Windows Server2000 Administration Questions

1.Explain hidden shares.

Hidden or administrative shares are share names with a dollar sign ($) appended to their names. Administrative shares are usually created automatically for the root of each drive letter. They do not display in the network browse list.

2.How do the permissions work in Windows 2000?

What permissions does folder inherit from the parent?

When you combine NTFS permissions based on users and their group memberships, the least restrictive permissions take precedence. However, explicit Deny entries always override Allow entries.

3.Why can’t I encrypt a compressed file on Windows 2000?

You can either compress it or encrypt it, but not both.

4.If I rename an account, what must I do to make sure the renamed account has the same permissions as the original one?

Nothing, it’s all maintained automatically.

5.What’s the most powerful group on a Windows system?

Administrators.

6.What are the accessibility features in Windows 2000?

Sticky Keys, Filter Keys Narrator, Magnifier, and On-Screen Keyboard.

7.Why can’t I get to the Fax Service Management console?

You can only see it if a fax had been installed.

8.What do I need to ensure before deploying an application via a Group Policy?

Make sure it’s either an MSI file, or contains a ZAP file for Group Policy.

9.How do you configure mandatory profiles?

Rename ntuser.dat to ntuser.man

10.How to get multiple displays to work in Windows 2000?

Multiple displays have to use peripheral connection interface (PCI) or Accelerated Graphics Port (AGP) port devices to work properly with Windows 2000.

11.What’s a maximum number of processors Win2k supports?

2

12.I had some NTFS volumes under my Windows NT installation. What happened to NTFS after Win 2k installation?

It got upgraded to NTFS 5.

13.How do you convert a drive from FAT/FAT32 to NTFS from the command line?

convert c: /fs:ntfs

14. Explain APIPA.

Auto Private IP Addressing (APIPA) takes effect on Windows 2000 Professional computers if no DHCP server can be contacted. APIPA assigns the computer an IP address within the range of 169.254.0.0 through 169.254.255.254 with a subnet mask of 255.255.0.0.

15.How does Internet Connection Sharing work on Windows 2000?

Internet Connection Sharing (ICS) uses the DHCP Allocator service to assign dynamic IP addresses to clients on the LAN within the range of 192.168.0.2 through 192.168.0.254. In addition, the DNS Proxy service becomes enabled when you implement ICS.

16What is Active Directory schema?

The Active Directory schema contains formal definitions of every object class that can be created in an Active Directory forest it also contains formal definitions of every attribute that can exist in an Active Directory object.

Active Directory stores and retrieves information from a wide variety of applications and services.

16.What is Global Catalog Server?

A global catalog server is a domain controller it is a master searchable database that contains information about every object in every domain in a forest. The global catalog contains a complete replica of all objects in Active Directory for its host domain, and contains a partial replica of all objects in Active Directory for every other domain in the forest. It have two important functions:

•Provides group membership information during logon and authentication

•Helps users locate resources in Active Directory

17.What is the ntds.tit file default size?

40 MB

18.Describe how the DHCP lease is obtained.

It’s a four-step process consisting of

(a) IP request

(b) IP offer

(C) IP selection

(d) acknowledgement.

19. We’ve installed a new Windows-based DHCP server, however, the users do not seem to be getting DHCP leases off of it.

The server must be authorized first with the Active Directory.

20.How can you force the client to give up the dhcp lease if you have access to the client PC?

ipconfig /release

21. What authentication options do Windows 2000 Servers have for remote clients?

PAP, SPAP, CHAP, MS-CHAP and EAP.

22. What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP/IP?

NWLink (Novell), NetBEUI, AppleTalk (Apple).

23. What is data link layer in the OSI reference model responsible for?

Data link layer is located above the physical layer, but below the network layer. Taking raw data bits and packaging them into frames. The network layer will be responsible for addressing the frames, while the physical layer is reponsible for retrieving and sending raw data bits.

24.What is binding order?

