228 Interview Question
228 Interview Question
228 Interview Question
266/333/400
FSB MHz 533/667/800MHz 1066/1333/1600/1866MHz
FAT 32 NTFS
Size of Cluster is 4KB Size of Cluster is 4KB
No security and quota options Security and quota options
are available in this file are available in this file
system. system.
volume size can be of
4tb(tera byte)volume size 16eb(exa byte)
Max file size is 4GB Max file 16TB minus 64KB
max IDE cable length is 45CM max SATA cable length is 25M
XP VISTA WINDOWS-7
XP-Home home basic Starter
home
XP-Professional premium home basic
Business home premium
enterprise professional
Ultimate business
enterprise
ultimate
COPY BAKCUP
size of data will be same it will compress the size
modification is possible it does not allow you to modified
copy cannot be schedule backup can be schedule
automatic restoration is not possible to its original we can restore the data to its
location original location dynamically
62. What is the difference between basic disk and dynamic disk?
By default every hard disk is basic disk. The main difference between basic disk and dynamic is
we can combine space from multiple hard disks as single logic unit.
63. What is defragmentation?
The process of moving data to the adjacent cluster is called defragmentation.
Defragmentation improves the performance of the disk.
64. What is roll back drivers?
If the device fails after updating the driver, we can restore the old driver by using roll back
option.
65. What is device driver? And types?
Device driver is the program or software which is the interface between computer and
hardware.
Drivers are of two types. 1) signed drivers 2) Unsigned drivers
A signed driver is basically a digitally signed driver, which means that the driver software is
associated with a digital certificate given by micro soft.
Run sigverif is the command to verify list of signed and unsigned drivers
66. What is the use of device manager?
Device manger is a console which display the status of device and drivers.
By using device manger we can trouble shoot the device.
XP
Yellow color question mark device is connected drivers are not installed.
Red color cross mark device is disabled.
VISTA AND WIN-7
Yellow color question mark device is connected drivers are not installed.
Down arrow device is disabled.
67. What is ICS?
ICS stands for Internet Connection Sharing which is used to share the internet.
68. What are the display problems?
69. What is network and its type s?
Network is a collection of connected devices together through a transmission media for sharing
resources.
Types of networks:
LAN (Local Area Network): if the devices are connected with in a diameter of 1Km is called LAN.
CAN (Campus Area Network): if the devices are connected with in a diameter of 5Km to 10Km is
called CAN.
MAN (Metropolitan Area Network): if the devices are connected with in a diameter of 2Km to
100Km is called MAN.
WAN (Wide Area Network): WAN is a collection of two or more LAN. It covers entire
geographical area.
PROTOCOL DHCP DNS FTP TFTP HTTP HTTPS POP3 IMAP Telnet SMTP
SERVER-
67 DATA-20
CLIENT- CONTROL-
PORT NO 68 53 21 69 80 443 110 143 23
Every service protocol has its own service address which is known as Port no.
HUB SWITCH
it is a broad cast device it is a unicast device
it works at physical layer of OSI model it works at data link layer of OSI model
max no of ports are 24 max no of ports are 48
it shares the bandwidth it does not shares the bandwidth
101. What is bandwidth?
It is the capacity of the medium to carry the signal.
102. What is the difference between switch and router?
SWITCH ROUTER
it works at data link layer of OSI model it works at network layer of OSI model
it works based up on MAC address it works based up on IP address
switch transfer the data between LAN Router transfer the data between LAN
segments and WAN segments
it cannot share or transfer the data Routers are capable of sharing an
using internet connection internet connection
TCP UDP
it is connection oriented protocol it is connection less protocol
it is reliable it is not reliable
it is slower it is faster
acknowledgement is possibel no acknowledgement
104. What do you mean by topology?
Topology defines the physical and logical structure of the network.
105. What are the types of topology?
Physical topology: it defines the way in which the devices are connected over a network.
Logical topology: it defines the way in which the devices are communicating with each other
over the physical topology.
106. Which cable support maximum distance and maximum speed?
Fiber optic cable and its speed is 1Gbps to 10Gbps (theoretically unlimited)
107. What is the max speed and distance supported by UTP cable and its types?
1000Mbps and distance up to 100M.
Cat-1,cat2,cat-3,cat4,cat-5,cat-5e,cat6-,cat7
108. What is the difference between cat5, cat5e, cat6 and cat7?
Max speed of cat5, cat5e, cat6 and cat7 is same but the signaling frequency is different.
