot a Win 2003 server box? The Boot.ini file is set as read-only, system, and hidden to prevent unwanted editing. To change the Boot.ini timeout and default settings, use the System option in Control Panel from the Advanced tab and select Startup

2.What do you do if earlier application doesn’t run on Windows Server 2003?When an application that ran on an earlier legacy version of Windows cannot be loaded during the setup function or if it later malfunctions, you must run the compatibility mode function. This is accomplished by right-clicking the application or setup program and selecting Properties –> Compatibility –> selecting the previously supported operating system.

3.If you uninstall Windows Server 2003, which operating systems can you revert to?Win ME, Win 98, 2000, XP. Note, however, that you cannot upgrade from ME and 98 to Windows Server 2003

4.How do you get to Internet Firewall settings?Start –> Control Panel –> Network and Internet Connections –> Network Connections

5.What is Active Directory? Active Directory is a network-based object store and service that locates and manages resources, and makes these resources available to authorized users and groups. An underlying principle of the Active Directory is that everything is considered an object—people, servers, workstations, printers, documents, and devices. Each object has certain attributes and its own security access control list (ACL).

6.Where are the Windows NT Primary Domain Controller (PDC) and its Backup Domain Controller (BDC) in Server 2003?The Active Directory replaces them. Now all domain controllers share a multimaster peer-to-peer read and write relationship that hosts copies of the Active Directory.

7.How long does it take for security changes to be replicated among the domain controllers? Security-related modifications are replicated within a site immediately. These changes include account and individual user lockout policies, changes to password policies, changes to computer account passwords, and modifications to the Local

Page 32: System Admin  Interview  questions

Security Authority (LSA).

8.What’s new in Windows Server 2003 regarding the DNS management?When DC promotion occurs with an existing forest, the Active Directory Installation Wizard contacts an existing DC to update the directory and replicate from the DC the required portions of the directory. If the wizard fails to locate a DC, it performs debugging and reports what caused the failure and how to fix the problem. In order to be located on a network, every DC must register in DNS DC locator DNS records. The Active Directory Installation Wizard verifies a proper configuration of the DNS infrastructure. All DNS configuration debugging and reporting activity is done with the Active Directory Installation Wizard.

9.When should you create a forest?Organizations that operate on radically different bases may require separate trees with distinct namespaces. Unique trade or brand names often give rise to separate DNS identities. Organizations merge or are acquired and naming continuity is desired. Organizations form partnerships and joint ventures. While access to common resources is desired, a separately defined tree can enforce more direct administrative and security restrictions.

10.How can you authenticate between forests?Four types of authentication are used across forests: (1) Kerberos and NTLM network logon for remote access to a server in another forest(2) Kerberos and NTLM interactive logon for physical logon outside the user’s home forest(3) Kerberos delegation to N-tier application in another forest(4) user principal name (UPN) credentials.

11.What snap-in administrative tools are available for Active Directory?Active Directory Domains and Trusts Manager, Active Directory Sites and Services Manager, Active Directory Users and Group Manager, Active Directory Replication (optional, available from the Resource Kit), Active Directory Schema Manager (optional, available from adminpack)

12.What types of classes exist in Windows Server 2003 Active Directory? Structural class. The structural class is important to the system administrator in that it is the only type from which new Active Directory objects are created. Structural classes are developed from either the modification of an existing structural type or the use of one or more abstract classes.Abstract class. Abstract classes are so named because they take the form of templates that actually create other templates (abstracts) and structural and auxiliary classes. Think of abstract classes as frameworks for the defining objects.Auxiliary class. The auxiliary class is a list of attributes. Rather than apply numerous attributes when creating a structural class, it provides a streamlined alternative by applying a combination of attributes with a single include action.88 class. The 88 class includes object classes defined prior to 1993, when the 1988 X.500 specification was adopted. This type does not use the structural, abstract, and auxiliary definitions, nor is it in common use for the development of objects in

Page 33: System Admin  Interview  questions

Windows Server 2003 environments.

13.How do you delete a lingering object? Windows Server 2003 provides a command called Repadmin that provides the ability to delete lingering objects in the Active Directory.

14.What is Global Catalog?The Global Catalog authenticates network user logons and fields inquiries about objects across a forest or tree. Every domain has at least one GC that is hosted on a domain controller. In Windows 2000, there was typically one GC on every site in order to prevent user logon failures across the network.

15.How is user account security established in Windows Server 2003?When an account is created, it is given a unique access number known as a security identifier (SID). Every group to which the user belongs has an associated SID. The user and related group SIDs together form the user account’s security token, which determines access levels to objects throughout the system and network. SIDs from the security token are mapped to the access control list (ACL) of any object the user attempts to access.

