Search Tool Bar

Thursday, February 24, 2011

1. WHAT IS THE DIFFERENCE B/W 2000 & 2003 SERVER

A. WINDOWS 2000 WINDOWS 2003

AD VER 1.0 AD VER 1.1

NTFS VER 5.0 NTFS 5.2

SIZE OF NTDS 16 MB SIZE OF NTDS.DIT 12 MB

DISK QUOTAS DISK QUOTAS

VOLUME SHADOW COPY SERVICES

SOFTWARE UPDATE SERVICES

GP MGMT CONSOLE

MBSA

ADMT

RSOP

IIS 5.0 IIS 6.0

DFS REPLICA DFS TARGET

2. WHAT ARE THE DIFFERENT FLAVOURS IN 2K

WINDOWS 2000 PROFESSIONAL

WINDOWS 2000 SERVER

WINDOWS 2000 ADVANCE SERVER

WINDOWS 2000 DATA CENTER SERVER

3. DIFFERENCES B/W EACH FLAVOUR OF 2K

STANDARD SERVER

ADVANCED SERVER

DATACENTERSERVER

PROFESSIONAL

SUITABILITY

SMALL TO MEDIUM N/W

MEDIUM TO LARGE N/W

EXTREMELY LARGE N/W

WEB DESIGNERS

SMP

4 PROCESSORS

8 PROCESSORS

16 PROCESSORS

2 PROCESSORS

RAM

4 GB

8 GB

64 GB

2 GB

FAULT TOLERANCE

YES

YES

YES

NO

N/W LOAD BALANCE

NO

YES

YES

NO

CLUSTERING

NO

YES

YES

NO

NO. OF NODES

--

4

8

--

4. COMMON FEATURES OF W2K FAMILY

A. ACTIVE DIRECTORY

DDNS NTFS VER 5.0 GROUP POLICY MULTI MASTER REPLICATION

DISK QUOTAS IIS 5.0 INBUILT TS DFS

RRAS DHCP PNP RIS

5. WHAT ARE THE DIFFERENT FLAVOURS IN 2003

WINDOWS 2003 STANDARD EDITION

WINDOWS 2003 ENTERPRISE EDITION

WINDOWS 2003 DATA CENTER SERVER

WINDOWS 2003 WEB EDITION

6. SPECIFIC FEATURES OF WIN 2003 OS FAMILY

STANDARD EDITION

ENTERPRISE

EDITION

DATACENTER

EDITION

WEB EDITION

SUITABILITY

SMALL NETWORKS

MEDIUM TO LARGE

EXTREMELY LARGE

WEB DESIGNERS

SMP

4 PROCESSORS

8 PROCESSORS

64 PROCESSORS

2 PROCESSORS

RAM

4 GB

8 GB

64 GB

2 GB

FAULT TOLERANCE

YES

YES

YES

NO

N/W LOAD BALANCE

NO

YES

YES

NO

CLUSTERING

NO

YES

YES

NO

NO. OF NODES

--

4

8

--

7. HARD WARE REQUIREMENTS FOR 2003

A.

REQUIREMENT

STANDARD EDITION

ENTERPRISE

EDITION

DATACENTER

EDITION

WEB EDITION

MINIMUM CPU SPEED

133 MHZ

133 MHZ FOR X86-BASED COMPUTERS.

733 MHZ FOR ITANIUM-BASED COMPUTERS.

400 MHZ FOR X86-BASED COMPUTERS.

733 MHZ FOR ITANIUM-BASED COMPUTERS.

133 MHZ

RECOMMENDED CPU SPEED

550 MHZ

733 MHZ

733 MHZ

550 MHZ

MINIMUM RAM

128 MB

128 MB

512 MB

128 MB

RECOMMENDED MINIMUM RAM

256 MB

256 MB

1 GB

256 MB

MAXIMUM RAM

4 GB

32 GB FOR X86-BASED COMPUTERS.

64 GB FOR ITANIUM-BASED COMPUTERS.

64 GB FOR X86-BASED COMPUTERS.

512 GB FOR ITANIUM-BASED COMPUTERS.

2 GB

MULTIPROCESSOR SUPPORT

UP TO 4

UP TO 8

MINIMUM 8-WAY MAXIMUM 64

UP TO 2

DISK SPACE FOR SETUP

1.5 GB

1.5 GB FOR X86-BASED COMPUTERS.

2.0 GB FOR ITANIUM-BASED COMPUTERS.

1.5 GB FOR X86-BASED COMPUTERS.

2.0 GB FOR ITANIUM-BASED COMPUTERS.

1.5 GB

8. H/W REQUIREMENTS FOR INSTALLING 2K PRO/STANDARAD /ADV/DATA CENTER

A

REQUIREMENTS

WINDOWS 2000 PROFESSIONAL

WINDOWS 2000 SERVER

WINDOWS 2000 ADVANCE SERVER

WINDOWS 2000 DATA CENTER SERVER

PROCESSOR

PENTIUM 166MHZ

PENTIUM 166MHZ

PENTIUM 166MHZ

PENTIUM 166MHZ

FREE HARD DISK

SPACE

650 MB

950 MB

950 MB

950 MB

RAM

32 MB

64 MB

64 MB

64 MB

RECOMMENDED RAM

64 MB

128 MB

128 MB

256 MB

MAX. RAM

2 GB

4 GB

8 GB

64 GB

NO. OF PROCESSORS

2

4

8

32

9. WHAT ARE THE COMPONENTS OF 2K ARCHITECTURE

A. USER MODE, KERNEL MODE, SUB SYSTEMS, EXECUTIVE SERVICES, KERNEL, HAL

10. WHAT IS AD

A. AN ACTIVE DIRECTORY IS A CENTRALIZED DATABASE WHERE IT CONTAINS INFORMATION ABOUT OBJECTS LIKE, USERS, GROUPS, COMPUTERS, PRINTERS, OUS, CONTACTS AND SHARED FOLDERS.

11. FEATURES OF AD

A. FULLY INTEGRATED SECURITY, INTEGRATION WITH DNS, POLICY BASED ADMINISTRATION, SCALABLE, FLEXIBLE, EXTENSIBLE, INTER OPERABILITY WITH OTHER DIRECTORY SERVICES.

12. WHAT ARE THE COMPONENTS OF AD

A. LOGICAL STRUCTURE: DOMAINS, TREES, FORESTS & OUS

PHYSICAL STRUCTURE: SITES AND DOMAIN CONTROLLERS

13. WHAT IS STRUCTURE OF AD

A. LOGICAL AND PHYSICAL

14. WHAT IS THE PROTOCOL USED BY AD FOR DIRECTORY ACCESS

A. LDAP LIGHT WEIGHT DIRECTORY ACCESS PROTOCOL

15. WHAT ARE THE NAMING CONVENTIONS USED BY LDAP

A. DN-(DISTINGUISHED NAME) RDN-(RELATIVE DISTINGUISHED NAME)

UPN-(USER PRINCIPAL NAME) GUID-(GOLBAL UNIQUE IDENTIFIER)

