Sunteți pe pagina 1din 23

+-10. WHAT IS AD A.

A active directory centralized database where it contains information about objects like, Users, Groups, Computers, Printers, OUs, Contacts and Shared Folders. 11. FEATURES OF AD

A. Fully integrated Security, Integration with DNS, Policy Based Administration, Scalable, Flexible, Extensible, Inter operability with other directory services. 12. WHAT ARE THE COMPONENTS OF AD

A. Logical Structure : Domains, Trees, Forests & OUs Physical Structure : Sites and Domain Controllers 13. WHAT IS STRUCTURE OF AD A. LOGICAL and PHYSICAL 14. A. WHAT IS THE PROTOCOL USED BY AD FOR DIRECTORY ACCESS LDAP Light Weight Directory Access Protocol

15. WHAT ARE THE NAMING CONVENTIONS USED BY LDAP A. DN-(Distinguished Name)RDN-(Relative Distinguished Name) UPN-(User Principal Name) GUID-(Golbal Unique Identifier) 16. WHAT IS A DOMAIN

A. Domain is collection of computers connected together with a server and users. 17. WHAT IS WORKGROUP

A. Collection of computers connected together without a server (only clients) 18. WHAT IS A TREE

A. Tree is a logical component of AD. Is a collection of domains which share contiguous name space. 19. WHAT IS A FOREST

A. Collection of Trees which don't share contiguous name space. 20. WHAT IS-A SITE

A. Site is a Physical component of AD. Group of TCP/IP subnets connected with a high speed wan link. 21. WHAT IS DC

A. Server with AD installed 22. WHAT IS A CHILD DC

A. Is a sub domain controller under root domain controller which share name space. 23. WHAT IS AN ADDITIONAL DC A. It is a backup server for DC 24. HOW TO PROMOTE DC ON A MEMBER SERVER A. Start - run - DCPromo 25. WHAT IS A ROLE OF ADDITIONAL DC

A. It maintains backup of AD to provide fault tolerance and network load balancing. 26. A DC CAN HAVE HOW MANY ADDITIONAL DCS A. Any no. ofADCs

27. WHAT ARE THE ADDITIONAL TOOLS FOUND AFTER INSTALLING A DC A. ADUC, ADSS, ADDT, DCSP, DSP 28. WHAT ARE DIFF FUNCTIONAL LEVELS OF 2003 A. Domain functional level and Forest functional levels 29. WHAT IS A MEMBER SERVER

A. 2000 of 2003 server which is a part of the domain 30. 31. WHAT IS A STANDALONE SERVER A. Server which is not a part of domain WHAT IS AN OBJECT

A. It is a representation of in entity 32. WHAT ARE THE DIFFERENT OBJECTS IN AD

A. Users, Groups, Computers, Printers, OUs, Contacts and Shared Folders 33. WHAT IS A SCHEMA

A. Set of rules. Schema is design of AD, defines objects and classes

34.

WHAT IS AN ATTRIBUTE A. Attribute is a piece of information about objects (Prop B. erties of objects)

35.

WHAT IS A CLASS

A. Class is a Collection of AD objects 36. WHAT IS AN FSMO

A. Flexible single master operations 37. WHAT ARE THE DIFF OPERATIONS MASTER OF 2003 PDC

38. SCHEMA MASTER, DOMAIN NAMING MASTER, EMULATOR, INFRASTRUCTURE MASTER, RID MASTER 39. WHAT IS A SCHEMA MASTER

Schema master controls up dates and modifications to schema. If you want to change schema we must have schema master on line. There will be only schema master in the forest If schema master fails it will not effect anything but we will not able change schema. 40. WHAT IS A DOMAIN NAMING MASTER,

Domain naming master controls addition or removal of domains in a forest. It ensures that domain names are unique. When we create a new domain, domain-naming master will send query a g.c server to conform whether the name existing domain or not because of this, g.c and domain naming master must be on same domain controller If domain master fails we cannot add or remove domain in a forest 41. WHAT IS A PDC EMULATOR

