windows 2000, 2003 and exchange server,\\ networking 1.
what is the ad? ad is distributed database, which organizes, manages, and controls network resources. ad stores attributes of objects
2. objects? each object is a collection of attributes. ex: - users, computers, groups, domain, sites, and printers. 3. attributes?? each attribute is defined only once, but can be used in multiple object classes, but is defined only once in the schema to ensure consistency. 4. ldap?? light-weight directory access protocol - ldap provides away to communicate with ad by specifying unique naming paths for each object in the directory. name paths are 1. distinguished names, 2. relative distinguished names.ex:--cn=rklraju,ou=sales, dc=msft, dc=saibaba cn,ou,dc – distinguished names,rklraju, sales, msft, saibaba --- relative distinguished names 5. domain?? domain is a collection of computers, which share a common directory database. domain is a security boundary, is a unit of replication. 6. ou?? used to delegate administrative control over the objects controlling of user and computer environments using gp. 7. tree?? tree is hierarchical arrangement of domains that share a contiguous name space having transitive and two-way trust.1.transitive trust – a trust extended to one domain is automatically extended to another domain that trusts that domain. 2. two-way trust – there are two trust paths given in opposite direction between two domains. 8. forest?? forest is a collection of one or more trees. the trees in forest share a common schemer and global catalog. each tree in forest has its own unique name space. --- the first win 2000 domain that you create is called the forest root domain and is the start of a forest, which collection of trees. 9. global catalog?? is a repository of information that contains a subset of the attributes of all objects in ad? the global catalog contains the information that is necessary to determine the location of any objects in directory. the global catalog enables users to uses universal group membership information to log on to the network. 10. domain controller?? is a domain and in a forest automatically replicate any change to the ad database to each other. an operation master is a domain controller that has been assigned one or more single master operation roles in ad domain or forest. its –participate in ad replication; -- perform single master operation roles in domain. 11. sites?? a site maps physical structure of your network. it –optimize replication traffic, --enable user to log on to a domain controller by using high speed connection. 12. what are the administering methods of windows 2000? 1 centralized management:- ad allows administrator to centrally manage large members of users computers, printers and network resources from a central locations, 2. manage user environment:- group policy enables administrators to specify setting and apply management group policy settings to ou aes in ad.3.delegate administration control:- ad allows an administrator with proper authority to delegate a selected set of administrative privileges to appropriate users groups with in your organization.
13. dns?? provides 1.name resolution – dns translates computer names to ip addresses to those computers can locate each other. 2. naming convention for win 2000 domains: - ad uses dns naming convention to name win 2000 names, 3.locating the physical component of ad: - dns identifies domain controller by the specific services that they provide, such as authenticating a log on request win 2000 uses dns to locate domain controllers. this is accomplished by srv records which map a particular service to the domain controllers. 14. dns installation?? > assign a static ip address -> configure the dns primary suffix, ->install dns server service ->create the forward lookup zone, ->create reserve lookup zone(optional). 15. how to create domain?? run type dcpromo.exestart ad installation select the domain controller and domain type domain, dns and netbios names database, log & shared systems volume locations select mixed mode or native mode select a password for directory restore mode. 16. differences between mixed mode and native mode?? the integrator of win nt “h-o” domain and win 2000 domain is called as mixed mode. all domain controllers running on windows2000 server family is called native mode. 17. replica domain controller?? to enable fault tolerance in the even that a domain controller goes offline unexpectedly, if a domain controller fails the domain controllers will provide authentication services and access to objects in ad, allowing the domain to operate as usual. 18. kerberos service?? its authenticates the users ticket by querying the ad and global catalog server to verify the information contained in the user session ticket. 19. how to works kerberos v5?? this protocol is the primary authentication protocol in win2000. it verifies both the identity of the user and the integrity of network services. 20. what will do netdom command?? is a command line utility that you can use to manage win 2000 domain (verify & remove) and trusts relation ships from command prompt window. 21. replication?? replication is the process of updating information in ad from one domain controller to the other domain controller in a network. replication synchronizes the copying of data on each domain controller. 22. replication latency?? is the time needed for a change made on one dc to received by another domain controller default replication latency = 5 minutes, when no changes, scheduled replication = one hour. 23. replication protocols?? rpc, smtp. 24. ad partitions?? 1. schema partition: - is stored on all of the dcs of a forest. 2. configuration partition: - is replicated to all domain controllers in a forest. 3. domain partition:- is replicated to all dcs with in its domain. 25. fsmo roles(flexible single master operation)?? 1. schema mastercontrols all originating updates to the schema.2. domain naming master: controls the addition or removal of domains in the forest 3.pdc emulator acts as a win nt pdc to support any backup domain controllers running win nt with in a mixed mode domain. the pdc emulator is the first domain controller that is created in a new domain its performs roles---a) acts as the pdc for any existing bdcs b)manages password changes from computers, c)minimizes replication latency for password changes d)synchronizes the time on all domain controllers throughout the domain to its time. e) prevents the possibilities of over writing gpos.4) rid relative identifier allocates blocks of ri: d to each domain controller in the domain deletes the objects from the domain when the object is moved from that domain to another domain. 5) infrastructure master is used to update object references in its domain
that point to the object in other domain. per-forest roles are schema master; domain naming master.perdomain roles are pdc emulator, rid master, infrastructure master. 26. how seize or stop the roles?? ntdsuil. 27. ad services?, dc, dns, wins, dhcp, iis, print, file, media telephony, cluster, database, mail,backoffce, ris, backup, application, certificate, license. 28. what is dhcp and define the working of dhcp?? dynamic host configuration protocol. its assigning ip address automatically to network nodes either statically or dynamically. you can allocate ip addresses to clients automatically when the clients start up; making it much easier to manage ip leases and corresponding properties in a network dhcp supports automatic updates to dns when host name or ip address changes occur. 29. what is scope, super scope and multi scope?? scope is a set of properties that define a range of ip addresses and related settings such as dns servers, default gateway, and other information that the client needs to obtain from the dhcp server. super scope to allocate ip addresses to clients on a multinet, which is a physical network segment containing multiple logical ip networks. ex:- you might support three different class c logical ip networks on a physical network segment. each of the three class c address ranges is defined as one of three individual child scopes under a super scope. a single dhcp server can support multiple local ip networks and remote networks. multicast scopes is used to broadcast ip traffic to a group of nodes using a single address, and is traditionally used in audio and video conferencing. dhcp server can allocate multicast addresses to a group of computers much like it allocates unicast addresses to individual computers. 30. what is reservations?? a reservations assigns a specific ip address to a specific mac address. 31. how to see mac address?? ipconfig /all 32. what is default lease time?? a dynamically assigned address and associated properties is called a lease. 33. boot p forwarding and dhcp relay agent?? a dhcp relay agent (bootp relay agent) functions as a sort of dhcp proxy, enabling dhcp clients on a given ip subnet to acquire ip leases from dhcp servers on other subnets. this can not run on a win 2000 server that also is running the dhcp server service or nat with automatic addressing enabled. 34. apipa, automatic private ip address range 169.254.0.1 to 169.254.255.254?? the rras service will use apipa if it is unable to locate a dhcp server at startup. apipa enables win 2000 to assign addresses in the class b address range 169.254.0.1 through 169.254.0.254. apipa is designed to allow automatic ip configuration when no dhcp server is available. it does not allocate settings for default gateway, dns servers, or wins servers. 35. what happened if dhcp fails?? network will fails, clients will disconnect from the network. 36. dhcp backup, where it will store?? administrative tools dhcp right click on dhcp server choose backup. it will store-- sysem32\dhcp\backup 37. disaster recovery plan?understand the needs of the departments that rly on your systems. understand the systems that apply to the departments in the previous item. make it your business to understand everything you need to about storage systems, media formats, software, scheduling, and more. establish policy and protocol with respect to backup and recovery.using the techniques and procedures discussed previously, establish backup restore procedures for systems and systems states, data and data recovery and
archiving and remote storage. perform disaster recovery trials, train, and perform weekly or monthly dr drills. 38. dhcp lease process 39. define dns and purpose. ?? domain name system provides the primary means through which win2000 clients resolve host names to ip addresses. 40. define hosts, cache dns, lmhosts, dns??caching dns helps reduce that load and reduce network traffic. host map a host name to a an ip address and are the primary means by which names are resolved. 41. difference between dns and wins?? wins provides the same capabilities for resolving netbios names to addresses that dns provides for host names. 42. what is the link between dns and ad?? ad use an identical hierarchical naming structure so that domains computers are represented both as ad object and as dns domains and resource records. 43. what are zones (forward and reverse)?? we have two zones in dns 1. forward look-up zone : converts names to ip-addresses .2. reverse look-up zone: convert ip addresses to name or fqdn .usually when we configure mail servers we have to configure reverse look-up zone. this zone configuration provides a feature of spam protection in mail servers 44. active directory integrate zone, primary zone, secondary zone and stub zone?? a primary master zone maintains locally the records for those domains for which it is authoritative. the secondary master maintains the zone records as a read-only copy and periodically performs zone transfers to refresh the data from the primary master. a secondary master is essentially a backup dns server 45. dns replication with in dns servers. difference between primary and secondary zone?? a primary master zone maintains locally the records for those domains for which it is authoritative. the secondary master maintains the zone records as a read-only copy and periodically performs zone transfers to refresh the data from the primary master. a secondary master is essentially a backup dns server 46. dns queries (recursive & interactive)?? dns queries works as a specified dns domain name, stated as a fully qualified domain name (fqdn) a specified query type, which can either specify a resource record by type or a specialized type of query operation a specified class for the dns domain name. 47. what is start of authority and purpose of it.?? 48. what are the problems occurs if dns fails?? 49. how do you know primary and secondary dns servers data is same (ie. replicated) or not?? no a primary master zone maintains locally the records for those domains for which it is authoritative. the secondary master maintains the zone records as a read-only copy and periodically performs zone transfers to refresh the data from the primary master. a secondary master is essentially a backup dns server 50. what are service records? how many are they?/1. host records map a host name to a an ip address and are the primary means by which names are resolved. 2)alias records alias name or cname, records map an alias name to an existing fqdn 3) mail exchanger records enable mail to be routed through or toa domain. 4) service location records enable you to easily move a service from one host to another and designate certain hosts as primary for a given service and others as secondary for that same service.
51. where the dns backup stores?? 52. dynamic dns & static dns??dynamic dns enables a win2000 dns server to automatically update resource records for clients when their host names or ip addresses change. 53. how to check dns is working or not? ntds utilities?? 54. preferred dns server, alternative dns difference?? 55. how dns client will contact server?? now lets look how it works: 1.when a dns name resolution request is forwarded to a dns server, the dns server examines its local dns cache for the ip address. 2. if the ip address is not in the dns server's cache, it checks its hosts file. (since the hosts file is a static text file, it is not commonly used.) 3. if the dns server is not authoritative and configured for forwarding, the dns server forwards the request to a higher-level dns server4.if the dns server cannot forward the request, or if forwarding fails, the dns server uses its root hints file (also known as cache.dns). the root hints file lists the 13 root dns servers. 5. the root dns server responds with the address of a com, edu, net, or other dns server type (depending on the request). 6.the dns server forwards the request to the high-level dns server, which can respond with a variety of ip addresses. 56. alias name?? alias name or cname, records map an alias name to an existing fqdn. ex:- if you r the administrator for “rklraju.org” and you have a server in your network named “ravi”, with a corresponding a record for “ravi” that points to the server’s ip address. you want to use the server as a web server. so, you create an alias for www that points to “ravi.rklraju.org. users connect to www.rklraju.org and dns actually routes them transparently to ravi.rklraju.org. 57. round robin, mask ordering?? 58. dns zones, chronicle records what are they? a primary master zone maintains locally the records for those domains for which it is authoritative. the secondary master maintains the zone records as a read-only copy and periodically performs zone transfers to refresh the data from the primary master. a secondary master is essentially a backup dns server 59. differences between fat & ntfs ?? ? fat and fat32 provide no security over locally logged-on users. only native ntfs provides extensive permission control on both remote and local files. 60. difference between nt4.0, win2000andwin2003?? a) in 2000 we cannot rename domain whereas in 2003 we can rename domain b) in 2000 it supports of 8 processors and 64 gb ram (in 2000 advance server) whereas in 2003 supports up to 64 processors and max of 512gb ram c)2000 supports iis 5.0 and 2003 supports iis6.0 d) 2000 doesn’t support dot net whereas 2003 supports microsoft .net 2.0 e) 2000 has server and advance server editions whereas 2003 has standard, enterprise, datacentre and web server editions. f) 2000 doesn’t have any 64 bit server operating system whereas 2003 has 64 bit server operating systems (windows server 2003 x64 std and enterprise edition) g) 2000 has basic concept of dfs (distributed file systems) with defined roots whereas 2003 has enhanced dfs support with multiple roots. h) in 2000 there is complexity in administering complex networks whereas 2003 is easy administration in all & complex networks i) in 2000 we can create 1 million users and in 2003 we can create 1 billion users. j) in 2003 we have concept of volume shadow copy service which is used to create hard disk snap shot which
is used in disaster recovery and 2000 doesn’t have this service. k) in 2000 we don’t have end user policy management, whereas in 2003 we have an end user policy management which is done in gpmc (group policy management console). l) in 2000 we have cross domain trust relation ship and 2003 we have cross forest trust relationship. m) 2000 supports 4-node clustering and 2003 supports 8-node clustering. n) 2003 has high hcl support (hardware compatibility list) issued by microsoft o) code name of 2000 is win nt 5.0 and code name of 2003 is win nt 5.1 p) 2003 has service called adfs (active directory federation services) which is used to communicate between branches with safe authentication. q) in 2003 their is improved storage management using service file server resource manager (fsrm) r) 2003 has service called windows share point services (it is an integrated portfolio of collaboration and communication services designed to connect people, information, processes, and systems both within and beyond the organizational firewall.) s) 2003 has improved print management compared to 2000 server t) 2003 has telnet sessions available. u) 2000 supports ipv4 whereas 2003 supports ipv4 and ipv6 61. what are the limitations of nt4.0?? win nt depends on a single primary domain controller, the pdc, which holds the master database of the domain configuration, accounts security, and so on. the bdc (backup domain controller) is a backup of pdc. the bdc can service the domain, interms of logon authentication, security, and the like. but its registry databases can’t be edited. 62. what are the advantages of win 2000 and win 2003?? exchange server 2003 runs only on win 2000 server and windows 2003, ad will supports to both. 63. what are the different versions in win 2003 and what are the differences between them?? 1. standard fully supports ad and security, 2. enterprise supports server clustering, 3.data center supports up to 8node server clustering, 4.web server supports to web based applications 64. what is group & how many are they. define each of them?? group is collection of users, contacts, computers, and other groups, -- manage user access to shared resources. groups are local, global and universal groups-- local groups assign access permissions to global domain groups for local domain resources. global groups provide access to resources in other trusted domains. universal groups grant access to resources in all trusted domains. 65. nested group?? in native mode, you can create a universa group and delegate the control over membership to an enterprise or senior administrator whose job it is to manage the membership of the global groups. domains must be in native mode to nest security groups. the universal group is not available in mixed mode. 66. what is ou and sub ou ? define purpose?? used to delegate administrative control over the objects by assigning specific permissions to users and groups and controlling of user and computer environments using gp 67. difference between ou and group?? groups are manage user access to shared resources. ou used to delegate administrative control over the objects by assigning specific permissions to users and groups and controlling of user and computer environments using gp 68. what are ntds database partitions?? 1. schema partition:- is stored on all of the dcs of a forest. 2. configuration partition:- is replicated to all domain controllers in a forest. 3. domain partition:- is replicated to all dcs with in its domain
69. define function of global catalog?? the global catalog enables users to uses universal group membership information to log on to the network 70. link between infrastructure and global catalog?? the infrastructure operations master should not be the same domain controller that hosts the global catalog. if the infrastructure master and the global catalog are the same computer, the infrastructure master will not function because it does not contain any references to objects that it does not hold. in this case, the domain replaces data and the global catalog server data cannot exist on the same domain controller. 71. what is authorities restore and non authoritive restore? an authoritative restore allows you to mark specific information in the database. authoritative restore occurs after non authoritative restore has been performed. 72. what is multi master replication?? multi master replication provides tow advantages for ad. 1. with few exceptions, there is no single domain controller that if unavailable, must be replaced before updates to active directory can resume. 2. domain controllers can be distributed across the network and located in multiple physical sites. locating domain controllers at multiple physical sites enables fault tolerance. 73. what is site links?? site link is an object userd to manage replication between sites , site link bridge consists of two or more site links. 74. define trust relation ship and transitive?? the security principals of one domain are trusted by the security services of another domain according to the trust relationship between the two domains. 1. transitive trust – a trust extended to one domain is automatically extended to an other domains that trust that domain. 2. twoway trust – there are tow trust path given in opposite direction between two domains. 75. how many types of backups? define them , difference between incremental and differential backup. what is archive. any third party tools are used for backup?? archived backup, copy backup, daily backup, normal backup, incremental backup, differential backup. a backup of all files that have changed since the last full or incremental backup, differential backup works exactly as the incremental, except that it does not do any thing to the archive bit. archived backup that documents the state of the archive bit at the time of copy. 76. define ras, ca, dfs??ras remote access server allocates ipx network numbers and node numbers to connecting clients. ca certificate authority, win2000 server running certificate services on your network from which to obtain the certificate this certificate server is called a certificate authority. distributed file system—enables you to simplify a user’s view of the lan and its resources. 77. define file server, dfs replication, frs, maximum. how many roots can be created?? file server is configured for advanced file services and storage. this server is usually configured for raid-0 , or raid-5 arrays, fail-over and cluster arrangements, to provide high availability of the services to all users. dfs – replication distributed file system—enables you to simplify a user’s view of the lan and its resources. dfs does this through replication which copies the root or link to one or more other server. frs file replication server.- set ntfs permissions on the main share folder to grant users read-only access but sill allow frs the control necessary to write changes to the share’s child folders. --- a server can host only one dfs root, so you must delete any existing root prior to creating a new one 78. which protocol the ping command works? how it works?? tcp/ip, ping—packet internet groper, it works, it bounces a packet off a remote host and listens for the return packet. if the packet comes back, you have basic tcp/ip connectivity between the two hosts.