16. WHAT IS A DOMAIN

A. DOMAIN IS COLLECTION OF COMPUTERS CONNECTED TOGETHER WITH A SERVER AND USERS.

17. WHAT IS WORKGROUP

A. COLLECTION OF COMPUTERS CONNECTED TOGETHER WITHOUT A SERVER (ONLY CLIENTS)

18. WHAT IS A TREE

A. TREE IS A LOGICAL COMPONENT OF AD. IS A COLLECTION OF DOMAINS WHICH SHARE CONTIGUOUS NAME SPACE

19. WHAT IS A FOREST

A. COLLECTION OF TREES WHICH DON’T SHARE CONTIGUOUS NAME SPACE.

20. WHAT IS A SITE

A. SITE IS A PHYSICAL COMPONENT OF AD. GROUP OF TCP/IP SUBNETS CONNECTED WITH A HIGH SPEED WAN LINK.

21. WHAT IS DC

A. SERVER WITH AD INSTALLED

22. WHAT IS A CHILD DC

A. IS A SUB DOMAIN CONTROLLER UNDER ROOT DOMAIN CONTROLLER WHICH SHARE NAME SPACE

23. WHAT IS AN ADDITIONAL DC

A. IT IS A BACKUP SERVER FOR DC

24. HOW TO PROMOTE DC ON A MEMBER SERVER

A. START – RUN – DCPROMO

25. WHAT IS A ROLE OF ADDITIONAL DC

A. IT MAINTAINS BACKUP OF AD TO PROVIDE FAULT TOLERANCE AND NETWORK LOAD BALANCING.

26. A DC CAN HAVE HOW MANY ADDITIONAL DCS

A. ANY NO. OF ADCS

27. WHAT ARE THE ADDITIONAL TOOLS FOUND AFTER INSTALLING A DC

A. ADUC, ADSS, ADDT, DCSP, DSP

28. WHAT ARE DIFF FUNCTIONAL LEVELS OF 2003

A. DOMAIN FUNCTIONAL LEVEL AND FOREST FUNCTIONAL LEVELS

29. WHAT IS A MEMBER SERVER

A. 2000 OF 2003 SERVER WHICH IS A PART OF THE DOMAIN

30. WHAT IS A STANDALONE SERVER

A. SERVER WHICH IS NOT A PART OF DOMAIN

31. WHAT IS AN OBJECT

A. IT IS A REPRESENTATION OF IN ENTITY

32. WHAT ARE THE DIFFERENT OBJECTS IN AD

A. USERS, GROUPS, COMPUTERS, PRINTERS, OUS, CONTACTS AND SHARED FOLDERS

33. WHAT IS A SCHEMA

A. SET OF RULES. SCHEMA IS DESIGN OF AD, DEFINES OBJECTS AND CLASSES

34. WHAT IS AN ATTRIBUTE

A. ATTRIBUTE IS A PIECE OF INFORMATION ABOUT OBJECTS (PROPERTIES OF OBJECTS)

35. WHAT IS A CLASS

A. CLASS IS A COLLECTION OF AD OBJECTS

36. WHAT IS AN FSMO

A. FLEXIBLE SINGLE MASTER OPERATIONS

37. WHAT ARE THE DIFF OPERATIONS MASTER OF 2003

A SCHEMA MASTER, DOMAIN NAMING MASTER, PDC EMULATOR, INFRASTRUCTURE MASTER, RID MASTER

38. WHAT IS A SCHEMA MASTER

A. IS RESPONSIBLE FOR OVER ALL MANAGEMENT, STRUCTURE AND DESIGN OF SCHEMA

ONLY ONE SCHEMA MASTER IN ENTIRE FOREST

39. WHAT IS A DOMAIN NAMING MASTER,

A. IS RESPONSIBLE FOR ADDITION OR REMOVAL OF DOMAINS AND MAINTAINING UNIQUE DOMAIN NAMES, ONLY ONE DN MASTER IN ENTIRE FOREST

40. WHAT IS A PDC EMULATOR

A. IS RESPONSIBLE FOR PROVIDING BACKWARD COMPATIBILITY FOR NT BDCS IN MIXED MODE. IT ACTS LIKE A PDC FOR BDCS. IT UPDATES THE PASSWORD CHANGES, SYNCHRONIZES TIME BETWEEN DCS, ONLY ONE PDC EMULATOR PER DOMAIN.

41. WHAT IS A INFRASTRUCTURE MASTER

A. IS RESPONSIBLE FOR UPDATING USER AND GROUP MEMBERSHIP INFORMATION AND UPDATING GLOBAL CATALOG, ONLY ONE INFRASTRUCTURE MASTER PER DOMAIN

42. WHAT IS A RID MASTER

A. RELATIVE IDENTIFIER IS RESPONSIBLE FOR ASSIGNING UNIQUE IDS TO THE OBJECTS CREATED IN THE AD, ONLY ONE RID MASTER PER DOMAIN

43. WHAT IS FILE SYSTEM

A. FILE SYSTEM PROVIDES THE SERVICES LIKE SAVING, DELETING & COPYING OF FILES & FOLDERS IN A SYSTEMATIC MANNER ON THE HARD DISK

44. WHAT ARE DIFF FS SUPPORTED BY 2000 & 2003

A. FAT, FAT32, NTFS, CDFS & UDFS

46. FEATURES OF NTFS IN 2000 & 2003

A. PROVIDES FILE & FOLDER LEVEL SECURITY, COMPRESSION, ENCRYPTION, REDUCED FRAGMENTATION, HOT FIXING, MAXIMUM PARTITION SIZE : 2 TB, FILE SIZE : UP TO 64 GB, DISK QUOTAS, MOUNTING.

45. NEWLY ADDED NTFS FEATURES IN 2003

A. VOLUME SHADOW COPY SERVICES, MAXIMUM PARTITION SIZE: 16 TB

FILE SIZE CAN BE UP TO 16 TB, RECOVERY LOGGING OF DISK ACTIVITIES

46. WHAT IS THE NTFS VERSION FOR 2000 & 2003

A. VER 5.0 & 5.1 FOR 2000 AND VER 5.2 FOR WIN 2003

47. WHAT ARE THE FILE & FOLDER PERMISSIONS IN 2K

A. FILE PERMISSIONS: FULLCONTROL, MODIFY, READ & EXECUTE, READ, WRITE, SPECIAL PERMISSIONS

FOLDER PERMISSIONS: FULLCONTROL, MODIFY, READ & EXECUTE LIST FOLDER CONTENTS, READ, WRITE, SPECIAL PERMISSIONS

48. WHAT IS THE SIGNIGICANCE OF MODIFY & FULL CONTROL PERMISSIONS

A. FC = RWXDO, MODIFY = RWXD

49. WHAT ARE THE ADVANCED PERMISSIONS AVAILABLE IN 2K

A. COMBINATION OF PERMISSIONS.

50. WHAT ARE THE FILE ATTRIBUTES

A. READ, WRITE, HIDDEN & ARCHIVE.

51. WHAT ARE THE SHARE LEVEL PERMISSIONS

A. FULL CONTROL, CHANGE, READ

52. HOW TO SHARE A RESOURCE (F/F, DRIVE, PRINTER, ETC...)

A. RIGHT CLICK - F/F – PROPERTIES - SHARE

53. SHARE/FILE NAMES CAN BE UPTO

A. SHARE NAME CAN BE UP TO 80 CHARACTERS, FILE NAMES CAN BE UP TO 255 CHARACTERS.

54. HOW TO MAP A SHARED RESOURCE

A. RIGHT CLICK ON THE SHARE AND CLICK MAP NETWORK DRIVE

55. HOW TO CONNECT TO A SHARED RESOURCE USING COMMAND PROMPT

A. START – RUN – CMD - NET USE Z: (\\SYSTEMNAME\SHARENAME)

56. WHAT IS NET USE, NET SHARE, NET VIEW, NET USER ETC

A. NET USE FOR MAPPING DRIVES, NET SHARE FOR CREATING SHARES, NET VIEW FOR USERS LOGGED IN AND NET USER FOR CREATING OR MODIFYING USERS

57. HOW TO SHARE A RESOURCE REMOTELY

A. FROM COMPUTER MANAGEMENT – CONNECT TO THE COMPUTER – SHARED FOLDERS – R/C SHARES- NEW SHARE

58. HOW TO ACCESS A REMOTE SHARE

A. START – RUN – (\\SN\SN) OR MY NETWORK PLACES

59. WHAT IS A QUOTA & ITS FEATURES

A. NEW FEATURE IN 2000 & 2003. QUOTAS ENABLE IN ADMINISTRATOR TO LIMIT THE ACCESS TO THE FREE SPACE ON LOCAL OR SERVER’S HARD DISKS

60. WHAT IS A DFS,

A. DISTRIBUTED FILE SYSTEM ENABLE IN ADMINISTRATOR TO GATHER ALL THE SCATTERED SHARES ON THE NETWORK AND MAINTAIN IN A SINGLE SERVER AND MAKE THEM APPEAR AS IF THEY ARE ON THE SAME SIDE SERVER

61. BENEFITS OF DFS

A. EASY FILE ACCESS, FAULT TOLERANCE, LOAD BALANCING AND SECURITY

63. DFS TERMINOLOGY

A. DOMAIN DFS ROOT, STANDALONE DFS ROOT & DFS LINK

64. DIFF B/W DOMAIN DFS ROOT AND STAND ALONE DFS ROOT

A. DOMAIN DFS ROOT OFFERS FAULT TOLERANCE AND LOAD BALANCING, CAN BE CONFIGURED ONLY ON DC. STAND ALONE DFS ROOT DOES NOT OFFER FT & LB CAN BE CONFIGURED ONLY ON STAND ALONE SERVER

62. WHAT IS A DFS REPLICA OR TARGET

A. IT IS A BACKUP FOR DOMAN DFS ROOT ON ANOTHER SERVER

63. HOW MANY DFS ROOTS CAN EXIST FOR A DC

A. 5000 TO 50000

64. HOW MANY DFS LINKS CAN EXIST FOR A DC

A. 5000 TO 50000

65. NO OF DFS REPLICAS CAN EXIST FOR A DC

A. 31

66. WHAT IS EFS & ITS FEATURES

A. ENCRYPTION IS THE PROCESS OF CONVERTING DATA INTO A FORMAT THAT CANNOT BE READ BY ANOTHER USER. ONCE A USER HAS ENCRYPTED A FILE, THE FILE AUTOMATICALLY REMAINS ENCRYPTED WHENEVER THE FILE IS STORED ON DISK.

