Documente Academic
Documente Profesional
Documente Cultură
2. What is LDAP?
3. What is DNS?
4. What are types of records in DNS?
5. What is WINS?
6. What is DHCP?
7. How clients use servers?
8. How servers provide optional data?
9. What are DHCP options?
10.How options are applied?
11.How the Lease Process Works
12.What are DHCP Client States in the Lease Process?
13.What are tombstone objects?
14.What is Global Catalog and Global Catalog Server?
15.What is Active Directory schema?
16.What are Active Directory Objects?
17.What are Active Directory Components?
18.What is Active Directory Replication?
19.What are the different partitions in AD?
20.What are types of Active Directory Trust Relationships?
21.In Active Directory, what are the differences between universal,
global, and domain local groups?
22.What are Forward Lookup Zones and Reverse Lookup Zones?
23.What are Operations Master Roles?
24.What are Forest-Wide Operations Master Roles?
25.What are Domain-Wide Operations Master Roles?
26.How to Plan the Placement of the FSMOs?
27.How to Manage Operations Master Roles?
28.How to view the existing Schema Master Role assignment?
29.How to view the existing Domain Naming Master role assignment?
30.How to view the existing RID Master role, PDC Emulator, and
Infrastructure Master Role assignments?
31.How to transfer the Schema Master role to another domain
controller?
32.How to transfer the Domain Naming Master role to another domain
controller?
33.How to transfer the RID Master role, PDC Emulator role, or
Infrastructure Master Role to another domain controller?
34.How to seize an Operations Master role?
35.How to perform a metadata cleanup?
36.What is "tattooing" the Registry?
37.What’s the major difference between FAT and NTFS on a local
machine?
38.What is LSDOU?
39.What is "tattooing" the Registry?
40.What is boot processing computer?
41.What do you mean by deadlock?
42.What is Distributed File System
43.What are the domain functional levels in Windows Server 2003?
44.How we can raise domain functional & forest functional level in
Windows Server 2003?
45.What is the default domain functional level in Windows Server 2003?
46.What is multi-master replication?
47.Which is the command used to remove active directory from a
domain controller?
48.What Exchange process is responsible for communication with AD?
49.What is DSACCESS?
50.Explain APIPA?
51.Where is GPT stored?
52.What hidden shares exist on Windows Server 2003 installation?
53.What’s the difference between standalone and fault-tolerant DFS
(Distributed File System) installations?
54.When should you create a forest?
55.How can you authenticate between forests?
56.What is an incremental backup?
57.What is Differential Backup?
58.What is Multilevel Incremental Backup?
59.What is reverse Incremental Backup?
60.What is Synthetic full backup?
61.What is RAID?
62.What is concatenation?
63.What is striping/RAID-0?
64.What is RAID 0+1? Why is it better than 0?
65.What is RAID-5?
66.What are types of Backups?
67.What is Incremental Backup?
68.What is Differential Backup
69.What is Full Backup?
70.
1. What is Active Directory?
An active directory is a directory structure used on Microsoft Windows based
computers and servers to store information and data about networks and domains. It
is primarily used for online information and was originally created in 1996 and first
used with Windows 2000.
An active directory (sometimes referred to as an AD) does a variety of functions
including the ability to provide information on objects, helps organize these objects
for easy retrieval and access, allows access by end users and administrators and
allows the administrator to set security up for the directory.
An active directory can be defined as a hierarchical structure and this structure is
usually broken up into three main categories, the resources which might include
hardware such as printers, services for end users such as web email servers and
objects which are the main functions of the domain and network.
2. What is LDAP?
LDAP (Lightweight Directory Access Protocol) is a protocol for communications
between LDAP servers and LDAP clients. LDAP servers store "directories" which are
access by LDAP clients.
LDAP is called lightweight because it is a smaller and easier protocol which was
derived from the X.500 DAP (Directory Access Protocol) defined in the OSI network
protocol stack.
LDAP servers store a hierarchical directory of information.
3. What is DNS?
Domain Name System (DNS) is one of the industry-standard suite of protocols that
comprise TCP/IP. Microsoft Windows Server 2003. DNS is implemented using two
software components: the DNS server and the DNS client (or resolver). Both
components are run as background service applications.
