228 Interview Question

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 27

JETKING

GET READY FOR THE INDUSTRY


1. What is hardware?
A) The physical components of a system which can to touched and feel is called hardware
2. What is cache memory? And its types?
A) It is small and fast memory which stores the data that is required for the processor for
processing.
B) L1, L2 &L3.
3. What is the difference between DDR1, DDR2 & DDR3?
  DDR 1 DDR 2 DDR 3
VOLTAGE 2.5 1.8 1.5
PINS 184 240 240

266/333/400
FSB MHz 533/667/800MHz 1066/1333/1600/1866MHz

4. What is the difference between core 2 duo and dual core?


DUAL CORE: separate cache memory for each core.
CORE 2 DUO: shared cache for both cores.
5. Name some processor manufactures?
Intel, AMD.
AMD: Advanced Micro Devices
6. What are the latest processor of Intel and AMD?
7. What is file system and what is the example for the same?
It defines the way in which files or folders are named, stored and organized.
FAT (File Allocation Table), FAT32 & NTFS (New Technology File System)
8. What is the difference between FAT32 and NTFS?

FAT 32 NTFS
Size of Cluster is 4KB Size of Cluster is 4KB
No security and quota options Security and quota options
are available in this file are available in this file
system. system.
volume size can be of
4tb(tera byte)volume size 16eb(exa byte)
Max file size is 4GB Max file 16TB minus 64KB

9. Converting FAT to NTFS?


Conver driveletter:/fs ntfs (Example: convert c:/fs ntfs)
10. What do you mean by formatting and its types?
It is a process of erasing data or creating tracks and sectors and selecting the file system is called
formatting.
Low level formatting and high level formatting.
Low level formatting: creating tracks and sectors is called low level formatting and it is also
called as physical formatting.
High level formatting: selecting the file system is called high level formatting and it is also called
as logical formatting.
11. How many USB devices can a single pc support?
127
12. How many PCI devices can we attach to single pc?
It depends upon the mother board manufactures.
13. What do you mean by track, sector and cluster?
Concentric circles on the disk are called tracks.
Sector is the part of track and the size of the sector is 512bytes.
Cluster is a group of sectors.
14. What is the size of sector?
512 bytes
15. What is MBR and what does it contains?
MBR stands for Master Boot Record.
First sector of the hard disk is called MBR.
It contains list of bootable files of O.S and partition information.
16. What do you mean by SMPS? What is the function of SMPS? List out the different voltages
given by SMPS?
SMPS (Switch Mode Power Supply): it is used to convert AC to DC.
Voltage
Blue white black orange red yellow
 -12 V -5 V  0   +3.3 V  +5 V +12 V 
17. List out the different connectors of SMPS and its uses?
Molex, ATX 20/24pin, Mini plug 4pin, Mini or Berg 4pin, SATA power connector.
18. What is BUS?
BUS is the interface through which data is transferred.
19. What is FSB & BSB?
FSB (Front Side Bus): it is the path used by the processor to communicate with RAM.
BSB (Back Side Bus): it is the path between L2 cache and L3 cache
20. What do you mean by jumper setting in IDE devices?
It is used to set master and slave configuration.

21. What is the difference between IDE & SATA?


SATA(Serail Advanced
Technology
IDE(Interated Drive Electronic) Aattachment)
it has 40 pin it is 7 pin
it transfer the data 1
it transfer the data 16bit at a time bit at a time with a
with a spped of 100/133Mbps speed of 600Mbps
we can connect 2 IDE devices to we can connect 1
single cable device for one cable
max SATA cable length
max IDE cable length is 45CM is 1M

22. What do you mean by RAID and its types?


RAID (Redundant Array of Inexpensive Disk) or (Redundant Array of Independent Disk): it is used
for fault tolerance.
Fault Tolerance provides continuous availability for data.
23. What is the speed of USB 2.0 and USB3.0?
480Mbps and 5000Mbps.
24. List out the different I/O ports of mother board with uses and no of pins?
25. What is BIOS and what is the function of BIOS?
BIOS (Basic Input Output System)
The BIOS software is built into the PC, and is the first code run by a PC when powered on ('boot
firmware').
The primary function of the BIOS is to set up the hardware and load and start an operating
system
26. What is the function of Northbridge and south bridge?
North Bridge: it controls the communication between RAM, AGP and processor.
South bridge: it controls the communication between other parts of the mother board.
27. My monitor display a message “Please check signal cable” what might be problem and how to
troubleshoot the problem?
VGA cable not connected, VGA cable problem, VGA port problem, RAM or RAM slot problem.
Note: if the monitor is displaying “frequency out of range” or HZ symbol then problem with
resolution.
28. My monitor display a message “Disk boot failure” or “insert boot media and select proper
boot device” what might be problem and how to troubleshoot the problem?
Hard disk power or data cable is not connected.
IDE/SATA on board interfaces may be disable in BIOS.
O.S not available.
29. My pc is continuously restarting what might be the problem?
Virus.
VIRUS stands for (Vital Information Resource Under Seize)
30. My pc is restarting after certain time? What might be the problem?
Overheating. Apply heat sink paste also called as thermal compound and also check CPU fan.
31. What is fire wire port? IEEE standard for fire wire?
It is used to transfer videos and photos at high speed.
IEEE standard for fire wire is IEEE 1394a(400Mbps) and IEEE 1394b(800mbps)
32. What are IRQ lines?
IRQ(Interrupt ReQuest) lines: this are the lines used by the processor to communicate with the
other devices.
33. What is the difference between IDE and SCSI?