Cat5 and Cat5e100MHz, Cat6250MHz, Cat7600MHz.
109. What is IP address? Types of IP address?
IP address is logical address which is used to identify the device on a network.
IP address is of two types.
Private IP address and Public IP address.
Public IP address is given by ISP where as Private IP address is used in organization.
110. What is the difference between broad band and base band signal?
IPV4 IPV6
it is a 32 bit address it is a 128bit address
it is a binary address it is a hexadecimal address
it is separated by . it is separated by colon :
It is not well suited for mobile
network it is better suited to mobile networks
112. What is subnet mask and what are the default subnet mask for class A, class B and class C?
Subnet mask: it is used to identify the network bit and host bit of the network.
CLASS RANGE
A 10.0.0.0 to 10.255.255.255
B 172.16.0.0 to 172.31.255.255
C 192.168.0.0 to 192.168.255.255
max
standard speed range
802.11 2Mbps 46meters
802.11a 54Mbps 46meters
802.11b 11Mbps 91meters
802.11g 54Mbps 91meters
IPV4 MAC
It is a logical address it is a physical address
it is a 32 bit binary address it is 48 bit hexa decimal address
it is temporary address it is permanent address
Separated by . separated by -
123. What is the max distance supported by fiber optic cable?
100KM
124. What is host and node?
Host: any device on a network with valid IP address is called as Host.(example: PC network
printer)
Node: any device on a network is called Node. (example: switch)
126. What are the difference between 2003 and 2008 server?
2003 2008
no virtualization virtualization is available
windows power shell is not
available windows power shell is available
no RODC RODC
IIS 6.0 IIS7.0
RIS WDS
Distributed file system maintains the load balance between the file servers and allows users to
access the data on file severs
157. What is Group policy?
GROUP POLICY: It is an administrative tool for managing user’s settings and computers settings
across the network.
158. What is OU?
It is a logical container which contains active directory objects (users, groups, computer
etc..)
It is also called sub tree and OU is the smallest scope or unit to which you can assign
group policy setting or delegate administrative authorize.
159. What is VPN?
A virtual private network (VPN) is a secure way of connecting to a private Local Area Network at
a remote location, using the Internet.
160. What are the VPN encryption protocols?
PPTP (Point to Point Tunneling Protocol), L2TP (Layer 2 Tunneling Protocol),SSTP(Secure Socket
Tunneling Protocol)
161. What is hibernate mode?
In hibernate mode the current state of the system is saved to the hard drive, and the system will
power down. When a user turns the system power back on, the saved information is read from
the hard disk,
162. What is firewall?
Firewall which block unwanted and unauthorized access to the network and system.
163. What is IP Sec?
Short for IP Security, a set of protocols developed by the IETF to support secure exchange of
packets at the IP layer.
172 .What are the main advantages and disadvantages of Fiber-Optic-based networks?
Advantage Data transfer rate is speed compared to other
173. What is Internet?
It is a World Wide Collection of computer networks co-operating with
each other to exchange data using
This checks the path of a data packet flowing from one router to another, until it reaches its destination.
Ans:Any server on which you will install Windows Server 2008 should have at least the
minimum hardware requirement for running the network operating system. Server hardware
should also be on the Windows Server 2008 Hardware Compatibility List to avoid the possibility
of hardware and network operating system incompatibility.
187.Which Control Panel tool enables you to automate the running of server utilities and
other applications?
The Task Scheduler enables you to schedule the launching of tools such as Windows Backup and
Disk Defragmenter.
188.When a child domain is created in the domain tree, what type of trust relationship
exists between the new child domain and the trees root domain?
Child domains and the root domain of a tree are assigned transitive trusts. This means that the
root domain and child domain trust each other and allow resources in any domain in the tree to
be accessed by users in any domain in the tree.
The primary function of domain controllers is to validate users to the network. However, domain
controllers also provide the catalog of Active Directory objects to users on the network.
190. What are some of the other roles that a server running Windows Server 2008 could fill
on the network?
A server running Windows Server 2008 can be configured as a domain controller, a file server, a
print server, a web server, or an application server. Windows servers can also have roles and
features that provide services such as DNS, DHCP, and Routing and Remote Access.
191. Which Windows Server 2008 tools make it easy to manage and configure a servers
roles and features?
