Sunteți pe pagina 1din 42

Ques-:1.

What is Operating System?

Ans :Operating System works as an interpreter between computer hardware and application. Operating System works as a user interface. Ques-:2. Types of Operating System?

Ans :There are two types of Operating System 1. SOS Simple Operating System as for e ample Windows !"# !$# %& '. NOS (etwork Operating System as for e ample Windows (T# ')))# '))* Ques-:3. What is Ser+er?

Ans :Ser+ers are computer that pro+ides the ser+ices. ,s for & ample 1. -(S Ser+er '. W.(S Ser+er *. -/01 Ser+er 2. 3,S Ser+er ". 41( Ser+er Ques-:4. What is 3,S Ser+er?

Ans :3,S stands for 3emote ,ccess Ser+er. .t is basically use for mobile user in the network. This Ser+er pro+ides the remote access connecti+ity for mobile user. .n this way all of the mobile users are connected to ser+er through telephone line. This Ser+er also pro+ides the connecti+ity between two or more Offices in the (etwork. Ques-:5. What is 41( Ser+er?

Ans :41( stands for 4irtual 1ri+ate (etwork. .t is basically use for mobile user in the network. This Ser+er pro+ides the remote access connecti+ity for mobile user. .n this way all of the mobile users are connected to ser+er through internet. This Ser+er also pro+ides the connecti+ity between two or more Offices in the (etwork. 41( is 0ost &ffecti+e 5(o costly6. Ques-:6. What is .,S Ser+er?

Ans :.,S stands for .nternet ,uthentication Ser+ices. .,S Ser+er is also known as 3,-.7S Ser+er. .,S Ser+er 1ro+ides the centrali8ed management of multiple 3,S 9 41( Ser+ers in the (etwork. On this Ser+er 3emote ,ccess 1olicy and 3emote ,ccess :ogging Options are a+ailable. Ques-:7. ;,T<(T;S?

Ans :There is ma=or differences are a+ailable between ;,T and (T;S ;ile System such as

FAT
;at stands for ;ile ,llocation Table There are two categories in ;at ;ile System o ;at 1> o ;at *' .n ;at 7p To ;older :e+el Security is a+ailable 0ompression Option is not a+ailable &ncryption Option is not a+ailable -isk ?uota Option is not ,+ailable ;,T Supported @y ,ll Of The %icrosoft @ased Operating System

NTFS
(T;S stands for (ew Technology ;ile System There are three categories in (T;S file System o (T;S 2.) (T O<S o (T;S ".) '))) O<S o (T;S >.) '))*O<S .n (T;S 7pAto ;ile :e+el Security is a+ailable 0ompression Option is a+ailable &ncryption Option is a+ailable -isk ?uota Option is ,+ailable (T;S Supported @y only :imited %icrosoft @ased Operating System What is the difference between Windows (T<')))<'))*?

Ques-:8.

Ans :There are many differences are a+ailable between Windows (T# '))) and '))* O<S# Such ,sAA

NT
There is no acti+e directory There is no tree<forest hierarchical structure are a+ailable There is no Site 3elationship There is no parent domain and child domain concepts are a+ailable in the network. (T support (T;S 2.) ;ile system (T Support (T:% 4ersion ' :an ,uthentication 1rotocol .n (T by default no Trust 3elationship are configured .n (T we will use System 1olicy .n (T specific 0lient Site Operating System is a+ailable i.e. (T Workstation 2.) &dition .n (T we will use & change "." Ser+er .n (T We 0an 0reate Only One Way Trust 3elationship inside The (etwork.

2000
There is ,cti+e -irectory Tree<;orest /ierarchal Structure are a+ailable There is Site 3elationship is a+ailable There is parent domain and child domain concept are a+ailable '))) support (T;S ".) ;ile system '))) Support Berberos 4ersion " ,uthentication 1rotocol .n '))) by default TwoAWay Trust 3elationship are configured .n '))) we will use Croup 1olicy '))) support ma imum *' 1rocessor and >2 C@ 3,% .n '))) specific 0lient Site Operating System is a+ailable i.e. '))) 1rofessional .n '))) we will use & change '))) Ser+er .n '))) no Stub Done is a+ailable in -(S .n '))) 3esultant Setup 1olicy is not a+ailable .n '))) C1%0 is not a+ailable .n '))) 0onditional ;orwarding option is not a+ailable

.n '))) &ffecti+e 1ermission option is not a+ailable .n '))) Only some ,dministrati+e 0ommand :ine Tools are a+ailable ,cti+e -irectory Sa+ed ?uery Option is not a+ailable Shadow 0opy Option is not a+ailable in Windows '))) O<S ,S3 Option is not a+ailable in Windows '))) O<S .n Windows '))) We 0an 0reate %a imum 1 -;S 3oot On , Single -;S Ser+er in The (etwork. .n '))) We 0an 0reate Two Way Trust 3elationship inside The (etwork.

2003
There is ,cti+e -irectory Tree ;orest /ierarchal Structure are a+ailable There is Site 3elationship is a+ailable There is parent domain and child domain concept are a+ailable '))* support (T;S >.) ;ile system '))* Support Berberos 4ersion " ,uthentication 1rotocol .n '))* by default TwoAWay Trust 3elationship are configured .n '))* we will use Croup 1olicy '))* support ma imum >2 1rocessor and "1' C@ 3,% .n '))* no specific 0lient Site Operating System is a+ailable you can use either win 'k 1rofessional either Win E1 1rofessional in the (etwork. .n '))* we will use & change '))* Ser+er .n '))* Stub Done is a+ailable in -(S .n '))* 3esultant Setup 1olicy is a+ailable .n '))* C1%0 is a+ailable .n '))* 0onditional ;orwarding option is a+ailable .n '))* &ffecti+e 1ermission option is a+ailable .n '))* more ,dministrati+e 0ommand :ine Tools are a+ailable ,cti+e -irectory Sa+ed ?uery Option is a+ailable Shadow 0opy Option is a+ailable in Windows '))* O<S ,S3 Option is a+ailable in Windows '))* O<S .n Windows '))* We 0an 0reate %ore Than 1 -;S 3oot On , Single -;S Ser+er in The (etwork. .n '))* We 0an 0reate Two Way Trust 3elationship inside The (etwork. Ques-:9. What is ,cti+e -irectory?

Ans :,cti+e -irectory is the main concept of Windows ')))<'))* (etwork. .t stores all of the information about the whole network such as users# printers# computers etc. Ques-:10. What is Tree?

Ans :, group of domain is called tree and sharing a contiguous (ame space. Ques-:11. What is ;orest?

Ans :, group of tree is called forest and does not sharing a contiguous name space but sharing a common configuration 5Schema6. Ques-:12. -ifference between -.0. and ,.-.0.?

Ans :-.0. stands for -omain 0ontroller and ,.-.0. stands for ,dditional -omain 0ontroller. ,.-.0. is a back up copy of -.0. Only one different is a+ailable @etween -.0. and ,.-.0. i.e. A Operation %aster 3ole. On -.0 all of the three Operation %aster 3oles are a+ailable 1. 3.- %aster '. 1-0 &mulator *. .nfrastructure Operation %aster 3ole @ut on ,.-.0 no any operation master roles are a+ailable Ques-:13. Ans :What is the benefit of 0hild -omain? There are many benefits of 0hild -omain Such ,s ). Security @oundary 1. ,dministrati+e O+erhead :ow '. (etwork Traffic :ow What is Croup?

Ques-:14.

Ans :Croup is a collection of user account. .t pro+ides the simplified administration in the network. Ques-:15. What is O7?

Ans :O7 stands for Organi8ational 7nit. On O7 we define group policy in the network. Croup policy is basically assigned on acti+e directory container i.e. Site# domain# O7. When e+er we want some users in the network do not use shut down the system# do not use run command# do not use control panel# then we put that user in the O7 and assign the appropriate Croup 1olicy on that O7. Ques-:16. What is Croup 1olicy?

Ans :Croup policy pro+ides the stream line access to all of the users in the network. Croup policy is basically assigned on acti+e directory container i.e. Site# domain# O7. When e+er we want some users in the network do not use shut down the system# do not use run command# do not use control panel# then we put that user in the O7 and assign the appropriate Croup 1olicy on That O7. Ques-:17. -ifference between 1ermission# 3ight and 1olicy?

Ans :Permission 1ermission are basically assigned on network resources as for e ample ;ile# ;older# Share ;older# 1rinter Ri !" 3ight is basically assign to users and groups. Po#i$% 1olicy are basically assigned on acti+e directory container i.e. A Site# -omain# O7. Ques-:18. What is .S, Ser+er?