SCSI(Small Computer System


IDE(Interated Drive Electronic) Interface)
it has 40 pin 58,68 and 80pin

hard disk rotation speed is 1000 to


hard disk rotation speed is 7200RPM 15000RPM

data transmission speed is


data transmission speed is 100/133Mbps 320Mbps.
it depends up on the cable. Max 32
we can connect 2 IDE devices to single cable devices

max IDE cable length is 45CM max SATA cable length is 25M

34. What is SCSI?


Small Computer System Interface
35. MODEM stands for? What is the function of modem?
MODEM stands for Modulation and Demodulation.
MODEM is used to convert digital signal to analog signal and vice versa.
36. “Blue screen of death” what might be problem?
It may be problem drivers compatibility or RAM problem or Bad sectors.
37. Edition of OS(XP,Vista& WIN 7)

XP VISTA WINDOWS-7
XP-Home home basic Starter
home
XP-Professional premium home basic
  Business home premium
  enterprise professional
  Ultimate business
    enterprise
    ultimate

38. Min requirement to install operating system


WINDOWS-7 for
RECOMDED XP for all VISTA for all all
RAM 128MB 1 GB 1 GB
PROCESSOR 300MHz 1.0GHz 1.0GHz
HARD DISK 2GB 15 GB 15 GB
       
39. Types of user Accounts ?
Administrator, standard and guest.
40. What is kernel? What is the kernel file for windows?
Kernel is the interface between hardware and O.S
NTOSKRNL is the kernel files for windows.
41. What is shell?
Shell is the interface between kernel and hardware.
42. What do you mean by booting?
Booting is the process of downloading OS form hard disk to RAM.
43. What do you mean by cold booting and worm booting?
Cold booting: Starting the computer by turning power on is called cold booting.
Warm booting: Restarting the computer by performing a reset operation (pressing reset, Ctrl-
Alt-Del, etc.) while the computer is still turned on
44. What do you mean by dual booting?
It is the process of selecting operating system is called dual booting if multiple O.S is installed.
45. What are the bootable files for XP, VISTA & WINDOWS-7?
XP: NTLDR, Boot.ini
VISTA & WINDOWS-7: Bootmgr, winresume.exe and winload.exe
46. How to update windows?
Control panel  security setting  windows update
47. What do you mean by updates?
Process of downloading new features is called updates.
48. What is the I.E version of XP, VISTA & WIN-7?
XP-6.0, VISTA-7.0 and WIN-7 8.0
49. What does u mean by service pack?
Service pack is a collection of updates and hot fixes.
A hot fix is code (sometimes called a patch) that fixes a bug in a product
a bug is a coding error in a computer program.
50. What is antivirus? Types of antivirus?
Antivirus is a program which is used to detect and delete the virus.
51. What is the difference between remote desktop and remote assistance?
By using remote desktop only single user can interact with the desktop where as in remote
assistance both users can interact with same desktop.

52. What is Backup? Types of backups?


Creating a duplicate copy of an existing data is called backup.
XP: normal backup, daily backup, copy backup, incremental backup and differential backup.
Vista/win-7: normal and incremental backup.
53. What is the difference between incremental and differential backup?
Incremental backup takes more time for backup and restoration is fast where as in differential
backup it takes less time for backup and more time for restoration.
54. What is the difference between backup and copy?

COPY BAKCUP
size of data will be same it will compress the size
modification is possible it does not allow you to modified
copy cannot be schedule backup can be schedule
automatic restoration is not possible to its original we can restore the data to its
location original location dynamically

55. What is re store point?


A restore point is a saved "snapshot" of a computer's data at a specific time
By creating a restore point, you can save the state of the operating system and your own data so
that if future changes cause a problem, you can restore the system and your data to the way it
was before the changes were made
56. What is last known good configuration?
The Last Known Good Configuration is basically a copy of a computer’s hardware
configuration and its driver settings. It is taken from the system’s registry readings when a
computer has a good, clean boot up.
This copy is made for whenever a computer fails to boot up successfully. When that happens, the
system’s operating system is able to pull up the good copy and perform a successful startup.
57. What are the features of windows 7?
Windows aero, improved graphics, I.E version 8.0, virtual hard disk, windows power shell and bit
drive locker.
58. What is bit locker drive?
It is a feature in win-7 which is used to protect the drive by assigning password.
59. What is printer and types of printer?
Printer is a output device which is used to convert softcopy into hardware copy.
Types of printers: impact and non-impact
Impact—dot matrix
Non-impact – laser, inkjet.
60. What is print spooler?
A software program responsible for managing all print jobs currently being sent to the
Computer printer

61. What is partition and types of partitions?


Logical division of an hard disk is called partition.
Partition are of three types. 1 primary partition 2. Extended partition 3. Logical partition.
Max we can create 4 primary partitions, 1 extended partition and n no of logical partition.