79. netstat, tracert, arp, route, nbtstat commands?? netstatprovides three primary functions 1). monitoring connections to remote hosts, 2). viewing protocol statistics for a connection, and 3).extracting the ip address of a host to which you hav connected using domain names >netstat –a --show all connections, including server connections.tracertuse tracert to trace the route used to connect to another host and determine where, if at all, a connection is failing. art address resolution protocol, lets you view the arp table on your local computer, which associates physical mac addresses of other computers on the local network with their ip addresses. route view or modify entries in the local computer’s static routing table.nbtstat to display statistics for netbios over tcp/ip connections. 80. difference between pinging ip address and system name?? ip address contains two separate pieces of information. each host must have a unique ip address that identifies the host on the network. systems name :identification of user or client or server, 81. system state, automatic disaster recovery, recovery console mode repair?? system recoveryconsole is also a new feature that allows you to boot to an ntfs-supported command line that will allow you to access ntfs volume. win 2000 also boots to a menu of “safe mode” choices in the event of serious system instability. disaster recovery is managed by using win2000 remote and removable storage services to maintain reliable backup sets. 82. nat and pap servers?? network address translation can inspect inbound packets to host names and query the internal ip address of the host from an internal dns. password authentication protocol only use pap to support clients that do not support any of the other authentication methods, or in situations where security is not an issue. enable pap for the rras server through the authentication methods dialog box in the rras server’s properties. 83. ftp configuration , website configuration , disk quotas , disk management , defragmentation ,compression , encryption , firewall , network load balancing?? ftpopen the iis console, right-click the server in the tree, and choose new- ftp site, to start the ftp site creation wizard. -> ip address, tcp port, path, read/write.website open the iis console, right-click the server where you want to asdd the site and choose new- website, to start the website creation wizard. -> ip address, tcp port, host header,ssl port, path, allow anonymous access , access permissions. disk quotasis controlling and enforcing a user’s ability to save data to a volume. the quota service ignores compression and applies the original size of a compressed file to the account. disk management: - you need the appropriate permissions to work with any disk on any computer that can be loaded into the snap-in viewer. disk defragmentation rearranges how the data is stored in the ad database, defragmentation can occur online of offline. compression the quota service ignores compression and applies the original size of a compressed file to the account encryption file system it encrypts the folder but not any of its contents, including subfolders or files. any new objects that you create in the folder, however, will be encrypted. if instead you choose apply changes to this folder, subfolders, and files, efs encrypts not only the folder, but also all of its child objects. 84. how to configure ip address command mode. stop & start service command mode?? ip config, ip config /release, ipconfig / renew. 85. what is ras and purpose of it?? remote access server allocates ipx network numbers and node numbers to connecting clients. 86. terminal services and purpose?? allows a user to establish a session on the server from a dumb terminal or
with terminal emulation software running on just about any device that can connect to the network. if needed remote access to the server, you would usually have had to use pe anywhere or carbon copy. 87. rpc and arp?? rpcremote procedure call which manages communications between clients and servers on separate machines. ad replication uses rpc over ip for replication within a site.arp address resolution protocol -- lets you view the arp table on your local computer, which associates physical mac addresses of other computers on the local network with their ip addresses. 88. outlook express files extension & microsoft outlook files extension?? .pst, .mst 89. clustering, sms, iis, mom?? clustering is a form of fault tolerance that allows users connected to one server to be automatically connected to another server when the former server fails. iis internet information server—provides both web and ftp services to the intranet and is an extremely powerful internet server. mom microsoft operations management—its sends alert messaging server. 90. raid levels? define the first 5 of them?? redundant array of independent disk. raid-o – [striped] –part of each byte of data is written to each drive in array. raid o is not redundant, but it provides the highest performance, because each byte of data is written in parallel. raid-1 (mirroring) all data on a drive is mirrored to a second drive. this provides the highest reliability. write performance is fairly slow, because data must be written to both drives. raid 0+1 as with raid 0, data is striped across each drive in the array however the array is mirrored to one or more parallel arrays. this provides the highest reliability and performance, but has the same high dist storage requirements as raid1 raid 5 part of each bute of data is striped to each in the array. however writes include parity information that allows any data to be recovered from the remaining drives if a drive fails. 91. basic disks and dynamic disks?? basic disks disks that are set up for basic storage are known as basic disks. basic disks canconsist of primary partitions, extended partitions, and logical drives. dynamic disk in which a single disk is configured as a single active partition. this configuration is known as a dynamic disk. its support volumes, which are storage objects that can consist of portions of a single dynamic disk or several dynamic disks. 92. boot files? boot sequence? boot files (boot.ini)the file loads a menu on to the screen at startup and allows you to select pre-boot options. 93. login procedure, back ground process?? 94. authentication ticket issuing. how many tickets description?? 1. bi-factorial network login is a bifactorial exercise, meaning that it requires the user or device to present tow factors to the authentication mechanisms of the network.—userid, password. 2.mono-factorial identification is a far more sucure and convenient form of authentication for two reasons – it is more secure, there can be only one—its more convenient, both for the user and the authenticator. 95. how to take backup of ntds and restore?? ntds.dit this single file is the ad database and stores all of the ad objects on the domain contrloller. .dit—directory information tree. the default location is the –system root\ntds folder. 96. site replication? inter site , replication max time , bhs , band width ?? site replications a) replication within sites—occurs between domain controllers in the same site. assumes fast and highly reliable network
links. does not compress replication traffic. uses a change notification mechanism. b) replication between sites—occurs on manually defined schedule. is designed to optimize bandwidth. one or more replicas in each site act as bridgeheads. inter site topology generator (istg) in each site to perform replication between sites. 97. how can we install a dc ? steps ?? click the start button, click run, type dcpromo, and then click ok the active directory installation wizard appears domain controller type selection wizard network credentials wizard---provide the credentials with permissions to add new domain controllers (domain administrator). you require to provide “user name”, “password”, and “domain” in the corresponding fields and click next to continue type password for restore mode password and confirm password provide the path to store the ad database and path to store log folders enter the folder path to store the sysvol folder directory services restore mode administrator password wizard appearsnext then it ll start to install 98. why dns is required for ad? fqdn??ad use an identical hierarchical naming structure so that domains and computers are represented both as ad object and as dns domains and resources records. dns provides the primary function in as ad 1. name resolution. 2. naming convention for windows 2000 domains. 3. locating the physical component of ad. fqdn fully qualified domain names. 99. what is group policy ?? gp enables you to set centralized and decentralized policies. ensure users have the required environments. lower total cost of ownership by controlling user and computers environments. enforce corporate polices. 100. what are the required components of windows server 2003 for installing exchange 2003? asp.net, smtp, nntp, w3svc 101.
what must be done to an ad forest before exchange can be deployed? - setup /forestprep
102.
what exchange process is responsible for communication with ad? - dsaccess
103. what 3 types of domain controller does exchange access? - normal domain controller, global catalog, configuration domain controller 104. what connector type would you use to connect to the internet, and what are the two methods of sending mail over that connector? - smtp connector: forward to smart host or use dns to route to each address 105. how would you optimize exchange 2003 memory usage on a windows server 2003 server with more than 1gb of memory? - add /3gb switch to boot.ini 106. what would a rise in remote queue length generally indicate? - this means mail is not being sent to other servers. this can be explained by outages or performance issues with the network or remote servers. 107. what would a rise in the local delivery queue generally mean? - this indicates a performance issue or outage on the local server. reasons could be slowness in consulting ad, slowness in handing messages off to local delivery or smtp delivery. it could also be databases being dismounted or a lack of disk space. 108. what are the standard port numbers for smtp, pop3, imap4, rpc, http, https ldap and global catalog? - smtp – 25, pop3 – 110, imap4 – 143, rpc – 135, http- 80, https- 443, ldap – 389, global catalog 3268
109. name the process names for the following: system attendant? – mad.exe, information store – store.exe, smtp/pop/imap/owa – inetinfo.exe 110. what is the maximum amount of databases that can be hosted on exchange 2003 enterprise? 20 databases. 4 sgs x 5 dbs. 111. what are the disadvantages of circular logging? - in the event of a corrupt database, data can only be restored to the last backup. 112. how to send messages or get control of other system connected in lan with the client os is 2000 pro and server is nt workstation- net send “computer name or user” message 113. how windows server will configure? its depends on the role of the server. if you installing active directory, you have to run dcpromo on command prompt, and followed instructions. over all it depends on the role. simply you can say– there is an option in windows “manage server” once you follow the instructions it will guide you to configure your server 114. how many types of server? if they are concern with hardware server, tell them the hardware configuration and vendor of the server. if they are asking about the types of windows server, tell them standard, enterprise, or small business server etc. 115. what is the server environment?. servers have tow type of structures in ad1.logical structure – domains, organizational units, trees and forest, and global catalog.2.physical structure-- domain controllers and sites. 116. how many servers u have how u will configure. we have 400 system, one mail server.------tell them that you have 400 pc based network, and you configure a active directory domain on windows servers to centralize administration tasks. 117. what must be done to an ad forest before exchange can be deployed? - setup /forestprep -question is incorrect, in order for ms exchange 2k or 2003 to be successfully “deployed” both forestprep and domain prep must successfully complete first, before the setup.exe of the actual exchange install, or the install and will error out if attempted. 118. what steps are required to perform a bare-metal recovery? a: reinstall the os. start -> run -> type “ntbackup” -> ok -> next -> select restore -> next -> select backup files -> next -> finish 119. name key files or directories on a unix system that should always be backed up. a: : /etc, /boot, /home 120. what is raid 0? : level 0 backup is normal or full backup. a normal backup disregards the archive bit in all files and backs up all files and folders selected, regardless of when they were modified. a normal backup is the most complete type of backup, and the only type of backup that can be used to back up the registry and other critical system files. a normal backup takes the longest amount of time to back up and recover. a normal backup clears the archive bit on all files after backing up. 121. what is raid 0+1? why is it better than 0? raid 1: its a mirroring process so that raid 1 s better than raid 0-- raid 0+1:striping + mirroring: data is striped across 2 or more disks, then duplicated to identical disk setups. this provides speed, as well as redundancy 122. what is raid-5? raid5:this s also striping and parity process in this raid 5 used 4 partations.4 th one s spare in case 2 nd paratation s failed spare (i mean 4 th ) s activate to 2 nd partation--- raid 5: raid with parity. data
is striped across multiple disks. a disk or disks in a raid-5 set is reserved for parity information. this way data can be reconstructed using the pairity information. 123. why would you not want to encapsulate a root directory with veritas? this is not nessacarily the case anymore with versions of vxfs greater than 4.5. root disk encapsulation requires kernel-level drivers in most cases. because of this, encapsulating the root partition can make it unreadable in a bare-metal recovery situation. 124. what is concatenation? concatenation is a process whereby multiple disk drives are combined into a larger volume. e.g. 2 drives, 1 30 gb drive, and a 10 gb drive are combined to present a 40gb drive to the os. 125. what is striping? a technique for spreading data over multiple disk drives. disk striping can speed up operations that retrieve data from disk storage. the computer system breaks a body of data into units and spreads these units across the available disks. systems that implement disk striping generally allow the user to select the data unit size or stripe width. disk striping is available in two types. single user striping uses relatively large data units, and improves performance on a single-user workstation by allowing parallel transfers from different disks. multi-user striping uses smaller data units and improves performance in a multi-user environment by allowing simultaneous (or overlapping) read operations on multiple disk drives. 126. why would you not want to do root-disk encapsulation with veritas? this is not nessacarily the case anymore with versions of vxfs greater than 4.5. root disk encapsulation requires kernel-level drivers in most cases. because of this, encapsulating the root partition can make it unreadable in a bare-metal recovery situation. 127. what is concatenation? concatination is a process whereby multple disk drives are combined into a larger volume. e.g. 2 drives, 1 30 gb drive, and a 10 gb drive are combined to present a 40gb drive to the os. 128. what is striping? striping is a process whereby data is split across multiple disks. this is typically done with identical drives. data being written is split into small blocks (8-32k typically) and written across as many drives that are in the striped volume. the block-size is typically called an ‘interlace’ or ‘interleave’ factor. this makes writing and reading data much faster than writing to a single disk. 129. what is a spindle? spindles are the center-points of disk drives.. the rotating shaft. the reason this question could be relevant is that when discussing raid, it’s not uncommon to hear terms like “spliting data across as many spindles as possible to achieve performance”… i think this term has started to fall out of use however. 130. what is an incremental backup? an incremental backup is copying data that has only changed since the last full backup. 131. what steps are required to perform a bare-metal recovery? most bare-metal recovery solutions require that a minimal os be installed back onto the system. there is software out there that can assist with this. however it’s usually easier to just boot a box from a cd or network server, install a base os, and recover from the last known good backup. 132. name key files or directories on a unix system that should always be backed up. solaris systems: /etc - system configuration information. /var/adm - additional log directory for solaris. /var/log preserve log data for forensics if needed. linux systems: /etc-system configuration information. /boot - linux kernel information /var/log - log data for forensics if needed.