Ans :.S, stands for .nternet Security ,cceleration. .S, Ser+er 1ro+ides the .nternet connecti+ity for all of the users in network .S, ser+er also works as a 1ro y Ser+er in the network. With the help of .S, Ser+er ,dministrator can ;iltering a 0lient reFuest ;or a Specific Web site in the (etwork. Ques-:19. What is -efault Cateway?

Ans :-efault Cateway is the .1 ,ddress of 3outer in the network. When e+er any clients want to go to another network that Fuery will forward to -efault Cateway.

Ques-:20.

What is Site?

Ans :, Site is a geographical area where all of the domains are a+ailable. Site manages the 3eplication Traffic between Two or %ore -ifferent Sites in the (etwork. Ques-:21. What is Operation %aster 3ole?

Ans :Operation %aster 3ole is a+ailable on -omain controller in the (etwork. There are ;i+e types of Operation %aster 3ole 1. Schema %aster '. -omain (aming %aster *. 3.- %aster 2. 1-0 &mulator ". .nfrastructure Operation %aster 3ole Ques-:22. Ans :-ifference between %i ed %ode and (ati+e %ode? There are three types of domain mode

1. &i'e( &o(e .n this mode (T# win 'k and win 'k* -.0 are a+ailable. '. )in 2* N+"i,e &o(es .n this mode Win 'k ,nd win 'k* -.0 are a+ailable. *. )in 2*3 N+"i,e &o(e .n this mode only win 'k* -.0 are a+ailable. Ques-:23. What is S0S.?

Ans :S0S. stands for Small 0omputer System .nterface. .n S0S. the rate of data transmission is fast. S0S. /ard -isk Speed3.1.% is fast .n S0S. -ata Transmission Speed .s *') %@1S in the (etwork. .n S0S. 0ontroller We 0an connect %a imum 1" physical -e+ices in the System. Ques-:24. What are ,A/ost 3ecord and 1T3 3ecord?

Ans :, record is also called host record. This record is basically created in forward lookup Done.

1T3 record is also called pointer record. This record is basically created in re+erse lookup Done. Ques-:25. What is 3eser+ation?

Ans :3eser+ation .s @asically used .n -/01 Ser+er. When &+er we want This 0omputer .s ,lways recei+ed This .1 address ;rom -/01 Ser+er in The network# in That 0ase we create a 3eser+ation in -/01 Ser+er Of that particular 0omputer in The (etwork. Ques-:26. Ans :.1 ,ddress 3ange<0lasses? There are two types of .1 address

1. 0lass ;ull .1 ,ddress '. 0lass :ess .1 ,ddress 0lass ;ull .1 ,ddress There are fi+e classes 1. 0lass , '. 0lass @ *. 0lass 0 2. 0lass ". 0lass & Ques-:27. ) 1'> 51'G is reser+ed for :oop back6 1'$ 1!1 1!' ''* ''2 '*! '2) '""

-ifference between /ardware 3outer and Software 3outer?

Ans :-+r(.+re Rou"er /ardware 3outer is a dedicated 3outer. .tHs ha+ing a lot of features such as security# dedicated routing in the network. ,s for e ample 0isco 3outer. So/".+re Rou"er Software 3outer is not a dedicated 3outer. .t pro+ides the different ser+ices also# such as -(S ser+er# -/01 Ser+er. i.e.Windows @ased 3outer. Ques-:28. -ifference between /ardware ;irewall and Software ;irewall?

Ans :-+r(.+re Fire.+## .t is a dedicated ;irewall. , lots of security features are a+ailable on hardware based firewall. ,s for e ample 0isco pi ;irewall. So/".+re Fire.+## .t is not a dedicated ;irewall. .ts pro+ides the normal security in the networkcheck point Ques-:29. What is -omain 0ontroller?

Ans :-.0 stands for domain controller. .t pro+ides the centrali8ed management of entire domain in the network. When e+er we will install acti+e directory database on a ser+er side operating system# then after that system becomes a -.0. -omain 0ontroller manages all security related .nteraction between users and 0omputers in The (etwork. Ques-:30. What is @ 3outer?

Ans :@ 3outer stands for @ridge 3outer. We can say this is a layer three bridge that pro+ides the communication between two or more different network .-. Ques-:31. What is @ridge?

Ans :@ridge is a layer ' network de+ice that pro+ides the communication within the same network id. .n @ridge %a imum 1> ports are a+ailable. Ques-:32. -ifference between Cateway and 3outer?

Ans :3outer works on same network architecture but Cateway works on different network architecture. Ques-:33. What is 1O1 Ser+er<S%T1 Ser+er?

Ans :1O1 stands for 1ost Office 1rotocol. .t is basically use for mail recei+ing purpose in the network. S%T1 stands for Simple %ail Transfer 1rotocol. .t is basically use for sending a mail as well as recei+ing a mail in the network.

Ques-:34.

What is ,cti+e -irectory 1artitions?

Ans :,cti+e directory 1artition .s a :ogical 1artition Of acti+e directory. This 1artition .s @asically 7se for replication from -.0 To ,.-.0 9 -.0 to C.0.S 5Clobal 0atalog ser+er6 in the (etwork. There are three Types Of acti+e -irectory partition 1. Schema partition '. 0onfiguration 1artition *. -omain 1artition Ques-:35. Ans :Types of ,cti+e -irectory 1artitions? There are three types of ,cti+e -irectory partition

1. Schema 1artition '. 0onfiguration 1artition *. -omain 1artition Ques-:36. What is the ;unction of 1ing 0ommand?

Ans :1ing pro+ides to check the 1hysical<.1 0onnecti+ity between two or more de+ices in the network. 1ing sends an .0%1 reFuest from source computer to destination computer and destination computer sends an .0%1 reply. Ques-:37. What are @roadcasting# %ulticasting and unicasting?

Ans :@roadcasting One to ,ll %ulticasting One to many not all 7nicasting One to One Ques-:38. What is Croup (esting?

Ans :When we add two or more Croups within a Single Croup# it is called Croup (esting. Ques-:39. Ans :Sector. What is ;.E%@3? ;.E%@3 3epair the %aster boot 3ecord of the 1artition @oot

Ques-:40.

What is ;.E@OOT?

Ans :;.E@OOT write a new 1artition @oot Sector on to the system 1artition. Ques-:41. What is S.-?

Ans :S.- stands for Security .dentifier. &+ery Ob=ect has a uniFue .-# it is called S.-. Ques-:42. What is 3,-.7S Serer?

Ans :3,-.7S Stands for 3emote ,uthentication -ialAin 7ser Ser+ice. 3,-.7S Ser+er 1ro+ides the 0entrali8ed management of %ultiple 3,S 9 41( Ser+er in the (etwork. On this Ser+er 3emote ,ccess 1olicy and 3emote ,ccess :ogging Options are a+ailable. Ques-:43. Ans :Ques-:44. Ans :Ques-:45. What is Trusting -omain? .n Trusting -omain 3esources are a+ailable. What is Trusted -omain? .n Trusted -omain 7ser ,ccountHs are a+ailable. What is %icrosoft & change Ser+er?

Ans :%icrosoft & change Ser+er is Software that pro+ides the ser+ices such as sending 9 recei+ing the %ail. Ques-:46. What is 1rinter?

Ans :1rinter is a Software that Co+erning the 1rint -e+ice. There are two types of 1rinter 1. :ocal 1rinter '. (etwork 1rinter. Ques-:47. What is 0hatting?

Ans :0hatting is a 3eal Time 0on+ersion between Two or %ore peoples in the (etwork. Ques-:48. What .s -irectory Ser+ices restore %ode?

Ans :When our ,cti+e -irectory -atabase is (ot Working 1roperly# Then We 3estart the -omain 0ontroller and 1ress f$ Bey Then after Selecting the -irectory Ser+ices 3estore %ode and Then after 3estoring the ,cti+e directory -atabase from the :ast @ackup. Ques-:49. Ans :Ques-:50. What is normal backup? Iust like a normal backup. @y default backup. What is incremental backup?

Ans :.n incremental @ackup only incremental parts are backup not full backup. Ques-:51. Ans :backup. Ques-:52. What is -ifferential backup? .n differential backup# we take full backup after the normal What is packet?

Ans :, packet is a logical grouping of information that includes a header which contains location information and user data. Ques-:53. What is forwarder?

Ans :.t is basically use in -(S Ser+er. When client Fuery to the -(S Ser+er# .n that case if the -(S is ha+ing a best result then -(S Ser+er gi+e the best result To The 0lient 0omputer .n The (etwork otherwise -(S Ser+er forward the client Fuery to the root -(S ser+er on own behalf and gi+e the complete result To The client computers in The (etwork Ques-:54. What is encryption?