62. What is the difference between basic disk and dynamic disk?
By default every hard disk is basic disk. The main difference between basic disk and dynamic is
we can combine space from multiple hard disks as single logic unit.
63. What is defragmentation?
The process of moving data to the adjacent cluster is called defragmentation.
Defragmentation improves the performance of the disk.
64. What is roll back drivers?
If the device fails after updating the driver, we can restore the old driver by using roll back
option.
65. What is device driver? And types?
Device driver is the program or software which is the interface between computer and
hardware.
Drivers are of two types. 1) signed drivers 2) Unsigned drivers
A signed driver is basically a digitally signed driver, which means that the driver software is
associated with a digital certificate given by micro soft.
Run  sigverif is the command to verify list of signed and unsigned drivers
66. What is the use of device manager?
Device manger is a console which display the status of device and drivers.
By using device manger we can trouble shoot the device.
XP
Yellow color question mark device is connected drivers are not installed.
Red color cross mark device is disabled.
VISTA AND WIN-7
Yellow color question mark device is connected drivers are not installed.
Down arrow device is disabled.
67. What is ICS?
ICS stands for Internet Connection Sharing which is used to share the internet.
68. What are the display problems?
69. What is network and its type s?
Network is a collection of connected devices together through a transmission media for sharing
resources.
Types of networks:
LAN (Local Area Network): if the devices are connected with in a diameter of 1Km is called LAN.
CAN (Campus Area Network): if the devices are connected with in a diameter of 5Km to 10Km is
called CAN.
MAN (Metropolitan Area Network): if the devices are connected with in a diameter of 2Km to
100Km is called MAN.
WAN (Wide Area Network): WAN is a collection of two or more LAN. It covers entire
geographical area.

70. What is networking?


Creating communication between connected devices on a network is called networking.
71. What is protocol?
Protocol is a set of rules which are predefined for the purpose of communication.
72. What is port no? what are the port no for DHCP,DNS,FTP,HTTP,HTTPS,TFTP,Telnet,SMTP,POP3
&IMAP?

PROTOCOL DHCP DNS FTP TFTP HTTP HTTPS POP3 IMAP Telnet SMTP
SERVER-
67 DATA-20
CLIENT- CONTROL-
PORT NO 68 53 21 69 80 443 110 143 23
Every service protocol has its own service address which is known as Port no.

73. What is telnet?


Telnet provided access to a command-line interface (usually, of an operating system) on a
remote host
74. List out the OSI Layers.
Application layer, Presentation layer, Session layer, Transport layer, Network layer, Data link
layer, and Physical layer.
75. What is the function of application layer?
It is responsible for providing access to the network resources. It is also called as user interaction
layer.
76. What are the protocols works at application layer?
DHCP, DNS, FTP, Telnet, SMTP, HTTP
77. What is the function of presentation layer?
It is responsible for translation, encryption and data compression.
78. What are the protocols works at presentation layer?
SSL(Secure Socket Layer) it is similar to telnet, MMIE:Multipurpose Internet Mail Extensions
(MIME) is an Internet standard that extends the format of e-mail
79. What is the function of session layer?
It is responsible for establishing, managing and terminating sessions.
80. What are the protocols works at session layer?
PPTP (Point to Point Tunneling Protocol), L2TP (Layer2 Tunneling Protocol), NetBIOS (Network
Basic Input Output System)

81. What is the function of transport layer?


It is responsible for end to end delivery of entire message.
It is also responsible for segmentation.
82. Transport layer is also called as ____CORE____ layer?
83. What are the protocols works at transport layer?
UDP(User Datagram Protocol), TCP(Transmission Control Protocol)
84. What is the function of network layer?
Network layer is responsible for end to end delivery of packets and routing.
Routing is the process of selecting the best path if multiple path are available.
Data unit at network layer is called Packet which contains source IP address and Destination IP
address.
85. What are the protocols works at network layer?
IP, IPSec, ICMP, and APPLE TALK.
ICMP (Internet Control Message Protocol): it is used to send error and query messages to the
sending device.
86. What are the devices works at network layer?
Router, Layer3switch.
Layer3 switch has functionality of Router and Switch.
87. What is the function of data link layer?
It is responsible for node to node delivery of frames.
A frame contains source MAC address and destination MAC address.
Data unit at the data link layer is called Frames.
88. What are the sub layers of data link layer?
Data link layer has two sub layers. 1) MAC (Media Access Control) 2) LLC (Logic Link Control)
89. What are the protocols works at data link layer?
PPP (Point to Point Protocol), HDLC (High-Level Data Link Control)
90. What are the devices works at data link layer?
Switch, Layer3switch and NIC.
91. What is the function of physical layer?
Physical layer is responsible for actual transmission of bits over the medium. It deals with
electrical and mechanical functions.
92. What are the devices works at physical layer?
Repeater and Hub
93. At which layer error will be detected?
At data link layer error will be detected.
94. At which layer error will be corrected?
At transport layer error will be corrected.
95. What is FTP and its function?
FTP stand for (File Transfer Protocol) it is used to upload and downloading of files and folders
from server to client and client to server.

96. What is TFTP and its function?


TFTP stands for (Trivial File Transfer Protocol) its function similar to that of FTP but it is a
connectionless protocol.
97. What is SMTP and its function?
SMTP stands for (Simple Mail Transfer Protocol): it is used to transfer the mails from one mail
sever to another mail server.
98. What is ARP and RARP?
ARP stand for (Address Resolution Protocol): it is used to find MAC address of the device if IP
address is known.
RARP stands for (Reverse Address Resolution Protocol): it is used to find the IP address of the
device if MAC address is known.
99. What is POP & IMAP with its functions?
POP(Post Office Protocol): it is used to download mails form mail server to client pc.
IMAP(Internet Message Access Protocol):it is used to access the emails from a remote server
and it does not download the mails.
100. What is the difference between hub and switch?

