Networking & MCSE Interview Questions and Answers

Embed Size (px)

Citation preview

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    1/23

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    2/23

    User interface

    Business Logic and

    Shared data.

    5. What are all the Extended services provided by the OS?

    Ubiquitous communications

    Network OS extension

    Binary large objects (BLOBs)

    Global directories and Network yellow pages

    Authentication and Authorization services

    System management

    Network time

    Database and transaction services

    Internet services

    Object- oriented services

    6. What are Triggers and Rules?

    Triggers are special user defined actions usually in the form of stored

    procedures, that are automatically invoked by the server based on data

    related events. It can perform complex actions and can use the full power of

    procedural languages.

    A rule is a special type of trigger that is used to perform simple checks on

    data.

    7. What is meant by Transparency?

    Transparency really means hiding the network and its servers from the users

    and even the application programmers.

    8. What are TP-Lite and TP-Heavy Monitors?

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    3/23

    TP-Lite is simply the integration of TP Monitor functions in the database

    engines. TP-Heavy are TP Monitors which supports the Client/Server

    architecture and allow PC to initiate some very complex multiserver

    transaction from the desktop.

    9. What are the two types of OLTP?

    TP lite, based on stored procedures. TP heavy, based on the TP monitors.

    10. What is a Web server?

    This new model of Client/Server consists of thin, protable, "universal" clients

    that talk to superfat servers. In the simplet form, a web server returns

    documents when clients ask for them by name. The clients and server

    communicate using an RPC-like protocol called HTTP.

    11. What are Super servers?

    These are fully-loaded machines which includes multiprocessors, high-speed

    disk arrays for intervive I/O and fault tolerant features.

    12. What is a TP Monitor?

    There is no commonly accepted definition for a TP monitor. According to Jeri

    Edwards' a TP Monitor is "an OS for transaction processing".

    13. TP Monitor does mainly two things extremely well. They are

    Process management and Transaction management.?

    They were originally introduced to run classes of applications that could

    service hundreds and sometimes thousands of clients. TP Monitors provide an

    OS - on top of existing OS - that connects in real time these thousands of

    humans with a pool of shared server processes.

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    4/23

    14. What is meant by Asymmetrical protocols?

    There is a many-to-one relationship between clients and server. Clients

    always initiate the dialog by requesting a service. Servers are passively

    awaiting for requests from clients.

    15. What are the types of Transparencies?

    The types of transparencies the NOS middleware is expected to provide are:-

    Location transparency

    Namespace transparency

    Logon transparency

    Replication transparency

    Local/Remote access transparency

    Distributed time transparency

    Failure transparency and

    Administration transparency.

    16. What is the difference between trigger and rule?

    The triggers are called implicitly by database generated events, while stored

    procedures are called explicitly by client applications.

    17. What are called Transactions?

    The grouped SQL statements are called Transactions (or) A transaction is a

    collection of actions embused with ACID properties.

    18. What are the building blocks of Client/Server?

    The client

    The server and

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    5/23

    Middleware.

    19. Explain the building blocks of Client/Server?

    The client side building block runs the client side of the application.

    The server side building block runs the server side of the application.

    20. The middleware buliding block runs on both the client and server

    sides of an application. It is broken into three categories:-

    Transport stack

    Network OS

    Service-specific middleware.

    21. What are all the Base services provided by the OS?

    Task preemption

    Task priority

    Semaphores

    Interprocess communications (IPC)

    Local/Remote Interprocess communication

    Threads

    Intertask protection

    Multiuser

    High performance file system

    Efficient memory management and

    Dynamically linked Run-time extensions.

    22. What are the roles of SQL?

    SQL is an interactive query language for ad hoc database queries.

    SQL is a database programming language.

    SQL is a data definition and data administration language.

    SQL is the language of networked database servers

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    6/23

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    7/23

    a remote server and suspends itself until it gets back the results. Parameters

    are passed like in any ordinary procedure. The RPC, like an ordinary

    procedure, is synchoronous. The process that issues the call waits until it

    gets the results.

    Under the covers, the RPC run-time software collects values for the

    parameters, forms a message, and sends it to the remote server. The server

    receives the request, unpack the parameters, calls the procedures, and sends

    the reply back to the client. It is a telephone-like metaphor.

    26. What are the main components of Transaction-based Systems?

    Resource Manager

    Transaction Manager and

    Application Program.