DECRYPTION IS THE PROCESS OF CONVERTING DATA FROM ENCRYPTED FORMAT BACK TO ITS ORIGINAL FORMAT. ONCE A USER HAS DECRYPTED A FILE, THE FILE REMAINS DECRYPTED WHENEVER THE FILE IS STORED ON DISK.

67. WHAT IS A TRUST

A. TRUST IS THE PROCESS OF OFFERING OR ACCESSING RESOURCES FROM ONE DOMAIN TO ANOTHER DOMAIN.

68. WHAT IS A TRANSITIVE TRUST

A. IT IS A TWO WAY TRUST

EX. IF A TRUSTS B, B AUTOMATICALLY TRUSTS A

69. WHAT IS A IN/NON TRANSITIVE TRUST

A. IT IS ONE WAY TRUST

EX. IF A TRUSTS B, B DOES NOT TRUST A

70. WHAT IS AN IMPLICIT TRUST

A. TRUST BETWEEN THE PARENT DOMAIN AND GRAND CHILD DOMAIN

71. WHAT IS AN EXPLICIT TRUST

A. IT IS A MANUAL TRUST ESTABLISHED BY ADMINISTRATOR BETWEEN TWO FOREST OR DOMAINS

72. WHAT IS THE DEFAULT TRUST BETWEEN THE PARENT & A CHILD DOMAIN

A. TWO WAY TRANSITIVE TRUST

73. HOW TO IMPLEMENT A TRUST

A. S-P-AT-ADDT-DOMAIN PROPERTIES-TRUST

74. AUTHENTICATION PROTOCOLS OF W2K

A. KERBEROS & NTLM

75. WHAT IS SPOOFING

A.

76. WHAT IS A KDC

A. KEY DISTRIBUTION CENTRE (DC) WHICH ISSUES KEYS TO THE CLIENTS

77. WHAT IS KERBEROS

A. IT IS AN AUTHENTICATION PROTOCOL OF WIN 2000 & 2003

78. WHAT IS NTLM

A. IT IS AN AUTHENTICATION PROTOCOL OF WIN NT

79. AUTHENTICATION PROCESS IN 2000 & 2003

A. 1.CLIENTS SENDS A REQUEST TO DC

B. DC CREATES A CLIENT SESSION KEY & SERVER SESSION KEY.

C. THE SERVER SESSION KEY PACKAGES CLIENT INFORMATION AND SERVER SESSION KEY AND FORMS A SESSION TICKET.

D. CLIENT SESSION KEY AND SESSION TICKET ARE SENT TO THE CLIENT WHICH CONSISTS OF RIGHTS AND PERMISSIONS.

E. THEN THE SERVER VERIFIES THE AUTHENTICATOR BETWEEN THE CLIENT & SERVER

F. ALLOWS THE RESOURCE

80. FEATURES OF KERBEROS

A. INTRODUCED IN THE YEAR 1991 BY MIT (MASSACHUSETTS INSTITUTE OF TECHNOLOGY)

B. WINDOWS 2000 WAS FIRST TO IMPLEMENT THIS PROTOCOL

C. KERBEROS IS A NAME OF 3 HEADED DOG (CERDEROS)

D. IT FALLOWS A 3 HEADED APPROACH WHILE AUTHENTICATING THE USERS

E. IT PROVIDES HIGH LEVEL OF SECURITY

F. IT ENCRYPTS THE USER NAME & PASSWORD WHEN THEY ARE BEING SENT OVER N/W

81. WHAT IS A TIMESTAMP

A. TIME CHECKED WHILE USER LOGS IN

82. WHAT IS A TIME SERVICE

A.

83. WHAT IS TGT & TGS

A.

84. WHAT IS A BASIC DISK & DYNAMIC DISK

A. BASIC DISK REFERS TO PARTITIONS, DYNAMIC REFERS TO VOLUMES

85. WHAT IS A SIMPLE, SPANNED , STRIPPED, MIRRORED AND RAID 5 VOLUME

A. SIMPLE VOLUME : SPACE FROM SINGLE HARD DISK FORMS SIMPLE VOLUME

B. SPANNED VOLUME : FREE SPACE CAN SPAN MORE THAN ONE HARD DISK AND APPEARS AS A SINGLE VOLUME

C. STRIPPED VOLUME: SPACE SELECTION FROM EACH HARD DISK IS IDENTICAL IN SIZE

D. MIRRORED VOLUME: IS AN ADDITIONAL HARD DISK USED FOR IMAGING PRIMARY HARD DISK TO PROTECT THE DATA IN THE SECOND DISK WHEN FIRST DISK FAILS.

86. WHAT IS RAID? RAID0, RAID 1, & RAID5

A. REDUNDANCY ARRAY INEXPENSIVE DISKS : IT IS A STANDARD USED FOR PROTECTING THE DATA

B. RAID0 : STRIPING WITHOUT PARITY OFFERS NO FAULT TOLERANCE

C. RAID1: MIRRORING OFFERS FAULT TOLERANCE, DOESN’T OFFER PERFORMANCE, REQUIRES DOWN TIME.

D. RAID5: STRIPING WITH PARITY OFFERS HIGHEST FAULT TOLERANCE, OFFERS AVAILABILITY AND PERFORMANCE I.E NO DOWN TIME.

87. DRIVES ARE REQUIRED FOR RAID 0,1,5

A. RAID0 : MINIMUM 2 DISKS AND MAXIMUM 32

B. RAID1 : MINIMUM & MAXIMUM 2 DISKS

C. RAID5 : MINIMUM 3 AND MAXIMUM 32

88. WHICH OF THE RAIDS PROVIDE HIGHEST FT

A. RAID 5

89. HOW TO REGENARATE THE DATA LOST FROM RAID 1 & 5

A. BY FIXING NEW HDD SELECTING REGENERATE OPTION BY RIGHT CLICKING ON THE DRIVE FROM DISK MANAGEMENT.

90. PRINT PROCESS IN 2K AND 2003

Application

A.