HUB SWITCH
it is a broad cast device it is a unicast device
it works at physical layer of OSI model it works at data link layer of OSI model
max no of ports are 24 max no of ports are 48
it shares the bandwidth it does not shares the bandwidth
   
101. What is bandwidth?
It is the capacity of the medium to carry the signal.
102. What is the difference between switch and router?

SWITCH ROUTER
it works at data link layer of OSI model it works at network layer of OSI model
it works based up on MAC address it works based up on IP address
switch transfer the data between LAN Router transfer the data between LAN
segments and WAN segments
it cannot share or transfer the data Routers are capable of sharing an
using internet connection internet connection

103. What is the difference between UDP & TCP?

TCP UDP
it is connection oriented protocol it is connection less protocol
it is reliable it is not reliable
it is slower it is faster
acknowledgement is possibel no acknowledgement
104. What do you mean by topology?
Topology defines the physical and logical structure of the network.
105. What are the types of topology?
Physical topology: it defines the way in which the devices are connected over a network.
Logical topology: it defines the way in which the devices are communicating with each other
over the physical topology.
106. Which cable support maximum distance and maximum speed?
Fiber optic cable and its speed is 1Gbps to 10Gbps (theoretically unlimited)
107. What is the max speed and distance supported by UTP cable and its types?
1000Mbps and distance up to 100M.
Cat-1,cat2,cat-3,cat4,cat-5,cat-5e,cat6-,cat7

108. What is the difference between cat5, cat5e, cat6 and cat7?
Max speed of cat5, cat5e, cat6 and cat7 is same but the signaling frequency is different.
Cat5 and Cat5e100MHz, Cat6250MHz, Cat7600MHz.
109. What is IP address? Types of IP address?
IP address is logical address which is used to identify the device on a network.
IP address is of two types.
Private IP address and Public IP address.
Public IP address is given by ISP where as Private IP address is used in organization.
110. What is the difference between broad band and base band signal?

Base band Broad band


digital signals are transmitted by using Base band analog signals are transmitted by using Broad band
In broadband transmission, signals are sent on
In a baseband transmission, the entire bandwidth multiple frequencies, allowing multiple signals to be
of the cable is consumed by a single signa sent simultaneously.
it is a bi-direction communication it is a uni-direction communication

111. What is the difference between IPV4 and IPV6?

IPV4 IPV6
it is a 32 bit address it is a 128bit address
it is a binary address it is a hexadecimal address
it is separated by . it is separated by colon :
It is not well suited for mobile
network it is better suited to mobile networks

112. What is subnet mask and what are the default subnet mask for class A, class B and class C?
Subnet mask: it is used to identify the network bit and host bit of the network.

CLASS SUBNET MASK


A 255.0.0.0
B 255.255.0.0
C 255.255.255.0
113. What are the private IP address for class A, class B and class C?

CLASS RANGE
A 10.0.0.0 to 10.255.255.255
B 172.16.0.0 to 172.31.255.255
C 192.168.0.0 to 192.168.255.255
   

114. What is wireless network?


Wireless network is a network set up by using radio signal frequency to communicate among
computers and other network devices
115. What are the IEEE standards for wireless network?

max
standard speed range
802.11 2Mbps 46meters
802.11a 54Mbps 46meters
802.11b 11Mbps 91meters
802.11g 54Mbps 91meters

116. What is Wi-Fi?


Wi-Fi (wireless fidelity) is technically an industry term that represents a type of wireless local
area network (LAN) protocol based on the 802.11 IEEE network standard
117. What are WPA and WPA2 in wireless network?
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols
and security certification programs developed by the Wi-Fi Alliance to secure wireless computer
networks
118. What is SSID?
A service set identifier (SSID) is a name that identifies a particular 802.11 wireless LAN
119. What are the devices used to create wireless LAN?
Wireless NIC card, Access point
120. What is MAC address?
MAC address is the hardware or physical address which is embedded in the device given by IEEE.
121. What are the commands to view the MAC address?
Get mac and ipconfig /all is the command to find the MAC address.
122. What is the difference between IP address and MAC address?

IPV4 MAC
It is a logical address it is a physical address
it is a 32 bit binary address it is 48 bit hexa decimal address
it is temporary address it is permanent address
Separated by . separated by -
123. What is the max distance supported by fiber optic cable?
100KM
124. What is host and node?
Host: any device on a network with valid IP address is called as Host.(example: PC network
printer)
Node: any device on a network is called Node. (example: switch)

125 .What is gateway?


a. The entrey and exit of the network

125. What are server and client?


Server provides the services to the client request.
Client request for the services from the server.