1. '. *. 2.

Ans :There are four types of encryption (o &ncryption no @asic %11& 2) bits des Strong "> bits des %11&<.1Sec Strongest 1'$ bit data encryption %11&<.1Sec What is 3.1 +.1# 3.1 +.'# .C%1# OS1;?

Ques-:55. 1. '. *. 2.

Ans :3.1 +.1 @roadcast Small (etwork 7se 3.1 +.' %ulticast .C%1 %ulticast OS1; %ulticast ;or :arger (etwork What is the reFuirement Of 41( Ser+er?

Ques-:56.

Ans :41( reFuire .1 connecti+ity between the client and the ser+er. 41( does not reFuire a dial up connection @etween the 0lient and ser+er in The (etwork. Ques-:57. Ans :Ques-:58. Ans :Ques-:59. What is .nbound 0onnection? .nbound connection is 0reated On ser+er Side. What is Outbound 0onnection? Outbound connection is created on client Side. What is The ;unction of =etpack command .n -/01 Ser+er?

Ans :0heck the database consistency of -/01 Ser+er in the (etwork Ques-:60. Ans : What is 3emote ,ccess 1olicy? .n 3emote ,ccess 1olicy there are three options are a+ailable

1. 0ondition $ a.m. to " p.m.# %arketing Croup '. 1ermission Jes<(o

*. 1rofile 0onnecti+ity time# .1Sec 1olicy Ques-:61. What is T3,0&3T?

Ans :T3,0&3T display 0omplete route .nformation from source computer to destination computer in the (etwork. Ques-:62. What is the function of =etpack command in W.(S ser+er?

Ans :;or 0ompacting the W.(S database# we use =etpack command. Ietpack wins.mdb kk.mdb Ques-:63. What is tunneling form?

Ans :The sending and recei+ing of data through a secure way in the network# it is called tunneling form. Ques-:64. What is trust relationship?

Ans :Trust relationship is an important part in the client ser+er network. There are two types of trust relationship 1. Non Tr+nsi"i,e Trus" (on Transiti+e Trust is a one way trust relationship in the network. ,s for e amplein (T network '. Tr+nsi"i,e Trus" Transiti+e Trust is two way trust relationship in the network. ,s for e amplein ')))<'))* network. Ques-:65. What is -,0:?

Ans :-,0: stand for -iscretionary ,ccess 0ontrol :ist. .n -,0: basically permission entry is a+ailable of any user in the network Ques-:66. What is S,0:?

Ans :S,0: stand for System ,ccess 0ontrol :ist. .n S,0: basically auditing entry is a+ailable of any user in the network.

Ques-:67.

What is %S.?

Ans :This file is basically use for deploying or installation of any application in the network. Ques-:68. What is %ST?

Ans :This file is basically using for repairing of any application in the network. Ques-:69. What is 8ap file?

Ans :.t is basically use for that application# which do not ha+e the %S. file. We create a te t file with 8ap e tension for deploying or installation purpose of any application in the network. Ques-:70. Ans :Ques-:71. What is ace? ,ce stand for access control entry. What is operation master role?

Ans :Operation master role is a+ailable on domain controller in the network. There are fi+e types of operation master role inside the acti+e directory 1. S$!em+ &+s"er Schema %aster is responsible for changes of schema# updating of schema in the (etwork. '. 0om+in N+min &+s"er -omain (aming %aster .s 3esponsible ;or adding or remo+ing a domain inside the forest. *. R10 &+s"er 3.- %aster pro+ides 3.- no. of each -.0 in the (etwork. &+ery -.0 is ha+ing a one id no# it is called 3.- (O. domain rid# ob=ectS...-. 2. P02 3mu#+"or .t is basically use ;or 1re+ious +ersion Of Windows '))) 0lients in The (etwork. 1-0 &mulator Work as an emulator for pre+ious +ersion of Windows '))) 0lients in the network.

1-0 1rimary -omain 0ontroller @-0 @ackup -omain 0ontroller ". 1n/r+s"ru$"ure O4er+"ion &+s"er .nfrastructure Operation %aster 3ole pro+ides uniFueness of any ob=ect inside the forest. .nfrastructure operation master role. 7pdates references to ob=ects and group membership from other domain .n the (etwork. Ques-:72. What is dedicated ser+er?

Ans :, dedicated ser+er functions as a ser+er only not as a client. ,s ;or & ample-omain 0ontroller. Ques-:73. What is bridgehead ser+er?

Ans :, bridgehead ser+er is a central point in the site that is responsible for replication from another site. Ques-:74. 1. '. *. 2. ". What is the booting file Of Windows ')))<'))*< p O<s?

Ans :(T:-3 (T-&T&0T.0O% @OOT..(. (T@OOT--.SJS (TOSB3(:.&E& What is clustering?

Ques-:75.

Ans :Suppose# . create a web sitewww.yahoo.com. This same web page is a+ailable On ,ll Of The ten computers. . configured clustering on all of the ten computers. :et Say at a same time one thousand people access this web site. .f this web ser+ices are pro+ided by only one computer# then it may be a +ery busy. @ut in this time workload is sharing among ten computers. This is called clustering and .f One Ser+er Will @e down ,nother Ser+er ,re pro+iding The Ser+ices in The (etwork. There are Two @enefits of 0lustering 1. ;ault Tolerance '. :oad @alancing

Ques-:76.

What is authoritati+e restore?

Ans :.n this process the one lacks +ersion no high of each ob=ect in acti+e directory database and this parts is o+errides on other -.0 in the network. We will use This %ethod in ;ollowing Options Such ,sAAA Some -eletions# Some rename Ques-:77. What is migration?

Ans :.t is basically use for con+erting (T# '))) network to '))* network. There are two types of migration 1. 54 r+(in .n upgrading 1rocess maintains current domain model. ,s for & ample@efore %igration three domains are a+ailable and after %igration again three domains are ,+ailable. 2. Res"ru$"urin .n restructuring 1rocess no maintain current domain models. ,s for e ampleA @efore %igration three domains are a+ailable and after %igration %ay @e one domain will be ,+ailable. Ques-:78. What .s Schema?

Ans :Schema basically reads The ,ttributes and defines The 0lasses. Such ,s 7ser class# 1rinter 0lass# 0omputer 0lass. Ques-:79. What is Stub Done?

Ans :ST7@ Done is a pointer 3ecord of Sub 0hild domain in the network. ST7@ Done pro+ides the directly communication @etween 1arent domain and Sub child domain. .f any case middle le+el -(S Will -own in That case 1arent and Sub 0hild -omain are still communicating with each other in the network Ques-:80. What .s Shadow 0opy?

Ans :Shadow 0opy pro+ides the automatic @ackup Of any particular shared ;older in The (etwork. Shadow copy pro+ides the (o. of pre+ious +ersion @ackup of ,ny particular Shared folder in the

(etwork. .n any time we can 4iew and restore Of ,ny 1re+ious 4ersion @ackup Of that particular ;older. This .s the (ew features of windows '))* Operating System. Ques-:81. What .s 3SO1?

Ans :3SO1 stands for 3esultant Set of 1olicy. .t is basically use for# when e+er we Want# What e+er the effecti+e policy .s apply On a particular 7ser and particular computer in The (etwork Ques-:82. What .s Croup 1olicy %odeling?

Ans :.n Croup policy %odeling# We 0an find out what &+er the effecti+e policy .s ,pply On a particular 7ser and particular computer in The (etwork Ques-:83. What .s Croup 1olicy 3esulting?

Ans :.n Croup policy resulting# we can find Out What e+er the effecti+e policy .s ,pply On a particular 7ser and particular computer in The (etwork Ques-:84. What .s S7S Ser+er?

Ans :S7S stands for software 7pdate ser+er. This ser+er pro+ides the ,utomatic 7pdating from %icrosoft 7pdate Ser+er to ,ll of The 0lients and ser+ers in the network Ques-:85. What .s Windows update?

Ans :Windows 7pdate Ser+ices 1ro+ides the automatic updating ;rom %icrosoft Windows update Ser+er to all of the 0lients 9 ser+ers in The (etwork Ques-:86. What .s C1%0?

Ans :C1%0 stands ;or Croup policy %anagement 0onsole. With The /elp Of this Tools We %anage the Croup policy Ob=ect Of entire ;orest from single :ocation in The (etwork. With The /elp of This Too we also take The @ackup and restoring Of Croup policy ob=ect.

Ques-:87.

What .s 0onditional ;orwarding?