16.If I delete a user and then create a new account with the same username and password, would the SID and permissions stay the same? No. If you delete a user account and attempt to recreate it with the same user name and password, the SID will be different.

17.What do you do with secure sign-ons in an organization with many roaming users?Credential Management feature of Windows Server 2003 provides a consistent single sign-on experience for users. This can be useful for roaming users who move between computer systems. The Credential Management feature provides a secure store of user credentials that includes passwords and X.509 certificates.

18.Anything special you should do when adding a user that has a Mac?"Save password as encrypted clear text" must be selected on User Properties Account Tab Options, since the Macs only store their passwords that way.

19.What remote access options does Windows Server 2003 support?Dial-in, VPN, dial-in with callback.

20.Where are the documents and settings for the roaming profile stored? All the documents and environmental settings for the roaming user are stored locally on the system, and, when the user logs off, all changes to the locally stored profile are copied to the shared server folder. Therefore, the first time a roaming user logs on to a new system the logon process may take some time, depending on how large his profile folder is.

21.Where are the settings for all the users stored on a given machine? C:\Document and Settings\All Users

Page 34: System Admin  Interview  questions

22.What languages can you use for log-on scripts? JavaScript, VBScript, DOS batch files (.com, .bat, or even .exe)

Network Questions - I

What is the difference between TCP and UDP

TCP is a connection oriented protocol, which means that everytime a packet is sent say from host A to B, we will get an acknowledgement. Whereas UDP on the other hand, is a connection less protocol.

Where will it be used : TCP -> Say you have a file transfer and you need to ensure that the file reaches intact, and time is not a factor, in such a case we can use TCP.

UDP-> Media Streaming, question is say you are watching a movie…would you prefer that your movie comes..perfectly….but u need to wait a long time before you see the next frame ?..or would you prefer the movie to keep streaming…Yes…The second option is definely better….This is when we need UDP

What is a MAC address?

MAC is a machines Physical address, The internet is addressed based on a logical addressing approach. Say, when the packet reaches say the bridge connection a LAN, the question is..how does it identify, which computer it needs to send the packet to. For this it uses the concept of ARP, Address Resolution Protocol, which it uses over time to build up a table mapping from the Logical addresses to the Physical addresses. Each computer is identified using its MAC/Physical address ( u can use the ipconfig -all option to get ur MAC address).

What is MTU?

The MTU is the “Maximum Transmission Unit” used by the TCP protocol. TCP stands for Transmission Control Prototcol. The MTU determines the size of packets used by TCP for each transmission of data. Too large of an MTU size may mean retransmissions if the packet encounters a router along its route that can’t handle that large a packet. Too small of an MTU size means relatively more overhead and more acknowledgements that have to be sent and handled. The MTU is rated in “octets” or groups of 8 bits. The so-called “official” internet standard MTU is 576, but the standard rating for ethernet is an MTU of 1500.

Difference Between. Switch , Hub, Router..

Hub: 1.it is a layer1 device..used to connect various machine on Lan.2.It forwards broadcast by default.3.It supports one collision domain and one broadcast domain.4.it works on Bus topology resulting less speed.Switch: 1. A layer2 device.2. Forward broadcast first time only.3. one broadcast domain & collision domains depends on no. of ports.4.It is based on Star Topology giving 100mbps to every pc on Lan.

Page 35: System Admin  Interview  questions

Router: 1. Does not Broadcast by default.2. breaks up Broadcast domain.3. Also called Layer3 switch.

VPN.....VPN(Virtual Private Network )… these are basically the logical networks on the physical line… you can have many VPN over same line..Need of VPN arises when your company need to increase the network but don’t want to buy any more switches.. take an eg. your dept. your room is packed with employees and ur company need to add 4 more persons to ur deptt. what will they do.. the solution is to create VPN’s…you can configure the switch ports in other deptts. and create a specific VLAN of ur deptt. So that the persons can sit there and access to the required pcs.

 

ARP & RARP.....

      Stands for Address Resolution Protocol…whenever a request is sent by a node on one network to the node on another network the Physical address(MAC) is required and for this the IP address need to be flow over the network..whenever a router with that network (IP) gets the msg. the required MAC address is sent through the network this process of converting the IP address to MAC address is Called ARP..and the reverse thats the convertion of the Mac address to the IP address is called RARP ( Reverse Address Resolution Protocol)

 

What is the difference between layer 2 and layer 3 in the OSI model?

Layer 2 is responsible for switching data whereas Layer 3 is responsible for routing the data.

Layer3: With information gathered from user, Internet protocol make one IP packet with source IP and Destination IP and other relevant information. It can then route packet through router to the destination.

Layer2: Soon after it receives IP packet from layer 3, it encapsulate it with frame header (ATM header in case of ATM technology) and send it out for switching. In case of Ethernet it will send data to MAC address there by it can reach to exact destination. 