126. What are the difference between 2003 and 2008 server?

2003 2008
no virtualization virtualization is available
windows power shell is not
available windows power shell is available
no RODC RODC
IIS 6.0 IIS7.0
RIS WDS

127. What is domain?


Domain is a collection of devices with centralized administrator.
128. What is work group?
Workgroup is a collection of devices without centralized administrator.
129. What is domain controller?
Domain controller is a server that control or responsible of provide to host access of all resoure
like printer, files, mail within the domain.
130. What is active directory?
Active directory is data base which stores the information about the objects likes users,
group,O.U etc
131. Where does active directory database is stored?
Active directory information will be stored in a file NTDS.DIT (New Technology Directory
Service.Directory Information Tree) default size of NTDS.DIT is 12.1Mb
Default Location of NTDS.DIT is C:/Windows/NTDS
132. What are the protocols for active directory and port no’s?
Kerberos and LDAP are the protocol of active directory.
Ports no for Kerberos (88) and LDAP(389)
133. What is Kerberos?
Kerberos is a computer network authentication protocol which works on the basis of "tickets" to
allow nodes communicating over a non-secure network to prove their identity to one another in
a secure manner

134. What is Sysvol?


The System Volume (Sysvol) is a shared directory that stores the server copy of the domain's
public files that must be shared for common access and replication throughout a domain.
135. What is tree and forest?
Tree: The hierarchical of individual domains is called tree.
Forest: The hierarchical of individual domains tree is called forest.
136. Where the domain user information does is stored?
NTDS.DIT file
137. Where the local user information does is stored?
SAM(Security Account Manager)
138. When do we called a server as active directory?
A sever which has FSMO roles is called is active directory.
139. What is FSMO roles and how many types of FSMO Roles are there?
FSMO stands for Flexible Single Master Operation.
It has 5 roles and they are classified into two types forest wide and domain wide
1.Schema master (forest wide), 2. Domain Naming Master (forest wide), 3. PDC Emulator
(domain wide), 4. PDC Emulator (domain wide), 5. RID Master (domain wide).
140. What is DCHP? What is the function of DHCP?
DHCP (Dynamic Host Configuration Protocol) it is used to assign IP address to the client
automatically.
141. What do you mean by APIPA and its range?
APIPA stands for Automatic Private IP Address. Whenever a DHCP server unable to assign IP
address client system then client system generate an IP address itself is known as APIPA.
Range of APIPA 169.254.0.1 to 169.254.255.254
142. What is the default lease period of IP address?
8 days
143. What do you mean by DHCP scope and what does it stores?
A DHCP scope is a valid range of IP addresses which are available for assignments or lease to
client computer.
It contains IP address range(address pool), address leases, reservation and exclusion
144. What do you mean by reservation, exclusion, address leases and address pool?
Reservation: means a particular IP is reserved for a particular PC
Address leases: it maintains the list of IP addresses which are assigned to the client PC’s.
Address Pool: it contains range of IP address to be assigned to the clients.
145. How to trouble shoot basic DHCP issues?
Ipconfig /release is the command to remove the current IP address.
Ipconfig /renew is the command to request for new IP address.
146. What is DNS? What is the function of DNS?
DNS mean Domain Naming Service/server used for name resolution.
Name resolution: mapping host name with IP address and IP address with host name
147. What do you mean by zone in DNS and its types?
Zone is a place where resource records are stored.
Zone is of two types. 1. Forward Lookup Zone: this contains information about hostname with IP
address
2. Reverse Lookup Zone: this contains information about IP address with hostname

148. What are primary and secondary DNS servers?


Primary DNS server are called master server where as Secondary DNS servers are called
alternate or backup DNS servers.
149. How to verify DNS is properly configure or not?
nslookup is the command to check the DNS is correctly configured or not.
150. What are the features of Windows 2008 server?
Virtualization, RODC, built in drivers, group policy comment etc.

151. What is IIS?


IIS(Internet Information Service) is tool which is used for hosting of web sites.
Website is a collection of web pages.
152. What is the version of IIS in 2003 and 2008?
2003 IIS v 6.0 and in 2008 server IIS v 7.0
153. What is CDC?
CDC(Child Domain Controller): it is the sub domain of the domain which inherits the properties
of the parent domain and also It reduce the load on parent domain and it is represented as
"hyd.jetking.com”
154. What is ADC and RODC ?
ADC (Additional Domain Controller): additional domain is the backup domain which is used for
load balancing and fault tolerance.
RODC Read Only Domain Controller
155. What is terminal server?
It is a service where multiple users can take remote desktop of the server at a time.
By default only two remote desktop are available.
156. What is DFS?

Distributed file system maintains the load balance between the file servers and allows users to
access the data on file severs
157. What is Group policy?
GROUP POLICY: It is an administrative tool for managing user’s settings and computers settings
across the network.
158. What is OU?
It is a logical container which contains active directory objects (users, groups, computer
etc..)
It is also called sub tree and OU is the smallest scope or unit to which you can assign
group policy setting or delegate administrative authorize.
159. What is VPN?
A virtual private network (VPN) is a secure way of connecting to a private Local Area Network at
a remote location, using the Internet.
160. What are the VPN encryption protocols?
PPTP (Point to Point Tunneling Protocol), L2TP (Layer 2 Tunneling Protocol),SSTP(Secure Socket
Tunneling Protocol)
161. What is hibernate mode?
In hibernate mode the current state of the system is saved to the hard drive, and the system will
power down. When a user turns the system power back on, the saved information is read from
the hard disk,
162. What is firewall?
Firewall which block unwanted and unauthorized access to the network and system.
163. What is IP Sec?
Short for IP Security, a set of protocols developed by the IETF to support secure exchange of
packets at the IP layer.