Ans :0onditional ;orwarding .s @asically use in -(S ser+er. .n -(S Ser+er# We define The 0ondition# .f ,ny -(S ?uery .s 3elated to That 1articular -omain# .n That 0ase That ?uery Will -irectly ;orward to That -omain and .f That -(S ?uery .s (ot 3elated to That 1articular -omain .n That 0ase That ?uery Will ;orward to .S1 -(S ser+er .n the (etwork. With The /elp of 0onditional ;orwarding# we can say the rate Of -ata Transmission 3ate .s ;ast in The (etwork This .s the (ew ;eatures in Windows '))* Operating System. Ques-:88. What .s &ffecti+e 1ermission?

Ans :&ffecti+e 1ermission display that is what e+er the effecti+e permission is a+ailable of any 7ser in ,ny particular resources in the (etwork. Ques-:89. Ans :1. %S-OS.SJS 1. .O.SJS '. 0O%%,(-.0O% Ques-:90. What .s ,S3? What .s the @ooting file Of !$ Operating system?

Ans :,S3 stands for automatic system reco+ery. ,S3 pro+ides the complete backup of any 0omputers in The (etwork. Ques-:91. policies? What .s the -ifference @etween system policy ,nd Croup

Ans :System 1olicy are 7sed in (T en+ironment @ut Croup policy ,re 7sed in Windows '))) ,nd Windows '))* &n+ironment. Ques-:92. What is 0onnection Oriented protocol?

Ans :@efore the -ata is Sending from Source 0omputer to destination 0omputer in the (etwork first of ,ll connection is establish

between source to destination 0omputer. .t .s 0alled connection Oriented 1rotocol. ,s ;or & ampleT01. Ques-:93. What .s .-&?

Ans :.-& Stands ;or .ntegrated de+ice electronics. .n .-& We 0an 0onnect %a imum 2 physical de+ices in The System. .n .-& the 3ate of -ata transmission is slow. .n .-& %a imum Speed is $) %@1S in the (etwork. Ques-:94. Why we 0reate a Site?

Ans :There are many benefits for creating a Site inside the (etwork Such asK 1. %anage 3eplication Traffic inside the (etwork '. ;or Croup policy 1urpose *. ,dministrati+e @urden will be :ow 2. (etwork Traffic will be :ow ". (etwork 1erformance will be Cood >. :ogon Traffic G. 3educe The (o. Of reFuest ;or Clobal 0atalog Ser+er Ques-:95. -ifference between .1 4A2 and .1 4A>?

Ans :There is ma=or difference between .1 4.2 and .1 4.> such as 1. .n .1 4.2 is a *' bits .1 ,ddress but .1 +.> 1'$ bits .1 ,ddress. '. .1 +.2 is a -ecimal ;ormat# but .1 4.> is /e aA-ecimal (umber. *. .1 4.2 has 2 Octets# but .1 4.> has 1> Octets. 2. .1 4.2 is supported by Operating System# but .1 4.> is supported by only some Operating System. ". .n .1 4.2 only limited number of .1 ,ddress are a+ailable# but in .1 4.> a number of .1 ,ddresses are a+ailable. Ques-:96. What .s the ;unction of Schema partition?

Ans :Schema 1artition is responsible for 3eplication to all of the -omains inside the ;orest.

Ques-:97.

What .s The ;unction of 0onfiguration 1artition?

Ans :0onfiguration 1artition is responsible for 3eplication to all of the -omains inside the ;orest. Ques-:98. What is the function of -omain 1artition?

Ans :-omain 1artition is responsible for 3eplication to all of the ,dditional -omain 0ontroller inside the own -omain. Ques-:99. Ans :What is ,cti+e -irectory -atabase :ocation? SystemrootL(T-S ;olderL(T-S.-.T

Ne".or*:A, group of computers that is connected by cable or other de+ices to


share their data# information and de+ices with each other is called (etwork. There are two types of (etworkK 1. Peer-"o-Peer:A1eerAtoA1eer network is also called Workgroup. .n Workgroup there is no dedicated ser+er. ,ll 0omputers are eFual# &+ery 0omputers Works @oth as a 0lient and a Ser+er. .n Workgroup all users account such as user name and password ,re ,+ailable in the S,% database. S,% Stands for Security ,ccount %anagement -atabase. 2. 2#ien" Ser,er:A0lient Ser+er network is also called -omain. .n -omain there is one dedicated ser+erM That Ser+er .s 0alled -.0. -.0 Stands for -omain 0ontroller. .n 0lient Ser+er (etwork ,ll users account such as user name and password are ,+ailable in the ,cti+e -irectory database. -omain is a security boundary in the (etwork. there ,re %any @enefits of -omain# Such ,s A. Single logon 6. Single 7ser ,ccount 2. 0entrali8ed %anagement There are three scopes of (etworkK 1. 7AN:A:,( stands for :ocal ,rea (etwork. .n a fi ed area all of the computers are connected to each other# it is called :,(. .n :,( we do not

use any third party Ser+ice 1ro+ider (etwork such as Telephone :ine# .nternet and Satellite. 2. )AN:AW,( stands for Wide ,rea (etwork. ,cross the world all of the computers are connected to each other# it is called W,(. .n W,( we use Third 1arty Ser+ice 1ro+ider (etwork such as Telephone :ine# .nternet and Satellite. 3. &AN:A%an stands for %etropolitan ,rea (etwork. %,( is a child of W,( because in a metropolitan city all of the computers are connected to each other# it is called %,(. .n %,( we use Third 1arty Ser+ice pro+ider (etwork such as Telephone :ine# .nternet and Satellite. 53'+m4#e:ASuppose . ha+e a company that name is ,@0 1+t. :td. held in -elhi which has four branch offices ;irst is South -elhi# Second is &ast -elhi# Third is (orth -elhi and ;ourth is West -elhi. ,ll the branch offices are connected to the main office with the help of Third 1arty Ser+ice 1ro+ider (etwork such as Telephone :ine# .nternet and Satellite# it is called %,(.6 N12:A(.0 stands for (etwork .nterface 0ard... P83:A1E& stands for 1re & ecution @oot &n+ironment. .t is generally use in 3.S. P83 +n( Non-P83:A@oot roam is a+ailable on 1E& 0ard. @oot roam is not a+ailable in (onA1E& 0ard. 2+9#e:A0able is a medium that creates a (etwork and carry the signals between computers in the (etwork. There are two types of cableK 2. T.is"e( P+ir 2+9#e:ATwisted 1air 0able is also called 1)@ase T. There are four pair in this cable White A Creen# White A @lue# White A @rown# White A Orange. There are two types of Twisted 1air 0ableK ,. 5TP:A7T1 stands for 7nshielded Twister 1air. There are no mass shielded on the wire. @. STP:AST1 stands for Shielded Twisted 1air. There are a mass shielded on wires.

3. 2o+'i+# 2+9#e:A0oa ial 0able =ust like as a normal T4 cable. .n coa ial cable one is copper wire that is located in the central location of the cable then after a plastic coating then after shielded with mass and then after upper coating 5@lack 0oating6. There are two types of coa ial cable. ,. T!in Ne" 2o+'i+# 2+9#e:AThin (et 0oa ial 0able is also called as 1)@ase '. 1) stand for 1) %@1S and ' stands for up to ')) meters. @. T!i$* Ne" 2o+'i+# 2+9#e:AThick (et 0oa ial 0able is also called as 1)@ase ". 1) stand for 1)%@1S and " stands for up to ")) meters. 4. Fi9er O4"i$ 2+9#e:A.n ;iber Optic 0able the data are sending in digital form not in analog form. The rate of data transmission is fast by using this cable. T!ere +re ".o "%4es o/ (e,i$e in "!e ne".or*: 1. -T& -e+iceAAA -.T.& Stands for -ata Terminal &Fuipment. ,s for e ample1.0# 3O7T&3 '. -0& -e+iceAAA-.0.& Stands ;or -ata 0ommunication &Fuipment. ,s for & ample/7@# SW.T0/# %O-&% S"r+i !" 2+9#e:AWhen we connect Two -ifferent -e+ices# Such as -T& to -0& -e+ice in that cases we will use straight cable as for e ample 0omputer to /ub# 0omputer to Switch. 2ross 2+9#e:AWhen we connect two similar de+ices# Such as -T& to -T&# -0& to -0& in that case we will use cross cable as for e ample 0omputer to 0omputer# /ub to /ub.