133. what is a level 0 backup? level 0 backup is normal or full backup. a normal backup disregards the archive bit in all files and backs up all files and folders selected, regardless of when they were modified. a normal backup is the most complete type of backup, and the only type of backup that can be used to back up the registry and other critical system files. a normal backup takes the longest amount of time to back up and recover. a normal backup clears the archive bit on all files after backing up. 134. what is an incremental backup? an incremental backup is the quickest method for performing backups of data. an incremental backup only backs up files that have been created or modified (their archive bit is set to 1) since the last normal or incremental backup. an incremental backup also clears the archive bit (sets the archive bit back to 0) of all files that it backs up. 135. what steps are required to perform a bare-metal recovery? reinstall the os. start -> run -> type “ntbackup” -> ok -> next -> select restore -> next -> select backup files -> next -> finish 136. what is raid 0+1? why is it better than 0? ·raid 0: striping. data is spread across multiple disks. no redundancy. ·raid 1: mirroring. data written to a mirror is duplicated to a second disk or volume. ·raid 0+1: striping + mirroring: data is striped across 2 or more disks, and then duplicated to identical disk setups. this provides speed, as well as redundancy. ·raid 1+0: mirroring + striping: _mirrors_ are striped across multiple disks. faster than 0+1, but not as redundant. ·raid 5: raid with parity. data is striped across multiple disks. a disk or disks in a raid-5 set is reserved for parity information. this way data can be reconstructed using the parity information. 137. why would you not want to encapsulate a root directory with veritas? encapsulating the root partition can make it unreadable in a bare-metal recovery situation. 138. what is concatenation? concatenation is the operation of joining two character strings end to end. 139. what is striping? a technique for spreading data over multiple disk drives. disk striping can speed up operations that retrieve data from disk storage. the computer system breaks a body of data into units and spreads these units across the available disks. systems that implement disk striping generally allow the user to select the data unit size or stripe width. disk striping is available in two types. single user striping uses relatively large data units, and improves performance on a single-user workstation by allowing parallel transfers from different disks. multi-user striping uses smaller data units and improves performance in a multi-user environment by allowing simultaneous (or overlapping) read operations on multiple disk drives. 140. what is a spindle? spindles are the center-points of disk drives.. the rotating shaft. the reason this question could be relevant is that when discussing raid, it’s not uncommon to hear terms like “splitting data across as many spindles as possible to achieve performance” 141. what is raid? raid 0-each file has a backup.
redundant
array
of
independent
disks.
142. i can put 30 hdd in a dell server(configuration of raid 5)in between two hdd was get problem. on that time wat we have to do?? i have out 2 new hdd …. if i put 2 new hdd wat about the configuration of raid 5??or we have configure raid 5.how?? 143. explain hidden shares. hidden or administrative shares are share names with a dollar sign ($) appended to their names. administrative shares are usually created automatically for the root of each drive letter. they do not display in the network browse list.
144. how do the permissions work in windows 2000? what permissions does folder inherit from the parent? when you combine ntfs permissions based on users and their group memberships, the least restrictive permissions take precedence. however, explicit deny entries always override allow entries. 145. why can’t i encrypt a compressed file on windows 2000? you can either compress it or encrypt it, but not both. 146. if i rename an account, what must i do to make sure the renamed account has the same permissions as the original one? nothing, it’s all maintained automatically. 147. what’s the most powerful group on a windows system? administrators. 148. what are the accessibility features in windows 2000? stickykeys, filterkeys narrator, magnifier, and onscreen keyboard. 149. why can’t i get to the fax service management console? you can only see it if a fax had been installed. 150. what do i need to ensure before deploying an application via a group policy? make sure it’s either an msi file, or contains a zap file for group policy. 151. how do you configure mandatory profiles? rename ntuser.dat to ntuser.man 152. i can’t get multiple displays to work in windows 2000. multiple displays have to use peripheral connection interface (pci) or accelerated graphics port (agp) port devices to work properly with windows 2000. 153. what’s a maximum number of processors win2k supports? 2 154. i had some ntfs volumes under my windows nt installation. what happened to ntfs after win 2k installation? it got upgraded to ntfs 5. 155. how do you convert a drive from fat/fat32 to ntfs from the command line? convert c: /fs:ntfs 156. explain apipa. auto private ip addressing (apipa) takes effect on windows 2000 professional computers if no dhcp server can be contacted. apipa assigns the computer an ip address within the range of 169.254.0.0 through 169.254.255.254 with a subnet mask of 255.255.0.0. 157. how does internet connection sharing work on windows 2000? internet connection sharing (ics) uses the dhcp allocator service to assign dynamic ip addresses to clients on the lan within the range of 192.168.0.2 through 192.168.0.254. in addition, the dns proxy service becomes enabled when you implement ics. 158. describe how the dhcp lease is obtained. it’s a four-step process consisting of (a) ip request, (b) ip offer, © ip selection and (d) acknowledgement. 159. i can’t seem to access the internet, don’t have any access to the corporate network and on ipconfig my address is 169.254.*.*. what happened? the 169.254.*.* netmask is assigned to windows machines running 98/2000/xp if the dhcp server is not available. the name for the technology is apipa (automatic private internet protocol addressing). 160. we’ve installed a new windows-based dhcp server, however, the users do not seem to be getting dhcp leases off of it. the server must be authorized first with the active directory. 161. how can you force the client to give up the dhcp lease if you have access to the client pc? ipconfig
/release 162. what authentication options do windows 2000 servers have for remote clients? pap, spap, chap, mschap and eap. 163. what are the networking protocol options for the windows clients if for some reason you do not want to use tcp/ip? nwlink (novell), netbeui, appletalk (apple). 164. what is data link layer in the osi reference model responsible for? data link layer is located above the physical layer, but below the network layer. taking raw data bits and packaging them into frames. the network layer will be responsible for addressing the frames, while the physical layer is reponsible for retrieving and sending raw data bits. 165. what is binding order? the order by which the network protocols are used for client-server communications. the most frequently used protocols should be at the top. 166. how do cryptography-based keys ensure the validity of data transferred across the network? each ip packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted. 167. should we deploy ipsec-based security or certificate-based security? they are really two different technologies. ipsec secures the tcp/ip communication and protects the integrity of the packets. certificatebased security ensures the validity of authenticated clients and servers. 168. what is lmhosts file? it’s a file stored on a host machine that is used to resolve netbios to specific ip addresses. 169. what’s the difference between forward lookup and reverse lookup in dns? forward lookup is name-toaddress, the reverse lookup is address-to-name. 170. how can you recover a file encrypted using efs? use the domain recovery agent. 171. what is a default gateway? - the exit-point from one network and entry-way into another network, often the router of the network. 172. how do you set a default route on an ios cisco router? - ip route 0.0.0.0 0.0.0.0 x.x.x.x [where x.x.x.x represents the destination address] 173. what is the difference between a domain local group and a global group? - domain local groups grant permissions to objects within the domain in which the reside. global groups contain grant permissions tree or forest wide for any objects within the active directory. 174. what is ldap used for? - ldap is a set of protocol used for providing access to information directories. 175. what tool have you used to create and analyze packet captures? - network monitor in win2k / win2k3, ethereal in linux, optiview series ii (by fluke networks). 176. how does hsrp work? 177. what is the significance of the ip address 255.255.255.255? - the limited broadcast address is utilized when an ip node must perform a one-to-everyone delivery on the local network but the network id is unknown.
178. what is active directory schema? schema is definitions of all objects , attributes. there is only one schema for an entire forest so that all objects created in ad conform the same rule. schema is 1. dynamically available, 2.dynamically updatable, 3. protected by dacls (discretionary access control lists) 179. what are the domain functional levels in windows server 2003? if there are many organisational units and to implement policy on all ouś we use domain level policy. 180. what are the forest functional levels in windows server 2003? 181. what is global catalog server? global catalog server maintains full information about its own domain and partial information about other domains. it is a forest wide role. 182. how we can raise domain functional & forest functional level in windows server 2003? 183. which is the default protocol used in directory services? 184. what is ipv6? internet protocol version 6 (ipv6) is a network layer ip standard used by electronic devices to exchange data across a packet-switched internetwork. it follows ipv4 as the second version of the internet protocol to be formally adopted for general use. 185. what is multimaster replication? multi-master replication is a method of replication employed by databases to transfer data or changes to data across multiple computers within a group. multi-master replication can be contrasted with a master-slave method (also known as single-master replication 186. what is a site? site maps a physical structure of networks. one or more well-connected highly reliable and fast tcp/ip subnets. a site allows administrator to configure active directory access and replication topology to take advantage of the physical network 187. which is the command used to remove active directory from a domain controler? dcpromo to add/remove active directory but first adc should be removed before dc if we want to remove dc first then check this server is last domain controller in domain 188. what is the file that’s responsible for keep all active directory database?
00326504521963
.ntds.dit
FORID:1
189. in which domain functional level, we can rename domain name? all domain controllers must be running windows server 2003, and the active directory functional level must be at the windows server 2003.yes u can rename the domain in windows server 2003 190. what is rsop ?resultant set of policy is provid to make policy modification and trouble shooting easier. rsop is the query object it has two mode 1.logging mode: polls existing policies and the reports the result of the query. 2.planning mode: the questins ask about the planned policy and the report the result of the quer. 191. expain the vpn?? vpn.. using the virtual private network this is technology which is use to make virtual network between any remote location. vpn make a tunnel type connection for fast & secure communication. using third party software we have many type of vpn softwares. 192. how isa server works ? ans..isa is software firewal & internet soloution for small & large network. isa server blocks inboud traffic as well as outbound traffic. it is a multitasking firewall server it provides nat (natwork address translation)& web proxy etc.. isa server provides secure vpn for connect remote clients or
remote location… 193. what is the concept for authoritative and nonauthoritative restoration? 1. non-authoriative restore: which accept the entries from other domain controller after the restoed data. 2.authoritative: not accept the entries from other domain controller. 194. what is the ntds.dit file default size? 40 mb 195. your computer gives you “non-disk error” before you log on what would you do to make your computer work? describe how the dhcp lease is obtained. it’s a four-step process consisting of (a) ip request, (b) ip offer, © ip selection and (d) acknowledgement. 196. i can’t seem to access the internet, don’t have any access to the corporate network and on ipconfig my address is 169.254.*.*. what happened? the 169.254.*.* netmask is assigned to windows machines running 98/2000/xp if the dhcp server is not available. the name for the technology is apipa (automatic private internet protocol addressing). 197. we’ve installed a new windows-based dhcp server, however, the users do not seem to be getting dhcp leases off of it. the server must be authorized first with the active directory. 198. how can you force the client to give up the dhcp lease if you have access to the client pc? ipconfig /release 199. what authentication options do windows 2000 servers have for remote clients? pap, spap, chap, mschap and eap. 200. what are the networking protocol options for the windows clients if for some reason you do not want to use tcp/ip? nwlink (novell), netbeui, appletalk (apple). 201. what is data link layer in the osi reference model responsible for? data link layer is located above the physical layer, but below the network layer. taking raw data bits and packaging them into frames. the network layer will be responsible for addressing the frames, while the physical layer is reponsible for retrieving and sending raw data bits. 202. what is binding order? the order by which the network protocols are used for client-server communications. the most frequently used protocols should be at the top. 203. how do cryptography-based keys ensure the validity of data transferred across the network? each ip packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted. 204. should we deploy ipsec-based security or certificate-based security? they are really two different technologies. ipsec secures the tcp/ip communication and protects the integrity of the packets. certificatebased security ensures the validity of authenticated clients and servers. 205. what is lmhosts file? it’s a file stored on a host machine that is used to resolve netbios to specific ip addresses. 206. what’s the difference between forward lookup and reverse lookup in dns? forward lookup is name-toaddress; the reverse lookup is address-to-name. 207. how can you recover a file encrypted using efs? use the domain recovery agent.
