Sunteți pe pagina 1din 13

22.

ISS multiple web servers


IIS supports multiple Web sites on a single server. For example, rather than using three different servers to
host three different Web sites, you can install all three Web sites on the same server. Consolidating Web
sites saves hardware resources, conserves space, and reduces energy costs.
To ensure that user requests reach the correct Web site, you must configure a unique identity for each site
on the server. To do so, you must distinguish each Web site with at least one of three unique identifiers: a
host header name, an IP address, or a unique TCP port number.
Web sites hosted on the same server can be distinguished using the following unique identifiers.

Host header name


IP address
TCP port number

Using host header names to uniquely identify sites on a server is recommended for most situations.

23.what is GPO - group policy object


In the Windows 2000 operating system, a Group Policy Object (GPO) is a
collection of settings that define what a system will look like and how it will
behave for a defined group of users. Microsoft provides a program snap-inthat
allows you to use the Group Policy Microsoft Management Console (MMC).
The selections result in a Group Policy Object. The GPO is associated with
selected Active Directory containers, such as sites, domains, or organizational
units (OUs). The MMC allows you to create a GPO that defines registry-based
polices, security options, software installation and maintenance options,
scripts options, and folder redirection options.

24.primary key in MySQL


A primary key is a column or a set of columns that uniquely identifies each row in the table.
The following are the rules that you must follow when you define a primary key for a table:

A primary key must contain unique values. If the primary key consists of multiple
columns, the combination of values in these columns must be unique.
A primary key column cannot contain NULL values. It means that you have to
declare the primary key column with NOT NULL attribute. If you dont, MySQL will
force the primary key column as NOT NULL implicitly.
A table has only one primary key.

25.what is /var folder usually for?

/var is a standard subdirectory of the root directory in Linux and other Unixlike operating systems that contains files to which the system writes data during the
course of its operation.
The root directory is the directory that contains all other directories and files on a
system and which is designated by a forward slash ( / ). Among the other directories
that are usually installed by default in the root directory
are /bin, /boot, /dev, /etc, /home, /initrd, /lib, /lost+found, /misc, /mnt, /opt, /proc, /root
, /sbin, /tmp and /usr.
/var is specific for each computer; that is, it is not shared over a network with other
computers, in contrast to many other high-level directories. Its contents are not
included in /usr because situations can occur in which it is desired to mount /usr as
read-only, such as when it is on a CDROM or on another computer. /usr, which is
generally the largest directory (at least on a newly installed system) and is used to
store application programs, should only contain static data.
Among the various subdirectories within /var are /var/cache (contains cached data
from application programs), /var/games (contains variable data relating to games in
/usr), /var/lib (contains dynamic data libraries and files), /var/lock (contains lock files
created by programs to indicate that they are using a particular file or
device),/var/log (contains log files), /var/run (contains PIDs and other system
information that is valid until the system is booted again) and /var/spool (contains
mail, news and printer queues).

26.what is /opt folder usually for?


This directory is reserved for all the software and add-on packages that are not part of
the default installation. For example, StarOffice, Kylix, Netscape Communicator and
WordPerfect packages are normally found here. To comply with the FSSTND, all
third party applications should be installed in this directory. Any package to be
installed here must locate its static files (ie. extra fonts, clipart, database files) must
locate its static files in a separate /opt/'package' or /opt/'provider' directory tree
(similar to the way in which Windows will install new software to its own directory
tree C:\Windows\Progam Files\"Program Name"), where 'package' is a name that
describes the software package and 'provider' is the provider's LANANA registered
name.