A. it acts as a pdc for nt bdcs in a mixed mode B.writes the password changes from windows nt window98,95 to the directory ntds.dit C, preferential replication of passwords When ever we change a password on a dc that dc will immediately forwarded the password change to the pdc emulator. For copying this password change to all dc will take time it is know as replication latency. In the mean time if the user tries to logon to another dc,that dc before rejecting the logon request because of the bad password will forward the request to pdc emulator. d. Acts as a time server

All the dc in the domain will synchronizes the time from pdc emulator in that domain The pdc emulator of that domain gets its time synchranges from root domain pdc emulator The root domain pdc emulator gets its time synchges from external time server like this time in the domain will be same E. writable copy of gp By default when you try to create or modify gp s the gps snap-in run on pdc emulator to reduce replication conflicts. 42. WHAT IS A INFRASTRUCTURE MASTER

A. Is responsible for updating user and group information and updating Global Catalog, Only one INFRASTRUCTURE MASTER per domain. 43. WHAT IS A RID MASTER.

It allocates pool of rids to all the dc in the domain SID=DOMAIN SID+RID WHEN EVER WE CREAT user group or computer they will get on sid this sid consists of domainsid+rid. Rid is given by rid master. If rid master fails will be to create users groups computer till the time we have ridpool. 44. WHAT IS FILE SYSTEM

A. File system provides the services like saving, deleting & copying of files & folders in a systematic manner on the hard disk 45. A. WHAT ARE DIFF FS SUPPORTED BY 2000 & 2003 FAT, FAT32, NTFS, CDFS & UDFS

46. FEATURES OF NTFS IN 2000 & 2003 A. Provides file & folder level security, compression, encryption, reduced fragmentation, hot fixing, maximum partition size : 2 TB, file size : up to 64 GB, Disk quotas, mounting. 46. NEWLY ADDED NTFS FEATURES IN 2003

A. Volume Shadow copy services, maximum partition size: 16 TB file size can be up to 16 TB, Recovery logging of disk activities 47. WHAT IS THE NTFS VERSION FOR 2000 & 2003 A. Ver 5.0 & 5.1 for 2000 and Ver 5.2 for win 2003 48. WHAT ARE THE FILE & FOLDER PERMISSIONS IN 2K

A. File Permissions: Fullcontrol, Modify, Read & Execute, Read, Write, Special Permissions Folder Permissions: Fullcontrol, Modify, Read & Execute, List Folder Contents, Read, Write, Special Permissions 49. WHAT IS THE SIGNIGICANCE OF MODIFY & FULL CONTROL PERMISSIONS A. FC = RWXDO, Modify = RWXD 50. WHAT ARE THE ADVANCED PERMISSIONS AVAILABLE IN 2K A. Combination of permissions. 51. WHAT ARE THE FILE ATTRIBUTES A. Read, Write, Hidden & Archive.

52. WHAT ARE THE SHARE LEVEL PERMISSIONS A. Full Control, Change, Read 53. HOW TO SHARE A RESOURCE (F/F, DRIVE, PRINTER, ETC..) A. Right Click - Properties - Share 54. SHARE/FILE NAMES CAN BE UPTO

A. Share name can be up to 80 Characters, File Names can be up to 255 characters. 55. HOW TO MAP A SHARED RESOURCE

A. Right click on the share and click map network drive 56. HOW TO CONNECT TO A SHARED RESOURCE USING COMMAND PROMPT A. Start - Run - CMD - Net use Z: (\\systemname\sharename) 57. WHAT IS NET USE, NET SHARE, NET VIEW, NET USER ETC

A. Net use for mapping drives, net share for creating shares, net view for users logged in and net user for creating or modifying users 58. HOW TO SHARE A RESOURCE REMOTELY