208. what are the required components of windows server 2003 for installing exchange 2003? - asp.net, smtp, nntp, w3svc 209. what must be done to an ad forest before exchange can be deployed? - setup /forestprep 210. what exchange process is responsible for communication with ad? – dsaccess 211. what 3 types of domain controller does exchange access? - normal domain controller, global catalog, configuration domain controller 212. what connector type would you use to connect to the internet, and what are the two methods of sending mail over that connector? - smtp connector: forward to smart host or use dns to route to each address 213. how would you optimise exchange 2003 memory usage on a windows server 2003 server with more than 1 gb of memory? - add /3 gb switch to boot.ini 214. what would a rise in remote queue length generally indicate? - this means mail is not being sent to other servers. this can be explained by outages or performance issues with the network or remote servers. 215. what would a rise in the local delivery queue generally mean? - this indicates a performance issue or outage on the local server. reasons could be slowness in consulting ad, slowness in handing messages off to local delivery or smtp delivery. it could also be databases being dismounted or a lack of disk space. 216. what are the standard port numbers for smtp, pop3, imap4, rpc, ldap, ftp, udp, http, https and global catalog? - smtp – 25, pop3 – 110, imap4 – 143, rpc – 135, ldap – 389, global catalog – 3268 ftp—20,21, udp -137, http –80, https – 443. 217. name the process names for the following: system attendant? – mad.exe, information store – store.exe, smtp/pop/imap/owa – inetinfo.exe 218. what is the maximum amount of databases that can be hosted on exchange 2003 enterprise? - 20 databases. 4 sgs x 5 dbs. 219. what are the disadvantages of circular logging? - in the event of a corrupt database, data can only be restored to the last backup. 220. what is a class d ip address? ip address ranges: class a: 0-126. 127 is a broadcast class b: 128-191 class c: 192-223 class d: 224-239 class e: 240-255. ip address ranges: class a: 0-126. : for about >256 subnets and >16777214 hosts per subnet 127.0.0.1: for proper configurations of tcp/ip. class b: 128-191: for about >65536 subnets and >65534 hosts per subnet class c: 192-223: for about >16777214 networks and 254 hosts per subnet class d: 224-239 : these addressess are for scientific researches .. class e: 240-255. : these are kept for future use 221. what is firewall? firewalls are of two types: -hardware firewall
-software firewall. firewall in simple manner is bascially the utility to provide the security over the network. these are the security measures that prevents the network’s in and out traffic to pass through the specific security filters so that the unwanted and unsecure data can be stopped from entering into the network. further… as a security measure it also depends on the network designer and implementer that how to use a firewall mean to say the security measures like how to present the content filtering and url filtering which type of firewall should be used and where to put it. 222. how isa server works ? ans..isa is software firewal & internet soloution for small & large network. isa server blocks inboud traffic as well as outbound traffic. it is a multitasking firewall server it provides nat (natwork address translation)& web proxy etc.. isa server provides secure vpn for connect remote clients or remote location… 223. what are fmso roles? list them.?? ans:fsmo roles are server roles in a forest there are five types of fsmo roles 1-scheema master 2-domain naming master 3-rid master 4-pdc emullator 5-infrastructure master 224. how can i deploy the latest patched in pc through g.p. without having the admin right in pc.?? create a batch file and place all the patches in the netlogon, and deploy the batch file through gp to all the pcs so the same should take affect after restarting the pc 225. how to remove the $sharing through g.p. in 1000 pcs. 226. in raid 5,suppose i have 5 hdd of 10-10 gb, after configuring the raid how much space do i have for utilise.-- 40 gb 227. can i changed password if my machince’s connectivity to dc who holds pdc emulator role has been fails? a) no you can’t the password. 228. i have been asked if there is set of 30 hard disk configured for raid 5 if two harddisk failed what about data a) it depends how u had configured ur raid its only raid5 or with with spare if its only raid 5 then in raid5 if ur 2 nos of hdd goes then ur raid is gone. 229. in raid 5,suppose i have 5 hdd of 10-10 gb, after configuring the raid how much space do i have for utilise.?? a) -1 out of the total (eg- if u r using 5 u will get only 4 because 1 goes for parity). 230. how can i resolve the svr name through nslookup a) what exactly u want to do, nslookup command will let u know through which server u r getting routed, (eg- c:\nslookup then u will get ur domain name to which u r getting routed. and if u want to get the name of the pc/server with the ip address then u have to give the command c:\nbtstat -a ip xx-xx-xx-xx) 231. how can i deploy the latest patched in pc through g.p. wihtout having the admin right in pc. a) create a batch file and place all the patches in the netlogon, and deploy the batch file through gp to all the pcs so the same should take affect after restarting the pc.(the answer to the above question is incorrect.you cannot deploy a batch file using group policy.you can only publish or assign msi packages or zap files. they are the only two valid file formats allowable when using “intellimirror”. in active directory. )
232. what is kerberos? which version is currently used by windows? how does kerberos work? 233. what is a firewall? a firewall is simply a program or hardware device that filters the information coming through the internet connection into your private network or computer system. if an incoming packet of information is flagged by the filters, it is not allowed through. firewalls use one or more of three methods to control traffic flowing in and out of the network: \* packet filtering - packets (small chunks of data) are analyzed against a set of filters. packets that make it through the filters are sent to the requesting system and all others are discarded. * proxy service - information from the internet is retrieved by the firewall and then sent to the requesting system and vice versa. * stateful inspection - a newer method that doesn’t examine the contents of each packet but instead compares certain key parts of the packet to a database of trusted information. information traveling from inside the firewall to the outside is monitored for specific defining characteristics, then incoming information is compared to these characteristics. if the comparison yields a reasonable match, the information is allowed through. otherwise it is discarded 234. what is active directory schema? schema master is a set of rules which is used to define the struture of active directory. it contains definitions of all the objects which are stored in ad. it maintains information and detail information of objects. 235. what are the domain functional levels in windows server 2003? if there are many organisational units and to implement policy on all ouś we use domain level policy 236. what are the forest functional levels in windows server 2003? 237. what is global catalog server? global catalog server maintains full information about its own domain and partial information about other domains. it is a forest wide role 238. what is ipv6? internet protocol version 6 (ipv6) is a network layer ip standard used by electronic devices to exchange data across a packet-switched internetwork. it follows ipv4 as the second version of the internet protocol to be formally adopted for general use 239. in which domain functional level, we can rename domain name? all domain controllers must be running windows server 2003, and the active directory functional level must be at the windows server 2003. yes u can rename the domain in windows server 2003 240. what is a site? sites: one or more well-connected highly reliable and fast tcp/ip subnets. a site allows administrator to configure active directory access and replication topology to take advantage of the physical network 241. which is the command used to remove active directory from a domain controller? dcpromo to add/remove active directory but first adc should be removed before dc if we want to remove dc first then check this server is last domain controller in domain. 242. how we can create console, which contain schema? . we have to open the register to see the schema master fsmo role--regser 32 schmamgmt 243. what is trust? to allow users in one domain to access resources in another, ad uses trust. trust is automatically produced when domains are created. the forest sets the default boundaries of trust, not the domain, and implicit trust is automatic. as well as two-way transitive trust, ad trusts can be shortcut (joins two domains in different trees, transitive, one- or two-way), forest (transitive, one- or two-way), realm
(transitive or nontransitive, one- or two-way), or external (nontransitive, one- or two-way) in order to connect to other forests or non-ad domains. ad uses the kerberos v5 protocol, although ntlm is also supported and web clients use ssl/tls. 244. what is the file that’s responsible for keep all active directory database? ntds.dit
00326504521963
FORID:1
245. what is rsop ?resultant set of policy is provid to make policy modification and trouble shooting easier. rsop is the query object it has two mode 1.logging mode: polls existing policies and the reports the result of the query. 2.planning mode: the questins ask about the planned policy and the report the result of the quer. 246. what is the concept for authoritative and nonauthoritative restoration? 1. non-authoriative restore: which accept the entries from other domain controller after the restoed data. 2.authoritative: not accept the entries from other domain controller. 247. what is the ntds.tit file default size? 40 mb 248. which is the command used to remove active directory from a domain controler? think ” dcpromo ” in command prompt . 249. what is multimaster replication?ans. it is also known as single-master replication. multi-master replication is a method of replication employed by databases to transfer data or changes to data across multiple computers within a group. multi-master replication can be contrasted with a master-slave method. 250. what is a denial of service(dos) attack? denial of service attack means server or machine receive so many packets from the single or multiple network sources or spoofed resources so that its all resources will be used to in responce of those packets & after that it will hang or not responding. then it will start to denial to its services 251. can i changed password if my machine’s connectivity to dc who holds pdc emulator role has been fails? a) no you can’t change the password. 252. i have been asked if there is set of 30 hard disk configured for raid 5 if two hard disk failed what about data a) it depends how u had configured ur raid its only raid5 or with spare if its only raid 5 then in raid5 if ur 2 nos of hdd goes then ur raid is gone. 253. q) how can i deploy the latest patched in pc through g.p. wihtout having the admin right in pc. a) create a batch file and place all the patches in the netlogon, and deploy the batch file through gp to all the pcs so the same should take affect after restarting the pc.{{ you cannot deploy a batch file using group policy.you can only publish or assign msi packages or zap files. they are the only two valid file formats allowable when using “intellimirror”. in active directory}} 254. q) in raid 5,suppose i have 5 hdd of 10-10 gb, after configuring the raid how much space do i have for utilise. a) -1 out of the total (eg- if u r using 5 u will get only 4 because 1 goes for parity). 255. q) how can i resolve the svr name through nslookup a) what exactly u want to do, nslookup command will let u know through which server u r getting routed, (eg- c:\nslookup then u will get ur domain name to which u r getting routed. and if u want to get the name of
the pc/server with the ip address then u have to give the command c:\nbtstat -a ip xx-xx-xx-xx) 256. how can i deploy the latest patched in pc through g.p. wihtout having the admin right in pc. a) create a batch file and place all the patches in the netlogon, and deploy the batch file through gp to all the pcs so the same should take affect after restarting the pc. 257. what are fmso roles? list them ans:fsmo roles are server roles in a forest there are five types of fsmo roles 1-scheema master 2-domain naming master 3-rid master 4-pdc emulator 5-infrastructure master 258. what’s the difference between local, global and universal groups? domain local groups assign access permissions to global domain groups for local domain resources. global groups provide access to resources in other trusted domains. universal groups grant access to resources in all trusted domains. 259. i am trying to create a new universal user group. why can’t i? universal groups are allowed only in native-mode windows server 2003 environments. native mode requires that all domain controllers be promoted to windows server 2003 active directory. 260. what is lsdou? it’s group policy inheritance model, where the policies are applied to local machines, sites, domains and organizational units. 261. why doesn’t lsdou work under windows nt? if the ntconfig.pol file exists, it has the highest priority among the numerous policies. 262. where are group policies stored? %systemroot%system32\grouppolicy 263. what are gpt and gpc? group policy template and group policy container. 264. where is gpt stored? %systemroot%\sysvol\sysvol\domainname\policies\guid 265. you change the group policies, and now the computer and user settings are in conflict. which one has the highest priority? the computer settings take priority. 266. you want to set up remote installation procedure, but do not want the user to gain access over it. what do you do? gponame–> user configuration–> windows settings–> remote installation services–> choice options is your friend. 267. what’s contained in administrative template conf.adm? microsoft netmeeting policies 268. how can you restrict running certain applications on a machine? via group policy, security settings for the group, then software restriction policies. 269. you need to automatically install an app, but msi file is not available. what do you do? a .zap text file can be used to add applications using the software installer, rather than the windows installer. 270. what’s the difference between software installer and windows installer? the former has fewer privileges and will probably require user intervention. plus, it uses .zap files.
271. what can be restricted on windows server 2003 that wasn’t there in previous products? group policy in windows server 2003 determines a users right to modify network and dial-up tcp/ip properties. users may be selectively restricted from modifying their ip address and other network configuration parameters. 272. how frequently is the client policy refreshed? 90 minutes give or take. 273. where is secedit? it’s now gpupdate. 274. you want to create a new group policy but do not wish to inherit. make sure you check block inheritance among the options when creating the policy. 275. what is "tattooing" the registry? the user can view and modify user preferences that are not stored in maintained portions of the registry. if the group policy is removed or changed, the user preference will persist in the registry. 276. how do you fight tattooing in nt/2000 installations? you can’t. 277. how do you fight tattooing in 2003 installations? user configuration - administrative templates - system group policy - enable - enforce show policies only. 278. what does intellimirror do? it helps to reconcile desktop settings, applications, and stored files for users, particularly those who move between workstations or those who must periodically work offline. 279. what’s the major difference between fat and ntfs on a local machine? fat and fat32 provide no security over locally logged-on users. only native ntfs provides extensive permission control on both remote and local files. 280. how do fat and ntfs differ in approach to user shares? they don’t, both have support for sharing. 281. explain the list folder contents permission on the folder in ntfs. same as read & execute, but not inherited by files within a folder. however, newly created subfolders will inherit this permission. 282. i have a file to which the user has access, but he has no folder permission to read it. can he access it? it is possible for a user to navigate to a file for which he does not have folder permission. this involves simply knowing the path of the file object. even if the user can’t drill down the file/folder tree using my computer, he can still gain access to the file using the universal naming convention (unc). the best way to start would be to type the full path of a file into run… window. 283. for a user in several groups, are allow permissions restrictive or permissive? permissive, if at least one group has allow permission for the file/folder, user will have the same permission. 284. for a user in several groups, are deny permissions restrictive or permissive? restrictive, if at least one group has deny permission for the file/folder, user will be denied access, regardless of other group permissions. 285. what hidden shares exist on windows server 2003 installation? admin$, drive$, ipc$, netlogon, print$ and sysvol. 286. what’s the difference between standalone and fault-tolerant dfs (distributed file system) installations? the standalone server stores the dfs directory tree structure or topology locally. thus, if a shared folder is inaccessible or if the dfs root server is down, users are left with no link to the shared resources. a fault-tolerant root node stores the dfs topology in the active directory, which is replicated to other domain controllers. thus, redundant root nodes may include multiple connections to the same data residing in
different shared folders. 287. we’re using the dfs fault-tolerant installation, but cannot access it from a win98 box. use the unc path, not client, only 2000 and 2003 clients can access server 2003 fault-tolerant shares. 288. where exactly do fault-tolerant dfs shares store information in active directory? in partition knowledge table, which is then replicated to other domain controllers. 289. can you use start->search with dfs shares? yes. 290. what problems can you have with dfs installed? two users opening the redundant copies of the file at the same time, with no file-locking involved in dfs, changing the contents and then saving. only one file will be propagated through dfs. 291. i run microsoft cluster server and cannot install fault-tolerant dfs. yeah, you can’t. install a standalone one. 292. is kerberos encryption symmetric or asymmetric? symmetric. 293. how does windows 2003 server try to prevent a middle-man attack on encrypted line? time stamp is attached to the initial client request, encrypted with the shared key. 294. what hashing algorithms are used in windows 2003 server? rsa data security’s message digest 5 (md5), produces a 128-bit hash, and the secure hash algorithm 1 (sha-1), produces a 160-bit hash. 295. what third-party certificate exchange protocols are used by windows 2003 server? windows server 2003 uses the industry standard pkcs-10 certificate request and pkcs-7 certificate response to exchange ca certificates with third-party certificate authorities. 296. what’s the number of permitted unsuccessful logons on administrator account? unlimited. remember, though, that it’s the administrator account, not any account that’s part of the administrators group. 297. if hashing is one-way function and windows server uses hashing for storing passwords, how is it possible to attack the password lists, specifically the ones using ntlmv1? a cracker would launch a dictionary attack by hashing every imaginable term used for password and then compare the hashes. 298. what’s the difference between guest accounts in server 2003 and other editions? more restrictive in windows server 2003. 299. how many passwords by default are remembered when you check "enforce password history remembered"? user’s last 6 passwords.
00326504521963
300. when i create a user folder in server 2003 and set the share and security permissions it allows the user read permissions only . they cannot write to the folder no matter what permissions i set.how do i get around this?
FORID:1
301. “what’s the difference between local, global and universal groups? domain local groups assign access permissions to global domain groups for local domain resources. global groups provide access to resources in other trusted domains. universal groups grant access to resources in all trusted domains.” 302. after reading that id probably not trust this site for too much, according to that both universal and global groups are the same! what about server modes? mixed, native or 2003 mode? universal groups
cant be assigned in mixed or non native / 2003 modes. plus if you need to be reading a site like this to pass an interview you really dont diserve the job you have wrongly applied for. 303. i am having windows 2003 server ,as well as 40 clients , my clients is differnt os i mean redhat or sun or windows ,eventhough i want to apply ip address for all clients ,how i can assingh the ip address 304. is it possible to create user with administrator access and deny permission to open specific folder. windows server 2003 web edition (member, not domen). 305. how to give permissions to user could not use control panel,delete folders,files, 306. how to use all installed software on server through client pc. 307. back up and restore commands?/ 308. security protocol of nt 4.0 and 2000/2003?? 309. what is aglp?? 310. ou group filtering?? 311. ad users and computers?? 312. computer account, machine account, user accounts, container?? 313. user configuration and computer configuration?? 314. no over ride?? 315. block inheritance?? 316. which one is high priority?? 317. software distribution?? 318. msi files and mst files . exe to msi files ? how it will refresh ?? 319. group polices . where these can apply ?? 320. what are the sequence of applying policies ?? 321. where this polices will store ?? 322. local security policy , domain controller security policy , domain security policy ?? 323. what is the default domain functional level in windows server 2003? 324. what are the physical & logical components of ads 325. in which domain functional level, we can rename domain name? 326. how we can create console, which contain schema? 327. can you explain us briefly archeitecture of windows 2000/2003?