Although most distributions neglect to create the directories /opt/bin, /opt/doc,


/opt/include, /opt/info, /opt/lib, and /opt/man they are reserved for local system
administrator use. Packages may provide "front-end" files intended to be placed in (by
linking or copying) these reserved directories by the system administrator, but must
function normally in the absence of these reserved directories. Programs to be invoked
by users are located in the directory /opt/'package'/bin. If the package includes UNIX
manual pages, they are located in /opt/'package'/man and the same substructure as
/usr/share/man must be used. Package files that are variable must be installed in
/var/opt. Host-specific configuration files are installed in /etc/opt.
Under no circumstances are other package files to exist outside the /opt, /var/opt, and
/etc/opt hierarchies except for those package files that must reside in specific locations
within the filesystem tree in order to function properly. For example, device lock files
in /var/lock and devices in /dev. Distributions may install software in /opt, but must
not modify or delete software installed by the local system administrator without the
assent of the local system administrator.
The use of /opt for add-on software is a well-established practice in the UNIX
community. The System V Application Binary Interface [AT&T 1990], based on the
System V Interface Definition (Third Edition) and the Intel Binary Compatibility
Standard v. 2 (iBCS2) provides for an /opt structure very similar to the one defined
here.
Generally, all data required to support a package on a system must be present within
/opt/'package', including files intended to be copied into /etc/opt/'package' and
/var/opt/'package' as well as reserved directories in /opt. The minor restrictions on
distributions using /opt are necessary because conflicts are possible between
distribution installed and locally installed software, especially in the case of fixed
pathnames found in some binary software.
The structure of the directories below /opt/'provider' is left up to the packager of the
software, though it is recommended that packages are installed in
/opt/'provider'/'package' and follow a similar structure to the guidelines for
/opt/package. A valid reason for diverging from this structure is for support packages
which may have files installed in /opt/ 'provider'/lib or /opt/'provider'/bin.

27.what is /bin folder usually for?

/bin is a standard subdirectory of the root directory in Unix-like operating


systems that contains the executable (i.e., ready to run) programs that must be
available in order to attain minimal functionality for the purposes of booting (i.e.,
starting) and repairing a system.
The root directory, which is designated by a forward slash ( / ), is the toplevel directory in the hierarchy of directories (also referred to as the directory tree) on
Unix-like operating systems. That is, it is the directory that contains all other
directories and their subdirectories as well as all files on the system.
A directory in a Unix-like operating system is merely a special type of file that
contains a list of the names of objects (i.e., files, links and directories) that appear to
the user to be in it along with the corresponding inodes for each object. A file is a
named collection of related information that appears to the user as a single, contiguous
block of data and that is retained in storage (e.g., a hard disk drive or a floppy disk).
An inode is a data structure on a filesystem that stores all the information about a
filesystem object except its name and its actual data. A data structure is a way of
storing data so that it can be used efficiently. A filesystem is the hierarchy of
directories that is used to organize files on a computer system.
The full names (also referred to as the absolute pathnames) of all of the subdirectories
in the root directory begin with a forward slash, which shows their position in the
filesystem hierarchy. In addition to /bin, some of the other standard subdirectories in
the root directory include /boot, /dev, /etc, /home, /mnt, /usr, /proc and /var.
Among the contents of /bin are
the shells (e.g., bash and csh), ls, grep, tar, kill, echo, ps, cp, mv, rm, cat, gzip, ping, s
u and the vi text editor. These programs can be used by both the root user (i.e., the
administrative user) and ordinary users.
A list of all the programs in /bin can be viewed by using the ls command, which is
commonly used to view the contents of directories, i.e.,
ls /bin

/bin is by default in PATH, which is the list of directories that the system searches for
the corresponding program when a command is issued. This means that anyexecutable
file (i.e., runnable program) in /bin can be run just by entering the file name at the
command line and then pressing the ENTER key
1.Explain what is the role you're applying about and how you understand it?

2.Have you used any AWS services in the past? Did you hit any challenges along the way
setting up those services?

3.Something that you are pationate to learn more of AWS?

4.Explain in simple terms what is virtualization

1. Virtualization is the single most effective way to reduce IT expenses while boosting
efficiency and agilitynot just for large enterprises, but for small and midsize
businesses too. VMware virtualization lets you: Run multiple operating systems and
applications on a single computer.
5.How does the hypervisor work?