Network resources are identified by numeric IP addresses, but these IP addresses
are difficult for network users to remember. The DNS database contains records that
map user-friendly alphanumeric names for network resources to the IP address used
by those resources for communication. In this way, DNS acts as a mnemonic device,
making network resources easier to remember for network users.
The Windows Server 2003 DNS Server and Client services use the DNS protocol that
is included in the TCP/IP protocol suite. DNS is part of the application layer of the
TCP/IP reference model
4. What are types of records in DNS?
'A' Record: Points a hostname to an IP Addressing
NS Record: Shows the Authoritative DNS for the zone
SOA Record : Start of Authority Record which shows the crucial information like
SERIAL number, which is monitor by other name servers for change, which indicates
to them a change in information for a zone, REFRESH which tell how often a
secondary name server should check for a change in the serial number, RETRY is to
inform a secondary server how long it should use it current entry if it is unable to
perform a refresh and MINIMUM is how long the other name servers should hold
these information.
CNAME Record: Canonical Naming Record Which allows a node to be address using
more than one host name
MX Record: which is used for message routing where there are multiple mail
exchange hosts an A Record is needed for every MX Record Set
PTR Records: These are reverse of 'A-Record' it points IP Address to a Host name
HINFO record: Indicates CPU and operating system types for mapping to specific
host names
TXT Records: Provides a descriptive text associated with host name
5. What is WINS?
WINS name resolution means successfully mapping a NetBIOS name to an IP
address. A NetBIOS name is a 16-byte address that is used to identify a NetBIOS
resource on the network. A NetBIOS name is either a unique (exclusive) or group
(nonexclusive) name. When a NetBIOS process is communicating with a specific
process on a specific computer, a unique name is used. When a NetBIOS process is
communicating with multiple processes on multiple computers, a group name is used.
The exact mechanism by which NetBIOS names are resolved to IP addresses
depends on the NetBIOS node type that is configured for the node. RFC 1001,
“Protocol Standard for a NetBIOS Service on a TCP/UDP Transport: Concepts and
Methods,” defines the NetBIOS node types, as listed in the following table.
NetBIOS Node Types
•If a ping of the default gateway succeeds, the DHCP client assumes it is still located
on the same network where it obtained its current lease, and the client continues to
use the current lease. By default, the client attempts, in the background, to renew
its current lease when 50 percent of its assigned lease time has expired.
•If a ping of the default gateway fails, the DHCP client assumes that it has been
moved to a different network, where DHCP services are not available (such as a
home network). By default, the client auto-configures its IP address as described
previously, and continues (every five minutes in the background) trying to locate a
DHCP server and obtain a lease.
Lease Renewals
The renewal process occurs when a client already has a lease, and needs to renew
that lease with the server. To ensure that addresses are not left in an assigned state
when they are no longer needed, the DHCP server places an administrator-defined
time limit, known as a lease duration, on the address assignment.
Halfway through the lease period, the DHCP client requests a lease renewal, and the
DHCP server extends the lease. If a computer stops using its assigned IP address
(for example, if a computer is moved to another network segment or is removed),
the lease expires and the address becomes available for reassignment.
The renewal process occurs as follows:
1.The client sends a request to the DHCP server, asking for a renewal and extension
of its current address lease. The client sends a directed request to the DHCP
server, with a maximum of three retries at 4, 8, and 16 seconds.
•If the DHCP server can be located, it typically sends a DHCP acknowledgment
message to the client. This renews the lease.
•If the client is unable to communicate with its original DHCP server, the client
waits until 87.5 percent of its lease time elapses. Then the client enters a
rebinding state, broadcasting (with a maximum of three retries at 4, 8, and 16
seconds) a DHCPDiscover message to any available DHCP server to update its
current IP address lease.
2.If a server responds with a DHCPOffer message to update the client's current
lease, the client renews its lease based on the offering server and continues
operation.
3.If the lease expires and no server has been contacted, the client must immediately
discontinue using its leased IP address. The client then proceeds to follow the
same process used during its initial startup to obtain a new IP address lease.
Managing Lease Durations
When a scope is created, the default lease duration is set to eight days, which works
well in most cases. However, because lease renewal is an ongoing process that can
affect the performance of DHCP clients and your network, it might be useful to
change the lease duration. Use the following guidelines to decide how best to modify
lease duration settings for improving DHCP performance on your network:
•If you have a large number of IP addresses available and configurations that rarely
change on your network, increase the lease duration to reduce the frequency of
lease renewal queries between clients and the DHCP server. This reduces network
traffic.