328. what are main differences in windows nt and windows 2000 archeitecture ? 329. user(s) are complaining of delays when using the network. what would you do? 330. what is maen different between hub and switch ? 331. what is meam by brodcast id? 332. what is mean by loop back id? 333. differences between win 2000 server & advanced server? 334. logical diagram of active directory? what is the difference between child domain & additional domain server? 335. ftp, nntp, smtp, kerberos, dns, dhcp, pop3 port numbers? 336. what is kerberos? which version is currently used by windows? how does kerberos work? 337. workers can not print from the printer, there user log on are correct and are allowed to print from that printer in active directory. how would you resolve this issue? 338. your hard drive is partitioned as follows: 8 gigs for os drive c, 8 gigs for hot swappable dirve d and rest is free as dirve e. your drive c crashes, how would you reboot your system without installing a new operating system? 339. why do i sometimes lose a server’s address when using more than one server? 340. what is bind? 341. name the steps to setup a slave zone in bind 342. name the steps to setup a primary zone in bind 343. what commands would you use under solaris or linux to modify/view an ldap tree? 344. how we can raise domain functional & forest functional level in windows server 2003? 345. which is the deafult protocol used in directory services? 346. what is the default domain functional level in windows server 2003? 347. what are the physical & logical components of ads 348. differences between win 2000 server & advanced server? 349. logical diagram of active directory? what is the difference between child domain & additional domain server? 350. what is kerberos? which version is currently used by windows? how does kerberos work? 351. distribution list? 352. gal, routing group, stm files, eseutil & ininteg - what are they used for?
353. what is mime & mapi? 354. list the services of exchange server 2000? 355. how would you recover exchange server when the log file is corrupted?
00326504521963
FORID:1
356. “what is the maximum storage capacity for exchange standard version? what would you do if it reaches maximum capacity?” 357. boot process in windows nt/xp/2000/2003 358. how do you configure memory dump if c:,d:,e: & paging file is configured so and so way? 359. what is active directory compared to sam? 360. can i changed password if my machince’s connectivity to dc who holds pdc emulator role has been fails? 361. exchange 2000 server standard edition limits the database size to 16 gigabytes. 362. what is the diffence between sd-ram and dd-ram ? 363. can i change my dc ip(dns,pref dns,gateway) while dc is working. and can i give another ip. 364. (what happend if i give that ip and what happend about the replication of ther dc when i am in suspend mode) ? 365. how can i deploy the latest patched in pc through g.p. wihtout having the admin right in pc. 366. how to remove the $sharing through g.p. in 1000 pcs. 367. how can i resolve the svr name through nslookup. 368. what is difference between scope and superscope ? 369. how can i make my server a daemon? 370. how should i choose a port number for my server? 371. layers in tcp/ip 372. how can i be sure that a udp message is received? 373. how to get ip header of a udp message 374. writing udp/sock_dgram applications 375. how many bytes in an ipx network address? 376. what is the difference between mutex and semaphore? 377. what is priority inversion? 378. different solutions to dining philosophers problem.
379. what is a message queue? 380. user(s) are complaining of delays when using the network. what would you do? 381. what are some of the problems associated with operating a switched lan? 382. name some of the ways of combining tcp/ip traffic and sna traffic over the same link. 383. what sort of cabling is suitable for fast ethernet protocols?
microsoft exchange server interview questions 1. distribution list? 2. gal, routing group, stm files, eseutil & ininteg - what are they used for? 3. what is mime & mapi? 4. list the services of exchange server 2000? 5. how would you recover exchange server when the log file is corrupted? 6. what is exchange server?? exchange is a client/ server electronic messaging system. 7. exchange server relation with ad?? the exchange routing engine that moves messages between exchange serversan to external messaging components. the routing engine uses routing information stored in active directory to figure out where and even when to send messages. 8. how to configure outlook with exchange server?? 9. how to take exchange server backup ?? 10. mail box stores , stores box ?? 11. difference between exchange server 5.5 and 2003 ?? 12. exchange 2000 server standard edition limits?? the database size to 16 gigabytes.
networking faqs 1.i have been called up for the tech interview on next week for the post of network engineer. help me out ? tcp/ip is a connection oriented protocol layer whereas udp is connectionless protocol 2. what is difference between tcp/ip and udp? tcp/ip is a connection oriented protocol layer whereas udp is connectionless protocol 3. encryption operation performed at what layer1.presentation layer2.physical layer3.transport layer operation perform in presentation layer is1:data encriptiondecription,2: protocal conversion,3: character conversion. ans is 1:-presentation layer
4. if you have 3 pc's with static ip's and there is one pc workstation that has ftp going through a router i am going to make a few assumptions to this vague question. i am assuming that the the ftp workstation is running ftp server and all ip addresses are publically routable ip addressess. now it is quite easy. from a unix workstation enter the command ftp xxx ( being the ip address of the server you want to address ). you will then get a response saying ( connected ). that is if the ftp server is open to guest and anonymous connections, which is not normally. you also need to remember that ftp uses tcp ports 20 and 21 for data and control. 5. what are the network monitoring tools? like what tools do you use to monitor network connections? tools are 1 ipconfig 2 ping 3 tracert 4 pingpath 6. in tcp/ip udp is connection less , why? tcp is reliable but udp is not reliable tcp sent it's packet in it's arriving order udp has no order 7.how to configure a router? here are two ways to configure router....u can install routher through the router disk which will require the connetion information like ur user name and password, setup wizard will auto detect the conntion and will configure the router, second method is mannul, wherein we open router page ex:speedtouch576 router page ip address is 192.168.1.254, once page is open then go to setup wizard it will ask for user name and password,if ur conntion is optaion dynamic ip address which is ur network server address then it will automatically connet, otherwise you have to optain some information from service provider..like vpi code and vci code,multiplexing method, enscapsulations..etc) put these information correctly on router page, router will be online 8. what is difference between public ip and private ip? public ip is that ,which provide by isp,and ping by any user from any where, private ip is ping locally public ip are the ip that can be accessed by every one,ie very user has the access to this ip's.e.g yahoo.com,google.com etc are the pubic ip's. private ip's are the ip that can not be accessed by every one,ie they are execively owned by an organization,only the user of that organisation has the access to this ip's. range of private ip address are class a 10.0.0.1 to 10.255.255.254 class b 172.16.0.1 to 172.31.255.254 class c 192.0.0.1 to 192.255.255.254 excluding ips are public ip's. 9. what is the difference between bri and pri port? both bri (basic rate interface) and pri (primary rate interface) provide multiple digital bearer channels over which temporary connections can be made and data can be sent. features:isdn bri services 2 b channels (64 kbps) and one d channel (16 kbps). the total bandwidth is 144 kbps. in north america isdn pri service is pri t1 total bandwidth 1.544 mbps ( 23 b channel with 64 kbps + 1 d channel with 64 kbps) in europe isdn pri service is pri e1 total bandwidth 2.048 mbps (30 b channel with 64 kbps + 1 d channel with 64 kbps) 10. what is ras server? ras means remote access service - we can remotely administar the server from any part of network in a organization or through vpn connectionex:- terminal service you should enable remote desktop services and you can troubleshooting your client and server pc's 11. what is the difference between remote desktop sharing and desktop sharing through net meeting? remote desktop sharing means you can access the remote desktop and share the screen in local. but any command you enter would be executed by remote. desktop sharing through netmeeting means you share
your screen, and anyone connect to you pc through netmeeting will share you screen automaticly. 12.why do we use subnet mask? what are its uses? a subnet allows the flow of network traffic between hosts to be segregated based on a network configuration. by organizing hosts into logical groups, subnetting can improve network security and performance. the most recognizable aspect of subnetting is the subnet mask. like ip addresses, a subnet mask contains four bytes (32 bits) and is often written using the same "dotteddecimal" notation. for example, a very common subnet mask in its binary representation 11111111 11111111 11111111 00000000 is typically shown in the equivalent, more readable form 255.255.255.0 1 13. what is the difference between win 2000 ads and win 2003 ads? 1.in win 2003 ads we can remane dns with netdom command 2.by default password complexity is enabled so we must disable password complexity from account policy in domain security policyto create uers.we can restrict users not to change the ipaddress of the system, 14.what is the difference between windows server 2003 and windows server 2000 and operating system ? ) in 2000 we cannot rename domain whereas in 2003 we can rename domain b) in 2000 it supports of 8 processors and 64 gb ram (in 2000 advance server) whereas in 2003 supports up to 64 processors and max of 512gb ram c)2000 supports iis 5.0 and 2003 supports iis6.0 d) 2000 doesn’t support dot net whereas 2003 supports microsoft .net 2.0 e) 2000 has server and advance server editions whereas 2003 has standard, enterprise, datacentre and web server editions. f) 2000 doesn’t have any 64 bit server operating system whereas 2003 has 64 bit server operating systems (windows server 2003 x64 std and enterprise edition) g) 2000 has basic concept of dfs (distributed file systems) with defined roots whereas 2003 has enhanced dfs support with multiple roots. h) in 2000 there is complexality in administering complex networks whereas 2003 is easy administration in all & complex networks i) in 2000 we can create 1 million users and in 2003 we can create 1 billion users. j) in 2003 we have concept of volume shadow copy service which is used to create hard disk snap shot which is used in disaster recovery and 2000 doesn’t have this service. k) in 2000 we don’t have end user policy management, whereas in 2003 we have a end user policy management which is done in gpmc (group policy management console). l) in 2000 we have cross domain trust relation ship and 2003 we have cross forest trust relationship. m) 2000 supports 4-node clustering and 2003 supports 8-node clustering. n) 2003 has high hcl support (hardware compatibility list) issued by microsoft o) code name of 2000 is win nt 5.0 and code name of 2003 is win nt 5.1 p) 2003 has service called adfs (active directory federation services) which is used to communicate between branches with safe authentication. q) in 2003 their is improved storage management using service file server resource manager (fsrm) r) 2003 has service called windows share point services (it is an integrated portfolio of collaboration and communication services designed to connect people, information, processes, and systems both within and beyond the organizational firewall.) s) 2003 has improved print management compared to 2000 server t) 2003 has telnet sessions available. u) 2000 supports ipv4 whereas 2003 supports ipv4 and ipv6 15. in roaming profile how to give only excel permission to particular user? in roaming profile ,go to file which you want to share it ,right click the folder containing the file and give share and select the user to
wich you want to give and assign. 16. how can i control the usb ports through network? through group policy or through remote desktop to local pc 17. what is patch management ? patch management is an area of systems management that involves acquiring, testing, and installing multiple patches (code changes) to an administered computer system. patch management tasks include: maintaining current knowledge of available patches, deciding what patches are appropriate for particular systems, ensuring that patches are installed properly, testing systems after installation, and documenting all associated procedures, such as specific configurations required. a number of products are available to automate patch management tasks, including ringmaster's automated patch management, patchlink update, and gibraltar's everguard.
18. if in a company with 80 computers with wireless network .all are using wireless internet.what is bandwidth the bandwidth per user in a 80 computers in a wireless network depends on the connection speed and no. of the wireless accesspoints and no. of users connected to each access point if the network is a combination of cable and partial wireless. say, 5 users are actively connected to a single wireless accesspoint which supports a connection speed of 10mbps, then each user has 10/5 mbps (2mbps) connection speed or bandwidth logically. 19. what is terminal service? terminal services is a component of microsoft windows operating systems (both client and server versions) that allows a user to access applications or data stored on a remote computer over a network connection. terminal services is microsoft's take on server centric computing, which allows individual users to acces network resources easily. 20. what is difference between terminal service and remote desktop? terminal services is a component of microsoft windows operating systems (both client and server versions) that allows a user to access applications or data stored on a remote computer over a network connection. terminal services is microsoft's take on server centric computing, which allows individual users to acces network resources easily. remote desktop is working with the help of remote desktop protocol (rdp) is a multi-channel protocol that allows a user to connect to a computer running microsoft terminal services. the server listens by default on tcp port 3389. 21. what is the difference between layer 3 switch and router? layer 3 switch is a multiport bridge with a router added in. layer 3 switches are faster than routers, but they usually lack some of the advanced functionalities of routers. a router is a device that routes the packets to their destination. it means that a router analyzes the layer 3 destination address of every packet, and devises the best next hop for it. this process takes time, and hence every packet encounters some delay because of this. 22. can somebody give me a clear calculation and explanation why 2 is 10 in binary digits? n decimal system upto ten numbers are possible(0-9).in binary only two(0-1). so the first number is 0 in both, next 1,1 next 10,1. because the possiblity of the next greatest number to 1 in binary is 10. 23. what is daemon? how does it differ from the cron batch process? when a cron initiates a command can the a daemon is a process which runs in the backgorund which doesn need any user interaction. once started it keeps on running and oing its neccessary tasks. a chron batch process.... now these are one of the jobs scheduled by the user in the chron tab files. each of these files are executed as per the details mentioned by the user in the chron tab files. all these jobs scheduled are run by a daemon called chrond.when & is used at the end of a command... it becomes a daemon. 24. what is a dns ? how it works ? dns stands for domain name server . it's primary purpose is to convert user friendly names to ip adresses . we have two zones in dns 1. forward look-up zone : converts names to ipaddresses .2. reverse look-up zone : convert ip addresses to name or fqdn .usually when we configure mail servers we have to configure reverse look-up zone . this zone configuration provides a feature of spam protection in mail servers .now lets look how it works :1.when a dns name resolution request is forwarded to a dns server, the dns server examines its local dns cache for the ip address. 2. if the ip address is not in the dns server's cache, it checks its hosts file. (since the hosts file is a static text file, it is not commonly used.) 3. if the dns server is not authoritative and configured for forwarding, the dns server forwards the request to a
