Mcse Questions

  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Mcse Questions as PDF for free.

More details

  • Words: 1,043
  • Pages: 4
1)What is ADS? Explain? 2)What are FSMO Rules and explian the usefulness of each Rule? 3)Replication between domain servers? 4)Structure of ADS backup including Incrimental, Regular, Differential? 5)Consider one scenario there are one forest and 5 child domain, if forest is down what steps you take to make it up and if one child domain is down what steps you take to trouble shoot this issue. 6)Replication between forest and additional domain controllers? 7)What is DNS.What are types of DNS server and explain forward and reverse DNS ? 8)DHCP, scopes, superscopes and reservations? 9)What are Filesystems and difference between encryption and decription? 10)What is Disk Quota planning and how you configure disk quota? 11)System state backup and restoration? 12)what is GPO and functions if GPO? 13)what is RIS and how can you configure RIS? 14)SUS and client configurations? 15)CA unicenter (SDO, AMO, RCO) how to create package and what packags can be created? 16)Backup Third party like veritas or legatos? 17)Raid levels raid 0, raid 1, raid 5 18)Difference between software and hardware raids? 19)Clustering, difference between hardware and software clustering? 20)How will you promote addition domain controller to forest(tools and utilities)) 21)Terminal server and client configuration? 22)Function of sites and servers in administrative tools? 23)Main function of trust,types of trusts and uses of creating trust? 24)what is trusting(transitive and non transitive? 25)what is one way trusting and 2 ways trusting? 26)structure of trusting? 27)User management in ADS? 28)full function if ntutils? 29)networking products (active components? 30)Differences between 2000,2003,NT 4.0 and 2008 31)what is shadowing 2003? 32)Any server you worked with specification most important like dell store edge 250 ,350 2500 etc 33)check logs in windows?

34)how to check login attempts in windows? 35)how to update registry from command line? 36)what is you current role in your office and daily schedules? 37)what is your strenght and weakness? 38)any knowledgeof unix? 39)Difference between DNS and WINS? 40)Default errors in DNS,,did you find any how did u solved it? 41)how to find which is primarch and child domain? 42)If DHCP fails what happens to client?what back up strategy you will follow? 43)what are features of NTFS? 44)how do you configure VLAN? 45)what is id file? 46)what is nsf? 47)what is ntf? 48)If blue dumps how will you solve the problem? 49)what antivirus server you are using how how you update the client antivrus and how you scan your network when virus attack? 50)What are the projects you worked previously? 51)How do configure print server? 52)what is nslookup command and what we use it? 53)port number for ftp telnet mail http dns dhcp etc 54)difference between hosts and lmhosts files? 55)in DHCP difference between reserved and excluded ips? 56)how to mount network shares from DOS windows? 57)what is global catlog? 58)what are 5 ADS files in winnt directory? 59)what is difference between native mode and mixed mode? 60)what is UPN (user principal name)in trust? 61)any idea about WMI? 62)what is VPN?what is its functions ?how its works and what protocol it uses? 63)Define TCP/IP layers and classes? 64)Formula for calculating subnets? 65)what is PPP and its functions? 66)add and delete a route?

67)why IP forwarding is required? 68)what is netbios? 69)what is ARP and what is its functions? 70)what is forward time out and recursion in DNS? 71)Define FDDN, SOA, NS, MX, CNAME PTR? 72)how to stop DNS from command mode? 73)Define Zone transfer? 74)what is round robin rotation? 75)how to referesh the DNS cache from command mode - ipconfig flush DNS 76)Debug logging enabled or disabled which is best? 77)what is recursive query and automatic query? 78)where is dns.log stored? 79)what is zone delagation? 80)what is Wins forward and Wins reverse? 81)define scavenging stale records? 82)how to view a client resolver cache? 83)how to flush and reset a client resolver cache? 84)how to renew DNS client registration? 85)how to verify a zone delagation? 86)Define the files boot, root.dns, cache.dns and zone?name, dns?

Windows admin interview questions

Describe how the DHCP lease is obtained. It’s a four-step process consisting of (a) IP request, (b) IP offer, © IP selection and (d) acknowledgement.

I can’t seem to access the Internet, don’t have any access to the corporate network and on ipconfig my address is 169.254.*.*. What happened? The 169.254.*.* netmask is assigned to Windows machines running 98/2000/XP if the DHCP server is not available. The name for the technology is APIPA (Automatic Private Internet Protocol Addressing).

We’ve installed a new Windows-based DHCP server, however, the users do not seem to be getting DHCP leases off of it. The server must be authorized first with the Active Directory.

How can you force the client to give up the dhcp lease if you have access to the client PC? ipconfig /release

What authentication options do Windows 2000 Servers have for remote clients? PAP, SPAP, CHAP, MS-CHAP and EAP.

What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP/IP? NWLink (Novell), NetBEUI, AppleTalk (Apple).

What is data link layer in the OSI reference model responsible for? Data link layer is located above the physical layer, but below the network layer. Taking raw data bits and packaging them into frames. The network layer will be responsible for addressing the frames, while the physical layer is reponsible for retrieving and sending raw data bits.

What is binding order? The order by which the network protocols are used for client-server communications. The most frequently used protocols should be at the top.

How do cryptography-based keys ensure the validity of data transferred across the network? Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.

Should we deploy IPSEC-based security or certificate-based security? They are really two different technologies. IPSec secures the TCP/IP communication and protects the integrity of the packets. Certificate-based security ensures the validity of authenticated clients and servers. What is LMHOSTS file? It’s a file stored on a host machine that is used to resolve NetBIOS to specific IP addresses.

What’s the difference between forward lookup and reverse lookup in DNS? Forward lookup is name-to-address, the reverse lookup is address-to-name. How can you recover a file encrypted using EFS? Use the domain recovery agent.

Related Documents

Mcse Questions
June 2020 8
Mcse
June 2020 8
Mcse 2003
May 2020 14
Mcse Notes
November 2019 14