The Server Manager window enables you to view the roles and features installed on a server and
also to quickly access the tools used to manage these various roles and features. The Server
Manager can be used to add and remove roles and features as needed.
192. What Windows Server 2008 service is used to install client operating systems over the
network?
Windows Deployment Services (WDS) enables you to install client and server operating systems
over the network to any computer with a PXE-enabled network interface.
193. What domain services are necessary for you to deploy the Windows Deployment
Services on your network?
Windows Deployment Services requires that a DHCP server and a DNS server be installed in the
domain
194. How is WDS configured and managed on a server running Windows Server 2008?
The Windows Deployment Services snap-in enables you to configure the WDS server and add
boot and install images to the server.
195. What is the difference between a basic and dynamic drive in the Windows Server 2008
environment?
A basic disk embraces the MS-DOS disk structure; a basic disk can be divided into partitions
(simple volumes).
Dynamic disks consist of a single partition that can be divided into any number of volumes.
Dynamic disks also support Windows Server 2008 RAID implementations.
RAID, or Redundant Array of Independent Disks, is a strategy for building fault tolerance into
your file servers. RAID enables you to combine one or more volumes on separate drives so that
they are accessed by a single drive letter. Windows Server 2008 enables you to configure RAID
0 (a striped set), RAID 1 (a mirror set), and RAID 5 (disk striping with parity).
197. What types of Active Directory objects can be contained in an Organizational Unit?
Organizational Units can hold users, groups, computers, contacts, and other OUs. The
Organizational Unit provides you with a container directly below the domain level that enables
you to refine the logical hierarchy of how your users and other resources are arranged in the
Active Directory.
Active Directory sites are physical locations on the network’s physical topology. Each regional
domain that you create is assigned to a site. Sites typically represent one or more IP subnets that
are connected by IP routers. Because sites are separated from each other by a router, the domain
controllers on each site periodically replicate the Active Directory to update the Global Catalog
on each site segment.
199. Can servers running Windows Server 2008 provide services to clients when they are
not part of a domain?
Servers running Windows Server 2008 can be configured to participate in a workgroup. The
server can provide some services to the workgroup peers but does not provide the security and
management tools provided to domain controllers.
200. What does the use of Group Policy provide you as a network administrator?
Group Policy provides a method of controlling user and computer configuration settings for
Active Directory containers such as sites, domains, and OUs. GPOs are linked to a particular
container, and then individual policies and administrative templates are enabled to control the
environment for the users or computers within that particular container.
201. What tools are involved in managing and deploying Group Policy?
GPOs and their settings, links, and other information such as permissions can be viewed in the
Group Policy Management snap-in.
GPOs are inherited down through the Active Directory tree by default. You can block the
inheritance of settings from upline GPOs (for a particular container such as an OU or a local
computer) by selecting Block Inheritance for that particular object. If you want to enforce a
higher-level GPO so that it overrides directly linked GPOs, you can use the Enforce command on
the inherited (or upline) GPO.
203. How can you make sure that network clients have the most recent Windows updates
installed and have other important security features such as the Windows Firewall enabled
before they can gain full network access?
You can configure a Network Policy Server (a service available in the Network Policy and
Access Services role). The Network Policy Server can be configured to compare desktop client
settings with health validators to determine the level of network access afforded to the client.
A domain DNS server provides for the local mapping of fully qualified domain names to IP
addresses. Because the DNS is a distributed database, the local DNS servers can provide record
information to remote DNS servers to help resolve remote requests related to fully qualified
domain names on your network.
A caching-only DNS server supplies information related to queries based on the data it contains
in its DNS cache. Caching-only servers are often used as DNS forwarders. Because they are not
configured with any zones, they do not generate network traffic related to zone transfers.
206.How the range of IP addresses is defined for a Windows Server 2008 DHCP server?
The IP addresses supplied by the DHCP server are held in a scope. A scope that contains more
than one subnet of IP addresses is called a superscope. IP addresses in a scope that you do not
want to lease can be included in an exclusion range.
209. Logical Diagram of Active Directory?, what is the difference between child domain &
additional domain Server?
Well, if you know what a domain is then you have half the answer. Say you have the domain
Microsoft.com. Now Microsoft has a server named server1 in that domain, which happens to the
be parent domain. So it’s FQDN is server1.microsoft.com. If you add an additional domain
server and name it server2, then it’s FQDN is server2.microsoft.com.