The order by which the network protocols are used for client-server communications. The most frequently used protocols should be at the top.

25.How do cryptography-based keys ensure the validity of data transferred across the network?

Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.

26.Should we deploy IPSEC-based security or certificate-based security?

They are really two different technologies. IPSec secures the TCP/IP communication and protects the integrity of the packets. Certificate-based security ensures the validity of authenticated clients and servers.

27.What is LMHOSTS file?

It’s a file stored on a host machine that is used to resolve NetBIOS to specific IP addresses.

28.What’s the difference between forward lookup and reverse lookup in DNS?

Forward lookup is name-to-address, the reverse lookup is address-to-name.

29.How can you recover a file encrypted using EFS?

Use the domain recovery agent.

Windows Server 2003 Interview Questions

1. How do you double-boot a Win 2003 server box?
The Boot.ini file is set as read-only, system, and hidden to prevent unwanted editing. To change the Boot.ini timeout and default settings, use the System option in Control Panel from the Advanced tab and select Startup

2.What do you do if earlier application doesn’t run on Windows Server 2003?
When an application that ran on an earlier legacy version of Windows cannot be loaded during the setup function or if it later malfunctions, you must run the compatibility mode function. This is accomplished by right-clicking the application or setup program and selecting Properties –> Compatibility –> selecting the previously supported operating system.

3.If you uninstall Windows Server 2003, which operating systems can you revert to?
Win ME, Win 98, 2000, XP. Note, however, that you cannot upgrade from ME and 98 to Windows Server 2003

4.How do you get to Internet Firewall settings?
Start –> Control Panel –> Network and Internet Connections –> Network Connections

5.What is Active Directory?
Active Directory is a network-based object store and service that locates and manages resources, and makes these resources available to authorized users and groups. An underlying principle of the Active Directory is that everything is considered an object—people, servers, workstations, printers, documents, and devices. Each object has certain attributes and its own security access control list (ACL).

6.Where are the Windows NT Primary Domain Controller (PDC) and its Backup Domain Controller (BDC) in Server 2003?
The Active Directory replaces them. Now all domain controllers share a multimaster peer-to-peer read and write relationship that hosts copies of the Active Directory.

7.How long does it take for security changes to be replicated among the domain controllers?
Security-related modifications are replicated within a site immediately. These changes include account and individual user lockout policies, changes to password policies, changes to computer account passwords, and modifications to the Local Security Authority (LSA).

8.What’s new in Windows Server 2003 regarding the DNS management?
When DC promotion occurs with an existing forest, the Active Directory Installation Wizard contacts an existing DC to update the directory and replicate from the DC the required portions of the directory. If the wizard fails to locate a DC, it performs debugging and reports what caused the failure and how to fix the problem. In order to be located on a network, every DC must register in DNS DC locator DNS records. The Active Directory Installation Wizard verifies a proper configuration of the DNS infrastructure. All DNS configuration debugging and reporting activity is done with the Active Directory Installation Wizard.

9.When should you create a forest?
Organizations that operate on radically different bases may require separate trees with distinct namespaces. Unique trade or brand names often give rise to separate DNS identities. Organizations merge or are acquired and naming continuity is desired. Organizations form partnerships and joint ventures. While access to common resources is desired, a separately defined tree can enforce more direct administrative and security restrictions.

10.How can you authenticate between forests?
Four types of authentication are used across forests:
(1) Kerberos and NTLM network logon for remote access to a server in another forest
(2) Kerberos and NTLM interactive logon for physical logon outside the user’s home forest
(3) Kerberos delegation to N-tier application in another forest
(4) user principal name (UPN) credentials.