higher-level dns server4.if the dns server cannot forward the request, or if forwarding fails, the dns server uses its root hints file (also known as cache.dns). the root hints file lists the 13 root dns servers. 5. the root dns server responds with the address of a com, edu, net, or other dns server type (depending on the request). 6.the dns server forwards the request to the high-level dns server, which can respond with a variety of ip addresses. 25. why we are using private ip in the lan? private address have defined to the use in corporate domains. these ip s have been reserved by internet . these ip s are not used in internet . th ip range is from 10.0.0.0 /8 172.16.18.0 to 172.31.xx.xx and 192.168.xx.xx. when these ip packets are routed in to internet they are discarded and dropped. and it is not advised to use public address in private lan to avoid connectivity issues when connecting the network to internet.because the public ip may be in use in internet 26. what is difference between layer 2 switch and layer 3 switch ? there is only one big diffrence between layer 2 and layer 3 swithces is that we are able to do routing in interanetwork with layer 3 swithces which is not possible to do with layer 2. cisco 2950 catalyst swithe is the example of that. layer 2 switch can only do switching where as layer 3 can do switching as well as routing,,ex: of layer 2 switches 1912, 2950, layer 3 switches 4503, 5500, 27. how to configure clients from 2000ads server? its very first u need to make that pc as member of domain. for this u should provide administrato password to authenticate 28. what is trojan horse? how to save a system from that? trojan horse's are the program , which are having a capability to replicate itself , and they could me multiple itselef through hosts and also these programs are very harmful for system., how to avoid - use any antivirus like avg , e-trust , trendmicro etc. 29. what is tcp/ip? tcp/ip- is a suite of protocols used for computer to computer communication. it has 5 layers. it consists of 4 layers which is an improved version of osi model wherein the seven layers have been reduced to 4 layers. application; transport; ip layer; physical access layer. 30. describe the osi model? 1) application layer:interface between user and network.it provide user interface application. 2) presentation layer:negoiate the data exchange format. 3)session layer:allow user to establish connection using easily remember names. 4) transport layer:provides end to end reliable transfer.5) network layer:routes the data through a large network.6) data link layer: it determine access to the network media.7) physical layer:it convert frames into bits. 31. in trojan horse how can we avoid the system from its effect? trojan horse is a small program which replicates itself in any network or system . for avoiding it use trendmicro antivirus for corporate offisecan corporate edition , 33. how to configure dhcp server? dhcp- dynamic host configuration protocol. this service is used to assign ip addresses to systems in a network. if in the case of internet, your system's ip address is assigned automatically by your isp coz u need to assign an ip address which is not in use and that is well known by your isp using this service.1.check out in the properties dialog box, you can see the check box marked as "assign ip address automatically" if you make use of internet.2.in the case of a local network u can assign an ip address manually. 34. user(s) are complaining of delays when using the network. what would you do? 35. what are some of the problems associated with operating a switched lan? 36. name some of the ways of combining tcp/ip traffic and sna traffic over the same link. 37. what sort of cabling is suitable for fast ethernet protocols? 34.what is a class d ip address? ip address ranges: class a: 0-126. 127 is a broadcast class b: 128-191
class c: 192-223 class d: 224-239 class e: 240-255. ip address ranges: class a: 0-126. : for about >256 subnets and >16777214 hosts per subnet 127.0.0.1: for proper configuraions of tcp/ip. class b: 128-191: for about >65536 subnets and >65534 hosts per subnet class c: 192-223: for about >16777214 networks and 254 hosts per subnet class d: 224-239 : these addressess are for scientific researches .. class e: 240-255. : these are kept for future use 35.why do i sometimes lose a server’s address when using more than one server? 36.what is firewall? firewalls are of two types: -hardware firewall -software firewall. firewall in simple manner is bascially the utility to provide the security over the network. these are the security measures that prevents the network’s in and out traffic to pass through the specific security filters so that the unwanted and unsecure data can be stopped from entering into the network.. further… as a security measure it also depends on the network designer and implementer that how to use a firewall mean to say the security measures like how to present the content filtering and url filtering which type of firewall should be used and where to put it.. 37.how do i monitor the activity of sockets? 38.how would i put my socket in non-blocking mode? 39.what are raw sockets? 40.what is the role of tcp protocol and ip protocol.--- well.. firt of all one should know what a protocol actually means: 41.a protocol is bascially set of rules designed and developed for the internetwork or can say intranetwork communications. the need of tcp had been rised in early years when like.. ibm mainframe were not able to communicate with the burroughs mainframe.. means if you wish to connect 2 or more computers they should be same with everything from manufacturer to designer and implementer…then tcp imerged as a solutionfor-ever.. earlier it was ncp( network control protocal) but later it refined into tcp( transmission control protocol) and ip(internet protocol)on jan.1,1983.. some general roles of tcp/ip are: 1. independence from particular vendor or network. 2. very low data overhead 3. good failure recovery. and if the thinghs are taken seprately.. then tcp is bascially responsible for proper data transmission by assuring data integrity it is a connection oriented protocol that follows the under scenerio 1. handshaking. 2. packect sequencing 3. flow control. 4. error handling. ip : since the data to be sent must be put somewhere the ip works here .. the required data is packaged in an ip
packet. 42.what is udp? . udp is a connectionless protocol that do not provide reliable transfer of information and is fast in nature as compare to tcp. this disadvantage on other hand is suitable for applications like video and voice. 43.how can i make my server a daemon? 44.how should i choose a port number for my server? 45.layers in tcp/ip 46.how can i be sure that a udp message is received? 47.how to get ip header of a udp message 48.writing udp/sock_dgram applications 49.how many bytes in an ipx network address? 50.what is the difference between mutex and semaphore? 51.what is priority inversion? 52.different solutions to dining philosophers problem. 53.what is a message queue? 54.questions on shared memory. 55.what is dhcp? dhcp is used for mac address to ip mapping its support both static and dynamic mapping. static mapping are done just like bootstrap and for dynamic mapping it have database of mac and ip when a packet with a mac comes ask for ip its check that assigns a dynamic ip fixed that for a specific time and then return that packet with that ip 56. -----ping ia process which use icmp protocol error message which is encapsulated in a ip packets its calculate the round trip delay time by sending the packet sending time and subtract it from arrival time. the error messages are 1.destination unreachable 2.hardware error. etc its also sets maximum hop value and after it becomes 0 the packets discarded telnet is a application layer process of connection remote computer and local area network computer by specifying the ip address by a specific port, 00326504521963
FORID:1
57.can i connect two computers to internet using same line ? u can connect two computer using nat which use port forwarding method and proxy server same time on the same line . 58. are all cache less proxies dns cacheful? if so why? 59. how does a ping work? the exact mechanism. 60. how does a dhcp work ? when a pc with no ip address just with an mac address boots up , what are the steps that happen till the time a ip is given to the pc from a dhcp. 61.what happens if there are 2 dhcp servers in the network and both gets a message from 2 pcs booting at exactly the same moment of time. 62.how to change mac address? ans:--you can change a mac address easily. go to the desktop>write click on
the my computer icon>properties>device manager>network adapters> properties> advance>network address.. and then change the value. the value should be hexadecimal or 16 octat 63.what is dhcp? ------dhcp is a protocol which is design for automatic give the ip address to dhcp client..dhcp assine the ip address for few days lease & capture the clients mac address. it is updated version of bootp… 64.what is a page file? -------page file is a virtual memory of the operating system & work as physical ram. it increases the system performance & working. 65.user(s) are complaining of delays when using the network. what would you do? ans:- get the user(s) to demonstrate the problem - determine how many other users are affected- ensure desktop hardware and configuration is ok- trace all connections (they may be on another subnet)- commence some monitoring or diagnostics - determine problem (if there is one)- provide solution 66.what is wds mode in ap?ans..wds stands for wireless distributed system, & work as bridging technology. in wds mode access point can communicate with wi-fi access points only does not support wireless cliens. if we want communicate 4 ap to each other so we should configure one ap as wds mode. in this mode wsd ap requires remote ap mac address so you have to type other aps mac address one by one. and configure ap in ap with wds mode with remote wds mac address.. with this setting u can make wireless lan with out any ethernet wire. 67. can i connect two computers to internet using same line. ans..yes, we can connect two or more system using many types of mathodes..1. remote help invitations.. if you have high or medium speed internet connection you can access the system.. 2. vpn.. using the virtual private network this is technology which is use to make virtual network between any remote location. vpn make a tunnel type connection for fast & secure communication. 3. using third party software we have many type of vpn softwares. 68.describe your home wlan setup.(pay attention to candidate’s confidence. plus if the candidate built it himself. plus if the network is secured additionally, regardless of the protocols used. plus if the candidate fought poor coverage.) 69.ad-hoc vs. infrastructure topology. advantages and disadvantages. ad-hoc networks are easy to set up. by definition ad-hoc wlans do not require access point, so they are cheaper. with infrastructured wlans one can connect to wired lan, enable wireless roaming for office workers, centralize wlan management, boost the range. 70.your preferred brand for wireless cards and access points. (an experienced candidate will be able to come up with strong argument to defend his preferences. he will point to the past projects as well.) 71.range and throughput of 802.11a, 802.11b and 802.11g networks. the official spec for 802.11a is 54 mbps and 25-75 feet indoors. the official spec for 802.11b is 11 mbps and 100-150 feet indoors. the official spec for 802.11g is 54 mbps and 100-150 feet indoors. an experienced candidate will provide his own observations. 72.how do you secure a wireless network? forbid ssid broadcasting, enable mac-level access where appropriate, enable wep, enable 802.11i where available, enable firewalls, enable wpa. 73.what does wi-fi stand for? wireless fidelity. 74.what is 802.11i? it’s a new ieee standard defining wireless network security.
75.what are the recommended channels if you’re setting up three wlans and want minimum interference? 1, 6 and 11 for the us, 1, 7 and 13 for europe and 1, 7 and 14 for japan. 76.what are your preferred tools for wardriving? somewhere the names kismet, *stumbler or others should come up. ask the candidate to describe his preferred configuration for wardriving. 77.bridge and router defferences?? bridge: it is also a network device which is use to connect multiple pc in the network. it is use in small or lans network. it work on layer 2 or 3(some times)of osi model.it is connect pc through hub. router: router is electronic machine and network device which is work as gateway.router connect multiple network or wirele cisco 1. what is a wildcard mask, and how is it different from a netmask? > netmask determines the subnet part of the ip address example:- 255.255.0.0 class b. the netmask is 255.255 wildcard mask is the opposite. u see this in ospf.0.0.255.255 .. the 255.255 here defines the host portion. its a wild thing really 2. how do you configure a cisco switch or router? what are the steps needed? >enable #configure terminal
configs are slightly similar
3. how would i place an interface into trunking mode? config t int s0/0 switchport mode trunk encapsulation dot1q|isl 4. how do you shutdown an interface on a router or switch? en config t int s0/0 shutdown 5. what is vtp?virtual trunking protocol. set up on switches to manage vlans. 6. what is vmps?vlan membership policy server. maps information regarding vlan 7. what is span/rspan?switched port analyzer. remote switched port analyzer. you can monitor traffic flowing to a port from another port. 8. what is flow/netflow?protocol for collecting ip information 9. what is tacacs? radius?terminal access controller access control system remote access dial in user service security enabled by aaa authentication, authorization, accounting provides a means of validation of users gaining access to a router accounting not used with radius.
sql &oracle faqs
en
11. what are the components of physical database structure of oracle database? oracle database is comprised of three types of files. one or more datafiles, two are more redo log files, and one or more control files. 22. what are the components of logical database structure of oracle database? there are tablespaces and database's schema objects. 33. what is a tablespace? a database is divided into logical storage unit called tablespaces. a tablespace is used to grouped related logical structures together. 44. what is system tablespace and when is it created? every oracle database contains a tablespace named system, which is automatically created when the database is created. the system tablespace always contains the data dictionary tables for the entire database. 55. explain the relationship among database, tablespace and data file. each databases logically divided into one or more tablespaces one or more data files are explicitly created for each tablespace. 66. what is schema? a schema is collection of database objects of a user. 77. what are schema objects? schema objects are the logical structures that directly refer to the database's data. schema objects include tables, views, sequences, synonyms, indexes, clusters, database triggers, procedures, functions packages and database links. 88. can objects of the same schema reside in different tablespaces? yes. 99. can a tablespace hold objects from different schemes? yes. 1010. what is oracle table? a table is the basic unit of data storage in an oracle database. the tables of a database hold all of the user accessible data. table data is stored in rows and columns. 1111. what is an oracle view? a view is a virtual table. every view has a query attached to it. (the query is a select statement that identifies the columns and rows of the table(s) the view uses.) 1212. what is partial backup ? a partial backup is any operating system backup short of a full backup, taken while the database is open or shut down. 1312. what is mirrored on-line redo log ? a mirrored on-line redo log consists of copies of on-line redo log files physically located on separate disks, changes made to one member of the group are made to all members. 1413. what is full backup ? a full backup is an operating system backup of all data files, on-line redo log files and control file that constitute oracle database and the parameter. 1514. can a view based on another view ? yes. 1615. can a tablespace hold objects from different schemes ? yes. 1716. can objects of the same schema reside in different tablespaces.? yes. 1817. what is the use of control file ? when an instance of an oracle database is started, its control file is used to identify the database and redo log files that must be opened for database operation to proceed. it is also used in database recovery.
1918. do view contain data ? views do not contain or store data. 2019. what are the referential actions supported by foreign key integrity constraint ? update and delete restrict - a referential integrity rule that disallows the update or deletion of referenced data. delete cascade when a referenced row is deleted all associated dependent rows are deleted. 2120. what are the type of synonyms? there are two types of synonyms private and public. 2221. what is a redo log ? the set of redo log files ysdate,uid,user or userenv sql functions, or the pseudo columns level or rownum. 2322. what is an index segment ? each index has an index segment that stores all of its data. 2423. explain the relationship among database, tablespace and data file.? each databases logically divided into one or more tablespaces one or more data files are explicitly created for each tablespace 2524. what are the different type of segments ? data segment, index segment, rollback segment and temporary segment. 2625. what are clusters ? clusters are groups of one or more tables physically stores together to share common columns and are often used together. 2726. what is an integrity constrains ? an integrity constraint is a declarative way to define a business rule for a column of a table. 2827. what is an index ? an index is an optional structure associated with a table to have direct access to rows, which can be created to increase the performance of data retrieval. index can be created on one or more columns of a table. 2928. what is an extent ? an extent is a specific number of contiguous data blocks, obtained in a single allocation, and used to store a specific type of information. 3029. what is a view ? a view is a virtual table. every view has a query attached to it. (the query is a select statement that identifies the columns and rows of the table(s) the view uses.) 3130. what is table ? a table is the basic unit of data storage in an oracle database. the tables of a database hold all of the user accessible data. table data is stored in rows and columns. 3231. can a view based on another view? yes. 3332. what are the advantages of views? - provide an additional level of table security, by restricting access to a predetermined set of rows and columns of a table. - hide data complexity. - simplify commands for the user. - present the data in a different perspective from that of the base table. - store complex queries. 3433. what is an oracle sequence? a sequence generates a serial list of unique numbers for numerical columns of a database's tables. 3534. what is a synonym? a synonym is an alias for a table, view, sequence or program unit. 3635. what are the types of synonyms? there are two types of synonyms private and public.