DOCUMENT TO BE PRINTED HANDED OVER TO GDI




GDI

Print Drivers

GDI INVOKES PRINT DRIVERS AND DRIVERS CONVERT THE DOC FORMAT TO EITHER RAW OR EMF AND HANDS OVER TO THE SPOOLER

Spooler

SPOOLER GATHERS THE DOCUMENT TO THE LOCAL HDD AND HANDS OVER TO PRINT PROCESSOR

Print Processor

PRINT PROCESSOR PRESENTS THE FORMAT TO THE PRINTER WHICH IS UNDERSTANDABLE BY THE PRINTER (RAW) AND HANDS OVER TO PRINT MONITOR

Monitor

PRINT MONITOR DETERMINES THE PORT TO WHICH PRINT DEVICE IS ATTACHED SUBMITS THE DATA TO PRINT DEVICE

Print Device

PRINTS THE OUTPUT

91. WHAT IS A PRINT POOL

A. GROUP OF PRINTERS

92. WHAT IS THE DIFF B/W RAW & EMF FORMAT

A. RAW FORMAT IS THE ONLY FORMAT PRINTER UNDERSTANDS

B. EMF (ENHANCED META FORMAT) IT IS A COMPRESSED FORMAT USED FOR FASTER PRINTING OVER THE N/W.

93. WHAT IS LOCAL PRINTER

A. THE PRINTER WHICH IS DIRECTLY ATTACHED TO THE COMPUTER

95. WHAT IS A NETWORK PRINTER

A. A PRINTER WITH ITS OWN NIC

94. HOW TO CONNECT TO A REMOTE PRINT DEVICE

A. MY NETWORK PLACES, BROWSE THE PRINTERS, R/C CONNECT

95. WHAT ARE THE DEFAULT BUILT IN USER A/CS

A. ADMINISTRATOR AND GUEST A/CS

96. WHAT ARE THE DEFAULT BUILT IN GROUP A/CS

A. ACCOUNT OPERATORS, SERVER OPERATORS, BACKUP OPERATORS, ADMINISTRATORS, PRINT OPERATORS, ETC

97. WHAT IS A LOCAL GROUP

A. A GROUP WHICH CAN BE CREATED ON CLIENT COMPUTER

98. WHAT IS A DOMAIN LOCAL GROUP

A. A GROUP WITH PRE-DEFINED RIGHTS AND PERMISSIONS USED FOR SETTING PERMISSIONS

99. WHAT IS A GLOBAL GROUP

A. IS A COLLECTION OF USERS USED FOR ORGANIZING USERS

100. WHAT IS A GROUP SCOPE

A. GROUP SCOPE IDENTIFIES THE EXTENT OF THE GROUP THAT IT CAN SPAN WITH IN A DOMAIN OR FOREST

101. WHAT IS A UNIVARSAL GROUP

A. GROUP MADE UP OF USERS FROM DIFFERENT DOMAINS

102. WHAT ARE TWO TYPES OF GROUPS

A. DISTRIBUTION, SECURITY

103. WHAT ARE THE USER ENVIRONMENT NEEDS

A. DESKTOP SETTINGS, STARTUP APPLICATIONS & NETWORK CONNECTIVITY

104. WHAT IS A PROFILE

A. PROFILE IS COMBINATION OF USER ENVIRONMENT, DESKTOP ENVIRONMENT

105. WHAT IS A POLICY

A. POLICY IS A FEATURE OF OS WHICH DETERMINES WHICH USER HAS WHAT TYPE OF ACCESS TO THE N/W RESOURCES (WHAT A USER CAN AND CAN’T DO IN A N/W)

106. WHAT ARE THE DIFF POLICIES SUPPORTED IN 2K

A. ACCOUNT, AUDIT, SECURITY AND GROUP POLICY

107. WHAT ARE DIFF TYPES OF PROFILES

A. LOCAL : PROFILE WHICH IS SAVED IN THE LOCAL HDD WHERE THE USER WORKS AVAILABLE ONLY ONE COMPUTER

B. ROAMING : PROFILE WHICH IS SAVED IN THE SERVER AND AVAILABLE IN THE ENTIRE NETWORK

C. MANDATORY : AVAILABLE IN THE ENTIRE N/W BUT SETTING ARE NOT SAVED WHEN A USER LOGS OFF

108. HOW THE PROFILE IS APPLIED

A. WHEN THE USER LOGS IN IS LOADED WITH A LOCAL PROFILE AND N/W PROFILE WHICH EVER IS LATEST TAKES PRECEDENCE

109. HOW THE GROUP POLICY IS APPLIED

A. FIRST COMPUTER POLICY IS APPLIED THEN SITE, DOMAIN AND OU LEVEL

110. DIFF SECURITY POLICES OF 2K

A. LOCAL SECURITY POLICY : WHICH IS LIMITED IN ONLY TO THE LOCAL MACHINE

B. DOMAIN SECURITY POLICY : APPLIES TO ALL THE DOMAINS & COMPUTERS WITH IN THE DOMAIN

C. DOMAIN CONTROLLER SECURITY POLICY : APPLIES POLICIES ONLY TO ONE DOMAIN CONTROLLER

111. WHAT IS A RIGHT

A. IT IS A PERMISSION OR TYPE OF ACCESS WHAT A USER CAN DO AND CAN’T DO

112. WHAT IS A GROUP POLICY

A. IT IS A COMBINATION OF PERMISSIONS, SECURITY AND RIGHTS WHICH CAN BE APPLIED ON SITES, DOMAINS AND OUS

113. WHAT IS A GROUP POLICY OBJECT

A. AN OBJECT WITH A COMBINATION OF PERMISSIONS/POLICIES WHICH CAN BE LINKED WITH SITES, DOMAINS AND OUS

114. HOW TO LINK GPO WITH DC/SITE/OU

A. DC PROPERTIES - GROUP POLICY – NEW – GPO NAME

115. WHAT ARE THE FEATURES OF GROUP POLICY

A. GROUP POLICY OFFERS SECURITY, SOFTWARE DEPLOYMENT, FOLDER REDIRECTION, LOGON LOGOFF SCRIPTS, INTERNET EXPLORER MAINTENANCE, BACK UP AND RESTORE ETC.

116. GP CAN BE IMPLIMENTABLE ON

A. LOCAL COMPUTER, SITES, DOMAINS, DCS AND OUS

117. WHAT IS THE SIGNIFICANCE OF INHERITENCE OF GROUP POLICY

A. WHEN YOU APPLY POLICY ON SITE LEVEL, POLICY GETS INHERITED BY ALL THE DOMAINS AND OUS

118. WHAT IS THE SIGNIFICANCE OF BLOCKING GROUP POLICY INHERITANCE

A. WHEN A CHILD OBJECT NEED NOT BE EFFECTED WITH THE POLICY APPLIED ON THE PARENT

120. WHAT IS THE PURPOSE OF LINKING AN EXISTING GP WITH ANOTHER CONTAINER

A. A SINGLE GPO CAN HAVE MULTIPLE POLICIES SET AND CAN BE LINKED WITH SITES DOMAINS AND OUS. NEED NOT CREATE MULTIPLE GPOS.