11.What snap-in administrative tools are available for Active Directory?
Active Directory Domains and Trusts Manager, Active Directory Sites and Services Manager, Active Directory Users and Group Manager, Active Directory Replication (optional, available from the Resource Kit), Active Directory Schema Manager (optional, available from adminpack)

12.What types of classes exist in Windows Server 2003 Active Directory?
Structural class. The structural class is important to the system administrator in that it is the only type from which new Active Directory objects are created. Structural classes are developed from either the modification of an existing structural type or the use of one or more abstract classes.
Abstract class. Abstract classes are so named because they take the form of templates that actually create other templates (abstracts) and structural and auxiliary classes. Think of abstract classes as frameworks for the defining objects.
Auxiliary class. The auxiliary class is a list of attributes. Rather than apply numerous attributes when creating a structural class, it provides a streamlined alternative by applying a combination of attributes with a single include action.
88 class. The 88 class includes object classes defined prior to 1993, when the 1988 X.500 specification was adopted. This type does not use the structural, abstract, and auxiliary definitions, nor is it in common use for the development of objects in Windows Server 2003 environments.

13.How do you delete a lingering object?
Windows Server 2003 provides a command called Repadmin that provides the ability to delete lingering objects in the Active Directory.

14.What is Global Catalog?
The Global Catalog authenticates network user logons and fields inquiries about objects across a forest or tree. Every domain has at least one GC that is hosted on a domain controller. In Windows 2000, there was typically one GC on every site in order to prevent user logon failures across the network.

15.How is user account security established in Windows Server 2003?
When an account is created, it is given a unique access number known as a security identifier (SID). Every group to which the user belongs has an associated SID. The user and related group SIDs together form the user account’s security token, which determines access levels to objects throughout the system and network. SIDs from the security token are mapped to the access control list (ACL) of any object the user attempts to access.

16.If I delete a user and then create a new account with the same username and password, would the SID and permissions stay the same?
No. If you delete a user account and attempt to recreate it with the same user name and password, the SID will be different.

17.What do you do with secure sign-ons in an organization with many roaming users?
Credential Management feature of Windows Server 2003 provides a consistent single sign-on experience for users. This can be useful for roaming users who move between computer systems. The Credential Management feature provides a secure store of user credentials that includes passwords and X.509 certificates.

18.Anything special you should do when adding a user that has a Mac?
"Save password as encrypted clear text" must be selected on User Properties Account Tab Options, since the Macs only store their passwords that way.

19.What remote access options does Windows Server 2003 support?
Dial-in, VPN, dial-in with callback.

20.Where are the documents and settings for the roaming profile stored?
All the documents and environmental settings for the roaming user are stored locally on the system, and, when the user logs off, all changes to the locally stored profile are copied to the shared server folder. Therefore, the first time a roaming user logs on to a new system the logon process may take some time, depending on how large his profile folder is.

21.Where are the settings for all the users stored on a given machine?
C:\Document and Settings\All Users

22.What languages can you use for log-on scripts?
JavaScript, VBScript, DOS batch files (.com, .bat, or even .exe)

Network Questions - I

1.      What is the difference between TCP and UDP

TCP is a connection oriented protocol, which means that everytime a packet is sent say from host A to B, we will get an acknowledgement. Whereas UDP on the other hand, is a connection less protocol.

Where will it be used : TCP -> Say you have a file transfer and you need to ensure that the file reaches intact, and time is not a factor, in such a case we can use TCP.

UDP-> Media Streaming, question is say you are watching a movie…would you prefer that your movie comes..perfectly….but u need to wait a long time before you see the next frame ?..or would you prefer the movie to keep streaming…Yes…The second option is definely better….This is when we need UDP

2.      What is a MAC address?

MAC is a machines Physical address, The internet is addressed based on a logical addressing approach. Say, when the packet reaches say the bridge connection a LAN, the question is..how does it identify, which computer it needs to send the packet to. For this it uses the concept of ARP, Address Resolution Protocol, which it uses over time to build up a table mapping from the Logical addresses to the Physical addresses. Each computer is identified using its MAC/Physical address ( u can use the ipconfig -all option to get ur MAC address).