A. From Computer Management - connect to the computer - shared folders - new 59. HOW TO ACCESS A REMOTE SHARE

A. Start - Run - (\\SN\SN) or My network places 60. WHAT IS A QUOTA & ITS FEATURES

A. New feature in 2000 & 2003. Quotas enable in Administrator to limit the access to the free space on local or server's hard disks 61. WHAT IS A DFS,

A. Distributed file system enable in Administrator to gather all the scattered shares on the network and maintain in a single server and make them appear as if they are on the same side server 62. BENEFITS OF DFS

A. Easy file access, fault tolerance, load balancing and security 63. A. 64. DFS TERMINOLOGY DOMAIN DFS ROOT, STANDALONE DFS ROOT & DFS LINK DIFF B/W DOMAIN DFS ROOT AND STAND ALONE DFS ROOT

A. Domain DFS root offers fault tolerance and load balancing, can be configured only on DC. Stand Alone DFS root does not offer FT & LB can be configured only on Stand alone server 63. WHAT IS A DFS REPLICA OR TARGET .

A, liis a backup for doman dfs root on another server 64. 65. 66. 67. HOW MANY DFS ROOTS CAN EXIST FOR A DC A, 5000 to 50000 HOW MANY DFS LINKS CAN EXIST FOR A DC A, 5000 to 50000 NO OF DFS REPLICAS CAN EXIST FOR A DC A. WHAT IS EFS & ITS FEATURES 31

A. Encryption is the process of converting data into a format that cannot be read by another user. Once a user has encrypted a file, the file automatically remains encrypted whenever the file is stored on disk. Decryption is the process of converting data from encrypted format back to its original format. Once a user has decrypted a file, the file remains decrypted whenever the file is stored on disk.

68.

WHAT IS A TRUST

A. Trust is the process of offering or accessing resources from one domain to another domain. 69. WHAT IS A TRANSITIVE TRUST

A. It is a two way trust Ex. If A trusts B, B automatically trusts A 70. WHAT IS A IN/NON TRANSITIVE TRUST

A. It is one way trust Ex. If A trusts B, B does not trust A 71. WHAT IS AN IMPLICIT TRUST

A. Trust between the parent domain and grand child domain 72. WHAT IS AN EXPLICIT TRUST

A. It is a manual trust established by administrator between two forest or domains 73. WHAT IS THE DEFAULT TRUST BETWEEN THE PARENT & A CHILD DOMAIN A. Two way transitive trust 74. 75. 76. 77. HOW TO IMPLEMENT A TRUST A. ADDT AUTHENTICATION PROTOCOLS OF W2K A. WHAT IS SPOOFING WHAT IS A KDC . A. Kerberos & NTLM

A. Key Distribution Centre (DC) which issues keys to the clients 78. WHAT IS KERBEROS A. It is an authentication protocol of Win 2000 & 2003 79. WHAT IS NTLM

A. It is an authentication protocol of Win NT

80. A. B. C.

AUTHENTICATION PROCESS IN 2000 & 2003 1 .Clients sends a request to DC DC creates a client session key & server session key. The server session key packages client information and server session

key and forms a session ticket. D. Client session key and session ticket are sent to the client which

consists of rights and permissions. E. F. 81. A. Then the server verifies the authenticator between the client & server Allows the resource FEATURES OF KERBEROS Introduced in the year 1991 by MIT (MASSACHUSETTS INSTITUTE

OF TECHNOLOGY) B. C. D. E. F. N/W 82. WHAT IS A TIMESTAMP Windows 2000 was first to implement this protocol Kerberos is a name of 3 headed dog (Cerderos) It follows a 3 headed approach while authenticating the users It provides high level of security It encrypts the user name & password when they are being sent over

A. Time check during while user logs in 83. 84. 85. WHAT IS A TIME SERVICE A. WHAT IS TGT & TGS WHAT IS A BASIC DISK & DYNAMIC DISK