119. WHAT IS THE ORDER IN WHICH GPOS ARE APPLIED

A. ALWAYS THE FIRST POLICY IS APPLIED THEN THE SECOND AND SO ON

120. WHAT ARE THE SUBFOLDERS SEEN UNDER COMPUTER CONFIGURATION &

USER CONFIGURATION

A. COMPUTER CONFIGURATION, SOFTWARE SETTING, WINDOWS SETTINGS AND ADMINISTRATIVE TEMPLATES

B. USER CONFIGURATION, SOFTWARE SETTING, WINDOWS SETTINGS AND ADMINISTRATIVE TEMPLATES

121. HOW TO APPLY SECURITY POLICIES USING GP

A. USING LSP, DSP, AND DCSP UNDER ADMIN TOOLS.

122. WHAT IS THE ADVANTAGE OF DEPLOYING SOFTWARES USING GP

A. AUTOMATING, UPGRADING AND REPAIRING SOFTWARE INSTALLATION ONLINE

123. WHAT ARE THE THREE PRIMARY GP SOFTWARE DEPLOYMENT METHODS

A. PUBLISHED, ASSIGNED AND ADVANCED

124. LAN PROTOCOLS SUPPORTED BY 2K

A. NETBEUI, IPX/SPX, TCP/IP, NWLINK, APPLETALK, DECNET

WINDOWS RAS AND ARAP

125. WAN PROTOCOLS SUPPORTED BY 2K & 03

A. SLIP, PPP

126. VPN PROTOCOLS SUPPORTED BY 2K & 03

A. L2F, PPTP AND L2TP

127. DIFF RAS AUTHENTICATION PROTOCOLS

A. PAP, CHAP, MSCHAP AND MSCHAP V2

129 WHAT IS AN ARP

A. ADDRESS RESOLUTION PROTOCOL USED FOR MAPPING IP TO MAC

128. FEATURES OF TCP/IP

A. IT IS A MOST POPULAR LAN AND WAN PROTOCOL

B. SUPPORTED BY MANY OS

C. IT IS A ROUTABLE PROTOCOL

D. IT IS A ROBUST PROTOCOL

E. AVAILABLE IN TWO VERSIONS IP V.4 & IP V.6

129. WHAT IS A SUBNET MASK

A. ACTS LIKE A MASK BETWEEN N/W AND HOST ID OR USED FOR DIFFERENTIATING N/W WITH HOST ID

130. WHAT IS SUBNETTING

A. DIVIDING THE SAME N/W INTO SMALLER SUBNETS

131. WHAT IS A GATEWAY

A. ADDRESS OF A ROUTER

132. WHAT ARE THE DIFF TCP/IP CLASSES

A. A, B, C, D AND E

133. WHAT ARE THE RESERVED IP ADDRESSES

A. 10.0.0.1 TO 10.255.255.254

B. 172.16.0.1 TO 172.31.255.254

C. 192.168.0.1 TO 192.168.255.255

134. WHAT IS ‘IANA’

A. INTERNET ASSIGNED NUMBERING AUTHORITY IS NOW CALLED AS INTERNET CORPORATION FOR ASSIGNING NAMES AND NUMBERS (ICANN)

135. WHAT IS MULTICASTING

A. USE OF CLASS D IPS : USED FOR PUBLISHING THE SAME MESSAGE TO GROUP OF PEOPLE

136. WHAT IS A NETWORK ID

A. 0.0.0.0

137. WHAT IS A BROADCAST ID

A. 255.255.255.255

137. WHAT IS A LOOP BACK ID

A. 127.0.0.1

139. DIFF TROUBLESHOOTING UTILITIES OF TCP/IP

A. PING, IPCONFIG, NBTSTAT, NETSTAT, PATHPING, TRACERT ETC

138. WHAT ARE THE CORE PROTOCOLS OF TCP/IP

A. TCP, UDP, ICMP AND ARP

139. WHAT IS ROUTING

A. PROCESS OF PROVIDING COMMUNICATION BETWEEN TWO DIFFERENT N/WS

140. WHAT IS DIFF BETWEEN STATIC & DYNAMIC ROUTING

A. STATIC ROUTING: DOESN’T REQUIRE ANY PROTOCOLS AND ROUTING TABLE REMAINS STATIC UNTIL ADMIN CHANGES.

B. DYNAMIC ROUTING : USES DYNAMIC ROUTING PROTOCOLS LIKE RIP V2, OSPF, IGMP AND IGRP. ROUTING TABLE GETS CHANGED AUTOMATICALLY OR DYNAMICALLY AS AND WHEN THERE IS A CHANGE IN ROUTING I.E ADDITION OR REMOVAL OF ROUTERS MODIFICATION OF ROUTING TABLE.

141. WHAT ARE THE ROUTING PROTOCOLS

A. OSPF, RIP VER2, NAT, IGMP

142. HOW TO ENABLE ROUTING

A. START-PROGRAMS-ADMIN TOOLS-RRAS-R/C SERVER - CONFIGURE AND ENABLED

143. WHAT IS NATTING

A. ENABLING ONE WAY COMMUNICATION I.E PRIVATE NETWORK CAN COMMUNICATE WITH PUBLIC BUT PUBLIC CAN’T COMMUNICATE WITH PRIVATE.

144. WHAT IS DIFF BETWEEN PRIVATE & PUBLIC IPS

A. IPS WHICH ARE NOT ACCESSIBLE BY ALL ARE CALLED PRIVATE IPS

B. IPS WHICH ARE ACCESSIBLE ARE CALLED PUBLIC IPS.

145. WHICH ORGANIZATION ISSUES PUBLIC IPS

A. ICANN OR IANA

146. WHAT IS SNMP

A. SIMPLE NETWORK MANAGEMENT PROTOCOL: USED FOR TROUBLESHOOTING & MANAGING THE N/W.

147. WHAT IS SMTP

A. SIMPLE MAIL TRANSFER PROTOCOL: USED FOR SENDING MAILS

148. WHAT IS POP/POP3 & IMAP4

A. POST OFFICE PROTOCOL : USED FOR RECEIVING MAILS

B. INTERNET MAIL ACCESS PROTOCOL : USED FOR RECEIVING MAILS

149. DIFF H/W DEVICES SUPPORTED BY RAS

A. PSTN MODEMS, ISDN MODEMS, X.25 PADS, RS232 INTERFACE AND DSL MODEMS

150. WHAT IS DNS

A. DOMAIN NAMING SERVICE OR SYSTEM: USED FOR RESOLVING HOST NAMES TO IPS AND IPS TO HOST NAMES

151. WHAT IS ‘NBNS’

A. NETBIOS NAMING SYSTEM EX: WINS

152. 2K/2003 SYSTEMS ACCESS RESOURCES USING ___NAMING CONVENTIONS

A DNS

153. WHAT IS A FORWARD LOOKUP

A. RESOLVING HOST NAMES TO IP ADDRESSES

154. WHAT IS A REVERSE LOOKUP

A. RESOLVING IP ADDRESSES TO HOST NAMES

155. WHAT IS A HOST RECORD

A. IT’S A FILE CONTAINS HOST NAMES TO IP MAPPING INFORMATION

156. WHAT IS A RESOURCE RECORD

A. IT IS A RECORD PROVIDES THE INFORMATION ABOUT THE RESOURCES AVAILABLE IN THE N/W

INFRASTRUCTURE

157. WHAT ARE THE DIFF DNS ROLES

A. STANDARD PRIMARY, STANDARD SECONDARY & AD INTEGRATED

158. WHAT IS A ZONE

A. ZONE IS A SUB TREE OF DNS DATABASE

159. WHAT IS PRIMARY, SECONDARY, STUB & AD INTEGRATED ZONE

A. PRIMARY: ZONE WHICH IS SAVED AS NORMAL TEXT FILE WITH FILENAME.DNS IN DNS FOLDER. MAINTAINS A READ WRITE COPY OF ZONE DATABASE

B. SECONDARY: MAINTAINS A READ ONLY COPY OF ZONE DATABASE ON ANOTHER DNS SERVER. PROVIDES FAULT TOLERANCE AND LOAD BALANCING BY ACTING AS BACKUP SERVER TO PRIMARY SERVER

C. STUB: CONTAINS A COPY OF NAME SERVER AND SOA RECORDS USED FOR REDUCING THE DNS SEARCH ORDERS. PROVIDES FAULT TOLERANCE AND LOAD BALANCING

D.

160. WHAT DOES A ZONE CONSIST OF & WHY DO WE REQUIRE A ZONE

A. ZONE CONSISTS OF RESOURCE RECORDS AND WE REQUIRE ZONE FOR REPRESENTING SITES

161. WHAT IS CACHING ONLY SERVER

A. WHEN WE INSTALL 2000 & 03 SERVER IT IS CONFIGURED AS CACHING ONLY SERVER WHERE IT MAINTAINS THE FREQUENTLY ACCESSED SITES INFORMATION AND AGAIN WHEN WE ACCESS THE SAME SITE FOR NEXT TIME IT IS OBTAIN FROM CACHED INFORMATION INSTEAD OF GOING TO THE ACTUAL SITE.

162. WHAT IS FORWARDER

A. WHEN ONE DNS SERVER CAN’T RESOLVE THE QUERY IT CAN BE FORWARDED TO ANOTHER DNS ONCE CONFIGURED AS FORWARDER.

163. WHATIS SECONDARY DNS SERVER

A. IT IS BACKUP FOR PRIMARY DNS WHERE IT MAINTAINS A READ ONLY COPY OF DNS DATABASE.

164. HOW TO ENABLE DYNAMIC UPDATES IN DNS

A. S-P-AT-DNS-ZONE PROPERTIES

165. WHAT ARE THE PROPERTIES OF DNS SERVER

A. INTERFACES, FORWARDERS, ADVANCED, ROOTHINTS, SECURITY, MONITORING,

LOGGING, DEBUG LOGINIG.