To4o#o %:ATopology

is the way of connecting the computers. Topology reFuires two or more computers. There are fi+e types of Topology. 1. 6us-To4o#o %:A.n this Topology all of the computers are connected to a single Wire Such ,sAAcoa ial cable. .n @usATopology if the cable is break from any where then the all network is down. .n @usATopology the network

speed is di+ided among the computers. .n this topology we use @(0 connector. @(0 stand ;or @arrel (et 0onnector. 2. S"+r To4o#o %:A.n this Topology all of the computers are connected to a central de+ice such as /ub# or Switch. .n star Topology if one computer Will failed in that case my network will be still working properly. .n this topology we normally use 7T1 cable and 3IA2" connecter. 3I stands for registered =ack. 3. Rin To4o#o %:A.n this Topology all of the computers are connected to own ne t computer and the last computer is connected to first computer. .n this topology if one computer will fails then my whole network are down. 50able 7sedA? Speed A ?6. 4. &es! To4o#o %:A.n this Topology all of the computers are connected to each other computer in the network by a separate cable and Separate (.0 card. .t is also called complete Topology. 5. -%9ri( To4o#o %:AWhen we will connect two or more same Topology To a single different Topology# it is called /ybrid Topology. There are two types of /ybrid TopologyK ,. S"+r .ire( 6us @. S"+r .ire( Rin

Te$!no#o %:AThe

rate of data transmission depends on your (etwork Technologies. There are many types of (etwork Technologies ,re ,+ailable in the WorldAAA 1. 3"!erne":A&thernet is a popular :,( Technology that uses 0S%,<0-. 2. AT&:A,T% stands for ,synchronous Transfer %ode. ,T% is a packet switching network that sends fi ed length packets o+er :,( or W,(. The packet si8e is "* bytes in which 2$ bites data and " bytes for address. 3. Fr+me Re#+%:A;rame 3elay is a packet switching networks that sends +ariable length packets o+er :,( or W,(.

4. F001:A;--. stands for ;iber -istributed -ata .nterface. The rate of data transmission is fast in this Technology. There are two types of 3ing in this Technology. ;irst is 1rimary 3ing and second is Secondary 3ing. (ormally the data is sending from source computer to destination computer through the 1rimary 3ing if 1rimary 3ing Will @e fails then the data Will @e sending through the Secondary 3ing. -u9:A/ub is a central de+ice in the network that is used in star topology. /ub does the broadcasting. The rate of data transmission is slow in the network by using /ub. S.i"$!:ASwitch is a central de+ice in the network that is used in star topology. Switch does the conditional broadcasting. The rate of data transmission is fast in the network by using Switch. Rou"er:A3outer is a de+ice that pro+ides the connecti+ity between two or more different network id. ;+"e.+%:ACateway is a de+ice that pro+ides the connecti+ity between two or more different network id. Cateway works on different network architecture. Re4e+"er:A3epeater recei+es the signals and retransmits it to original strength in the network. 1P A((ress:A.1 ,ddress is a uniFue identifier in the network from one computer to anther computers. .1 ,ddress .s , 0ombination Of (etwork .d N /ost .d. &A2 A((ress:A&ach network adaptor are ha+ing a uniFue address# it is called 1hysical ,ddress or %,0 ,ddress. %,0 stands for media access control. Su9ne"s:A(etwork segments that connected to a router are called Subnets. Su9ne" &+s*:AThe Subnet %ask is a screen that differentiates from (etwork .- to /ost .- in a .1 ,ddress. Ne".or* 10:AThe first part of the .1 ,ddress that defines the network is called (etwork .-. -os" 10:AThe second or last part of The .1 ,ddress that defines the /ost number is called /ost .-.

Su9 Ne""in :A, @ig (etwork .s further di+ided .nto SmallerAsmaller (etwork that is called sub netting. .n sub netting we increase the (etwork .- and decrease the /ost .- by making some changes in subnet mask. Su4er Ne""in :A0ombining of SmallerASmaller (etwork into big (etwork That .s 0alled Super netting. .n Super netting we increase the /ost .- and -ecrease the (etwork .- by making some changes in subnet mask. Pro'% Ser,er:A1ro y Ser+er is a firewall component that enables us to connect multiple computers in a network to the .nternet by using a single 1ublic .1 ,ddress. @y 1ro y Ser+er we can filter the client reFuest for a specific Web Site. NAT:AThe (,T is a de+ice or ser+ice that translates 1ri+ate .1 ,ddress to 1ublic .1 ,ddress in the (etwork (,T 1ro+ides the internet connecti+ity for all Of the .nternal 7ser in the (etwork through Single 1ublic .1 address ,nd Single :ine. There are three Types of (,T 1. Static (at 2. -ynamic (at 3. O+erloading (at1,T51ort address Translation6 Fire.+##:A, ;irewall is the combination of hardware and software that pre+ents unauthori8ed access to an internal network from outside. &i$roso/" Pro'% Ser,er:A%icrosoft 1ro y Ser+er pro+ides both features Such ,s 1ro y Ser+er and a ;irewall. Pro"o$o#:A1rotocol is the set of rules and regulations that pro+ides the communication @etween Two or %ore de+ices in the (etwork. P+$*e" S.i"$!in :A.n 1acket Switching all of the data are sending from source computer to destination computer through may be a different way. 2ir$ui" S.i"$!in :A.n 0ircuit Switching all of the data are sending from source computer to destination computer through a single way. 0is* Quo"+:AWhen we want some users in the network do not use more disk space of the /ard -isk then we put a appropriate -isk ?uota entry on those users.

2om4ression:A@y compression we add free of space in our /ard -isk. Termin+"or:ATerminator absorbed the electric signal and stops the reflection. So$*e":A, Socket is a combination of .1 ,ddress and T01<7-1 1ort. Por":A, 1ort is recogni8ed by the ser+ice as for e ample ;T1 uses 1ort '1. OS1:AOS. stands for Open System .nterconnection model. .t is a standard model in the world. When e+er One 0omputer Wants to communicate with another 0omputer# , %a=or Task .s 1erformed inside the 0omputer and that ma=or Task are di+ided into Se+en 1arts and That Se+en 1arts .s 0alled se+en :ayers. 1. A44#i$+"ion 7+%er: A ,pplication :ayer .dentify the which types Of ,pplication ,re 7sing @y The 0lient .n The (etwork. ,s ;or e ample /TT1# ;T1# S%T1# Telnet 2. Presen"+"ion 7+%er: A The format Of -ata depends on the presentation :ayer. There ,re Two %a=or ;unction Of 1resentation :ayer ,. 0on+erting /igh :e+el 0oding to :ow :e+el 0oding @. 0on+erting :ow le+el 0oding to high :e+el 0oding Cenerally there are Two Types ,re 0oding .n this :ayer 1. ,S0..A,merican Standard 0ode ;or .nformation .nterchange code '. &@0-.0& tended @inary 0oded ;or decimal interchange 0ode Some additional ;unctions are presentation :ayers is 1. 0ompression 2. -ecompression 3. &ncryption 4. -ecryption 3. Session 7+%er: A Session :ayer 1ro+ides which types Of Session ,re &stablish between Sources to -estination 0omputer in the (etwork. There ,re three Types Of -ata Transmission in the (etwork ,. Sim4#e' Tr+nsmission:ASimple Transmission is only one way transmission as for e ample 3,-.O# T.4 6. -+#/-0u4#e':A/alfA-uple is an only one way transmission at a time. ,s for e amplehub# walky talky 2. Fu##-0u4#e':A;ullA-uple is a two way transmission at a same time. ,s for e ampleswitch# telephone# and wireless

Session :ayer 1ro+ide Some ,dditional ;unction in the (etwork# That .s 1. 1ause the Session '. Terminate The Session *. 3estart The session 4. Tr+ns4or" 7+%er:ATransport :ayer pro+ides The &nd to &nd 0onnecti+ity in The (etwork. Transport :ayer is responsible to carry the data from source to destination computer .n the (etwork. Transport :ayer pro+ides The Two types Of 0onnecti+ity in The network 3eliable 0onnecti+ity 7nreliable connecti+ity Cenerally There ,re Two types Of 1rotocol in Transport :ayer 1. T01ATransmission 0ontrol 1rotocol '. 7-17ser -atagram 1rotocol T01 pro+ides the reliable connecti+ity in the (etwork. 9 7-1 1ro+ides the 7nreliable connecti+ity in the network. 5. Ne".or* 7+%er:A(etwork :ayer 1ro+ides the Source .1 address and destination .1 address in the (etwork. There are Two %a=or ;unction of network :ayer 1. 1ro+ides the :ogical addressing.1 ,ddressing. '. 1ro+ides the 3outing 3outer .s a :ayer * de+ice in the network 6. 0+"+ 7in* 7+%er:A-ata :ink :ayer pro+ides the Source %ac address ,nd destination %ac address in the (etwork. ,ll of the Wan Technology .s a :ayer ' technology. Switch and @ridge .s a :ayer 'de+ice in The (etwork. 7. P!%si$+# 7+%er:A1hysical :ayer .s 3esponsible ;or 1ut The -ata on the 0able. /ub# 3epeater# 0able# (.0 these are :ayer A1 -e+ice in The (etwork. T2P:A 1. '. *. 2. ". >. 50P:1. T01 Stands for Transmission 0ontrol protocol T01 is a 0onnection Oriented protocol .t .s a unicasting protocol The 3ate of -ata transmission .s Slow in T01 .n T01 The Cuarantee Of -ata -eli+ery .n T01 ,cknowledgement is must. 7-1 Stands for 7ser -atagram protocol.