A. Basic disk refers to partitions, dynamic refers to volumes 86. WHAT IS A SIMPLE, SPANNED , STRIPPED, MIRRORED AND RAID 5 VOLUME A. B. Simple Volume : Space from single hard disk forms simple volume Spanned Volume : Free space can span more than one hard disk and

appears as a single volume C. size D. Mirrored Volume : Is an additional hard disk used for imaging primary Stripped Volume: Space selection from each hard disk is identical in

hard disk to protect the data in the second disk when first disk fails. 87. A. WHAT IS RAID? RAID0, RAID 1, & RAID5 Redundancy array inexpensive disks : It is a standard used for

protecting the data B. C. RAID0 : Striping without parity offers no fault tolerance RAID1 : Mirroring offers fault tolerance, doesn't offer performance,

requires down time. D. RAID5 : Striping with parity offers highest fault tolerance, offers

availability and performance i.e no down time. 88. A. B. C. 89. 90. DRIVES ARE REQUIRED FOR RAID 0,1,5 RAIDO : Minimum 2 disks and Maximum 32 RAID1 : Minimum & Maximum 2 disks RAID5 : Minimum 3 and Maximum 32 WHICH OF THE RAIDS PROVIDE HIGHEST FT A. RAID 5

HOW TO REGENARATE THE DATA LOST FROM RAID 1 & 5

A. By fixing new HDD selecting regenerate option by right clicking on the drive from disk management. 91. A. Document to be printed handed over to GDI GDI invokes print drivers and drivers convert the doc format to either RAW or EMF and hands over to the spooler Spooler gathers the document to the local HDD and hands over to print processor Print processor presents the format to the printer which is understandable by the printer (RAW) and hands over to Print Monitor Print Monitor determines the port to which print device is attached submits the data to print device Prints the output 92. 93. A. B. WHAT IS A PRINT POOL A. Group of Printers WHAT IS THE DIFF B/W RAW & EMF FORMAT Raw format is the only format printer understands EMF (Enhanced Meta Format) It is a compressed format used for PRINT PROCESS IN 2K

faster printing over the N/W. 94. WHAT IS LOCAL PRINTER

A. The printer which is directly attached to the computer 95. WHAT IS A NETWORK PRINTER

A. A printer with its own NIC 95. HOW TO CONNECT TO A REMOTE PRINT DEVICE A. My Network places, Browse the Printers, R/C Connect 96. WHAT ARE THE DEFAULT BUILT IN USER A/Cs A. Administrator and Guest A/Cs

97.

WHAT ARE THE DEFAULT BUILT IN GROUP A/CS Server Operators, Backup Operators, Administrators,

A. Account Operators, Print Operators, etc

-98. WHAT IS A LOCAL GROUP A. A group which can be created on client computer 99. WHAT IS A DOMAIN LOCAL GROUP

A. A group with pre-defined rights and permissions used for setting permissions 100. WHAT IS A GLOBAL GROUP

A. Is a collection of users used for organizing users 101. A. 5 WHAT IS A GROUP SCOPE Group scope identifies the extent of the group with in a domain or forest

102. A.

WHATISAUNIVARSALGROUP Group made up of users from different domains DISTRIBUTION,

103. WHAT ARE TWO TYPES OF GROUPS A. SECURITY 104. A. 105.

WHAT ARE THE USER ENVIRONMENT NEEDS Desktop settings, Startup applications & Network connectivity WHAT IS A PROFILE