166. PROPERTIES OF A ZONE

A. GENERAL, SOA, NAMESERVER, WINS, SECURITY AND ZONE TRANSFER

167. WHAT IS SCAVENGING

A. FINDING AND DELETING UNWANTED RECORDS

168. WHAT ARE SRV RECORDS

A. SRV ARE THE SERVICE RECORDS, THERE ARE 6 SERVICE RECORDS. THEY ARE USEFUL FOR LOCATING THE SERVICES

169. WHAT ARE THE TYPES OF SRV RECORDS

A. MSDCS : CONTAINS DCS INFORMATION

B. TCP : CONTAINS GLOBAL CATALOG, KERBEROS AND LDAP INFORMATION

C. UDP : CONTAINS KERBEROS INFORMATION

D. SITES : CONTAINS SITES INFORMATION

E. DOMAIN DNS ZONE : CONTAINS DOMAIN’S DNS SPECIFIC INFORMATION

F. FOREST DNS ZONE : CONTAINS FOREST’S SPECIFIC INFORMATION

170. WHERE DOES A HOST FILE RESIDE

A. C: WINDOWS\SYSTEM32\DRIVERS\ETC

171. WHAT IS AN SOA RECORD

A. START OF AUTHORITY: USEFUL WHEN A ZONE STARTS. PROVIDES THE ZONE STARTUP INFORMATION

172. WHAT IS A QUERY

A. A REQUEST MADE BY THE DNS CLIENT TO PROVIDE THE NAME SERVER INFORMATION

173. WHAT ARE THE DIFFERENT TYPES OF QURIES

A. RECURSION, ITERATION

174. TOOLS FOR TROUBLESHOOTING DNS

A. DNS CONSOLE, NSLOOKUP, DNSCMD, IPCONFIG, LOGS, PERFORMANCE MONITOR

175. WHAT IS DHCP

A. DYNAMIC HOST CONFIGURATION PROTOCOL: ASSIGNS IPS TO THE CLIENTS REQUESTED DYNAMICALLY OR AUTOMATICALLY

176. PROCESS OF DHCP (DORA)

A. DISCOVER : THE CLIENT DISCOVERS DHCP

B. OFFER : THE DHCP SERVER OFFERS A GROUP OF IPS TO THE CLIENTS TO PICK ANY

C. REQUEST : THE CLIENT SELECTS AN IP AND REQUEST DHCP TO CONFIRM IT

D. ACKNOWLEDGEMENT : THE DHCP SERVER MAKES A CONFIRMATION BY SENDING AN DHCPACK TO THE CLIENT

177. WHAT IS A SCOPE

A. RANGE OF IP ADDRESSES

178. WHAT IS AN IP LEASE

A. DHCP SERVER OFFERS AN IP TO THE CLIENT FOR A PERIOD OF 8 DAYS. THIS OFFER IS CALLED IP LEASE

179. WHAT IS THE DEFAULT DURATION OF A LEASE

A. 8 DAYS

180. WHAT IS AUTHORIZING DHCP SERVER

A. ENABLING AD KNOW THE AVAILABILITY OF DHCP SERVER. USEFUL WHEN WE HAVE MULTIPLE DHCP SERVERS AND YOU WANT TO DESIGNATE ONE PARTICULAR DHCP SERVER TO BE ACTIVE. THEN WE SHOULD AUTHORIZE.

181. WHAT IS IP RESERVATION

A. RESERVING A PARTICULAR DYNAMIC IP FOR A PARTICULAR SYSTEM

182. WHAT IS EXCLUSION

A. OMITTING ASSIGNING FROM THE RANGE SELECTED IPS.

183. WHAT IS A SUPER SCOPE

A. GROUP OF SCOPES IS CALLED AS SUPER SCOPE.

184. PURPOSE OF DHCP RELAY AGENT

A. DHCP SERVER IS AVAILABLE ON ANOTHER N/W AND YOU WANT ANOTHER N/W TO OBTAIN IPS FROM THE DHCP SERVER. THEN THE DHCP RELAY AGENT HAS TO BE CONFIGURED ON THE ROUTER SO THAT THE DHCP RA CAN FORWARD THE REQUESTS FROM THE CLIENTS TO THE DHCP SERVER TO OBTAIN IPS FOR THE CLIENTS IT ACT LIKE A MEDIATOR BETWEEN CLIENTS AND DHCP.

185. HOW TO GIVEUP AN IP OBTAINED FROM DHCP

A. S-R-CMD- IPCONFIG /RELEASE

186. HOW TO OBTAIN A NEW IP FROM DHCP SERVER

A. S-R-CMD- IPCONFIG /RENEW

187. SWITCHES USED WITH IPCONFIG

A. IPCONFIG /ALL, RELEASE, RENEW, FLUSHDNS

188. IF THE CLIENT IS UNABLE TO CONTACT DHCP SERVER, WHAT HAPPENS

A. OBTAINS AN IP FROM APIPA

189. WHAT IS APIPA

A. AUTOMATIC PRIVATE IP ADDRESSING, WHEN A CLIENT MACHINE UNABLE TO CONTACT DHCP THEN APIPA ASSIGNS AN IP TO THE CLIENT. THIS ENABLES THE N/W AVAILABILITY.

190. WHAT ARE THE IP RANGES PROVIDED BY APIPA

A. 169.254.0.0 TO 169.254.255.255

191. WHAT IS WINS

A. WINDOW INTERNET NAMING SERVICE: USEFUL IN WINDOWS N/W ONLY. RESOLVES NETBIOS NAMES TO IP ADDRESSES AND IPS TO NETBIOS NAMES.

192. WINS IS USED IN WHICH ENVIRONMENTS

A. WHEN THE N/W HAS OS LIKE 95, WKS, NT, 98

193. WINS SUPPORTS ___CONVENTIONS

A. NBNS

194. DIFF BETWEEN NBNS & DNS CONVENTIONS

A. WINS USES NBNS CONVENTIONS AND DNS USES DNS CONVENTIONS

195. WHAT ARE THE PORT NUMBERS FOR:

FTP,TELNET,SMTP,DNS,HTTP,POP3,IMAP,SNMP,NNTP,LDAP,L2TP,PPTP,KERBEROS, DNS,HOSTNAME,RADIUS,LDAP, AND WINS

A. FTP-21, TELNET-23, SMTP-25, DNS-53, HTTP-80, POP3-110, IMAP-143,

SNMP-161, NNTP-119, LDAP-389, L2TP-1701, PPTP-1723, KERBEROS-88, DHCP67, HOSTNAME-42, RADIUS-1812, WINS-1512, ROUTER-520

196. WHAT IS IIS

A. IT IS A WEB SERVER FROM MICROSOFT

197. WHAT ARE THE SERVICES OFFERED BY IIS

A. WWW, HTTP, FTP, NNTP, SMTP, FRONTPAGE, ASP.NET SERVICES

198. WHICH VER OF IIS IS WITH 2K & 03

A. WIN 2K-IIS 5.0 AND WIN03- IIS 6.0

199. WHAT IS A VIRTUAL DIRECTORY

A. USING VIRTUAL DIRECTORY WE CAN HAVE CHILD WEBSITES OR LINKS TO PARENT WEBSITES

200. WHAT IS REGISTRY

A. REGISTRY IS A CONFIGURATION DATABASE ABOUT SYSTEM, HARDWARE & SOFTWARE

201. ICMP AND ITS IMPORTANCE

A. INTERNET CONTROL MESSAGE PROTOCOL : RESPONSIBLE FOR GENERATING MESSAGES LIKE REQUESTED TIME OUT, DESTINATION NOT REACHABLE, TTL, AND OTHER ECHO MESSAGES.

202. WHAT ARE THE BOOTABLE FILES

A. NTLDR, NTDETECT.COM, BOOT.INI, NTOSKRNL.EXE, BOOTSECT.DOS

203. WHAT IS A PAGE FILE

A. A PAGE FILE IS USED AS VIRTUAL MEMORY.

204. HOW TO INCREASE THE SIZE OF PAGING FILE

A. SYSTEM PROPERTIES-ADVANCED-PERFORMANCE SETTINGS-ADVANCED-CHANGE

205. WHAT IS THE ADVANTAGE OF SPLITTING A PAGE FILE AMONG DRIVES

A. IMPROVES THE I/O PERFORMANCE

206. WHAT IS A FILE REPLICATION

A. REPLICATION IS PROCESS OF DUPLICATING FILES OF ONE SERVER TO ANOTHER SERVER.

207. WHAT IS A SYSVOL

A IT IS A PUBLIC FOLDER GETS REPLICATED ON TO ALL DCS AND CONTAIN INFORMATION ABOUT USERS AND INFORMATION LIKE POLICIES AND PROFILES.