164 What is the version of server 2008?


b. Operating systems. Released to manufacturing officially released on February 27, 2008,

165. What is mean by delegation control?


a. Delegation of Control is assigning a person or group specific administrative permissions

166 What is packet?


A block of information with IP address
167 What is segment?
A segment is a defined portion or section of something larger such as a data file
2. What is frame?
a. A block of information with MAC address
168. What is port number?
b. Every service protocol has its own service address is known as port number
169 What is Network ID?
It represents the IPaddress to which network
170. What is the Registry?
Registry is the database most Windows-based operating systems use to keep track of the
settings for

171. When would you use a crosslink cable?


To connect the similar devices

172 .What are the main advantages and disadvantages of Fiber-Optic-based networks?
Advantage Data transfer rate is speed compared to other
173. What is Internet?
It is a World Wide Collection of computer networks co-operating with
each other to exchange data using

174. Define Trust relation?

Creating the communication between two Domains.

175 What are the main features of ICS?


Address translation, Public and private interface, Firewall, DHCP allocator and DNS proxy.

176 What is the use of tracert command

This checks the path of a data packet flowing from one router to another, until it reaches its destination.

186 What is the use of ping command?


It checks weather a computer can transmit data over a network.
177 What is an offline file?
A file on a remote server that is temporarily stored locally. In order to allow
users access to data when they are not on the network

178 Ping tool work using which protocol?


ICMP

178 What are the requirements for ADDS?


Windows 2000/2003 Server Operating System
TCP/IP protocol and IP address
Network Card with Active state
NTFS partition
179 Explain about RAID-1
Min. and max. 2 Hard disk
If anyone disk fails data can be recovered from other disk
50% space wastage
No read/write performance improvement
Good for storing Operating system

180 Explain about RAID-5 ?


Data is stored in distributed format across all the disk
Min 3 max. 32
If anyone disk fails data can be recovered using parity
Parity space wastage eg. Parity = total space \ no of disk
Good for storing data.
181 Difference between Windows NT , 2003 and 2008 ?
Win NT Win 2k3 Win 2k8
Active Directory Domain
Directory Service Active Directory Service Services
FAT16 and NTFS 4.0
FAT16 FAT16, FAT32 and NTFS 5.0 FAT32 and NTFS 5.0
Compression Compression, Encryption and Disk Quota  
No IPSec IPSec built-in IPSec built-in
No Shadow Copy Shadow Copy Shadow Copy
Basic disk Basic and Dynamic Disk Basic and Dynamic Disk
IIS Ver 4 IIS Ver 6 IIS Ver 7
System Policy Group Policy Group Policy

182 Difference between Windows XP home and Windows XP prof

Xp Home Basic Xp Profosnal


no Remote desktop Remote desktop
NO Offline folders Offline folders
1 processor 2 processor
workgroup member Workgroup and domain member
NO Encryption Encryption
NO GPO GPO
No ASR ASR

182 What is mail server ?


Mail server is software which maintains user mailboxes. eg : Exchange server
Lotus domino, etc.

183 .Port numbers for various application and services


There are total 65536 ports available. Below is the list of some well-known ports
184. What is Logon script ?
Logon script is a bat file or script file which runs when a user logs on.
185Where are logon script stored?
: They are stored in Sysvo folder of DC

186.What two hardware considerations should be an important part of the planning


process for a Windows Server 2008 deployment?

Ans:Any server on which you will install Windows Server 2008 should have at least the
minimum hardware requirement for running the network operating system. Server hardware
should also be on the Windows Server 2008 Hardware Compatibility List to avoid the possibility
of hardware and network operating system incompatibility.

187.Which Control Panel tool enables you to automate the running of server utilities and
other applications?

The Task Scheduler enables you to schedule the launching of tools such as Windows Backup and
Disk Defragmenter.

188.When a child domain is created in the domain tree, what type of trust relationship
exists between the new child domain and the trees root domain?

Child domains and the root domain of a tree are assigned transitive trusts. This means that the
root domain and child domain trust each other and allow resources in any domain in the tree to
be accessed by users in any domain in the tree.

189.What is the primary function of domain controllers?

The primary function of domain controllers is to validate users to the network. However, domain
controllers also provide the catalog of Active Directory objects to users on the network.
190. What are some of the other roles that a server running Windows Server 2008 could fill
on the network?

A server running Windows Server 2008 can be configured as a domain controller, a file server, a
print server, a web server, or an application server. Windows servers can also have roles and
features that provide services such as DNS, DHCP, and Routing and Remote Access.

191. Which Windows Server 2008 tools make it easy to manage and configure a servers
roles and features?

The Server Manager window enables you to view the roles and features installed on a server and
also to quickly access the tools used to manage these various roles and features. The Server
Manager can be used to add and remove roles and features as needed.

192. What Windows Server 2008 service is used to install client operating systems over the
network?

Windows Deployment Services (WDS) enables you to install client and server operating systems
over the network to any computer with a PXE-enabled network interface.

193. What domain services are necessary for you to deploy the Windows Deployment
Services on your network?

Windows Deployment Services requires that a DHCP server and a DNS server be installed in the
domain

194. How is WDS configured and managed on a server running Windows Server 2008?

The Windows Deployment Services snap-in enables you to configure the WDS server and add
boot and install images to the server.