3.      What is MTU?

The MTU is the “Maximum Transmission Unit” used by the TCP protocol. TCP stands for Transmission Control Prototcol. The MTU determines the size of packets used by TCP for each transmission of data. Too large of an MTU size may mean retransmissions if the packet encounters a router along its route that can’t handle that large a packet. Too small of an MTU size means relatively more overhead and more acknowledgements that have to be sent and handled. The MTU is rated in “octets” or groups of 8 bits. The so-called “official” internet standard MTU is 576, but the standard rating for ethernet is an MTU of 1500.

4.      Difference Between. Switch , Hub, Router..

Hub: 1.it is a layer1 device..used to connect various machine on Lan.
2.It forwards broadcast by default.
3.It supports one collision domain and one broadcast domain.
4.it works on Bus topology resulting less speed.
Switch: 1. A layer2 device.
2. Forward broadcast first time only.
3. one broadcast domain & collision domains depends on no. of ports.
4.It is based on Star Topology giving 100mbps to every pc on Lan.
Router: 1. Does not Broadcast by default.
2. breaks up Broadcast domain.
3. Also called Layer3 switch.

5.      VPN.....
VPN(Virtual Private Network )… these are basically the logical networks on the physical line… you can have many VPN over same line..
Need of VPN arises when your company need to increase the network but don’t want to buy any more switches.. take an eg. your dept. your room is packed with employees and
ur company need to add 4 more persons to ur deptt. what will they do.. the solution is to create VPN’s…you can configure the switch ports in other deptts. and create a specific VLAN of ur deptt. So that the persons can sit there and access to the required pcs.

 

6.      ARP & RARP.....

      Stands for Address Resolution Protocol…whenever a request is sent by a node on one network to the node on another network the Physical address(MAC) is required and for this the IP address need to be flow over the network..whenever a router with that network (IP) gets the msg. the required MAC address is sent through the network this process of converting the IP address to MAC address is Called ARP..and the reverse thats the convertion of the Mac address to the IP address is called RARP ( Reverse Address Resolution Protocol)

 

7.      What is the difference between layer 2 and layer 3 in the OSI model?

Layer 2 is responsible for switching data whereas Layer 3 is responsible for routing the data.

Layer3: With information gathered from user, Internet protocol make one IP packet with source IP and Destination IP and other relevant information. It can then route packet through router to the destination.

Layer2: Soon after it receives IP packet from layer 3, it encapsulate it with frame header (ATM header in case of ATM technology) and send it out for switching. In case of Ethernet it will send data to MAC address there by it can reach to exact destination. 