A hypervisor, also called a virtual machine manager, is a program that


allows multiple operating systems to share a single hardware
processor.
6.Types of hypervisors?
IBM systems breaks hypervisors down into two different types:
Type 1 hypervisors
Type 1 hypervisors are those that run directly on the system hardware and offers a higher level of virtualization
efficiency and security.
Type 2 hypervisors
Type 2 hypervisors are those that run on a host operating system that provides virtualization services, such as I/O
device support and memory management. Type 2 hypervisors are used mainly on client systems where efficiency is
less critical, and are also commonly used for systems where support for a broad range of I/O devices is needed and
can be provided by the host operating system.

.
7.What TCP/IP is?

TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic


communication language or protocol of the Internet. It can also be used as a
communications protocol in a private network (either an intranet or
anextranet). When you are set up with direct access to the Internet, your
computer is provided with a copy of the TCP/IP program just as every other

computer that you may send messages to or get information from also has a
copy of TCP/IP.
TCP/IP is a two-layer program. The higher layer, Transmission Control
Protocol, manages the assembling of a message or file into smaller packets
that are transmitted over the Internet and received by a TCP layer that
reassembles the packets into the original message. The lower layer, Internet
Protocol, handles the address part of each packet so that it gets to the right
destination. Each gateway computer on the network checks this address to
see where to forward the message. Even though some packets from the same
message are routed differently than others, they'll be reassembled at the
destination.

8.What a subnet mask is used for? How it works? What it's made up of?
An IP address has two components, the network address and the host address. A subnet mask
separates the IP address into the network and host addresses (<network><host>). Subnetting
further divides the host part of an IP address into a subnet and host address
(<network><subnet><host>) if additional subnetwork is needed. It is called a subnet mask because it
is used to identify network address of an IP address by perfoming a bitwise AND operation on the
netmask.
A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into
network address and host address. Subnet Mask is made by setting network bits to all "1"s and
setting host bits to all "0"s. Within a given network, two host addresses are reserved for special
purpose, and cannot be assigned to hosts. The "0" address is assigned a network address and "255"
is assigned to a broadcast address, and they cannot be assigned to hosts.
Examples of commonly used netmasks for classed networks are 8-bits (Class A), 16-bits (Class B)
and 24-bits (Class C), and classless networks are as follows:
Class
CIDR
CIDR
CIDR
CIDR
A
CIDR
CIDR
CIDR
CIDR
CIDR

Address
/4
/5
/6
/7
/8
/9
/10
/11
/12
/13

# of Hosts
240,435,456
134,217,728
67,108,864
33,554,432
16,777,216
8,388,608
4,194,304
2,097,152
1,048,576
524,288

Netmask (Binary)
11110000 00000000 00000000 00000000
11111000 00000000 00000000 00000000
11111100 00000000 00000000 00000000
11111110 00000000 00000000 00000000
11111111 00000000 00000000 00000000
11111111 10000000 00000000 00000000
11111111 11000000 00000000 00000000
11111111 11100000 00000000 00000000
11111111 11110000 00000000 00000000
11111111 11111000 00000000 00000000

Netmask (Decimal)
240.0.0.0
248.0.0.0
252.0.0.0
254.0.0.0
255.0.0.0
255.128.0.0
255.192.0.0
255.224.0.0
255.240.0.0
255.248.0.0

CIDR
CIDR
B
CIDR
CIDR
CIDR
CIDR
CIDR
CIDR
CIDR
C
CIDR
CIDR
CIDR
CIDR
CIDR
CIDR

/14
/15
/16
/17
/18
/19
/20
/21
/22
/23
/24
/25
/26
/27
/28
/29
/30

262,144
131,072
65,534
32,768
16,384
8,192
4,096
2,048
1,024
512
256
128
64
32
16
8
4