195. What is the difference between a basic and dynamic drive in the Windows Server 2008
environment?

A basic disk embraces the MS-DOS disk structure; a basic disk can be divided into partitions
(simple volumes).
Dynamic disks consist of a single partition that can be divided into any number of volumes.
Dynamic disks also support Windows Server 2008 RAID implementations.

196. What is RAID in Windows Server 2008?

RAID, or Redundant Array of Independent Disks, is a strategy for building fault tolerance into
your file servers. RAID enables you to combine one or more volumes on separate drives so that
they are accessed by a single drive letter. Windows Server 2008 enables you to configure RAID
0 (a striped set), RAID 1 (a mirror set), and RAID 5 (disk striping with parity).

197. What types of Active Directory objects can be contained in an Organizational Unit?

Organizational Units can hold users, groups, computers, contacts, and other OUs. The
Organizational Unit provides you with a container directly below the domain level that enables
you to refine the logical hierarchy of how your users and other resources are arranged in the
Active Directory.

198. What are Active Directory sites in Windows Server 2008?

Active Directory sites are physical locations on the network’s physical topology. Each regional
domain that you create is assigned to a site. Sites typically represent one or more IP subnets that
are connected by IP routers. Because sites are separated from each other by a router, the domain
controllers on each site periodically replicate the Active Directory to update the Global Catalog
on each site segment.

199. Can servers running Windows Server 2008 provide services to clients when they are
not part of a domain?

Servers running Windows Server 2008 can be configured to participate in a workgroup. The
server can provide some services to the workgroup peers but does not provide the security and
management tools provided to domain controllers.

200. What does the use of Group Policy provide you as a network administrator?

Group Policy provides a method of controlling user and computer configuration settings for
Active Directory containers such as sites, domains, and OUs. GPOs are linked to a particular
container, and then individual policies and administrative templates are enabled to control the
environment for the users or computers within that particular container.

201. What tools are involved in managing and deploying Group Policy?

GPOs and their settings, links, and other information such as permissions can be viewed in the
Group Policy Management snap-in.

202. How do you deal with Group Policy inheritance issues?

GPOs are inherited down through the Active Directory tree by default. You can block the
inheritance of settings from upline GPOs (for a particular container such as an OU or a local
computer) by selecting Block Inheritance for that particular object. If you want to enforce a
higher-level GPO so that it overrides directly linked GPOs, you can use the Enforce command on
the inherited (or upline) GPO.
203. How can you make sure that network clients have the most recent Windows updates
installed and have other important security features such as the Windows Firewall enabled
before they can gain full network access?

You can configure a Network Policy Server (a service available in the Network Policy and
Access Services role). The Network Policy Server can be configured to compare desktop client
settings with health validators to determine the level of network access afforded to the client.

204.What is the purpose of deploying local DNS servers?

A domain DNS server provides for the local mapping of fully qualified domain names to IP
addresses. Because the DNS is a distributed database, the local DNS servers can provide record
information to remote DNS servers to help resolve remote requests related to fully qualified
domain names on your network.

205.In terms of DNS, what is a caching-only server?

A caching-only DNS server supplies information related to queries based on the data it contains
in its DNS cache. Caching-only servers are often used as DNS forwarders. Because they are not
configured with any zones, they do not generate network traffic related to zone transfers.

206.How the range of IP addresses is defined for a Windows Server 2008 DHCP server?

The IP addresses supplied by the DHCP server are held in a scope. A scope that contains more
than one subnet of IP addresses is called a superscope. IP addresses in a scope that you do not
want to lease can be included in an exclusion range.

207. How do you view replication properties for AD?


By using Active Directory Replication Monitor.
Start–> Run–> Replmon

208. What are sites what are they used for?


One or more well-connected (highly reliable and fast) TCP/IP subnets. A site allows
administrators to configure Active Directory access and replication topology to take advantage of
the physical network

209. Logical Diagram of Active Directory?, what is the difference between child domain &
additional domain Server?
Well, if you know what a domain is then you have half the answer. Say you have the domain
Microsoft.com. Now Microsoft has a server named server1 in that domain, which happens to the
be parent domain. So it’s FQDN is server1.microsoft.com. If you add an additional domain
server and name it server2, then it’s FQDN is server2.microsoft.com.
Now Microsoft is big so it has offices in Europe and Asia. So they make child domains for them
and their FQDN would look like this: europe.microsoft.com & asia.microsoft.com. Now lets say
each of them have a server in those child domains named server1. Their FQDN would then look
like this: server1.europe.microsoft.com & server1.asia.microsoft.com..

210.What are Active Directory Groups?


Groups are containers that contain user and computer objects within them as members. When
security permissions are set for a group in the Access Control List on a resource, all members of
that group receive those permissions. Domain Groups enable centralized administration in a
domain. All domain groups are created on a domain controller.
In a domain, Active Directory provides support for different types of groups and group scopes.
The group type determines the type of task that you manage with the group. The group scope
determines whether the group can have members from multiple domains or a single domain

211.What are the types of Group Types?


* Security groups: Use Security groups for granting permissions to gain access to resources.
Sending an e-mail message to a group sends the message to all members of the group. Therefore
security groups share the capabilities of distribution groups.
* Distribution groups: Distribution groups are used for sending e-main messages to groups of
users. You cannot grant permissions to security groups. Even though security groups have all the
capabilities of distribution groups, distribution groups still requires, because some applications
can only read distribution groups.