WINDOWS Shortcut Keys

General Windows Keystrokes

Get Help – F1

Open the Start Menu – WINDOWS LOGO KEY or CTRL+ESC

Switch between Open Applications – ALT+TAB

Open the Shortcut Menu – APPLICATIONS KEY or SHIFT+F10

Minimize all Applications – WINDOWS LOGO KEY+M

Find a File or Folder from Desktop – F3

Move to First Item on the Taskbar – WINDOWS LOGO KEY+TAB

Open Windows Explorer – WINDOWS LOGO KEY+E

Open Run Dialog – WINDOWS LOGO KEY+R

Application Keystrokes

Exit the Active Application – ALT+F4

     Open the Application Control Menu – ALT+SPACEBAR

      Move to the Menu Bar – ALT

      Move between Menus – ALT, ARROW KEYS

      Choose a Menu Item – ENTER

      Open a child Window Control Menu – ALT+DASH

Cancel or close a Menu – ESC or ALT

Working in Dialog Boxes

Move through Dialog Controls – TAB

Move Backward through Dialog Controls – SHIFT+TAB

Move to Another Page – CTRL+TAB

Reverse Direction through Pages – CTRL+SHIFT+TAB

Select/Deselect in List View – SPACEBAR or CTRL+SPACEBAR

Toggle a Check Box ON/OFF – SPACEBAR

Working with Text

       Move One Character Left – LEFT ARROW

       Move One Character Right – RIGHT ARROW

       Move One Word Left – CTRL+LEFT ARROW

       Move One Word Right – CTRL+RIGHT ARROW

       Move to Beginning of Line – HOME

       Move to End of Line – END

       Move One Paragraph Up – CTRL+UP ARROW

       Move One Paragraph Down – CTRL+DOWN ARROW

       Move to Beginning of Document – CTRL+HOME

       Move to End of Document – CTRL+END

       Scroll Up or Down One Screen – PAGE UP or PAGE DOWN

       Select One Character Left – SHIFT+LEFT ARROW

       Select One Character Right – SHIFT+RIGHT ARROW

       Select One Word Left – CTRL+SHIFT+LEFF ARROW

        Select One Word Right – CTRL+SHIFT+RIGHT ARROW 

       Select to Beginning of Line – SHIFT+HOME

       Select to End of Line – SHIFT+END

       Select to Beginning of Document – CTRL+SHIFT+HOME

         Select to End of Document – CTRL+SHIFT+END

         Select All – CTRL+A

         Undo – CTRL+Z

         Delete Current Character – DELETE

         Delete Prior Character  – BACKSPACE

Working in Windows Explorer

Delete Selected File or Folder  – DELETE

Rename Selected File or Folder – F2

Refresh Window – F5

Switch Between Tree View and List View – F6 or TAB

Go Up One Folder Level – BACKSPACE

Open File or Folder Properties – ALT+ENTER

Untruncate Columns in List View – CTRL+NUM PAD PLUS 

Using the Clipboard

Copy Selected File or Text to Clipboard – CTRL+C

Cut Selected File or Text to Clipboard – CTRL+X

Paste Contents of Clipboard – CTRL+V

Windows System Key Combinations

CTRL+ESC - Open Start menu

ALT+TAB - Switch between open programs

ALT+F4 - Quit program

SHIFT+DELETE - Delete items permanently

Windows Program Key Combinations

CTRL+C - Copy

CTRL+X - Cut

CTRL+V - Paste

CTRL+Z - Undo

CTRL+B - Bold

CTRL+U - Underline

CTRL+I - Italic

Mouse Click/Keyboard Modifier Combinations for Shell Objects

SHIFT+RIGHT CLICK - Displays a context menu containing alternative verbs.

SHIFT+DOUBLE CLICK - Runs the alternate default command (the second item on the menu).

ALT+DOUBLE CLICK - Displays properties.

SHIFT+DELETE - Deletes an item immediately without placing it in the Recycle Bin.

General Keyboard-Only Commands

F1 - Starts Windows Help.

F10 - Activates menu bar options.

SHIFT+F10 - Opens a context menu for the selected item. This is the same as right-clicking anobject.

CTRL+ESC - Opens the Start menu. Use the ARROW keys to select an item.

CTRL+ESC, ESC - Selects the Start button. (Press TAB to select quick launch, the taskbar, system tray)

ALT+DOWN ARROW - Opens a drop-down list box.

ALT+TAB - Switch to another running application. Hold down the ALT key and then press the TAB key to view the task-switching window.

Press down and hold the SHIFT key while you insert a CD-ROM to bypass the auto-run feature.

ALT+SPACE - Displays the main window's System menu. From the System menu, you can restore, move, resize, minimize, maximize, or close the window.

ALT+- (ALT+hyphen) - Displays the Multiple Document Interface (MDI) child window's System menu. From the MDI child window's System menu, you can restore, move, resize, minimize, maximize, or close the child window.

CTRL+TAB - Switch to the next child window of a Multiple Document Interface (MDI) application.

ALT+ - Opens the corresponding menu.

ALT+F4 - Closes the current window.

ALT+DOWN ARROW - Opens a drop-down list box.

CTRL+F4 - Closes the current Multiple Document Interface (MDI) window.

ALT+F6 - Switch between multiple windows in the same program. For example, when the Notepad Find dialog box is displayed, ALT+F6 switches between the Find dialog box and the main Notepad window.