'. *. 2. ". >.

.t .s a 0onnection :ess protocol .t .s a @roadcasting protocol The 3ate Of -ata transmission is ;ast .n 7-1 (o Cuarantee of -ata -eli+ery .n 7-1 (o ,cknowledgement

0+"+ "r+nsmission T%4es:AThere are three types of data transmission in the networkAA 1. Sim4#e' Tr+nsmission:ASimple Transmission is only one way transmission as for e ample 3,-.O# T.4 2. -+#/-0u4#e':A/alfA-uple is a one way transmission at a time. as for e amplehub# walkyAtalky 3. Fu##-0u4#e':A;ullA-uple is a two way transmission at a same time. as for e ampleswitch# telephone# wireless ARP:A,31 stands for ,ddress 3esolution 1rotocol. .t is basically use for resol+ing .1 ,ddress to %,0 ,ddress in the network. 0O0 mo(e#:-O- %odel Stands ;or department of defense model. This %odel is also known ,s T01<.1 %odel. There are four :ayers in -O- %odelAAA 1. ,pplication :ayer* layer of OS. %odel '. Transport layertransport layer of OS. %odel *. .nternet layer(etwork layer Of OS. %odel 2. (etwork .nterface :ayer Or physical :ayer-ata link 9 1hysical :ayer of OS. %odel. 1.A44#i$+"ion 7+%er:AThere are many types of protocols in ,pplication :ayerK ,. -TTP:A/TT1 stands for /yper Te t Transfer 1rotocol. .t is basically use for caring the web page. /TT1 uses 1ort $). @. FTP:A;T1 stands for ;ile Transfer 1rotocol. .t is basically use for transferring the file. ;T1 uses 1ort '1. 2. Tr+ns4or" 7+%er:AThere are two types of protocol in this layerK

,. T2P:A T01 stands for Transmission 0ontrol 1rotocol. .t is a connection oriented protocol. The rate of data transmission is slow in this protocol. @y this protocol the acknowledgement is must. @. 50P:A 7-1 stands for 7ser -atagram 1rotocol. .t is a connection less protocol. The rate of data transmission is fast by this protocol. The acknowledgement is not reFuired. 3. 1n"erne" 7+%er:AThere are normally four protocols on this layerK ,. 1P:A.1 stands for .nternet 1rotocol. .t is responsible for assigning the .1 ,ddress. @. 12&P:A.0%1 stands for .nternet 0ontrol %anage 1rotocol. On the unsuccessful deli+ery it shows the error massage to resend the data. 0. 1;&P:A.C%1 stands for .nternet Croup %anagement 1rotocol. .t is responsible for control %ulticasting and @roadcasting. -. ARP:A,31 stands for ,ddress 3esolution 1rotocol. .t is basically used for resol+ing .1 ,ddress to %,0 ,ddress in the network. 0u+# 6oo"in :A, -ual @oot configuration allows us to choose between two or more operating system each time when we start the computer. .n -ual @ooting one operating system is belongs to (OS family and another operating system must be belongs to simple O<S family and the system partition must be formatted with either ;at or ;at *'. Fi#e S%s"em:A, logical di+ision of the /ard -isk is called ;ile System such as sector or Tracks. P+r"i"ion:A, logical di+ision of /ard -isk is called 1artition. 5ser Pro/i#e:A, user profile contents the information about a specific userHs log on setting Such ,s -esktop Setting. There are three types of user profile. 1. 7o$+# 5ser Pro/i#e:A, local user profile is automatically created on each computer to which the user log on. 2. Ro+min 5ser Pro/i#e:AThe same profile can be used from anywhere in the network from which the user log on. .n This 1rofile 7ser 0an 0hange /is Own profile and that profile Will @e sa+ed .n 0entral :ocation.

3. &+n(+"or% 5ser Pro/i#e:A, permanent profile will be used of any user in the network from which the user log on. .n this profile user can change his own profile but that profile will not be sa+ed in central location. That change is only for temporary purpose. O//#ine:A@y offline user e+enly access to a network share folder when he disconnected from the network. There ,re Three Types Of offline setting 1. %anually 0aching ;or documentby -efault 2. automatic caching for document 3. automatic caching for program Re$o,er% system is 3eco+ery fi mbr# fi 2onso#e:AWhen my systemHs registry is damage and my operating not starting properly in that case we will use 3eco+ery 0onsole. .n 0onsole we use some command line tools such as enable# disable# boot etc.

A$"i,e 0ire$"or%:A,cti+e -irectory is the main concept of Windows '))) 9 Windows '))* (etwork. .t stores the complete information about the whole network such as users# printers# computers etc. ,cti+e -irectory pro+ides The 0entrali8ed %anagement in the (etwork. O9<e$"s:A&+erything in ,cti+e -irectory is called Ob=ect such as users# 1rinters# computers etc. A""ri9u"es:A&+ery ob=ect has some Fualities that are called ,ttributes. On the basis of these attributes we identify the ob=ect such as user# printer# computer etc. Termin+# Ser,i$es:A@y Terminal Ser+ices we can manage our ser+er from anywhere in the network. There are two modes in Terminal Ser+icesK 1. Remo"e A(minis"r+"ion &o(e:A.n this mode at a same time @y -efault ma imum two administrators can connect remotely to the ser+er and manage it. 2. A44#i$+"ion Ser,er &o(e:A@y this mode user allow to run remotely one or more applications on the Ser+er. 7e+se( 7ine:A:eased :ine is a point to point connection. When we connect '2 hours a day to the .nternet then we ha+e a best option to choose the :ease :ine because it is cost effecti+e5no 0ostly6

1S0N 7ine:A.S-( :ine is not a point to point connection. .S-( networks e tend from the local telephone e change to the remote user in the network. @y .S-( :ine the rate of data transmission is fast. The data are sending in digital form not in analog form. .n .S-( scenario both side 5client side and ser+er side6 .S-( %odem is necessary. 5S6:A7S@ stands for 7ni+ersal Serial @us. .t is basically use for physically connecting many de+ices ,t a Same Time that supports the 7S@ such as printer# mouse# scanner# web camera etc. .t is compatible with near about 1'G de+ices at the same time. Se$uri"% Tem4#+"e:ASecurity Template is a readymade designed by %icrosoft for implementing a security configuration in the network. There are four types of Security Template @asic 5@y -efault6# 0ompatible 5:owA:e+el Security6# Secure and /igh. Ser,i$e P+$*:ASer+ice 1ack updates the -:: files and adds some additional features in operating system. 077:A-:: stands for -ynamic :ink :ibrary. .t is the important files of any application# which helps to run any application. 2R2:A030 stands for 0yclic 3edundancy 0heck. 030 is a number pro+ided by a mathematically calculation on the packet at its source. 0ri,er:A-ri+er is software which helps to perform the /ardware properly. &u#"i#in*:A%ultilink connection uses multiple modems to create a single connection to the .nternet or other computers in the network. 2S&A=20:A0S%,<0- stands for 0arrier Sense %ultiple ,ccess<0ollision -etect. ,t a same time when two computers are sending data to each other in a single way then collision happens. .n that case 0S%,<0- stops the collision and retransmits the data after sometime in the network. 2A7:A0,: stands for 0lient ,ccess :icense. ,ny client computer who accesses the ser+er in a network must reFuire a license. There are two types of license 1er Ser+er and 1er Seat. We con+ert 1er Ser+er to 1er Seat at one time but we cannot con+ert from 1er Seat to 1er Ser+er. A(min4+$*.msi:A;or .nstalling<7ninstalling of ,dministrati+e tools we use ,dminpack.msi.