3736. what is a private synonym? only its owner can access a private synonym. 3837. what is a public synonym? any database user can access a public synonym. 3938. what are synonyms used for? - mask the real name and owner of an object. - provide public access to an object - provide location transparency for tables, views or program units of a remote database. - simplify the sql statements for database users. 4039. what is an oracle index? an index is an optional structure associated with a table to have direct access to rows, which can be created to increase the performance of data retrieval. index can be created on one or more columns of a table. 4140. how are the index updates? indexes are automatically maintained and used by oracle. changes to table data are automatically incorporated into all relevant indexes.
oracle interview questions and answers 41. what is a tablespace? a database is divided into logical storage unit called tablespaces. a tablespace is used to grouped related logical structures together 42. what is rollback segment ? a database contains one or more rollback segments to temporarily store "undo" information. 43. what are the characteristics of data files ? a data file can be associated with only one database. once created a data file can't change size. one or more data files form a logical unit of database storage called a tablespace. 44. how to define data block size ? a data block size is specified for each oracle database when the database is created. a database users and allocated free database space in oracle datablocks. block size is specified in init.ora file and can’t be changed latter. 45. what does a control file contain ? a control file records the physical structure of the database. it contains the following information. database name names and locations of a database's files and redolog files. time stamp of database creation. 46.what is difference between unique constraint and primary key constraint ? a column defined as unique can contain nulls while a column defined as primary key can't contain nulls. 47.what is index cluster ? a cluster with an index on the cluster key 48.when does a transaction end ? when it is committed or rollbacked. 49. what is the effect of setting the value "all_rows" for optimizer_goal parameter of the alter session command ? what are the factors that affect optimizer in choosing an optimization approach ? answer the optimizer_mode initialization parameter statistics in the data dictionary the optimizer_goal parameter of the alter session command hints in the statement. 50. what is the effect of setting the value "choose" for optimizer_goal, parameter of the alter session command ? the optimizer chooses cost_based approach and optimizes with the goal of best throughput if
statistics for atleast one of the tables accessed by the sql statement exist in the data dictionary. otherwise the optimizer chooses rule_based approach. 51. what does commit do ? commit makes permanent the changes resulting from all sql statements in the transaction. the changes made by the sql statements of a transaction become visible to other user sessions transactions that start only after transaction is committed. 52. what does rollback do ? rollback retracts any of the changes resulting from the sql statements in the transaction. 53. define transaction ? a transaction is a logical unit of work that comprises one or more sql statements executed by a single user. 62. what is read-only transaction ? a read-only transaction ensures that the results of each query executed in the transaction are consistant with respect to the same point in time. 63. what is a deadlock ? explain . two processes wating to update the rows of a table which are locked by the other process then deadlock arises. in a database environment this will often happen because of not issuing proper row lock commands. poor design of front-end application may cause this situation and the performance of server will reduce drastically. these locks will be released automatically when a commit/rollback operation performed or any one of this processes being killed externally. 64. what is a schema ? the set of objects owned by user account is called the schema. 65. what is a cluster key ? the related columns of the tables are called the cluster key. the cluster key is indexed using a cluster index and its value is stored only once for multiple tables in the cluster. 66. what is parallel server ? multiple instances accessing the same database (only in multi-cpu environments) 68. what is clusters ? group of tables physically stored together because they share common columns and are often used together is called cluster. 69. what is an index ? how it is implemented in oracle database ? an index is a database structure used by the server to have direct access of a row in a table. an index is automatically created when a unique of primary key constraint clause is specified in create table comman (ver 7.0) 86.what are various types of joins ? equijoins, non-equijoins, self join, outer join 87.what is a package cursor ? a package cursor is a cursor which you declare in the package specification without an sql statement. the sql statement for the cursor is attached dynamically at runtime from calling procedures. 88.if you insert a row in a table, then create another table and then say rollback. in this case will the row be inserted ? yes. because create table is a ddl which commits automatically as soon as it is executed. the ddl commits the transaction even if the create statement fails internally (eg table already exists error) and not syntactically. 89.what are the various types of queries ?? normal queries sub queries co-related queries nested queries compound queries 90.what is a transaction ? a transaction is a set of sql statements between any two commit and rollback statements.
91.what is implicit cursor and how is it used by oracle ? an implicit cursor is a cursor which is internally created by oracle. it is created by oracle for each individual sql. 92.which of the following is not a schema object : indexes, tables, public synonyms, triggers and packages ? public synonyms 94.what is pl/sql? pl/sql is oracle's procedural language extension to sql. the language includes object oriented programming techniques such as encapsulation, function overloading, information hiding (all but inheritance), and so, brings state-of-the-art programming to the oracle database server and a variety of oracle tools. 95.is there a pl/sql engine in sql*plus? no. unlike oracle forms, sql*plus does not have a pl/sql engine. thus, all your pl/sql are send directly to the database engine for execution. this makes it much more efficient as sql statements are not stripped off and send to the database individually. 96.is there a limit on the size of a pl/sql block? currently, the maximum parsed/compiled size of a pl/sql block is 64k and the maximum code size is 100k. you can run the following select statement to query the size of an existing package or procedure. sql> select * from dba_object_size where name = 'procedure_name' 64.when to create indexes ? to be created when table is queried for less than 2% or 4% to 25% of the table rows. 65.how can you avoid indexes ? to make index access path unavailable - use full hint to optimizer for full table scan - use index or and-equal hint to optimizer to use one index or set to indexes instead of another. - use an expression in the where clause of the sql. 66.what is the result of the following sql : select 1 from dual union select 'a' from dual; error 67.can database trigger written on synonym of a table and if it can be then what would be the effect if original table is accessed. yes, database trigger would fire. 68.can you alter synonym of view or view ? no 69.can you create index on view ? no 70.what is the difference between a view and a synonym ? synonym is just a second name of table used for multiple link of database. view can be created with many tables, and with virtual columns and with conditions. but synonym can be on view. 71.what is the difference between alias and synonym ? alias is temporary and used with one query. synonym is permanent and not used as alias. 72.what is the effect of synonym and table name used in same select statement ? valid 73.what's the length of sql integer ? 32 bit length 74.what is the difference between foreign key and reference key ? foreign key is the key i.e. attribute which refers to another table primary key. reference key is the primary key of table referred by another table. 75.can dual table be deleted, dropped or altered or updated or inserted ? yes
76.if content of dual is updated to some value computation takes place or not ? yes 77.if any other table same as dual is created would it act similar to dual? yes 78.for which relational operators in where clause, index is not used ? <> , like '% ...' is not functions, field +constant, field || '' 79.assume that there are multiple databases running on one machine. how can you switch from one to another ? changing the oracle_sid 80.what are the advantages of oracle ? portability : oracle is ported to more platforms than any of its competitors, running on more than 100 hardware platforms and 20 networking protocols. market presence : oracle is by far the largest rdbms vendor and spends more on r & d than most of its competitors earn in total revenue. this market clout means that you are unlikely to be left in the lurch by oracle and there are always lots of third party interfaces available. backup and recovery : oracle provides industrial strength support for on-line backup and recovery and good software fault tolerence to disk failure. you can also do point-in-time recovery. performance : speed of a 'tuned' oracle database and application is quite good, even with large databases. oracle can manage > 100gb databases. multiple database support : oracle has a superior ability to manage multiple databases within the same transaction using a two-phase commit protocol. 81.what is a forward declaration ? what is its use ? pl/sql requires that you declare an identifier before using it. therefore, you must declare a subprogram before calling it. this declaration at the start of a subprogram is called forward declaration. a forward declaration consists of a subprogram specification terminated by a semicolon. 82.what are actual and formal parameters ? actual parameters : subprograms pass information using parameters. the variables or expressions referenced in the parameter list of a subprogram call are actual parameters. for example, the following procedure call lists two actual parameters named emp_num and amount: eg. raise_salary(emp_num, amount); formal parameters : the variables declared in a subprogram specification and referenced in the subprogram body are formal parameters. for example, the following procedure declares two formal parameters named emp_id and increase: eg. procedure raise_salary (emp_id integer, increase real) is current_salary real; •
what is normalization? explain different levels of normalization? o
•
what is denormalization and when would you go for it? o
•
check out the article q100139 from microsoft knowledge base and of course, there’s much more information available in the net. it’ll be a good idea to get a hold of any rdbms fundamentals text book, especially the one by c. j. date. most of the times, it will be okay if you can explain till third normal form.
as the name indicates, denormalization is the reverse process of normalization. it’s the controlled introduction of redundancy in to the database design. it helps improve the query performance as the number of joins could be reduced.
how do you implement one-to-one, one-to-many and many-to-many relationships while designing tables? o
one-to-one relationship can be implemented as a single table and rarely as two tables with primary and foreign key relationships. one-to-many relationships are implemented by splitting the data into
two tables with primary key and foreign key relationships. many-to-many relationships are implemented using a junction table with the keys from both the tables forming the composite primary key of the junction table. it will be a good idea to read up a database designing fundamentals text book. •
what’s the difference between a primary key and a unique key? o
•
what are user defined datatypes and when you should go for them? o
•
a candidate key is one that can identify each row of a table uniquely. generally a candidate key becomes the primary key of the table. if the table has more than one candidate key, one of them will become the primary key, and the rest are called alternate keys. a key formed by combining at least two or more columns is called composite key.
what are defaults? is there a column to which a default can’t be bound? o
•
bit datatype is used to store boolean information like 1 or 0 (true or false). untill sql server 6.5 bit datatype could hold either a 1 or 0 and there was no support for null. but from sql server 7.0 onwards, bit datatype can represent a third state, which is null.
define candidate key, alternate key, composite key. o
•
user defined datatypes let you extend the base sql server datatypes by providing a descriptive name, and format to the database. take for example, in your database, there is a column called flight_num which appears in many tables. in all these tables it should be varchar(8). in this case you could create a user defined datatype called flight_num_type of varchar(8) and use it across all your tables. see sp_addtype, sp_droptype in books online.
what is bit datatype and what’s the information that can be stored inside a bit column? o
•
both primary key and unique enforce uniqueness of the column on which they are defined. but by default primary key creates a clustered index on the column, where are unique creates a nonclustered index by default. another major difference is that, primary key doesn’t allow nulls, but unique key allows one null only.
a default is a value that will be used by a column, if no value is supplied to that column while inserting data. identity columns and timestamp columns can’t have defaults bound to them. see create default in books online.
what is a transaction and what are acid properties? o
a transaction is a logical unit of work in which, all the steps must be performed or none. acid stands for atomicity, consistency, isolation, durability. these are the properties of a transaction. for more information and explanation of these properties, see sql server books online or any rdbms fundamentals text book. explain different isolation levels an isolation level determines the degree of isolation of data between concurrent transactions. the default sql server isolation level is read committed. here are the other isolation levels (in the ascending order of isolation): read uncommitted, read committed, repeatable read, serializable. see sql server books online for an explanation of the isolation levels. be sure to read about set transaction isolation level, which lets you customize the isolation level at the connection level. read committed - a transaction operating at the read committed level cannot see changes made by other transactions until those transactions are committed. at this
level of isolation, dirty reads are not possible but nonrepeatable reads and phantoms are possible. read uncommitted - a transaction operating at the read uncommitted level can see uncommitted changes made by other transactions. at this level of isolation, dirty reads, nonrepeatable reads, and phantoms are all possible. repeatable read - a transaction operating at the repeatable read level is guaranteed not to see any changes made by other transactions in values it has already read. at this level of isolation, dirty reads and nonrepeatable reads are not possible but phantoms are possible. serializable - a transaction operating at the serializable level guarantees that all concurrent transactions interact only in ways that produce the same effect as if each transaction were entirely executed one after the other. at this isolation level, dirty reads, nonrepeatable reads, and phantoms are not possible. •
create index myindex on mytable(mycolumn)what type of index will get created after executing the above statement? o
•
what’s the maximum size of a row? o
•
8060 bytes. don’t be surprised with questions like ‘what is the maximum number of columns per table’. 1024 columns per table. check out sql server books online for the page titled: "maximum capacity specifications". explain active/active and active/passive cluster configurations hopefully you have experience setting up cluster servers. but if you don’t, at least be familiar with the way clustering works and the two clusterning configurations active/active and active/passive. sql server books online has enough information on this topic and there is a good white paper available on microsoft site. explain the architecture of sql server this is a very important question and you better be able to answer it if consider yourself a dba. sql server books online is the best place to read about sql server architecture. read up the chapter dedicated to sql server architecture.
what is lock escalation? o
•
non-clustered index. important thing to note: by default a clustered index gets created on the primary key, unless specified otherwise.
lock escalation is the process of converting a lot of low level locks (like row locks, page locks) into higher level locks (like table locks). every lock is a memory structure too many locks would mean, more memory being occupied by locks. to prevent this from happening, sql server escalates the many fine-grain locks to fewer coarse-grain locks. lock escalation threshold was definable in sql server 6.5, but from sql server 7.0 onwards it’s dynamically managed by sql server.
what’s the difference between delete table and truncate table commands? o
delete table is a logged operation, so the deletion of each row gets logged in the transaction log, which makes it slow. truncate table also deletes all the rows in a table, but it won’t log the deletion of each row, instead it logs the deallocation of the data pages of the table, which makes it faster. of course, truncate table can be rolled back. truncate table is functionally identical to delete statement with no where clause: both remove all rows in the table. but truncate table is faster and uses fewer system and transaction log resources than delete. the delete statement removes rows one at a time and records an entry in the transaction log for each deleted row. truncate table removes the data by deallocating the data pages used to store the table’s data, and only the page deallocations are recorded in the transaction log. truncate table removes all rows from a table, but the table structure and its columns, constraints, indexes and so on remain. the counter used by an identity for new rows is reset to the seed for the column. if you want to retain the identity counter, use delete instead. if you want to remove table definition and its data, use the drop table statement. you cannot use truncate table on a
table referenced by a foreign key constraint; instead, use delete statement without a where clause. because truncate table is not logged, it cannot activate a trigger. truncate table may not be used on tables participating in an indexed view •
explain the storage models of olap o
•
what are the new features introduced in sql server 2000 (or the latest release of sql server at the time of your interview)? what changed between the previous version of sql server and the current version? o
•
indexes in sql server are similar to the indexes in books. they help sql server retrieve the data quicker. indexes are of two types. clustered indexes and non-clustered indexes. when you create a clustered index on a table, all the rows in the table are stored in the order of the clustered index key. so, there can be only one clustered index per table. non-clustered indexes have their own storage separate from the table data storage. non-clustered indexes are stored as b-tree structures (so do clustered indexes), with the leaf level nodes having the index key and it’s row locater. the row located could be the rid or the clustered index key, depending up on the absence or presence of clustered index on the table. if you create an index on each column of a table, it improves the query performance, as the query optimizer can choose from all the existing indexes to come up with an efficient execution plan. at the same t ime, data modification operations (such as insert, update, delete) will become slow, as every time data changes in the table, all the indexes need to be updated. another disadvantage is that, indexes need disk space, the more indexes you have, more disk space is used.
what is raid and what are different types of raid configurations? o
•
constraints enable the rdbms enforce the integrity of the database automatically, without needing you to create triggers, rule or defaults. types of constraints: not null, check, unique, primary key, foreign key. for an explanation of these constraints see books online for the pages titled: "constraints" and "create table", "alter table"
what is an index? what are the types of indexes? how many clustered indexes can be created on a table? i create a separate index on each column of a table. what are the advantages and disadvantages of this approach? o
•
this question is generally asked to see how current is your knowledge. generally there is a section in the beginning of the books online titled "what’s new", which has all such information. of course, reading just that is not enough, you should have tried those things to better answer the questions. also check out the section titled "backward compatibility" in books online which talks about the changes that have taken place in the new version.
what are constraints? explain different types of constraints. o
•
check out molap, rolap and holap in sql server books online for more infomation.
raid stands for redundant array of inexpensive disks, used to provide fault tolerance to database servers. there are six raid levels 0 through 5 offering different levels of performance, fault tolerance. msdn has some information about raid levels and for detailed information, check out the raid advisory board’s homepage
what are the steps you will take to improve performance of a poor performing query? o
this is a very open ended question and there could be a lot of reasons behind the poor performance of
a query. but some general issues that you could talk about would be: no indexes, table scans, missing or out of date statistics, blocking, excess recompilations of stored procedures, procedures and triggers without set nocount on, poorly written query with unnecessarily complicated joins, too much normalization, excess usage of cursors and temporary tables. some of the tools/ways that help you troubleshooting performance problems are: set showplan_all on, set showplan_text on, set statistics io on, sql server profiler, windows nt /2000 performance monitor, graphical execution plan in query analyzer. download the white paper on performance tuning sql server from microsoft web site. don’t forget to check out sql-server-performance.com •
what are the steps you will take, if you are tasked with securing an sql server? o
•
what is a deadlock and what is a live lock? how will you go about resolving deadlocks? o
•
blocking happens when one connection from an application holds a lock and a second connection requires a conflicting lock type. this forces the second connection to wait, blocked on the first. read up the following topics in sql server books online: understanding and avoiding blocking, coding efficient transactions. explain create database syntax many of us are used to creating databases from the enterprise manager or by just issuing the command: create databae mydb.
but what if you have to create a database with two file groups, one on drive c and the other on drive d with log on drive e with an initial size of 600 mb and with a growth factor of 15%? o
•
deadlock is a situation when two processes, each having a lock on one piece of data, attempt to acquire a lock on the other’s piece. each process would wait indefinitely for the other to release the lock, unless one of the user processes is terminated. sql server detects deadlocks and terminates one user’s process. a livelock is one, where a request for an exclusive lock is repeatedly denied because a series of overlapping shared locks keeps interfering. sql server detects the situation after four denials and refuses further shared locks. a livelock also occurs when read transactions monopolize a table or page, forcing a write transaction to wait indefinitely. check out set deadlock_priority and "minimizing deadlocks" in sql server books online. also check out the article q169960 from microsoft knowledge base.
what is blocking and how would you troubleshoot it? o
•
again this is another open ended question. here are some things you could talk about: preferring nt authentication, using server, databse and application roles to control access to the data, securing the physical database files using ntfs permissions, using an unguessable sa password, restricting physical access to the sql server, renaming the administrator account on the sql server computer, disabling the guest account, enabling auditing, using multiprotocol encryption, setting up ssl, setting up firewalls, isolating sql server from the web server etc. read the white paper on sql server security from microsoft website. also check out my sql server security best practices
that’s why being a dba you should be familiar with the create database syntax. check out sql server books online for more information.
how to restart sql server in single user mode? how to start sql server in minimal configuration mode? o
sql server can be started from command line, using the sqlservr.exe. this exe has some very important parameters with which a dba should be familiar with. -m is used for starting sql server in single user mode and -f is used to start the sql server in minimal configuration mode. check out sql server books online for more parameters and their explanations.