11111111 11111100 00000000 00000000


11111111 11111110 00000000 00000000
11111111 11111111 00000000 00000000
11111111 11111111 10000000 00000000
11111111 11111111 11000000 00000000
11111111 11111111 11100000 00000000
11111111 11111111 11110000 00000000
11111111 11111111 11111000 00000000
11111111 11111111 11111100 00000000
11111111 11111111 11111110 00000000
11111111 11111111 11111111 00000000
11111111 11111111 11111111 10000000
11111111 11111111 11111111 11000000
11111111 11111111 11111111 11100000
11111111 11111111 11111111 11110000
11111111 11111111 11111111 11111000
11111111 11111111 11111111 11111100

255.252.0.0
255.254.0.0
255.255.0.0
255.255.128.0
255.255.192.0
255.255.224.0
255.255.240.0
255.255.248.0
255.255.252.0
255.255.254.0
255.255.255.0
255.255.255.128
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.248
255.255.255.252

Subnetting an IP network is to separate a big network into smaller multiple networks for
reorganization and security purposes. All nodes (hosts) in a subnetwork see all packets transmitted
by any node in a network. Performance of a network is adversely affected under heavy traffic load
due to collisions and retransmissions.
Applying a subnet mask to an IP address separates network address from host address. The
network bits are represented by the 1's in the mask, and the host bits are represented by 0's.
Performing a bitwise logical AND operation on the IP address with the subnet mask produces the
network address. For example, applying the Class C subnet mask to our IP address 216.3.128.12
produces the following network address:
IP:
1101 1000 . 0000 0011 . 1000 0000 . 0000 1100
Mask: 1111 1111 . 1111 1111 . 1111 1111 . 0000 0000
--------------------------------------------1101 1000 . 0000 0011 . 1000 0000 . 0000 0000

(216.003.128.012)
(255.255.255.000)
(216.003.128.000)

Subnetting Network
Here is another scenario where subnetting is needed. Pretend that a web host with a Class C
network needs to divide the network so that parts of the network can be leased to its customers.
Let's assume that a host has a network address of 216.3.128.0 (as shown in the example above).
Let's say that we're going to divide the network into 2 and dedicate the first half to itself, and the
other half to its customers.
216 .
216 .

3 . 128 . (0000 0000)


3 . 128 . (1000 0000)

(1st half assigned to the web host)


(2nd half assigned to the customers)

The web host will have the subnet mask of 216.3.128.128 (/25). Now, we'll further divide the 2nd half
into eight block of 16 IP addresses.

216 .
3 . 128 . (1000 0000)
216 .
3 . 128 . (1001 0000)
216 .
3 . 128 . (1010 0000)
216 .
3 . 128 . (1011 0000)
216 .
3 . 128 . (1100 0000)
216 .
3 . 128 . (1101 0000)
216 .
3 . 128 . (1110 0000)
216 .
3 . 128 . (1111 0000)
----------------------------255 . 255 . 255 . (1111 0000)

Customer
Customer
Customer
Customer
Customer
Customer
Customer
Customer

1
2
3
4
5
6
7
8

---------

Gets
Gets
Gets
Gets
Gets
Gets
Gets
Gets

16
16
16
16
16
16
16
16

IPs
IPs
IPs
IPs
IPs
IPs
IPs
IPs

(14
(14
(14
(14
(14
(14
(14
(14

usable)
usable)
usable)
usable)
usable)
usable)
usable)
usable)

(Subnet mask of 255.255.255.240)