A. Profile is combination of user environment, desktop environment 106. WHAT IS A POLICY

A. Policy is a feature of OS which determines which user has what type of access to the N/W resources 107. A. 108. A. WHAT ARE THE DIFF POLICIES SUPPORTED IN 2K ACCOUNT , AUDIT, SECURITY AND GROUP POLICY WHAT ARE DIFF TYPES OF PROFILES Local : Profile which is saved in the local HDD where the user works

available only one computer B. Roaming : Profile which is saved in the server and available in the

entire Network C. Mandatory : Available in the entire N/W but setting are not saved when

a user logs off 109. HOW THE PROFILE IS APPLIED

A. When the user logs in is loaded with a local profile and N/W profile which ever is latest takes precedence 110. A. 111. A. B. HOW THE GROUP POLICY IS APPLIED First computer policy is applied then site, domain and OU level DIFF SECURITY POLICES OF 2K Local Security Policy : which is limited in only to the local machine Domain security policy : Applies to all the domains & computers with in

the domain C. Domain controller security policy : Applies policies only to one domain

controller 112. A. 113. WHAT IS A RIGHT It is a permission or type of access what a user can do and can't do WHAT IS A GROUP POLICY

A. It is a combination of permissions, security and rights which can be applied on sites, domains and OUs 114. WHAT IS A GROUP POLICY OBJECT

A. In object with a combination of permissions which can be linked with sites, domains and OUs 115. A. 116. HOW TO LINK GPO WITH DC/SITE/OU DC Properties - Group Policy - New - GPO Name WHAT ARE THE FEATURES OF GROUP POLICY

A. Group policy offers security, software deployment, folder redirection, logon logoff scripts, internet explorer maintenance, back up and restore etc. 117. A. 118. A. OUs GP CAN BE IMPLIMENTABLE ON Local computer, Sites, domains, DCs and OUs WHAT IS THE SIGNIFICANCE OF INHERITENCE OF GROUP POLICY When you apply policy on site level, policy gets inherited by all the domains and

119. WHAT IS THE SIGNIFICANCE OF BLOCKING GROUP POLICY INHERITANCE A. When a child object need not be effected with the policy applied on the parent THE PURPOSE OF LINKING AN EXISTING GP WITH

120. WHAT IS ANOTHER CONTAINER

A. A single GPO can have multiple policies set and can be linked with sites domains and OUs. Need not create multiple GPOs.

120. A.

WHAT IS THE ORDER IN WHICH GPOs ARE APPLIED Always the first policy is applied then the second and so on

121. WHAT ARE THE SUBFOLDERS SEEN UNDER COMPUTER CONFIGURATION & USER CONFIGURATION A. Computer configuration, software setting, windows settings and

administrative templates B. User configuration, software setting, windows settings and

administrative templates 122. A. 123. A. HOW TO APPLY SECURITY POLICIES USING GP Using LSP, DSP, DCSP under admin tools. WHAT IS THE ADVANTAGE OF DEPLOYING SOFTWARES USING GP Automating, upgrading and repairing software installation online

124. WHAT ARE THE THREE PRIMARY GP SOFTWARE DEPLOYMENT METHODS A. Assign,Published, assigned and advanced 125. LAN PROTOCOLS SUPPORTED BY 2K

A. NetBEUI, IPX/SPX, TCP/IP, NWLINK, APPLETALK, DECNET ,WINDOWS RAS AND ARAP 126. 127. A. 128. A. 129 WAN PROTOCOLS SUPPORTED BY 2K & 03 VPN PROTOCOLS SUPPORTED BY 2K & 03 L2F, PPTP AND L2TP DIFF RAS AUTHENTICATION PROTOCOLS PAP, CHAP, MSCHAP AND MSCHAP V2 WHATISANARP A. Address Resolution protocol used for mapping IP to MAC A. SLIP.PPP,

129. A. B. C. D. E. 130. A. Host ID 131. A. 132. A. 133. A. 134. A. B. C. 135. A.

FEATURES OF TCP/IP It is a most popular LAN and WAN protocol Supported by many OS It is a routable protocol It is a robust protocol Available in two Versions IP V.4 & IP V.6 WHAT IS A SUBNET MASK Acts like a mask between NAA/ and Host ID or used for differentiating N/W with