S+/e &o(e:A.n this mode load only basic de+ices and dri+ers that are reFuire to start the computer. not loading the following dri+ers such as 4C, card# soundcard# network card etc. Only load the @asic dri+er Such as keyboard# mouse# and storage de+ice. >;A &O03:A:oad the basic 4C, dri+er. This mode is useful if a +ideo dri+er is pre+enting windows operating system from starting properly# basic resolution 2$) >2) pi els setting are applies. 0NS S3R>3R:A-(S stands for domain name system. .t is a basically use for name resolution purpose of Windows ')))<'))* clients in the network on working purpose. There are two types of 8onesK 1. For.+r( 7oo*u4 ?one:A.t is basically used for resol+ing /ost name to .1 ,ddress in the network. 2. Re,erse 7oo*u4 ?one:A.t is basically used for resol+ing .1 ,ddress to /ost name in the network. Re#+"e( 0om+in: A 3elated to -omain There are three types of 8oneK 1. A$"i,e 0ire$"or% 1n"e r+"e( ?one:A,cti+e -irectory .ntegrated Done is integrated with ,cti+e -irectory. ;or creating this 8one ,cti+e -irectory and -(S is necessary on a particular computer in the network. 2. S"+n(+r( Prim+r% ?one:AStandard 1rimary Done is not integrated with ,cti+e -irectory. ;or creating this 8one only -(S is necessary not ,cti+e -irectory is reFuired. 3. S"+n(+r( Se$on(+r% ?one:AStandard Secondary Done is clone copy of master -(S Ser+er such as ,cti+e -irectory .ntegrated Done or Standard 1rimary Done. ?one:ADone is the database in the -(S where all computers , 3ecord 5/ost 3ecord6 and 1T3 3ecord 51ointer 3ecord6 are ,+ailable in the network. >ir"u+# &emor%:A4irtual %emory is some space in the /ard -isk that is used whene+er 3,% is full in computer.

5n+""en(e( 1ns"+##+"ion:A.n this process we create an answer file. @y this process we can run the automatically installation of Windows ')))<'))* Operating System. 0FS:A-;S stands for -istributed ;ile System. .t is a central location of any user in the network and that is linked with all of the share folder in the network. @y -;S user will be only access the -;S ser+er and further access any share folder in the network. -+r(.+re Pro/i#e:A;or battery sa+ing purpose or electricity sa+ing purpose we can use the /ardware 1rofile. .t is basically use for mobile user in the network. There are two main important parts in the /ardware 1rofile for e amination point of +iew first is -ock and second 7ndock station. -ock stationinside the office# undock stationoutside the office. 1n"erne":AThe worldwide collection of all (etworks and Cateways that is uses T01<.1 protocol is called .nternet. .t is a e ample of W,(<it is also known as W,(. .nternet uses the high speed data communication lines between the ma=or nodes and the host computer. .nternet is a public (et and e+erybody can access it without user name and password. 1n"r+ne":A, pri+ate network within an organi8ation that is uses for distribute the information within the organi8ation is called .ntranet. .t is a e ample of :,(<it is also known as :,(. .n .ntranet only the organi8ation people can access and use the .ntranet. 3'"r+ne":A, pri+ate network that is working within a organi8ation and outside the organi8ation but not for public<e+erybody is called & tranet. .n & tranet the company employees# distributors# suppliers# customer etc. can access the network. 0-2P:A-/01 stands for -ynamic /ost 0onfiguration 1rotocol. -/01 Ser+er pro+ides the automatically T01<.1 configuration of all of the clients in the network. AP1PA:A,1.1, stands for ,utomatic 1ri+ate .1 ,ddressing. When . configure a computer in T01<.1 setting to obtain .1 ,ddress automatically and my -/01 Ser+er is not a+ailable or not responding to -/01 client in that case the computer recei+e a .1 ,ddress from ,1.1, in the range of 1>!.'"2.).).,1.1, 3,(C& 1>!.'"2.).1 to 1>!.'"2.'"".'"2

0-2P S$o4e: A , -/01 scope is a range of .1 ,ddresses in the -/01 Ser+er Who leases the .1 address to -/01 0lient in the network. There are three types of ScopesK 1. Norm+# S$o4e:A 2. &u#"i$+s" S$o4e:A 3. Su4er S$o4e:A 0-2P Re#+% A en":ASuppose . ha+e two subnets that is Subnet , and Subnet @ and both subnets are connected to a 3outer. . ha+e a -/01 Ser+er in Subnet ,. . configure two scopes in -/01 Ser+er i.e. Scope , for Subnet , and Scope @ for Subnet @. . want to configure that all the computers in Subnet @ recei+e the .1 ,ddresses from -/01 Ser+er That .s :ocated in Subnet ,. @ut my 3outer is not 3;0 1"2' 53eFuest for 0omment6 compatible in that case . will install a -/01 relay ,gent in Subnet @. S$o4e O4"ion:AScope Option pro+ides the additional T01<.1 configuration of any -/01 client in the network such as the .1 ,ddress of -(S Ser+er# W.(S Ser+er# 3outer etc. There are four types of scope optionK 1. Ser,er 7e,e#:A 2. S$o4e 7e,e#:A 3. 2#+ss 7e,e#:A 4. Reser,e( 2#ien" 7e,e#:A Remo"e A$$ess 2onne$"i,i"%:AThere are two types of 3emote ,ccess 0onnecti+ity in The (etwork. 1. 0i+#-u4 Remo"e A$$ess:A;or -ialAup 3emote ,ccess at least telephone line and modem are necessary on both side 0lient side and Ser+er side. , 3,S Ser+er is must be configured at Ser+er side. .n this process 3emote ,ccess 0lient dial the telephone number of 3,S Ser+er and then after gi+ing user name and password. ,fter +erifying user name and password the 3emote ,ccess 0lient connect to the 3,S Ser+er and further connect to the .nternal (etwork.

2. >PN:A41( Stands for 4irtual 1ri+ate (etwork. .n this process 3emote ,ccess 0lient connect to the 41( Ser+er +ia .nternet. @y this process the communication is +ery secure and the data are sending and recei+ing in tunneling form. 0NS:AThere are two types of -(S ?ueryK 1. 1"er+"i,e Quer%:AWhen a client ?uery to the -(S Ser+er and if my -(S Ser+er is ha+ing the best result then it will gi+e the best result to client in the network otherwise it will send a message not found# it is called .terati+e ?uery. 2. Re$ursi,e Quer%:AWhen a client ?uery to the -(S Ser+er and if my -(S Ser+er is ha+ing the best result then it will gi+e the best result to client computer otherwise it forward the client ?uery on own behalf to the 3oot -(S Ser+er and it will gi+e the complete result to the client 0omputer in the network# it is called 3ecursi+e ?uery. 2A:A0, stands for 0ertification ,uthority. 0, pro+ides the secure communication between two or more computers in the network. There are four types of 0,K 1. 3n"er4rise Roo" 2A:A 2. 3n"er4rise Su9or(in+"e 2A:A 3. S"+n( A#one Roo" 2A:A 4. S"+n( A#one Su9or(in+"e 2A:A &nterprise 3oot 0, and &nterprise Subordinate 0, reFuired the ,cti+e -irectory but Stand ,lone 3oot 0, and Stand ,lone Subordinate 0, do not reFuire ,cti+e -irectory. 1P Se$ Po#i$%:A.1 Sec 1olicy pro+ides the secure communication between two or more computers in the network. There are three types of .1 Sec 1olicy in the networkK 1. 2#ien" Res4on( On#%:A

2. Se$ure Ser,er Re@uire( Se$uri"%:A 3. Se$ure Ser,er Re@ues" Se$uri"%:A 12S:A.0S stands for .nternet 0onnection Sharing. .t is basically used in workgroup to share the .nternet connection. NS 7oo*u4:A(S :ookup check that my -(S Ser+er is working properly or not in the network. S$+,en in :ASca+enging is use to clear the stale records in the -(S Ser+er. )1NS:AW.(S stands for Windows .nternet (aming System. .t is basically use for (ame 3esolution purpose for pre+ious +ersion of Windows '))) 0lients in the network. .t is resol+ing (et@.OS (ame to .1 address in The (etwork There is three types of 3eplication partner in the W.(S Ser+erK 1. Pus! P+r"ner:A 2. Pu## P+r"ner:A 3. Pus!-Pu## P+r"ner:A5@y -efault6 There are four Types Of nodes in W.(S Ser+erK @ (ode 5@roadcasting6 1 (ode 5Search Ser+er6 % (ode 5@ N 16 / (ode 51 N @6 R1S:A3.S Stands for 3emote .nstallation Ser+ice. .n this process the computers are connected to a ser+er running 3emote .nstallation Ser+ice and then after 3.S Ser+er install the Windows '))) 1rofessional on those computers. .n this process the client computers uses the 1E& 0ard. -ome Fo#(er:A/ome ;older is a central location of any user in the network where he can sa+e file and folder. /ome ;older shows as a dri+e in the computer when a user login the network from anywhere.