CIDR - Classless Inter Domain Routing


Classless InterDomain Routing (CIDR) was invented to keep the Internet from running out of IP
Addresses. The IPv4, a 32-bit, addresses have a limit of 4,294,967,296 (232) unique IP addresses.
The classful address scheme (Class A, B and C) of allocating IP addresses in 8-bit increments can
be very wasteful. With classful addressing scheme, a minimum number of IP addresses allocated to
an organization is 256 (Class C). Giving 256 IP addresses to an organization only requiring 15 IP
addresses is wasteful. Also, an organization requiring more than 256 IP addresses (let's say 1,000
IP addresses) is assigned a Class B, which allocates 65,536 IP addresses. Similarly, an organization
requiring more than 65,636 (65,634 usable IPs) is assigned a Class A network, which allocates
16,777,216 (16.7 Million) IP addresses. This type of address allocation is very wasteful.
With CIDR, a network of IP addresses is allocated in 1-bit increments as opposed to 8-bits in classful
network. The use of a CIDR notated address can easily represent classful addresses (Class A = /8,
Class B = /16, and Class C = /24). The number next to the slash (i.e. /8) represents the number of
bits assigned to the network address. The example shown above can be illustrated with CIDR as
follows:
216.3.128.12, with subnet mask of 255.255.255.128 is written as
216.3.128.12/25
Similarly, the 8 customers with the block of 16 IP addresses can be
written as:
216.3.128.129/28, 216.3.128.130/28, and etc.

9.In class C space, how many host can you have in that space? Is there a special IP address
that cannot be used?

10.Any differences between TCP and UDP?

Difference between TCP and UDP


TCP

UDP

Reliability: TCP is connection-oriented protocol.

Reliability: UDP is connectionless protocol. When

When a file or message send it will get delivered

you a send a data or message, you don't know if

unless connections fails. If connection lost, the

it'll get there, it could get lost on the way. There

server will request the lost part. There is no

may be corruption while transferring a message.

corruption while transferring a message.


Ordered: If you send two messages along a

Ordered: If you send two messages out, you

connection, one after the other, you know the first don't know what order they'll arrive in i.e. no
message will get there first. You don't have to

ordered

worry about data arriving in the wrong order.


Heavyweight: - when the low level parts of the

Lightweight: No ordering of messages, no

TCP "stream" arrive in the wrong order, resend

tracking connections, etc. It's just fire and forget!

requests have to be sent, and all the out of

This means it's a lot quicker, and the network

sequence parts have to be put back together, so

card / OS have to do very little work to translate

requires a bit of work to piece together.

the data back from the packets.

Streaming: Data is read as a "stream," with

Datagrams: Packets are sent individually and are

nothing distinguishing where one packet ends and guaranteed to be whole if they arrive. One packet
another begins. There may be multiple packets

per one read call.

per read call.


Examples: World Wide Web (Apache TCP port

Examples: Domain Name System (DNS UDP

80), e-mail (SMTP TCP port 25 Postfix MTA), File port 53), streaming media applications such as
Transfer Protocol (FTP port 21) and Secure Shell IPTV or movies, Voice over IP (VoIP), Trivial File
(OpenSSH port 22) etc.

Transfer Protocol (TFTP) and online multiplayer


games etc

11. Tell me about different DNS record types.


There are 5 types of DNS records:
A, CNAME, NS, MX, and PTR

A records
Address (A) records direct a hostname to a numerical IP address. For example, if you want
mycomputer.yourdomain.com to point to your home computer (which is, for example, 192.168.0.3),
you would enter a record that looks like:
mycomputer.yourdomain.com. A 192.168.0.3

Important: You must put a period after the hostname. Do not put periods after IP addresses.
CNAME records
CNAME allows a machine to be known by one or more hostnames. There must always be an A
record first, and this is known as the canonical or official name. For example:
yourdomain.com. A 192.168.0.1

Using CNAME, you can point other hostnames to the canonical (A record) address. For example:
ftp.yourdoman.com. CNAME yourdomain.com.
mail.yourdomain.com. CNAME yourdomain.com.
ssh.yourdomin.com. CNAME yourdomain.com.

CNAME records make it possible to access your domain through ftp.yourdomain.com,


mail.yourdomain.com, etc. Without a proper CNAME record, you will not be able to connect to your
server using such addresses.
Entering a CNAME record
If you wanted home.yourdomain.com to point to yourdomain.com, we could enter the record in two
ways:
home CNAME yourdomain.com
The first method allows you to simply enter the subdomain. Do not put a period after the subdomain
name.
- OR -

home.yourdomain.com. CNAME yourdomain.com


The second method requires you to enter the entire hostname, followed by a period.