•If there are a limited number of IP addresses available and if client configurations
change frequently or clients move often on the network, reduce the lease duration.
This increases the rate at which addresses are returned to the available address
pool for reassignment.
•Consider the ratio between connected computers and available IP addresses. For
example, if there are 40 systems sharing a Class C address (with 254 available
addresses), the demand for reusing addresses is low. A long lease time, such as
two months, would be appropriate in such a situation. However, if 230 computers
share the same address pool, demand for available addresses is greater, and a
lease time of a few days or weeks is more appropriate.
•Use infinite lease durations with caution. Even in a relatively stable environment,
there is a certain amount of turnover among clients. At a minimum, roving
computers might be added and removed, desktop computers might be moved from
one office to another, and network adapter cards might be replaced. If a client with
an infinite lease is removed from the network, the DHCP server is not notified, and
the IP address cannot be reused. A better option is a very long lease duration, such
as six months. This ensures that addresses are ultimately recovered.
12. What are DHCP Client States in the Lease Process?
DHCP clients cycle through six different states during the DHCP lease process, as
illustrated in Figures 4.3 and 4.4. Figure 4.4 illustrates the DHCP lease process for
clients that are renewing a lease.
Figure 4.3 DHCP Client States During the Lease Process
Figure 4.4 DHCP Client States During the Lease Renewal Process
When the DHCP client and DHCP server are on the same subnet, the DHCPDiscover,
DHCPOffer, DHCPRequest, and DHCPAck messages are sent via media access control
and IP-level broadcasts.
In order for DHCP clients to communicate with a DHCP server on a remote network,
the connecting router or routers must support the forwarding of DHCP messages
between the DHCP client and the DHCP server using a BOOTP/DHCP Relay Agent. For
more information, see "Supporting BOOTP Clients" and "Managing Relay Agents"
later in this chapter.
Initializing
This state occurs the first time the TCP/IP protocol stack is initialized on the DHCP
client computer. The client does not yet have an IP address to request from the
DHCP servers. This state also occurs if the client is denied the IP address it is
requesting or the IP address it previously had was released. Figure 4.5 shows the
Initialization state.
We would simply map a drive for users to the Sales folder on Server1, and they
would automatically be redirected to the appropriate folder of the appropriate server
as they accessed the subfolders. Note that DFS maintains and does not change any
of the permissions associated with the actual folders. Whatever level of access users
had to the folders before DFS will be the same level of access after DFS has been
configured.
In Windows 2000, two types of DFS structures exist – standalone DFS, and domain-
based DFS. Note that while a domain can host multiple DFS roots, any server can
host only a single DFS root, regardless of type (stand-alone or domain-based).
Standalone DFS structures can be created on any server running Windows 2000 with
DFS installed (it is installed by default). With standalone DFS, Active Directory is not
required. Creating a DFS structure begins with a server hosting the ‘root’ of DFS.
This is the shared folder that will first be connected to by clients. With Standalone
DFS, this root can only be hosted on a single server. As such, if this server fails,
users will not be able to gain access to the DFS tree (of course, they will still be able
to access resources that exist on other physical servers if they knew the location of
those folders). Standalone DFS does not support having replicas of the root,
although you can configure replicas of folders beneath the root. This would allow
users to be load-balanced between folders that exist of different servers, but contain
identical information. Note that in a standalone DFS setup, the replication of data
between replicas does not happen automatically – you must somehow make
replication happen between the replicas (using a tool such a robo copy, for instance).
and then click Raise to raise the domain functional level to Windows Server 2003.
5. Read the warning message, and if you wish to perform the action, click Ok.
You will receive an acknowledgement message telling you that the operation was
completed successfully. Click Ok.
You can check the function level by performing step 3 again and viewing the current
function level.
To raise the forest functional level, you must be a member of the Enterprise
Admins group.
In order to raise the Forest Functional Level:
1. Log on to the PDC of the forest root domain with a user account that is a
member of the Enterprise Administrators group.
2. Open Active Directory Domains and Trusts, click Start, point to All
Programs, point to Administrative Tools, and then click Active Directory
Domains and Trusts.