208. WHAT IS A DEFAULT TIME FOR REPLICATION TO TAKE PLACE B/W DC AND ADC

A. 5 SECONDS AND 3 SECONDS FOR IMMEDIATE CHANGE

209. WHAT IS AN INTERSITE AND INTRASITE REPLICATION

A. WHEN

210. HOW TO DEPLOY SOFTWARE

211. WHAT ARE DIFF ENVIRONMENT VARIABLES

212. WHAT DO YOU MEAN BY USER AND SYSTEM VARIABLES

213. WHAT ARE THE COMPONENTS OF WIN2K ARCHITECTURE

214. WHAT IS AN SMS SERVER

215. WHAT IS AN ISA SERVER

216. WHAT IS A GLOBAL CATALOG SERVER

217. AD IS DIVIDED INTO___PARTITIONS

218. DOMAIN PARTITION CONTAINS__INFORMATION

219. CONFIG PARTITION CONTAINS__INFORMATION

220. SCHEMA PARTITION CONTAINS__INFORMATION

221. WHAT IS NTDS

222. WHERE TO CHANGE SERVER ROLES

223. WHAT DOES A NETLOGON SERVICE DO

224. HOW TO MONITOR REPLICATION

225. WHAT IS CLUSTERING

226. PREREQUSITES TO PREPARE CLUSTER SET

227. WHAT DO YOU MEAN BY COMPLETE, KERNEL AND SMALL MEMORYDUMP

228. WHERE THE DEBUGGING INF IS SAVED

229. WHAT IS A DIGITAL SIGNATURE

230. WHAT IS THIN CLIENT

231. TS GETS INSTALLED IN___AND___MODES

232. WHAT IS AN RDP

233. WHAT IS A REMOTE ADMINISTRATION MODE

234. WHAT IS A APPLICATION SERVER MODE

235. WHAT ARE THE MIN H/W REQUIREMENTS FOR TS

236. NAME A FEW ADMINISTRATIVE TOOLS

237. WHAT ARE THE PREREQUISITES FOR RIS

238. WHAT DO YOU MEAN BY PXE

239. WHAT ALL THE O/S DOES RIS SUPPORT

240. WHAT IS A CD IMAGE AND A CLIENT IMAGE

241. WHAT IS DEPLOYMENT

242. WHAT ARE THE 3 DEPLOYMENT TOOLS

243. WHAT IS THE DIFF AMONG 1)SETUPMGR 2) SYSPREP 3)RIS

244. WHAT IS A DISTRIBUTION FOLDER

245. WHAT IS AN UNATTENDED INSTALLATION

246. WHAT IS AN ANSWER FILE

247. HOW TO PERFORM AN UNATTENDED INSTALLATION

248. WHAT DO YOU MEAN BY PRESTAGING CLIENTS

249. AN EXAMPLE OF AN FQDN

250. WHAT IS A URL,UNC,FQDN,

251. WHAT ARE NAMING CONVENTIONS USED BY LDAP

252. WHAT IS THE DIRECTORY ACCESS PROTOCOL USED BY AD

253. WHAT IS RDN,DN,UPN AND GUID

254. DIFF B/W HOST RECORD AND ALIAS RECORD

255. WHAT IS A CONTACT

256. WHAT ARE THE DIFF TYPES OF BACKUP

257. WHAT IS AN ERD AND ITS COMPONENTS

258. WHAT IS A SYSTEM STATE DATA BACKUP

259. WHAT ALL THE MEDIA SUPPORTED BY BACKUP

260. WHAT IS AN AUTHORITATIVE AND NON AUTHORITATIVE RESTORE OF AD

261. WHICH VER OF TCP/IP IS IN 2K

262. VER 6 OF TCP/IP IS OF___BITS

263. WHAT IS HYBERNATION

264. WHAT IS THE SIGNIFICANCE OF NTLDR,NTOSKRNL,BOOT.INI

265. WHAT IS A DDNS

266. WHAT IS THE ADVANTAGE OF INTEGRATING DNS AND DHCP

267. WHAT IS THE DIFF B/W REGEDT32 AND REGEDIT

268. WHAT IS BOOTP

269. WHAT DOES LMHOSTS FILE CONTAIN

270. WHO DEVELOPED KERBEROS

271. WHAT IS PKI

272. WHAT IS A PUBLIC/PRIVATE KEY

273. WHAT IS THE ROLE OF KCC

274. WHAT IS A CA

275. WHAT IS ENTERPRISE ROOT CA

276. WHAT IS A ENTERPRISE SUBORDINATE CA

277. WHAT IS STANDALONE ROOT CA

278. WHAT IS STANDALONE SUBORDINATE CA

279. WHAT IS A CERTIFICATE SERVICE

280. WHAT IS A HOST FILE

281. WHAT IS A STALE RECORD

282. WHAT IS DYNAMIC ROUTING

283. WHAT ARE SECURITY GROUPS

284. WHAT IS A PTR RECORD

285. WHAT ARE REMOTE ACCESS POLICIES

286. WHAT IS DEMAND DIALING

287. WHAT IS AUDITING

288. WHAT IS A DISTRIBUTION GROUP

289. WHAT IS A MULTIHOMED SYSTEM

290. WHAT IS RIPREP

291. HOW TO UPGRADE NT SERVER TO 2K SERVER

292. HOW TO CREATE INSTALLATION DISKS

293. HOW TO CREATE BOOTABLE DISK

294. WHAT IS DSC

295. HOW TO SEIZE FSMO ROLES

296. WHAT IS A RECURSIVE QUERY

297. WHAT IS AN ITERATION QUERY

298. UG CAN CONTAIN DLG T/F

299. DLG CAN CONTAIN UG T/F

300. GG CAN CONTAIN GG T/F

301. WHERE DOES THE SCRIPTS FOLDER EXIST

302. ADVANCED SERVER SUPPORTS__GB OF RAM

303. CLUSTERING IS A FEATURE OF___SERVER

304. ____SERVER IS SUITABLE FOR EXTREMELY LARGE DATABASE AND REAL-TIME ONLINE TRANSACTION PROCESSING

305. CONVERTING BASIC TO DYNAMIC DISKS NEED MIN ___MB OF FREE SPACE ON THE HDD

306. WHICH OF THE RAID LEVELS OFFERS HIGHEST FT

307. REVERTING DYNAMIC TO BASIC DISKS, DATA IS LOST T/F

308. HOW TO SHARE A RESOURCE REMOTLY

309. HOW TO MANAGE DISKS OF A REMOTE COMPUTER

310. WHAT IS MOUNTING

311. CAN WE INSTALL XP-PRO USING RIS Y/N

312. 2K STANDARD SERVER SUPPORTS SMP UPTO___PROCESSORS

313. FAULT TOLORANCE IS NOT SUPPORTED BY 2K PRO T/F

314. WHAT IS A PREFERRED DNS

315. WHAT ARE THE DIFF EVENTS RECORDED IN EVENT VIEWER

316. WHAT DO YELLOW, BLUE AND RED COLORS REPRESENT IN EV

317. WHERE CAN WE FIND PORT NUMBERS

318. WHERE DOES DNS DATABASE GETS STORED

319. WHAT IS DRIVER SIGNING

320. WHAT IS AN MMC AND INTELLIMIRROR

321. WHAT IS TERMINAL SERVER

322. WHAT ARE ROOT HINT SERVERS

323. WHAT IS A BRIDGEHEAD SERVER

324. WHAT IS A RECOVERY AGENT

325. WHAT IS RECOVERY CONSOLE

326. WHAT IS A HARDWARE PROFILE

327. HOW TO SCHEDULE A BACKUP

328. HOW TO REDIRECT A PRINT JOB

329. HOW TO REDIRECT FOLDERS

330. HOW TO PUBLISH OBJECTS IN AD

331. JET-DIRECT PRINTERS USE___PROTOCOL

332. HOW TO CHANGE LOCATION OF THE SPOOL FOLDER

333. WHERE TO ENABLE IPSEC

334. HOW TO OPTIMIZE AD PERFORMANCE

335. WHAT IS A DEMAND-DIAL ROUTING

336. WHAT IS A REMOTE ACCESS POLICY

Thursday, October 21, 2010

How To Set Up an FTP Server in Windows Server 2003

Install Internet Information Services and the FTP Service
Because FTP depends on Microsoft Internet Information Services (IIS), IIS and the FTP Service must be installed on the computer. To install IIS and the FTP Service, follow these steps.
NOTE: In Windows Server 2003, the FTP Service is not installed by default when you install IIS. If you already installed IIS on the computer, you must use the Add or Remove Programs tool in Control Panel to install the FTP Service.
Click Start, point to Control Panel, and then click Add or Remove Programs.
Click Add/Remove Windows Components.
In the Components list, click Application Server, click Internet Information Services (IIS)
(but do not select or clear the check box), and then click Details.
Click to select the following check boxes (if they are not already selected):
Common FilesFile Transfer Protocol (FTP) ServiceInternet Information Services Manager
Click to select the check boxes next to any other IIS-related service or subcomponent that you want to install, and then click OK.
Click Next.
When you are prompted, insert the Windows Server 2003 CD-ROM into the computer's CD-ROM or DVD-ROM drive or provide a path to the location of the files, and then click OK.
Click Finish.
IIS and the FTP service are now installed. You must configure the FTP Service before you can use it.