NAMESERVER (NS) records


NS records specify the authoritative nameservers for the domain.
Important: Changing NS records may cause your site to stop working. There is generally no need to
change NS records.
Entering an NS record
The first step is to delete the old NS records from the table above.

Then, enter two new nameservers records. Be sure that the nameserver hostname is followed by a
period, as in this example:
yourdomain.com NS ns1.slamdot.com.

Be sure to put a period after the nameserver hostname in an NS record (ns1.slamdot.com. and not
ns1.slamdot.com ).
MX records
Free e-mail services such as everyone.net require that MX changes be made in order for their
software to work. This change allows mail destined for your domain to be directed to their
server. Please note that changing MX records will prevent your current POP3 accounts, forwarders,
autoresponders, and mailing lists from functioning.
First, delete the old MX record by clicking the Delete icon under "Actions." There should now be no
MX records listed.
Next, click Create DNS Record and enter a name for your MX record. Select MX for the type, and
type in the hostname in the value field, followed by a period, given to you by the e-mail provider.
Then select the priority level (usually 10) from the dropdown box. The priority level will also be given
to you by the e-mail provider. Click Create Record.
Note: Be sure to put a period at the end of the hostname.
To restore the original MX settings, enter yourdomain.com. and priority 0 after deleting the other MX
record.
PTR records
Pointer records (PTR) are used for reverse lookups. For example, to make 192.168.0.1 resolve to
www.yourdomain.com, the record would look like:
1.0.168.192.in-addr.arpa PTR www.yourdomain.com.

Note: The IP address is reversed in the first field. Please use a period after your hostname (second
field).

12.Is it possible to overwrite the DNS record at the PC?

13.What's an lmhosts file used for?

1. The LMHOSTS (LAN Manager Hosts) file is used to enable Domain Name Resolution
under Windows when other methods, such as WINS, fail. It is used in conjunction with
workgroups and domains.

14.What are different RAID levels you can use? And which one would you use for specific
situation? What abour RAID5?

15. Windows PC has an IP address 169.254.X.X. What does it typically mean and whit the
cause? How would you troubleshoot it? What would you look for on the DHCP server? Is
there any log you can look at?

16.Windows Blue Screen of Death, what are the troubleshooting steps there?

17. How to log in to a PC that might be bluescreening?

18.When you press F8, there is an option "Last known good configuration" can you explain
exactly what that is?
It's a Windows startup option that uses the most recent system settings that worked correctly. Every time
you turn your computer off and Windows shuts down successfully, important system settings are saved in
the registry. If a problem occurs, you can restart your computer using those settings. For example, if a new
driver for your video card is causing problems, or an incorrect registry setting is preventing Windows from
starting correctly, you can restart your computer using Last Known Good Configuration.

19.There is a customer who used to be able to connect to a Windows server on the internet
over remote desktop, they now report they are unable to do so.

20.Can you explain what DCOM is and why it may not sometimes work?

Distributed Component Object Model (DCOM) is a proprietary Microsoft technology


for communication among software components distributed across networked
computers.DCOM, which originally was called "Network OLE", extends Microsoft's COM, and
provides the communication substrate under Microsoft's COM+ application server infrastructure.
Not working - For DCOM to work, the client must be able to reach the server by its actual IP address. If
you use firewalls that translate network addresses, the client cannot use the actual IP address to reach the
server.
COM inserts the IP address of the server computer into the interface marshaling packets that are returned
to the client. Instead of using the translated IP/header, Remote Procedure Call (RPC, or DCOM) uses the
actual IP address to reach the server. Because the firewall prevents the client from directly accessing the
server, the client receives the error message.

21. How would you start a windows service for remote machine over the network.

S-ar putea să vă placă și