WHAT IS SUBNETTING Dividing the same N/W into Smaller subnets WHAT IS A GATEWAY Address of a Router WHAT ARE THE DIFF TCP/IP CLASSES A, B, C, D and E WHAT ARE THE RESERVED IP ADDRESSES 10.0.0.1 to 10.255.255.254 172.16.0.1 to 172.31.255.254 192.168.0.1 to 192.168.255.255 WHAT IS 'IANA' Internet assigned numbering authority is now called as Internet Corporation for

assigning names and numbers (ICANN)

136. A. 137. A. 138. 139. A. 139. A. 140. A. 141. A.

WHAT IS MULTICASTING Use of class D IPs : Used for publishing the same message to group of people WHAT IS A NETWORK ID and WHAT IS A BROADCAST ID 0.0.0.0 and 255.255.255.255 WHAT IS A LOOP BACK ID A. 127.0.0.1

DIFF TROUBLESHOOTING UTILITIES OF TCP/IP Ping, IPconfig, Nbtstat, netstat, pathping, tracertetc WHAT ARE THE CORE PROTOCOLS OF TCP/IP TCP.UDP, ICMPand ARP WHAT IS ROUTING Process of providing communication between two different N/Ws WHAT IS DIFF BETWEEN STATIC & DYNAMIC ROUTING Static Routing : Doesn't require any protocols and routing table remains

static until admin changes. B. Dynamic Routing : Uses dynamic routing protocols like RIP V2, OSPF,

IGMP and IGRP. Routing table gets changed automatically or dynamically as and when there is a change in routing i.e addition or removal of routers modification of routing table. 142. A. 143. A. 144. WHAT ARE THE ROUTING PROTOCOLS OSPF, RIPVER2, NAT, IGMP HOW TO ENABLE ROUTING Start-Programs-Admin Tools-RRAS-R/c Server - configure and enabled WHAT IS NATTING

A. Enabling one way communication i.e private network can communicate with public but public can't communicate with private. 145. WHAT IS DIFF BETWEEN PRIVATE & PUBLIC IPS

A. B. 146. 147. A. N/W. 148. A. 149. A. B. 150. A. 151.

IPs which are not accessible by all are called private IPs IPs which are accessible are called public IPs. WHO WILL ISSUE PUBLIC IPS A. ICANN or IANA WHATISSNMP Simple Network Management Protocol: used for troubleshooting & managing the

WHAT IS SMTP Simple mail Transfer Protocol : Used for sending mails WHAT IS POP/POP3 & IMAP4 Post office protocol : used for receiving mails Internet Mail Access Protocol: used for receiving mails DIFF H/W DEVICES SUPPORTED BY RAS PSTN Modems, ISDN Modems, X.25 PADS, RS232 interface and DSL Modems WHAT IS DNS

A. Domain Naming Service or System : used for resolving host names to IPs and IPs to Host names 152. A. 153. 154. A. 155. WHATIS'NBNS' NetBios naming system Ex: WINS

2K ACCESS RESOURCES USING DNS NAMING CONVENTIONS WHAT IS A FORWARD LOOKUP Resolving Host names to IP addresses WHAT IS A REVERSE LOOKUP

A. Resolving IP addresses to Host names

156. A. 157. A.

WHAT IS A HOST RECORD It's a file contains host names to IP mapping information WHAT IS A RESOURCE RECORD It is a record provides the information about the resources available in the N/W

infrastructure 158. A. 159. A. 160. A. WHAT ARE THE DIFF DNS ROLES STANDARD PRIMARY, STANDARD SECONDARY & AD INTEGRATED WHAT IS A ZONE Zone is a sub tree of DNS database WHAT IS PRIMARY, SECONDARY, STUB & AD INTEGRATED ZONE Primary : Zone which is saved as normal text file with filename.dns in