3. In the console tree, right-click Active Directory Domains and Trusts, and
then click Raise Forest Functional Level.
4. Under Select an available forest functional level, click Windows Server
2003. and then click Raise to raise the forest functional level to Windows
Server 2003.
5. Read the warning message, and if you wish to perform the action, click
Ok.
54 23 53
Server A queries the DCs for their current USNs and gets the following information.
Domain Domain Domain
Controller B Controller C Controller D
58 23 64
From this information, Server A can calculate the changes it needs from each server,
as follows.
Domain Domain Domain
Controller B Controller C Controller D
When you force the demotion of a DC, you return the operating system to a state
that is the same as the successful demotion of the last domain controller in a domain
(service start values, installed services, use of a registry based SAM for the account
database, computer is a member of a workgroup).
Note: In Windows 2000, the System event log identifies forcibly demoted DCs and
instances of the /forceremoval operation by event ID 29234. In Windows Server
2003 the System event log identifies forcibly demoted DCs by event ID 29239.
1. Click Start, click Run, and then type the following command:
dcpromo /forceremoval
At the Welcome to the Active Directory Installation Wizard page, click Next.
At the Force the Removal of Active Directory page, click Next.
In Administrator Password, type the password and confirmed password that you
want to assign to the Administrator account of the local SAM database, and then
click Next.
In Summary, click Next.
After you use the dcpromo /forceremoval command, all the remaining metadata
for the demoted DC is not deleted on the surviving domain controllers, and
therefore you must manually remove it by using the NTDSUTIL command.
48. What Exchange process is responsible for communication with AD?
DSACCESS
49. What is DSACCESS?
DSAccess implements a directory access cache that stores recently accessed
information for a configurable length of time. This reduces the number of queries
made to global catalog
50. Explain APIPA?
Auto Private IP Addressing (APIPA) takes effect on Windows 2000 Professional
computers if no DHCP server can be contacted. APIPA assigns the computer an IP
address within the range of 169.254.0.0 through 169.254.255.254 with a subnet
mask of 255.255.0.0.
51. Where is GPT stored?
%SystemRoot%\SYSVOL\sysvol\domainname\Policies\GUID
52. What hidden shares exist on Windows Server 2003 installation?
Admin$, Drive$, IPC$, NETLOGON, print$ and SYSVOL.
53. What’s the difference between standalone and fault-tolerant DFS
(Distributed File System) installations?
The standalone server stores the Dfs directory tree structure or topology locally.
Thus, if a shared folder is inaccessible or if the Dfs root server is down, users are left
with no link to the shared resources. A fault-tolerant root node stores the Dfs
topology in the Active Directory, which is replicated to other domain controllers. Thus,
redundant root nodes may include multiple connections to the same data residing in
different shared folders
54. When should you create a forest?
Organizations that operate on radically different bases may require separate trees
with distinct namespaces. Unique trade or brand names often give rise to separate
DNS identities. Organizations merge or are acquired and naming continuity is desired.
Organizations form partnerships and joint ventures. While access to common
resources is desired, a separately defined tree can enforce more direct administrative
and security restrictions.
55. How can you authenticate between forests?
Four types of authentication are used across forests: (1) Kerberos and NTLM network
logon for remote access to a server in another forest; (2) Kerberos and NTLM
interactive logon for physical logon outside the user’s home forest; (3) Kerberos
delegation to N-tier application in another forest; and (4) user principal name (UPN)
credentials.
56. What is an incremental backup?
A "normal" incremental backup will only back up files that have been changed since
the last backup of any type. This provides the quickest means of backup, since it
only makes copies of files that have not yet been backed up. For instance, following
our full backup on Friday, Monday’s tape will contain only those files changed since
Friday. Tuesday’s tape contains only those files changed since Monday, and so on.
The downside to this is obviously that in order to perform a full restore, you need to
restore the last full backup first, followed by each of the subsequent incremental
backups to the present day in the correct order. Should any one of these backup
copies be damaged (particularly the full backup), the restore will be incomplete.
57. What is Differential Backup?
A cumulative backup of all changes made after the last full backup. The advantage to
this is the quicker recovery time, requiring only a full backup and the latest
differential backup to restore the system. The disadvantage is that for each day
elapsed since the last full backup, more data needs to be backed up, especially if a
majority of the data has been changed.