212.Where are group policies stored?

Ans : %SystemRoot%System32\GroupPolicy

213. What is GPT and GPC?


Ans:Group policy template and group policy container.

214.Where is GPT stored?

Ans %SystemRoot%\SYSVOL\sysvol\domainname\Policies\GUID

215.How can you restrict running certain applications on a machine?

Ans :Via group policy, security settings for the group, then Software Restriction Policies.

216.What’s the major difference between FAT and NTFS on a local machine?
Ans: FAT and FAT32 provide no security over locally logged-on users. Only native NTFS
provides extensive permission control on both remote and local files.

217.What’s the difference between standalone and fault-tolerant DFS (Distributed File
System) installations?

Ans :The standalone server stores the Dfs directory tree structure or topology locally. Thus, if a
shared folder is inaccessible or if the Dfs root server is down, users are left with no link to the
shared resources. A fault-tolerant root node stores the Dfs topology in the Active Directory,
which is replicated to other domain controllers. Thus, redundant root nodes may include multiple
connections to the same data residing in different shared folders.

218.Where exactly do fault-tolerant DFS shares store information in Active Directory?

Ans : In Partition Knowledge Table, which is then replicated to other domain controllers.

219. How do you double-boot a Win 2003 server box?

The Boot.ini file is set as read-only, system, and hidden to prevent unwanted editing. To change
the Boot.ini timeout and default settings, use the System option in Control Panel from the
Advanced tab and select Startup.

219.What do you do if earlier application doesn’t run on Windows Server 2008?

Ans :When an application that ran on an earlier legacy version of Windows cannot be loaded
during the setup function or if it later malfunctions, you must run the compatibility mode
function. This is accomplished by right-clicking the application or setup program and selecting
Properties –> Compatibility –> selecting the previously supported operating system.

218.What are the Windows Server keyboard shortcuts?

Ans :Winkey opens or closes the Start menu. Winkey + BREAK displays the System Properties
dialog box. Winkey + TAB moves the focus to the next application in the taskbar. Winkey +
SHIFT + TAB moves the focus to the previous application in the taskbar. Winkey + B moves the
focus to the notification area. Winkey + D shows the desktop. Winkey + E opens Windows
Explorer showing My Computer. Winkey + F opens the Search panel. Winkey + CTRL + F
opens the Search panel with Search for Computers module selected. Winkey + F1 opens Help.
Winkey + M minimizes all. Winkey + SHIFT+ M undoes minimization. Winkey + R opens Run
dialog. Winkey + U opens the Utility Manager. Winkey + L locks the computer.

219.What is Active Directory?

Ans :Active Directory is a network-based object store and service that locates and manages
resources, and makes these resources available to authorized users and groups. An underlying
principle of the Active Directory is that everything is considered an object—people, servers,
workstations, printers, documents, and devices. Each object has certain attributes and its own
security access control list (ACL).

220. How can you force the client to give up the dhcp lease if you have access to the client PC?

Ans: ipconfig /release

221. I can’t seem to access the Internet, don’t have any access to the corporate network and on
ipconfig my address is 169.254.*.*. What happened?

Ans: The 169.254.*.* net mask is assigned to Windows machines running 98/2000/XP if the
DHCP server is not available. The name for the technology is APIPA (Automatic Private
Internet Protocol Addressing).

222. How much is the weight of 20 mangoes and 30 oranges?

i. 1 orange weighs twice that of 1 mango

ii. 2 mangoes and 3 oranges weigh 2 kg

223.Secure services in your network require reverse name resolution to make it more difficult to
launch successful attacks against the services. To set this up, you configure a reverse lookup
zone and proceed to add records. Which record types do you need to create?

Ans :PTR Records

224.What is the main purpose of a DNS server?

Ans :DNS servers are used to resolve FQDN hostnames into IP addresses and vice versa

225. SOA records must be included in every zone. What are they used for?

Ans :SOA records contain a TTL value, used by default in all resource records in the zone. SOA
records contain the e-mail address of the person who is responsible for maintaining the zone.
SOA records contain the current serial number of the zone, which is used in zone transfers.

226.What is the main purpose of SRV records?

Ans : SRV records are used in locating hosts that provide certain network services
227. Before installing your first domain controller in the network, you installed a DNS server
and created a zone, naming it as you would name your AD domain. However, after the
installation of the domain controller, you are unable to locate infrastructure SRV records
anywhere in the zone. What is the most likely cause of this failure?

Ans : The zone you created was not configured to allow dynamic updates. The local interface on
the DNS server was not configured to allow dynamic updates.

228. You are administering a network connected to the Internet. Your users complain that
everything is slow. Preliminary research of the problem indicates that it takes a considerable
amount of time to resolve names of resources on the Internet. What is the most likely reason for
this?

Ans : DNS servers are not caching replies.. Local client computers are not caching replies… The
cache.dns file may have been corrupted on the server.

229. What is difference between windows 2000 server and windows 2003 server ?

Ans: 1) Doamin rename is not possible in windows 2000


2) windows 2k - IIS 5 and windows 2k3 - II6
3) Windows 2k - IE 5 and Windows 2k3 - IE6
4) Terminal service are enhanced in win2k3
5) Windows 2k doesn't have 64 bit version
6) DNS Stub zone has introduced in win2k3.
7) Shadow copying has introduced

You might also like