DNS folder. Maintains a read write copy of zone database B. Secondary : Maintains a read only copy of zone database on another

dns server. Provides fault tolerance and load balancing by acting as backup server to primary server C. Stub : Contains a copy of name server and SOA records used for

reducing the dns search orders. Provides fault tolerance and load balancing 161. 162. A. WHAT DOES A ZONE CONSIST OF & WHY DO WE REQUIRE A ZONE A. Zone consists of resource records and we require zone for representing sites WHAT IS CACHING ONLY SERVER When we install 2000 & 03 server it is configured as caching only server where it

maintains the frequently accessed sites information and again when we access the same site for next time it is obtain from cached information instead of going to the actual site.

163. A.

WHAT IS FORWARDER When one DNS server can't resolve the query it can be forwarded to another DNS

once configured as forwarder. 164. WHATIS SECONDARY DNS SERVER

A. It is backup for primary DNS where it maintains a read only copy of DNS database. 165. HOW TO ENABLE DYNAMIC UPDATES IN DNS A. Properties 166. A. WHAT ARE THE PROPERTIES OF DNS SERVER INTERFACES, FORWARDERS, ADVANCED, ROOTHINTS, S-P-AT-DNS-Zone

SECURITY.MONITORING,LOGGING,DEBUG LOGINIG. 167. A. 168. A. 169. PROPERTIES OF A ZONE GENERAL, SOA, NAMESERVER, WINS, SECURITY AND ZONE TRANSFER WHAT IS SCAVENGING Finding and deleting unwanted records WHAT ARE SRV RECORDS

A. SRV are the service records, there are 6 service records. They are useful for locating the services 170. A. B. C. D. E. WHAT ARE THE TYPES OF SRV RECORDS MSDCS : Contains DCs information TCP : Contains Global Catalog, Kerberos and LDAP information UDP : Contains Kerberos information Sites : Contains Sites information Domain DNS Zone : Contains domain's DNS specific information

F. 171. 172.

Forest DNS Zone : Contains Forest's specific information WHERE DOES A HOST FILE RESIDE A. WHAT IS SOA C:Windows\System32\drivers\etc

A. Start of Authority: Useful when a zone starts. Provides the zone startup information 173. A. 174. A. 175. A. 176. WHAT IS A QUERY A request made by the DNS client to provide the name server information WHAT ARE THE DIFFERENT TYPES OF QUERIES RECURSION, ITERATION TOOLS FOR TROUBLESHOOTING DNS DNS CONSOLE,NSLOOKUP,DNSCMD,IPCONFIG,LOGS ,PM WHAT IS DHCP

A. Dynamic Host Configuration Protocol : Assigns IPs to the clients requested dynamically or automatically 177. A. B. C. D. PROCESS OF DHCP (DORA) Discover: The client discovers DHCP Offer: The DHCP server offers a group of IPs to the clients to pick any Request: The client selects an IP and request DHCP to confirm it Acknowledgement : The DHCP server makes a confirmation by sending an DHCPACK to the client 178. 179. WHAT IS A SCOPE A. Range of IP addresses

WHAT IS AN IP LEASE

A. DHCP server offers an IP to the client for a period of 8 days. This offer is called IP lease

180. 181.

WHAT IS THE DEFAULT DURATION OF A LEASE A. 8 days WHAT IS AUTHORIZING DHCP SERVER

A. Enabling AD know the availability of DHCP server. Useful when we have multiple DHCP Servers and you want to designate one particular DHCP server to be active. Then we should authorize. 182. A. 183. A. 184. A. 185. WHAT IS IP RESERVATION Reserving a particular dynamic IP for a particular system WHAT IS EXCLUSION Omitting assigning from the range selected IPs. WHAT IS A SUPER SCOPE Group of scopes is called as super scope. PURPOSE OF DHCP RELAY AGENT