Configure The FTP Service
To configure the FTP Service to allow only anonymous connections, follow these steps:
Start Internet Information Services Manager or open the IIS snap-in.
Expand Server_name, where Server_name is the name of the server.
Expand FTP Sites
Right-click Default FTP Site, and then click Properties.
Click the Security Accounts tab.
Click to select the Allow Anonymous Connections check box (if it is not already selected), and then click to select the Allow only anonymous connections check box. When you click to select the Allow only anonymous connections check box, you configure the FTP Service to allow only anonymous connections. Users cannot log on by using user names and passwords.
Click the Home Directory tab.
Click to select the Read and Log visits check boxes (if they are not already selected), and then click to clear the Write check box (if it is not already cleared).
Click OK.
Quit Internet Information Services Manager or close the IIS snap-in.The FTP server is now configured to accept incoming FTP requests. Copy or move the files that you want to make available to the FTP publishing folder for access. The default folder is drive:\Inetpub\Ftproot, where drive is the drive on which IIS is installed.

Configure a default Web site
When you install IIS, it is preconfigured to serve as a default Web site; however, you may want to change some of the settings. To change the basic settings for the Web site and to emulate the steps that are required to set up Apache for the first time by using the configuration file:
1. Log on to the Web server computer as an administrator.
2. Click Start, point to Settings, and then click Control Panel.
3. Double-click Administrative Tools, and then double-click Internet Services Manager.
4. Right-click the Web site that you want to configure in the left pane, and then click Properties.
5. Click the Web site tab.
6. Type a description for the Web site in the Description box.
7. Type the Internet Protocol (IP) address to use for the Web site or leave the All (Unassigned) default setting.
8. Modify the Transmission Control Protocol (TCP) port as appropriate.
9. Click the Home Directory tab.
10. To use a folder on the local computer, click A directory on this computer, and then click Browse to locate the folder that you want to use.
11. To use a folder that has been shared from another computer on the network, click A share located on another computer, and then either type the network path or click Browse to select the shared folder.
12. Click Read to grant read access to the folder (required).
13. Click OK to accept the Web site properties.


Create a new Web site
To create a new Web site in Apache, you must set up a virtual host and configure the individual settings for the host. If you are using IIS, you can create a new Web site by translating the following terms to the IIS equivalents:
Collapse this tableExpand this table
Apache term IIS term
DocumentRoot IIS Web Site Home Directory
ServerName IIS Host Header
Listen IIS IP Address and TCP Port

IIS IP Address and TCP Port
To create a new Web site in IIS, follow these steps:
1. Log on to the Web server computer as an administrator.
2. Click Start, point to Settings, and then click Control Panel.
3. Double-click Administrative Tools, and then double-click Internet Services Manager.
4. Click Action, point to New, and then click Web Site.
5. After the Web Site Creation Wizard starts, click Next.
6. Type a description for the Web site. This description is used internally to identify the Web site in Internet Services Manager only.
7. Select the IP address to use for the site. If you select All (unassigned), the Web site is accessible on all interfaces and all configured IP addresses.
8. Type the TCP port number to publish the site on.
9. Type the Host Header name (the real name that is used to access this site).
10. Click Next.
11. Either type the path to the folder that is holding the Web site documents or click Browse to select the folder, and then click Next.
12. Select the access permissions for the Web site, and then click Next.
13. Click Finish.

Wednesday, October 20, 2010

MCITP Course Contents

Network Essentials
· Networking Concepts, History of Server OS
· Introduction to windows server 2003 & 2008
· Features of Windows Server 2008
· Installation of Windows Server 2008
· Installation of windows Vista
· Introduction and Creation of Users accounts
RODC & Physical Structure of AD-DS
· Introduction & Configuration of Read-Only Domain Controller
· SITES and Global Catalog
· Backup Strategies
· Replication between the Domain Controllers
· AD-DS Partitions
Active Directory - Domain Services
· IP Addressing
· Logical Topologies - Peer-Peer & Domain Models
· Introduction to Directory Services
· Evolution of Active Directory Services - LDAP Protocol
· Features of Active Directory
· Installing Active Directory – Domain Controller
Dynamic Host Configuration Protocol (DHCP)
· Introduction and Configuration of DHCP Server
· DHCP Client Configuration
· Reservations
· BOOTP Server
· DHCP Backup
Member Servers, Clients, User Configuration
· Configuring Member Servers and Clients.
· Creating Users in AD-DS
· User Logon policies
· Password policies
· Account Lockout policies
· User properties
Domain Name System (DNS)
· Internet Basics, Host & LM Host Files
· DNS Naming Hierarchy
· Lookup Zones - Forward and Reverse lookup Zones
· Types of Zones – Primary, Secondary & Stub Zone
· Resource Records, Integration with ADS, SRV Records
Terminal Services
· Terminal Server Configuration
· Terminal Server Licensing Mode
· Remote Desktop
· T.S Web access administration and T.S Remote Apps.
· Overview of T.S Gateway service
Internet Information Services
· IIS 7.0 Configuration
· Hosting Websites, Virtual Directories
· Backup & Restoring Sites
· FTP Server Configuration
User Profile
· Types of Profiles
· Local, Roaming and Mandatory Profiles
· Home Folder
· Disk Quotas
Permissions/Access Control Lists
· File Systems
· Security and Sharing Permissions - Folders & Files
· Offline Folder
Logical Structure of AD - DS
· Configuring ADC
· Tree Structure - Child Domain
· FOREST Structure
Routing & Remote Access
· Routing Configuration - Static Routes
· ICS, NAT, DHCP Relay Agent
· Remote Access Server Configuration
· Dial-in & Dial-out
· VPN - PPTP, L2TP
FSMO Roles of AD - DS
· Roles of AD - DS
· Transferring of Roles
· Seizing of Roles
Windows Deployment Services
· Introduction & Configuration of WDS Server
· Attended & Unattended Installation
Distributed File System, Backup & Recovery, Printers
· Introduction to DFS & File server
· Configuring Namespace, Folders etc
· Introduction to Backup & Backup media
· Types of Backups & Strategies
· Recovery of Data from any backup media
· Introduction to printers
· Types of printers & configuration
Disk Management
· Basic & Dynamic Disks
· Types of Volumes
· RAID 0, 1, 5 Levels
· Remote Hard disk Partitioning
· Mounting Concepts
Active Directory Trusts
· Introduction to Trust Relationship
· Categories, Directions & Types of Trusts
· Functional Levels
· Authentication Protocols
· Configuring Forest Trusts between 2008 Forests
Advanced Topics
· Windows Server Core
· Upgrading windows server 2003 to 2008
· Groups, VSS, Paging File
· System state backup & restoration
· Domain Renaming, Auditing policies
· Overview of AD- FS, LDS, RMS, CS
Group Policy / System Policy
· Organizational Unit, Delegation of Control
· User & Computer Policies
· Scope of Policies - OU, Domain, Sites
· Group policy modeling (RSOP)
· Software Deployment
· Scripts, Folder Redirection

MCITP Course Contents

MCITP Course Contents

  • Advanced Terminal Services
  • T.S Web Access Administration, Remote Apps. Etc.,
  • Managing a Microsoft Windows 2008 Network Environment.
  • Configuring Read-Only Domain Controller
  • Designing Microsoft Windows 2008 Active DirectoryInfrastructure, Network Infrastructure,
  • Application Infrastructure.
    Windows Server Core