WINDOWS Shortcut Keys

General Windows Keystrokes

Get Help – F1

Open the Start Menu – WINDOWS LOGO KEY or CTRL+ESC

Switch between Open Applications – ALT+TAB

Page 36: System Admin  Interview  questions

Open the Shortcut Menu – APPLICATIONS KEY or SHIFT+F10

Minimize all Applications – WINDOWS LOGO KEY+M

Find a File or Folder from Desktop – F3

Move to First Item on the Taskbar – WINDOWS LOGO KEY+TAB

Open Windows Explorer – WINDOWS LOGO KEY+E

Open Run Dialog – WINDOWS LOGO KEY+R

Application Keystrokes

Exit the Active Application – ALT+F4

Open the Application Control Menu – ALT+SPACEBAR

Move to the Menu Bar – ALT

Move between Menus – ALT, ARROW KEYS

Choose a Menu Item – ENTER

Open a child Window Control Menu – ALT+DASH

Cancel or close a Menu – ESC or ALT

Working in Dialog Boxes

Move through Dialog Controls – TAB

Move Backward through Dialog Controls – SHIFT+TAB

Move to Another Page – CTRL+TAB

Reverse Direction through Pages – CTRL+SHIFT+TAB

Select/Deselect in List View – SPACEBAR or CTRL+SPACEBAR

Toggle a Check Box ON/OFF – SPACEBAR

Working with Text

Move One Character Left – LEFT ARROW

       Move One Character Right – RIGHT ARROW

       Move One Word Left – CTRL+LEFT ARROW

       Move One Word Right – CTRL+RIGHT ARROW

       Move to Beginning of Line – HOME

       Move to End of Line – END

Page 37: System Admin  Interview  questions

       Move One Paragraph Up – CTRL+UP ARROW

       Move One Paragraph Down – CTRL+DOWN ARROW

       Move to Beginning of Document – CTRL+HOME

       Move to End of Document – CTRL+END

       Scroll Up or Down One Screen – PAGE UP or PAGE DOWN

       Select One Character Left – SHIFT+LEFT ARROW

       Select One Character Right – SHIFT+RIGHT ARROW

       Select One Word Left – CTRL+SHIFT+LEFF ARROW

        Select One Word Right – CTRL+SHIFT+RIGHT ARROW 

       Select to Beginning of Line – SHIFT+HOME

       Select to End of Line – SHIFT+END

       Select to Beginning of Document – CTRL+SHIFT+HOME

         Select to End of Document – CTRL+SHIFT+END

         Select All – CTRL+A

         Undo – CTRL+Z

         Delete Current Character – DELETE

         Delete Prior Character  – BACKSPACE

Working in Windows Explorer

Delete Selected File or Folder  – DELETE

Rename Selected File or Folder – F2

Refresh Window – F5

Switch Between Tree View and List View – F6 or TAB

Go Up One Folder Level – BACKSPACE

Open File or Folder Properties – ALT+ENTER

Untruncate Columns in List View – CTRL+NUM PAD PLUS 

Using the Clipboard

Copy Selected File or Text to Clipboard – CTRL+C

Cut Selected File or Text to Clipboard – CTRL+X

Page 38: System Admin  Interview  questions

Paste Contents of Clipboard – CTRL+V

Windows System Key Combinations

CTRL+ESC - Open Start menu

ALT+TAB - Switch between open programs

ALT+F4 - Quit program

SHIFT+DELETE - Delete items permanently

Windows Program Key Combinations

CTRL+C - Copy

CTRL+X - Cut

CTRL+V - Paste

CTRL+Z - Undo

CTRL+B - Bold

CTRL+U - Underline

CTRL+I - Italic

Mouse Click/Keyboard Modifier Combinations for Shell Objects

SHIFT+RIGHT CLICK - Displays a context menu containing alternative verbs.

SHIFT+DOUBLE CLICK - Runs the alternate default command (the second item on the menu).

ALT+DOUBLE CLICK - Displays properties.

SHIFT+DELETE - Deletes an item immediately without placing it in the Recycle Bin.

General Keyboard-Only Commands

F1 - Starts Windows Help.

F10 - Activates menu bar options.

SHIFT+F10 - Opens a context menu for the selected item. This is the same as right-clicking anobject.

CTRL+ESC - Opens the Start menu. Use the ARROW keys to select an item.

CTRL+ESC, ESC - Selects the Start button. (Press TAB to select quick launch, the taskbar, system tray)

ALT+DOWN ARROW - Opens a drop-down list box.

Page 39: System Admin  Interview  questions

ALT+TAB - Switch to another running application. Hold down the ALT key and then press the TAB key to view the task-switching window.

Press down and hold the SHIFT key while you insert a CD-ROM to bypass the auto-run feature.