Now Microsoft is big so it has offices in Europe and Asia. So they make child domains for them
and their FQDN would look like this: europe.microsoft.com & asia.microsoft.com. Now lets say
each of them have a server in those child domains named server1. Their FQDN would then look
like this: server1.europe.microsoft.com & server1.asia.microsoft.com..
Ans : %SystemRoot%System32\GroupPolicy
Ans %SystemRoot%\SYSVOL\sysvol\domainname\Policies\GUID
Ans :Via group policy, security settings for the group, then Software Restriction Policies.
216.What’s the major difference between FAT and NTFS on a local machine?
Ans: FAT and FAT32 provide no security over locally logged-on users. Only native NTFS
provides extensive permission control on both remote and local files.
217.What’s the difference between standalone and fault-tolerant DFS (Distributed File
System) installations?
Ans :The standalone server stores the Dfs directory tree structure or topology locally. Thus, if a
shared folder is inaccessible or if the Dfs root server is down, users are left with no link to the
shared resources. A fault-tolerant root node stores the Dfs topology in the Active Directory,
which is replicated to other domain controllers. Thus, redundant root nodes may include multiple
connections to the same data residing in different shared folders.
Ans : In Partition Knowledge Table, which is then replicated to other domain controllers.
The Boot.ini file is set as read-only, system, and hidden to prevent unwanted editing. To change
the Boot.ini timeout and default settings, use the System option in Control Panel from the
Advanced tab and select Startup.
Ans :When an application that ran on an earlier legacy version of Windows cannot be loaded
during the setup function or if it later malfunctions, you must run the compatibility mode
function. This is accomplished by right-clicking the application or setup program and selecting
Properties –> Compatibility –> selecting the previously supported operating system.
Ans :Winkey opens or closes the Start menu. Winkey + BREAK displays the System Properties
dialog box. Winkey + TAB moves the focus to the next application in the taskbar. Winkey +
SHIFT + TAB moves the focus to the previous application in the taskbar. Winkey + B moves the
focus to the notification area. Winkey + D shows the desktop. Winkey + E opens Windows
Explorer showing My Computer. Winkey + F opens the Search panel. Winkey + CTRL + F
opens the Search panel with Search for Computers module selected. Winkey + F1 opens Help.
Winkey + M minimizes all. Winkey + SHIFT+ M undoes minimization. Winkey + R opens Run
dialog. Winkey + U opens the Utility Manager. Winkey + L locks the computer.
Ans :Active Directory is a network-based object store and service that locates and manages
resources, and makes these resources available to authorized users and groups. An underlying
principle of the Active Directory is that everything is considered an object—people, servers,
workstations, printers, documents, and devices. Each object has certain attributes and its own
security access control list (ACL).
220. How can you force the client to give up the dhcp lease if you have access to the client PC?
221. I can’t seem to access the Internet, don’t have any access to the corporate network and on
ipconfig my address is 169.254.*.*. What happened?
Ans: The 169.254.*.* net mask is assigned to Windows machines running 98/2000/XP if the
DHCP server is not available. The name for the technology is APIPA (Automatic Private
Internet Protocol Addressing).
223.Secure services in your network require reverse name resolution to make it more difficult to
launch successful attacks against the services. To set this up, you configure a reverse lookup
zone and proceed to add records. Which record types do you need to create?
Ans :DNS servers are used to resolve FQDN hostnames into IP addresses and vice versa
225. SOA records must be included in every zone. What are they used for?
Ans :SOA records contain a TTL value, used by default in all resource records in the zone. SOA
records contain the e-mail address of the person who is responsible for maintaining the zone.
SOA records contain the current serial number of the zone, which is used in zone transfers.
Ans : SRV records are used in locating hosts that provide certain network services
227. Before installing your first domain controller in the network, you installed a DNS server
and created a zone, naming it as you would name your AD domain. However, after the
installation of the domain controller, you are unable to locate infrastructure SRV records
anywhere in the zone. What is the most likely cause of this failure?
Ans : The zone you created was not configured to allow dynamic updates. The local interface on
the DNS server was not configured to allow dynamic updates.
228. You are administering a network connected to the Internet. Your users complain that
everything is slow. Preliminary research of the problem indicates that it takes a considerable
amount of time to resolve names of resources on the Internet. What is the most likely reason for
this?
Ans : DNS servers are not caching replies.. Local client computers are not caching replies… The
cache.dns file may have been corrupted on the server.
229. What is difference between windows 2000 server and windows 2003 server ?