Tr+$er":A Tracert display 0omplete 3outes .nformation from source computer to destination computer in the network. Te#ne":ATelnet pro+ides the remotely logon the computer and working on that computer. ;#o9+# 2+"+#o Ser,er: A , Clobal 0atalog Ser+er is a forest root domain that creates a relationship between two computers within the Single ;orest @y default first root domain controller is the global catalog ser+er in the network. .t stores the information about uni+ersal group in the network. Clobal 0atalog Ser+er %aintain The 3ead Only 0opy To ,ll Of The -omain .nside The ;orest. 5ser Ri !":A7ser 3ights authori8ed a user to who logon to the network or computer to perform certain action on the system. There are some common 7ser 3ightsK ,. @. 0. -. :og on :ocally 0hange the System Time Shut -own the System ,ccess the 0omputer from (etwork

Po.er 5ser:A, user that ,re ha+ing the special authority to maintain the user accounts such as add a user account# delete a user account# modify a user account# change the password of a user etc. is called 1ower 7ser. 6+$*u4 O4er+"or:A, user that is ha+ing the power of @ackup and 3estore the file of a computer it is called @ackup Operator. )ire#ess 2ommuni$+"ion:A.n Wireless 0ommunication we ha+e not need to attach a de+ice to the computer by the help of wire. Wireless 0ommunication de+ice works on the basis of recei+e and transmit the analog or digital signals in The (etwork. There are two types of Wireless 0ommunicationK 1. 1n/r+re( Tr+nsmission:A.n .nfrared Transmission an infrared light beam is used to carry the data between transmit and recei+ing de+ice. There must be a clear line between transmit and recei+ing de+ice for communication. T4 and 3emote is the e ample of .nfrared Transmission. 2. N+rro.9+n( R+(io Tr+nsmission:A.n (arrowband 3adio Transmission user tunes both the transmitter and the recei+er to a certain freFuency.

(arrowband 3adio Transmission does not reFuire a clear line between both de+ices. 3adio and ;% is the e ample of (arrowband 3adio Transmission. PPTP:A11T1 stands for 1oint to 1oint Tunneling 1rotocol. .t is used in 3,S connecti+ity. 11T1 enable the secure transfer of encapsulate data between a 11T1 0lient and a 11T1 Ser+er across the .nternet. 11T1 uses %11& 5%icrosoft 1ointA toA1oint &ncryption6 to encrypt the data. 72TP:A:'T1 stands for :ayer Two Tunneling 1rotocol. .t is used in 3,S and more secure then 11T1. :'T1 enables the secure transfer of encapsulate data between :'T1 0lient and :'T1 Ser+er across the .nternet. :'T1 uses .1 Sec 5.nternet 1rotocol Security6 for &ncrypt the data. T!ree )+% -+n( S!+*e:AT01 is a reliable 1rotocol. When two computers communicate that using T01# firstly establish a connection before the e change of data# it is called session. Two computers establish a session by a process that is called Three Way /and Shake. There are three steps in Three Way /and Shake processK ,. The source computer initiates the connection by transmitting the session information. @. The destination computer responds with its session information. 0. The source computer recei+es the information and sends an acknowledgement. -os" N+me:A, /ost (ame is a user friendly name that is gi+en by us to a computer to identify him. The /ost (ame is a 1" byte or up to '"" character length name. Ne"6ios N+me:A, (et@.OS (ame is a 1"N1 byte name in that 1" byte is host name that is gi+en by us and 1 byte is generated by computer automatically.1 @yte -epends on That 0omputer ,re 1ro+iding Which Binds Of ser+ices .n the (etwork. )e9 Ser,er:A, ser+er computer that pro+ides the ser+ices related to web site<.nternet is called Web Ser+er. 2#+ss-/u## 1P A((ress:A,ll the .1 ,ddresses are di+ided into fi+e classes class ,# @# 0# - and &. ,ll the classes ha+ing a default subnet mask according to its class. So the .1 ,ddress that is gi+en with its default subnet mask is called 0lassAfull .1 ,ddress.

2#+ss-#ess 1P A((ress:A,ll the .1 ,ddresses are di+ided into ;i+e 0lasses class ,# @# 0# - and &. ,ll the classes ha+ing its default subnet mask. When we change the default subnet mask of an .1 ,ddress by the help of sub netting and super netting# it is called 0lassAless .1 ,ddress. 0ri,er Si nin :ASometimes when we install a new dri+er<software on the computer then its installation process is o+erwrite some system files and damage or creating some problem with our operating system. To stop this thing windows '))) ha+e a feature i.e. -ri+er Signing. -ri+er Signing check the dri+er<software is signed by %icrosoft or not. There are three Options in -ri+er SigningK 1. 1 nore:A.n .gnore Windows do not check the signed or unsigned dri+er and install the dri+er normally. 2. )+rn:A.n Warn Windows check the dri+er is signed or unsigned and gi+e a warning massage during installation for unsigned dri+er. 3. 6#o$*:A.n @lock Windows ne+er install the unsigned dri+er. Permission 1n!eri"+n$e:A,ll the permissions is assigned to a folder is automatic apply on its subfolder or files# it is called 1ermission .nheritance. T+*e O.ners!i4:A.f the administrator has no rights or permissions on an ob=ect then the administrator can be the owner of that ob=ect by the using the power i.e. Take ownership and forcibly get the permission on that ob=ect. Re$o,er% A en":A3eco+ery ,gent has the power of -ecrypt the file of any user. 0e$r%4"ion:A0hange an &ncrypted file to a simple file is called -ecryption. Or 3emo+e the &ncryption from a file or ;older is called -ecryption. -i((en S!+re:AWhen we share a ob=ect with the O sign# it is called /idden Share. /idden Share ob=ect is not shown as like normal share ob=ects. Prin" 0e,i$e:A1rint -e+ice is a hardware that is physically prints a document. S4oo# Fo#(er:ASpool ;older shows the entire documents that are waiting for print in print Fueue.

0e/+u#" Prin"er:AWhich printer . want to gi+e priority to print document that is known as -efault 1rinter. Prin"er Poo#in :A@y the 1rinter 1ooling we can connect one 1rinter -ri+er with two or more print de+ice for load balancing 1urpose .n The (etwork.. .n printer 1olling We 0an say One %aster and %ore than one ser+ant are ,+ailable in the (etwork. .n printer pooling it is necessary that print de+ice is same manufacturer and same model no. Prin"er Priori"%:A@y 1rinter 1riority we can connect two or more printers with one print de+ice and set the priority of each printer that whose document is print firstly .n the (etwork. .n printer priority We 0an say one ser+ant and more than one master are ,+ailable in the (etwork. .n that case which work will be first? We 0an configure the priority on the printer# such asmanger!!# user1 1n"erne" Prin"in :A@y the .nternet printing we can print a document remotely in the (etwork. .n .nternet 1rinting we can print the document on the print de+ice that is located in other city. S$o4e o/ ;rou4:AThere are three types of Croup scopes .n the (etworkKA 1. 0om+in 7o$+# ;rou4:A.n -omain :ocal Croup user @elongs to ,ny -omain and ,ccess resources %y -omain. 2. ;#o9+# ;rou4:A.n Clobal Croup 7ser @elongs To %y -omain and ,ccess 3esources ,ny -omain. 3. 5ni,ers+# ;rou4AA.n 7ni+ersal Croup user 7ser @elongs to ,ny -omain and ,ccess 3esources ,ny -omain. There are two types of CroupsK 1. Se$uri"% ;rou4:ASecurity Croup is basically used for gi+e the permission to the user on a 1articular resource of the network. Security Croup is ha+ing all the features of -istribution Croup.

2. 0is"ri9u"ion ;rou4:A-istribution Croup is basically created for sending &A%ails in The (etwork. On -istribution Croup we can not assign the permission ;or ,ny Ob=ects in The network. -istribution Croup 0an (ot Work ,s , Security Croup. 0is+s"er:A,n e+ent that becomes a cause to unable to start Windows properly such as corruption of boot sector# deleting or missing system file etc. is called disaster. 0is+s"er Re$o,er%:AWhen a computer disaster occurs after that the process of restoring the computer to its original state that is prior of disaster is called -isaster 3eco+ery. 3R0:A&3- stands for &mergency 3epair -isk. &3- ha+ing a backup copy of system state data such as registry# system files# partition boot sector# startup en+ironment etc. .t is most important tool to reco+er your system registry. 0is* 0u4#i$+"ion:AWhen we need to install Windows ')))<'))* on a large number of computers. We ha+e create a disk image of Windows ')))<'))* installation and then copy the image to the multiple computers that process is called -isk -uplication.

S-ar putea să vă placă și