ALT+SPACE - Displays the main window's System menu. From the System menu, you can restore, move, resize, minimize, maximize, or close the window.

ALT+- (ALT+hyphen) - Displays the Multiple Document Interface (MDI) child window's System menu. From the MDI child window's System menu, you can restore, move, resize, minimize, maximize, or close the child window.

CTRL+TAB - Switch to the next child window of a Multiple Document Interface (MDI) application.

ALT+ - Opens the corresponding menu.

ALT+F4 - Closes the current window.

ALT+DOWN ARROW - Opens a drop-down list box.

CTRL+F4 - Closes the current Multiple Document Interface (MDI) window.

ALT+F6 - Switch between multiple windows in the same program. For example, when the Notepad Find dialog box is displayed, ALT+F6 switches between the Find dialog box and the main Notepad window.

Shell Objects and General Folder/Windows Explorer Shortcuts

F2 - Rename object

F3 - Find: All Files

CTRL+X - Cut

CTRL+C - Copy

CTRL+V - Paste

SHIFT+DEL - Delete selection immediately, without moving the item to the Recycle Bin.

ALT+ENTER - Open the property sheet for the selected object.

To Copy a File - Press down and hold the CTRL key while you drag the file to another folder.

To Create a Shortcut - Press down and hold CTRL+SHIFT while you drag a file to the desktop or a folder.

General Folder/Shortcut Control

Page 40: System Admin  Interview  questions

F4 - Selects the Go To A Different Folder box and moves down the entries in the box (if the toolbar is active in Windows Explorer).

F5 - Refreshes the current window.

F6 - Moves among panes in Windows Explorer.

CTRL+G - Opens the Go To Folder tool (in Windows 95 Windows Explorer only).

CTRL+Z - Undo the last command.

CTRL+A - Select all the items in the current window.

BACKSPACE - Switch to the parent folder.

SHIFT+CLICK - Close Button For folders, close the current folder plus all parent folders.

Windows Explorer Tree Control

Numeric Keypad * - Expands everything under the current selection.

Numeric Keypad + - Expands the current selection.

Numeric Keypad - - Collapses the current selection.

RIGHT ARROW - Expands the current selection if it is not expanded, otherwise goes to the first child.

LEFT ARROW - Collapses the current selection if it is expanded, otherwise goes to the parent.

Property Sheet Control

CTRL+TAB/CTRL+SHIFT+TAB - Move through the property tabs.

Accessibility Shortcuts

Tap SHIFT 5 times - Toggles StickyKeys on and off.

Press down and hold the right SHIFT key for 8 seconds - Toggles FilterKeys on and off.

Press down and hold the NUM LOCK key for 5 seconds - Toggles ToggleKeys on and off.

Left ALT+left SHIFT+NUM LOCK - Toggles MouseKeys on and off.

Left ALT+left SHIFT+PRINT SCREEN - Toggles High Contrast on and off.

Microsoft Natural Keyboard Keys

WINDOWS - Start Menu

WINDOWS+R - Run dialog box

Page 41: System Admin  Interview  questions

WINDOWS+M - Minimize All

SHIFT+WINDOWS+M - Undo Minimize All

WINDOWS+F1 - Help

WINDOWS+E - Windows Explorer

WINDOWS+F - Find Files or Folders

WINDOWS+D - Minimizes all open windows and displays the desktop

CTRL+WINDOWS+F - Find Computer

CTRL+WINDOWS+TAB - Moves focus from Start, to Quick Launch bar, to System Tray. Use RIGHT ARROW or LEFT ARROW to move focus to items on Quick Launch bar and System Tray

WINDOWS+TAB - Cycle through taskbar buttons

WINDOWS+BREAK - System Properties dialog box

Application key - Displays a context menu for the selected item

Microsoft Natural Keyboard with IntelliType Software Installed

WINDOWS+L - Log off Windows

WINDOWS+P - Opens Print Manager

WINDOWS+C - Opens Control Panel

WINDOWS+V - Opens Clipboard

WINDOWS+K - Opens Keyboard Properties dialog box

WINDOWS+I - Opens Mouse Properties dialog box

WINDOWS+A - Opens Accessibility Options(if installed)

WINDOWS+SPACEBAR - Displays the list of IntelliType Hotkeys

WINDOWS+S - Toggles the CAP LOCK key on and off

Dialog Box Keyboard Commands

TAB - Move to the next control in the dialog box.

SHIFT+TAB - Move to the previous control in the dialog box.

SPACEBAR - If the current control is a button, this clicks the button. If the current control is a check box, this toggles the check box. If the current control is an option button, this selects the option button.

Page 42: System Admin  Interview  questions

ENTER - Equivalent to clicking the selected button (the button with the outline).

ESC - Equivalent to clicking the Cancel button.

ALT+ - Select menu item.