1.Explain hidden shares.
Hidden or administrative shares are share names with a dollar sign ($) appended to their names. Administrative shares are usually created automatically for the root of each drive letter. They do not display in the network browse list.
2.How do the permissions work in Windows 2000?
What permissions does folder inherit from the parent?
When you combine NTFS permissions based on users and their group memberships, the least restrictive permissions take precedence. However, explicit Deny entries always override Allow entries.
3.Why can’t I encrypt a compressed file on Windows 2000?
You can either compress it or encrypt it, but not both.
4.If I rename an account, what must I do to make sure the renamed account has the same permissions as the original one?
Nothing, it’s all maintained automatically.
5.What’s the most powerful group on a Windows system?
Administrators.
6.What are the accessibility features in Windows 2000?
Sticky Keys, Filter Keys Narrator, Magnifier, and On-Screen Keyboard.
7.Why can’t I get to the Fax Service Management console?
You can only see it if a fax had been installed.
8.What do I need to ensure before deploying an application via a Group Policy?
Make sure it’s either an MSI file, or contains a ZAP file for Group Policy.
9.How do you configure mandatory profiles?
Rename ntuser.dat to ntuser.man
10.How to get multiple displays to work in Windows 2000?
Multiple displays have to use peripheral connection interface (PCI) or Accelerated Graphics Port (AGP) port devices to work properly with Windows 2000.
11.What’s a maximum number of processors Win2k supports?
2
12.I had some NTFS volumes under my Windows NT installation. What happened to NTFS after Win 2k installation?
It got upgraded to NTFS 5.
13.How do you convert a drive from FAT/FAT32 to NTFS from the command line?
convert c: /fs:ntfs
14. Explain APIPA.
Auto Private IP Addressing (APIPA) takes effect on Windows 2000 Professional computers if no DHCP server can be contacted. APIPA assigns the computer an IP address within the range of 169.254.0.0 through 169.254.255.254 with a subnet mask of 255.255.0.0.
15.How does Internet Connection Sharing work on Windows 2000?
Internet Connection Sharing (ICS) uses the DHCP Allocator service to assign dynamic IP addresses to clients on the LAN within the range of 192.168.0.2 through 192.168.0.254. In addition, the DNS Proxy service becomes enabled when you implement ICS.
16What is Active Directory schema?
The Active Directory schema contains formal definitions of every object class that can be created in an Active Directory forest it also contains formal definitions of every attribute that can exist in an Active Directory object.
Active Directory stores and retrieves information from a wide variety of applications and services.
16.What is Global Catalog Server?
A global catalog server is a domain controller it is a master searchable database that contains information about every object in every domain in a forest. The global catalog contains a complete replica of all objects in Active Directory for its host domain, and contains a partial replica of all objects in Active Directory for every other domain in the forest. It have two important functions:
•Provides group membership information during logon and authentication
•Helps users locate resources in Active Directory
17.What is the ntds.tit file default size?
40 MB
18.Describe how the DHCP lease is obtained.
It’s a four-step process consisting of
(a) IP request
(b) IP offer
(C) IP selection
(d) acknowledgement.
19. We’ve installed a new Windows-based DHCP server, however, the users do not seem to be getting DHCP leases off of it.
The server must be authorized first with the Active Directory.
20.How can you force the client to give up the dhcp lease if you have access to the client PC?
ipconfig /release
21. What authentication options do Windows 2000 Servers have for remote clients?
PAP, SPAP, CHAP, MS-CHAP and EAP.
22. What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP/IP?
NWLink (Novell), NetBEUI, AppleTalk (Apple).
23. What is data link layer in the OSI reference model responsible for?
Data link layer is located above the physical layer, but below the network layer. Taking raw data bits and packaging them into frames. The network layer will be responsible for addressing the frames, while the physical layer is reponsible for retrieving and sending raw data bits.
24.What is binding order?
The order by which the network protocols are used for client-server communications. The most frequently used protocols should be at the top.
25.How do cryptography-based keys ensure the validity of data transferred across the network?
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
26.Should we deploy IPSEC-based security or certificate-based security?
They are really two different technologies. IPSec secures the TCP/IP communication and protects the integrity of the packets. Certificate-based security ensures the validity of authenticated clients and servers.
27.What is LMHOSTS file?
It’s a file stored on a host machine that is used to resolve NetBIOS to specific IP addresses.
28.What’s the difference between forward lookup and reverse lookup in DNS?
Forward lookup is name-to-address, the reverse lookup is address-to-name.
29.How can you recover a file encrypted using EFS?
Use the domain recovery agent.