A. DHCP server is available on another N/W and you want another N/W to obtain Ips from the DHCP server. Then the DHCP Relay Agent has to be configured on the router so that the DHCP RA can forward the requests from the clients to the DHCP server to obtain IPs for the clients it act like a mediator between clients and dhcp. 186. A. 187. A. 188. A. HOW TO GIVEUP AN IP OBTAINED FROM DHCP S-R-CMD- IPCONFIG /RELEASE HOW TO OBTAIN A NEW IP FROM DHCP SERVER S-R-CMD- IPCONFIG /RENEW SWITCHES USED WITH IPCONFIG IPCONFIG /ALL, RELEASE, RENEW, FLUSHDNS

189. IF THE CLIENT IS UNABLE TO CONTACT DHCP SERVER, WHAT HAPPENS A. Obtains an IP from APIPA 190. WHAT IS APIPA

A. Automatic Private IP addressing, when a client machine unable to contact dhcp then apipa assigns an IP to the client. This enables the N/W availability. 191. A. 192. WHAT ARE THE IP RANGES PROVIDED BY APIPA 169.254.0.0 to 169.254.255.255 WHAT IS WINS

A.Window Internet Naming Service : Useful in windows N/W only. Resolves NetBios names to IP addresses and IPs to NetBios names. 193. WINS IS USED IN WHICH ENVIRONMENTS A. When the N/W has OS like 95, WKS, NT, 98 194. WINS SUPPORTS NBNS CONVENTIONS 195. DIFF BETWEEN NBNS & DNS CONVENTIONS A. Wins uses NBNS conventions and DNS uses DNS conventions 196. WHAT ARE THE PORT NUMBERS FOR:

FTP,TELNET,SMTP,DNS,HTTP,POP3,IMAP,SNMP,NNTP,LDAP,L2TP,PPTP,KERB EROS, DNS,HOSTNAME,RADIUS,LDAP, AND WINS A. FTP-21,TELNET=23, SMTP-25,DNS-53,HTTP-80,POP3-110,IMAP-143,

SNMP-161,NNTP-119,LDAP-389,L2TP-1701,PPTP-1723,KERBEROS-88,DHC-P67, HOSTNAME-42,RADIUS-1812,WINS-1512, router-520 197. A. 198. A. 199. A. 200. A. 201. WHAT IS IIS It is a Web server from microsoft WHAT ARE THE SERVICES OFFERED BY IIS www,http,ftp,nntp,smtp,frontpage,asp.net services WHICH VER OF IIS IS WITH 2K& 03 Win2K-IIS5.0and Win03-IIS 6.0 WHAT IS A VIRTUAL DIRECTORY Using virtual directory we can have child websites or links to parent websites WHAT IS REGISTRY

A. 202.

Registry is a configuration database about system, hardware & software ICMP AND ITS IMPORTANCE

A. Internet Control Message Protocol : Responsible for generating messages like requested time out, destination not reachable, TTL, and other echo messages. 203. A. 204. A. 205. A. WHAT ARE THE BOOTABLE FILES NTLDR, NTdetect.com, Boot.lni, NTOSKRNL.exe, Bootsect.dos, WHAT IS A PAGE FILE A page file is used as virtual memory. HOW TO INCREASE THE SIZE OF PAGING FILE System properties-Advanced-Performance settings-advanced-change

206. WHAT IS THE ADVANTAGE OF SPLITTING A PAGE FILE AMONG DRIVES A. 207. A. 208. 209. Improves the I/O performance WHAT IS A FILE REPLICATION Replication is process of duplicating files of one server to another server. WHAT IS A SYSVOL It is a public folder gets replicated on to all DCs and contain information user

Information like policies and profiles. Policies and scripts are saved in sysvol folder and replicated to all the DC in a forest File replication service is responsible for the replicating policies and scripts 210. WHAT IS A DEFAULT TIME FOR REPLICATION TO TAKE PLACE B/W DC AND. A. 5 seconds and 3 seconds for immediate change

S-ar putea să vă placă și