Shell Objects and General Folder/Windows Explorer Shortcuts

F2 - Rename object

F3 - Find: All Files

CTRL+X - Cut

CTRL+C - Copy

CTRL+V - Paste

SHIFT+DEL - Delete selection immediately, without moving the item to the Recycle Bin.

ALT+ENTER - Open the property sheet for the selected object.

To Copy a File - Press down and hold the CTRL key while you drag the file to another folder.

To Create a Shortcut - Press down and hold CTRL+SHIFT while you drag a file to the desktop or a folder.

General Folder/Shortcut Control

F4 - Selects the Go To A Different Folder box and moves down the entries in the box (if the toolbar is active in Windows Explorer).

F5 - Refreshes the current window.

F6 - Moves among panes in Windows Explorer.

CTRL+G - Opens the Go To Folder tool (in Windows 95 Windows Explorer only).

CTRL+Z - Undo the last command.

CTRL+A - Select all the items in the current window.

BACKSPACE - Switch to the parent folder.

SHIFT+CLICK - Close Button For folders, close the current folder plus all parent folders.

Windows Explorer Tree Control

Numeric Keypad * - Expands everything under the current selection.

Numeric Keypad + - Expands the current selection.

Numeric Keypad - - Collapses the current selection.

RIGHT ARROW - Expands the current selection if it is not expanded, otherwise goes to the first child.

LEFT ARROW - Collapses the current selection if it is expanded, otherwise goes to the parent.

Property Sheet Control

CTRL+TAB/CTRL+SHIFT+TAB - Move through the property tabs.

Accessibility Shortcuts

Tap SHIFT 5 times - Toggles StickyKeys on and off.

Press down and hold the right SHIFT key for 8 seconds - Toggles FilterKeys on and off.

Press down and hold the NUM LOCK key for 5 seconds - Toggles ToggleKeys on and off.

Left ALT+left SHIFT+NUM LOCK - Toggles MouseKeys on and off.

Left ALT+left SHIFT+PRINT SCREEN - Toggles High Contrast on and off.

Microsoft Natural Keyboard Keys

WINDOWS - Start Menu

WINDOWS+R - Run dialog box

WINDOWS+M - Minimize All

SHIFT+WINDOWS+M - Undo Minimize All

WINDOWS+F1 - Help

WINDOWS+E - Windows Explorer

WINDOWS+F - Find Files or Folders

WINDOWS+D - Minimizes all open windows and displays the desktop

CTRL+WINDOWS+F - Find Computer

CTRL+WINDOWS+TAB - Moves focus from Start, to Quick Launch bar, to System Tray. Use RIGHT ARROW or LEFT ARROW to move focus to items on Quick Launch bar and System Tray

WINDOWS+TAB - Cycle through taskbar buttons

WINDOWS+BREAK - System Properties dialog box

Application key - Displays a context menu for the selected item

Microsoft Natural Keyboard with IntelliType Software Installed

WINDOWS+L - Log off Windows

WINDOWS+P - Opens Print Manager

WINDOWS+C - Opens Control Panel

WINDOWS+V - Opens Clipboard

WINDOWS+K - Opens Keyboard Properties dialog box

WINDOWS+I - Opens Mouse Properties dialog box

WINDOWS+A - Opens Accessibility Options(if installed)

WINDOWS+SPACEBAR - Displays the list of IntelliType Hotkeys

WINDOWS+S - Toggles the CAP LOCK key on and off

Dialog Box Keyboard Commands

TAB - Move to the next control in the dialog box.

SHIFT+TAB - Move to the previous control in the dialog box.

SPACEBAR - If the current control is a button, this clicks the button. If the current control is a check box, this toggles the check box. If the current control is an option button, this selects the option button.

ENTER - Equivalent to clicking the selected button (the button with the outline).

ESC - Equivalent to clicking the Cancel button.

ALT+ - Select menu item.