58. What is Multilevel Incremental Backup?
A more sophisticated incremental backup scheme involves multiple numbered
backup levels. A full backup is level 0. A level n backup will back up everything since
the most recent level n-1 backup. Assume a level 0 backup was taken on a Sunday.
A level 1 backup taken on Monday would only include changes made since Sunday. A
level 2 backup taken on Tuesday would only include changes made since Monday. A
level 3 backup taken on Wednesday would only include changes made since Tuesday.
If a level 2 backup was taken on Thursday, it would include all changes made since
Monday because Monday was the most recent level n-1 backup.
59. What is reverse Incremental Backup?
An incremental backup of the changes made between two instances of a mirror is
called a reverse incremental. By applying a reverse incremental to a mirror, the
result will be a previous version of the mirror.
60. What is Synthetic full backup?
A synthetic backup is a form of an incremental backup that is possible when there is
a separate computer that manages the backups. The backup server takes a typical
incremental backup of the system in question and combines this data with the
previous backups to generate a new synthetic backup. This new synthetic backup is
indistinguishable from a normal full backup and shares all the advantages, such as
faster restore times.
61. What is RAID?
RAID-Redundant Array of Inexpensive Discs, It is a technique that was developed to
provide speed, reliability, and increased storage capacity using multiple disks, rather
than single disk solutions. RAID basically takes multiple hard drives and allows them
to be used as one large hard drive with benefits depending on the scheme or level of
RAID being used.
62. What is Raid-Concatenation?
Concatenations are also known as "Simple" RAIDs. A Concatenation is a collection of
disks that are "welded" together. Data in a concatenation is layed across the disks in
a linear fashion from on disk to the next. So if we've got 3 9G (gig) disks that are
made into a Simple RAID, we'll end up with a single 27G virtual disk (volume). When
you write data to the disk you'll write to the first disk, and you'll keep writing your
data to the first disk until it's full, then you'll start writing to the second disk, and so
on. All this is done by the Volume Manager, which is "keeper of the RAID".
Concatenation is the cornerstone of RAID.
Now, do you see the problem with this type of RAID? Because we're writing data
linearly across the disks, if we only have 7G of data on our RAID we're only using the
first disk! The 2 other disks are just sitting there bored and useless. This sucks. We
got the big disk we wanted, but it's not any better than a normal disk drive you can
buy off the shelves in terms of performance. There has got to be a better way..........
63. What is Striping/RAID-0?
Striping is similar to Concatenation because it will turn a bunch of little disks into a
big single virtual disk (volume), but the difference here is that when we write data
we write it across ALL the disks. So, when we need to read or write data we're
moving really fast, in fact faster than any one disk could move. There are 2 things to
know about RAID-0, they are: stripe width, and columns. If we're going to read and
write across multiple disks in our RAID we need an organized way to go about it.
First, we'll have to agree on how much data should be written to a disk before
moving to the next; we call that our "stripe width".
Then we'll need far cooler term for each disk, a term that allows us to visualize our
new RAID better..... "Column" sounds cool! Alright, so each disk is a "column" and
the amount of data we put on each "column" before moving to the next is our "stripe
width"
64. What is Mirroring/RAID-1?
Mirroring is a concept where you are creating same mirror of RAID, i.e. in order to
create 27 G disk if you are using 3 X 9 G Disks to form a simple RAID(RAID-0), then
for Mirroring/RAID-1 you have to use 6 X 9 G Disks. This is because the first 27 G
will form a simple RAID and the remaining 27 G will become the Mirror of First one.
What ever data that is being written into the first one will be replicated into second
one, such that if the first RAID Fails then automatically the second will come to
existence.
65. What is RAID 0+1? Why is it better than 0?
Raid 0 is using striping technology which means in case of failure of any one of the
disks in the Raid then the data will be lost. But in case of RAID 0+1 both the striping
and mirroring technologies were used. What ever data is on striped volume the same
will be mirrored hence recovery will be easier and secure.
66. What is RAID-5?
67. What are the types of backups?
Normal Backups: A normal backup is the first step to any backup plan. When the Normal
backup option is selected; all the selected files and folders are backed up and the archive
attribute of all files are cleared. Normal backups are the most time consuming process but
prove more efficient at the time of restoration than other backup types.