•
as a part of your job, what are the dbcc commands that you commonly use for database maintenance? o
•
what are statistics, under what circumstances they go out of date, how do you update them? o
•
replication is the process of copying/moving data between databases on the same or different servers. sql server supports the following types of replication scenarios: snapshot replication transactional replication (with immediate updating subscribers, with queued updating subscribers) merge replication see sql server books online for indepth coverage on replication. be prepared to explain how different replication agents function, what are the main system tables used in replication etc.
how to determine the service pack currently installed on sql server? o
•
types of backups you can create in sql sever 7.0+ are full database backup, differential database backup, transaction log backup, filegroup backup. check out the backup and restore commands in sql server books online. be prepared to write the commands in your interview. books online also has information on detailed backup/restore architecture and when one should go for a particular kind of backup.
what is database replication? what are the different types of replication you can set up in sql server? o
•
there are lots of options available, you have to choose your option depending upon your requirements. some of the options you have are: backup/restore, dettaching and attaching databases, replication, dts, bcp, logshipping, insert…select, select…into, creating insert scripts to generate data.
explain different types of backups avaialabe in sql server? given a particular scenario, how would you go about choosing a backup plan? o
•
statistics determine the selectivity of the indexes. if an indexed column has unique values then the selectivity of that index is more, as opposed to an index with non-unique values. query optimizer uses these indexes in determining whether to choose an index or not while executing a query. some situations under which you should update statistics: 1) if there is significant change in the key values in the index 2) if a large amount of data in an indexed column has been added, changed, or removed (that is, if the distribution of key values has changed), or the table has been truncated using the truncate table statement and then repopulated 3) database is upgraded from a previous version. look up sql server books online for the following commands: update statistics, stats_date, dbcc show_statistics, create statistics, drop statistics, sp_autostats, sp_createstats, sp_updatestats
what are the different ways of moving data/databases between servers and databases in sql server? o
•
dbcc checkdb, dbcc checktable, dbcc checkcatalog, dbcc checkalloc, dbcc showcontig, dbcc shrinkdatabase, dbcc shrinkfile etc. but there are a whole load of dbcc commands which are very useful for dbas. check out sql server books online for more information.
the global variable @@version stores the build number of the sqlservr.exe, which is used to determine the service pack installed. to know more about this process visit sql server service packs and versions.
what are cursors? explain different types of cursors. what are the disadvantages of cursors? how can you avoid cursors? o
cursors allow row-by-row processing of the resultsets. types of cursors: static, dynamic, forward-only, keyset-driven. see books online for more information. disadvantages of cursors: each time you fetch a
row from the cursor, it results in a network roundtrip, where as a normal select query makes only one roundtrip, however large the resultset is. cursors are also costly because they require more resources and temporary storage (results in more io operations). further, there are restrictions on the select statements that can be used with some types of cursors. most of the times, set based operations can be used instead of cursors. here is an example: if you have to give a flat hike to your employees using the following criteria: salary between 30000 and 40000 — 5000 hike salary between 40000 and 55000 — 7000 hike salary between 55000 and 65000 — 9000 hike. in this situation many developers tend to use a cursor, determine each employee’s salary and update his salary according to the above formula. but the same can be achieved by multiple update statements or can be combined in a single update statement as shown below:
•
o
update tbl_emp set salary = case when salary between 30000 and 40000 then salary + 5000 when salary between 40000 and 55000 then salary + 7000 when salary between 55000 and 65000 then salary + 10000 end
o
another situation in which developers tend to use cursors: you need to call a stored procedure when a column in a particular row meets certain condition. you don’t have to use cursors for this. this can be achieved using while loop, as long as there is a unique key to identify each row. for examples of using while loop for row by row processing, check out the ‘my code library’ section of my site or search for while. write down the general syntax for a select statements covering all the options. here’s the basic syntax: (also checkout select in books online for advanced syntax).
o
select select_list [into new_table_] from table_source [where search_condition] [group by group_by_expression] [having search_condition] [order by order_expression [asc | desc] ]
what is a join and explain different types of joins. o
•
can you have a nested transaction? o
•
yes, very much. check out begin tran, commit, rollback, save tran and @@trancount
what is an extended stored procedure? can you instantiate a com object by using t-sql? o
•
joins are used in queries to explain how different tables are related. joins also let you select data from a table depending upon data from another table. types of joins: inner joins, outer joins, cross joins. outer joins are further classified as left outer joins, right outer joins and full outer joins. for more information see pages from books online titled: "join fundamentals" and "using joins".
an extended stored procedure is a function within a dll (written in a programming language like c, c++ using open data services (ods) api) that can be called from t-sql, just the way we call normal stored procedures using the exec statement. see books online to learn how to create extended stored procedures and how to add them to sql server. yes, you can instantiate a com (written in languages like vb, vc++) object from t-sql by using sp_oacreate stored procedure. also see books online for sp_oamethod, sp_oagetproperty, sp_oasetproperty, sp_oadestroy. for an example of creating a com object in vb and calling it from t-sql, see ‘my code library’ section of this site.
what is the system function to get the current user’s user id? o
user_id(). also check out other system functions like user_name(), system_user, session_user, current_user, user, suser_sid(), host_name().
•
what are triggers? how many triggers you can have on a table? how to invoke a trigger on demand? o
•
there is a trigger defined for insert operations on a table, in an oltp system. the trigger is written to instantiate a com object and pass the newly insterted rows to it for some custom processing. what do you think of this implementation? can this be implemented better? o
•
triggers are special kind of stored procedures that get executed automatically when an insert, update or delete operation takes place on a table. in sql server 6.5 you could define only 3 triggers per table, one for insert, one for update and one for delete. from sql server 7.0 onwards, this restriction is gone, and you could create multiple triggers per each action. but in 7.0 there’s no way to control the order in which the triggers fire. in sql server 2000 you could specify which trigger fires first or fires last using sp_settriggerorder. triggers can’t be invoked on demand. they get triggered only when an associated action (insert, update, delete) happens on the table on which they are defined. triggers are generally used to implement business rules, auditing. triggers can also be used to extend the referential integrity checks, but wherever possible, use constraints for this purpose, instead of triggers, as constraints are much faster. till sql server 7.0, triggers fire only after the data modification operation happens. so in a way, they are called post triggers. but in sql server 2000 you could create pre triggers also. search sql server 2000 books online for instead of triggers. also check out books online for ‘inserted table’, ‘deleted table’ and columns_updated()
instantiating com objects is a time consuming process and since you are doing it from within a trigger, it slows down the data insertion process. same is the case with sending emails from triggers. this scenario can be better implemented by logging all the necessary data into a separate table, and have a job which periodically checks this table and does the needful.
what is a self join? explain it with an example. o
self join is just like any other join, except that two instances of the same table will be joined in the query. here is an example: employees table which contains rows for normal employees as well as managers. so, to find out the managers of all the employees, you need a self join.
o
create table emp ( empid int, mgrid int, empname char(10) )
o
insert emp select 1,2,’vyas’ insert emp select 2,3,’mohan’ insert emp select 3,null,’shobha’ insert emp select 4,2,’shridhar’ insert emp select 5,2,’sourabh’
o
select t1.empname [employee], t2.empname [manager] from emp t1, emp t2 where t1.mgrid = t2.empid here’s an advanced query using a left outer join that even returns the employees without managers (super bosses)
o
select t1.empname [employee], coalesce(t2.empname, ‘no manager’) [manager] from emp t1 left outer join emp t2 on t1.mgrid = t2.empid
•
what is normalization? - well a relational database is basically composed of tables that contain related data. so the process of organizing this data into tables is actually referred to as normalization.
•
what is a stored procedure? - its nothing but a set of t-sql statements combined to perform a single task of several tasks. its basically like a macro so when you invoke the stored procedure, you actually run a set of statements.
•
can you give an example of stored procedure? - sp_helpdb , sp_who2, sp_renamedb are a set of system defined stored procedures. we can also have user defined stored procedures which can be called in similar way.
•
what is a trigger? - triggers are basically used to implement business rules. triggers is also similar to stored procedures. the difference is that it can be activated when data is added or edited or deleted from a table in a database.
•
what is a view? - if we have several tables in a db and we want to view only specific columns from specific tables we can go for views. it would also suffice the needs of security some times allowing specfic users to see only specific columns based on the permission that we can configure on the view. views also reduce the effort that is required for writing queries to access specific columns every time.
•
what is an index? - when queries are run against a db, an index on that db basically helps in the way the data is sorted to process the query for faster and data retrievals are much faster when we have an index.
•
what are the types of indexes available with sql server? - there are basically two types of indexes that we use with the sql server. clustered and the non-clustered.
•
what is the basic difference between clustered and a non-clustered index? - the difference is that, clustered index is unique for any given table and we can have only one clustered index on a table. the leaf level of a clustered index is the actual data and the data is resorted in case of clustered index. whereas in case of nonclustered index the leaf level is actually a pointer to the data in rows so we can have as many non-clustered indexes as we can on the db.
•
what are cursors? - well cursors help us to do an operation on a set of data that we retreive by commands such as select columns from table. for example : if we have duplicate records in a table we can remove it by declaring a cursor which would check the records during retreival one by one and remove rows which have duplicate values.
•
when do we use the update_statistics command? - this command is basically used when we do a large processing of data. if we do a large amount of deletions any modification or bulk copy into the tables, we need to basically update the indexes to take these changes into account. update_statistics updates the indexes on these tables accordingly.
•
which tcp/ip port does sql server run on? - sql server runs on port 1433 but we can also change it for better security.
•
from where can you change the default port? - from the network utility tcp/ip properties –> port number.both on client and the server.
•
can you tell me the difference between delete & truncate commands? - delete command removes the rows from a table based on the condition that we provide with a where clause. truncate will actually remove all the rows from a table and there will be no data in the table after we run the truncate command.
•
can we use truncate command on a table which is referenced by foreign key? - no. we cannot use truncate command on a table with foreign key because of referential integrity.
•
what is the use of dbcc commands? - dbcc stands for database consistency checker. we use these commands to check the consistency of the databases, i.e., maintenance, validation task and status checks.
•
can you give me some dbcc command options?(database consistency check) - dbcc checkdb - ensures that
tables in the db and the indexes are correctly linked.and dbcc checkalloc - to check that all pages in a db are correctly allocated. dbcc sqlperf - it gives report on current usage of transaction log in percentage. dbcc checkfilegroup - checks all tables file group for any damage. •
what command do we use to rename a db? - sp_renamedb ‘oldname’ , ‘newname’
•
well sometimes sp_reanmedb may not work you know because if some one is using the db it will not accept this command so what do you think you can do in such cases? - in such cases we can first bring to db to single user using sp_dboptions and then we can rename that db and then we can rerun the sp_dboptions command to remove the single user mode.
•
what is the difference between a having clause and a where clause? - having clause is basically used only with the group by function in a query. where clause is applied to each row before they are part of the group by function in a query.
•
what do you mean by collation? - collation is basically the sort order. there are three types of sort order dictionary case sensitive, dictonary - case insensitive and binary.
•
what is a join in sql server? - join actually puts data from two or more tables into a single result set.
•
can you explain the types of joins that we can have with sql server? - there are three types of joins: inner join, outer join, cross join
•
when do you use sql profiler? - sql profiler utility allows us to basically track connections to the sql server and also determine activities such as which sql scripts are running, failed jobs etc..
•
what is a linked server? - linked servers is a concept in sql server by which we can add other sql server to a group and query both the sql server dbs using t-sql statements.
•
can you link only other sql servers or any database servers such as oracle? - we can link any server provided we have the ole-db provider from microsoft to allow a link. for oracle we have a ole-db provider for oracle that microsoft provides to add it as a linked server to the sql server group.
•
which stored procedure will you be running to add a linked server? - sp_addlinkedserver, sp_addlinkedsrvlogin
•
what are the os services that the sql server installation adds? - ms sql server service, sql agent service, dtc (distribution transac co-ordinator)
•
can you explain the role of each service? - sql server - is for running the databases sql agent - is for automation such as jobs, db maintanance, backups dtc - is for linking and connecting to other sql servers
•
how do you troubleshoot sql server if its running very slow? - first check the processor and memory usage to see that processor is not above 80% utilization and memory not above 40-45% utilization then check the disk utilization using performance monitor, secondly, use sql profiler to check for the users and current sql activities and jobs running which might be a problem. third would be to run update_statistics command to update the indexes
•
lets say due to n/w or security issues client is not able to connect to server or vice versa. how do you troubleshoot? - first i will look to ensure that port settings are proper on server and client network utility for connections. odbc is properly configured at client end for connection ——makepipe & readpipe are utilities to check for connection. makepipe is run on server and readpipe on client to check for any connection issues.
•
what are the authentication modes in sql server? - windows mode and mixed mode (sql & windows).
•
where do you think the users names and passwords will be stored in sql server? - they get stored in master db in the sysxlogins table.
•
what is log shipping? can we do logshipping with sql server 7.0 - logshipping is a new feature of sql server 2000. we should have two sql server - enterprise editions. from enterprise manager we can configure the logshipping. in logshipping the transactional log file from one server is automatically updated into the backup database on the other server. if one server fails, the other server will have the same db and we can use this as the dr (disaster recovery) plan.
•
let us say the sql server crashed and you are rebuilding the databases including the master database what procedure to you follow? - for restoring the master db we have to stop the sql server first and then from command line we can type sqlserver –m which will basically bring it into the maintenance mode after which we can restore the master db.
•
let us say master db itself has no backup. now you have to rebuild the db so what kind of action do you take? - (i am not sure- but i think we have a command to do it).
•
what is bcp? when do we use it? - bulkcopy is a tool used to copy huge amount of data from tables and views. but it won’t copy the structures of the same.
•
what should we do to copy the tables, schema and views from one sql server to another? - we have to write some dts packages for it.