Copy Backups: A copy backup option is not considered as a planned schedule
backup, all the selected files and folders are backed up. Archive attributes of the files
are not cleared while this option is selected.
Incremental Backups: Incremental backups are the fastest backup process. An
incremental backup backs up the files and folders which were last created or
modified or changed since last normal or incremental backup. An incremental backup
backs up files that are created or changed since the last normal or incremental
backup. After the backup is performed the archive attributes of the files are cleared.
Restoration of data from an incremental backup requires the last normal backup and
all the following incremental backups. These backups need to be restored in the
same manner as they were created.
Note: If any media in the incremental backup set is damaged or data becomes
corrupt, the data backed up after corruption cannot be restored.
Differential Backups: Differential backups back up those files which were created or
changed since the last normal backup. Archive attributes of the files does not get
cleared after taking the backup with the differential backup method. The restoration
process of files from differential backup is more efficient than an incremental backup.
Daily Backups: All the selected files and folders which have been changed during a
day are backed up with Daily Backups option. The data is backed up by using the
modified date of the files and the archive attributes are also does not get cleared
with this option.
68. What is a Full Backup?
A full backup is a backup of every file on a file system, whether that file has changed
or not. A full backup takes longer to accomplish and requires the most storage space
on the backup media, but it also provides the quickest restore times. A full backup
should be performed weekly or monthly on production systems, along with daily
differential backups. A full backup should also be performed before any major
planned changes to a system.
69. What is Incremental Backup?
An incremental backup is a backup of every file on a file system which has changed
since the last backup. An incremental backup is the fastest backup and requires the
least storage space on the backup media. However, incremental backups also require
the longest time and the most tapes to restore. Incremental backups should be used
only in environments where backup time or backup storage media are extremely
constrained. For most environments, a weekly full backup and a daily differential
backup represent a better plan. If you perform a full backup on Sunday along with
incremental backups every night and the system crashes on Thursday, you will need
to restore the full backup from Sunday along with the incremental backups from
Monday, Tuesday, and Wednesday. In contrast, if you perform a full backup on
Sunday and a differential every night, when the system crashes on Thursday you will
only need to restore the full backup from Sunday and the differential backup from
Wednesday.
70. What is Differential Backup?
A differential backup is a backup of every file on a file system which has changed
since the last full backup. A differential backup can be an optimal middle-ground
between a full backup and an incremental backup. A differential backup is not as
fast as an incremental backup, but it is faster than a full backup. A differential
backup requires more storage space than an incremental backup, but less than a full
backup. A differential backup requires more time to restore than a full backup, but
not as much time to restore as an incremental backup. If you perform a full backup
on Sunday and a differential every night, and the system crashes on Thursday, you
will only need to restore the full backup from Sunday and the differential backup
from Wednesday. In contrast, if you perform a full backup on Sunday and
incremental backups every night, when the system crashes on Thursday, you will
need to restore the full backup from Sunday along with the incremental backups
from Monday, Tuesday, and Wednesday. A differential backup should be performed
daily on production systems.
71. What are Cold Backups and Hot Backups?
Cold Backup and Hot Backup terms are used by Oracle.
Cold Backup: Takes the Database offline and copy database files to different loction
is called cold backup in Oracle.
Hot Backup: Taking the Database backup when the Database is online.
72. How can I prohibit users from using the Internet by using Group Policy
in a Windows 2000 server?
There is not a direct Group Policy setting that disables IE. There are three ways that
I can think of to disable it from functioning to connect to the Internet.
The first is using the IE policies. This method breaks IE, but does not prohibit it from
running. This solution configures the Proxy Settings incorrectly. Give it a Proxy
server name or address that does not exist, or a wrong port to use for the proxy.
You can configure this setting under User Configuration->Windows Settings-
>Internet Explorer Maintenance->Connection->Proxy Settings. IE will look for a
Proxy server, but always fail.
The other two ways target the IE application directly. First, you can configure the
Don't Run Specified Windows Applications policy, which is located under User
Configuration->Administrative Templates->System. Just add in Iexplore.exe to deny
IE from running. The second way is to use a Software Restriction policy for
Iexplore.exe. You could use a path rule here, but I would suggest using a hash rule,
to ensure the file can't be moved or renamed.