    27. What are the three types of SQL database server architecture?

    Process-per-client Architecture. (Example: Oracle 6, Informix )

    Multithreaded Architecture. (Example: Sybase, SQL server)

    Hybrid Architecture (Example: Oracle 7)

    28. What are the Classification of clients?

    Non-GUI clients - Two types are:-

    1. Non-GUI clients that do not need multi-tasking

    (Example: Automatic Teller Machines (ATM), Cell phone)

    2. Non-GUI clients that need multi-tasking

    (Example: ROBOTs)

    GUI clients

    OOUI clients

    29. What are called Non-GUI clients, GUI Clients and OOUI Clients?

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    8/23

    Non-GUI Client: These are applications, generate server requests with a

    minimal amount of human interaction.

    GUI Clients: These are applicatoins, where occassional requests to the

    server result from a human interacting with a GUI

    (Example: Windows 3.x, NT 3.5)

    OOUI clients : These are applications, which are highly-iconic, object-

    oriented user interface that provides seamless access to information in very

    visual formats.

    (Example: MAC OS, Windows 95, NT 4.0)

    30. What is Message Oriented Middleware (MOM)?

    MOM allows general purpose messages to be exchanged in a Client/Server

    system using message queues. Applications communicate over networks by

    simply putting messages in the queues and getting messages from queues. It

    typically provides a very simple high level APIs to its services.

    MOM's messaging and queuing allow clients and servers to communicate

    across a network without being linked by a private, dedicated, logical

    connection. The clients and server can run at different times. It is a post-

    office like metaphor.

    31. What is meant by Middleware?

    Middleware is a distributed software needed to support interaction between

    clients and servers. In short, it is the software that is in the middle of the

    Client/Server systems and it acts as a bridge between the clients and

    servers. It starts with the API set on the client side that is used to invoke a

    service and it covers the transmission of the request over the network and

    the resulting response.

    It neither includes the software that provides the actual service - that is in

    the servers domain nor the user interface or the application login - that's in

    clients domain.

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    9/23

    32. What are the functions of the typical server program?

    It waits for client-initiated requests. Executes many requests at the same

    time. Takes care of VIP clients first. Initiates and runs background task

    activity. Keeps running. Grown bigger and faster.

    33. What is meant by Symmentric Multiprocessing (SMP)?

    It treats all processors as equal. Any processor can do the work of any other

    processor. Applications are divided into threads that can run concurrently on

    any available processor. Any processor in the pool can run the OS kernel and

    execute user-written threads.

    34. What are Service-specific middleware?

    It is needed to accomplish a particular Client/Server type of services which

    includes:-

    Database specific middleware

    OLTP specific middleware

    Groupware specific middleware

    Object specific middleware

    Internet specific middleware and

    System management specific middleware.

    35. What are General Middleware?

    It includes the communication stacks, distributed directories, authentication

    services, network time, RPC, Queuing services along with the network OS

    extensions such as the distributed file and print services.

    36. What is meant by Asymmetric Multiprocessing (AMP)?

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    10/23

    It imposses hierarchy and a division of labour among processors. Only one

    designated processor, the master, controls (in a tightly coupled

    arrangement) slave processors dedicated to specific functions.

    37. What is OLTP?

    In the transaction server, the client component usually includes GUI and the

    server components usually consists of SQL transactions against a database.

    These applications are called OLTP (Online Transaction Processing) OLTP

    Applications typically,

    Receive a fixed set of inputs from remote clients. Perform multiple pre-

    compiled SQL comments against a local database. Commit the work andReturn a fixed set of results.

    38. What is meant by 3-Tier architecture?

    In 3-tier Client/Server systems, the application logic (or process) lives in the

    middle tier and it is separated from the data and the user interface. In

    theory, the 3-tier Client/Server systems are more scalable, robust and

    flexible.Example: TP monitor, Web.

    39. What is meant by 2-Tier architecture?

    In 2-tier Client/Server systems, the application logic is either burried inside

    the user interface on the client or within the database on the server.

    Example: File servers and Database servers with stored procedures.

    40. What is Load balancing?

    If the number of incoming clients requests exceeds the number of processes

    in a server class, the TP Monitor may dynamically start new ones and this is

    called Load balancing.

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    11/23

    41. What are called Fat clients and Fat servers?

    If the bulk of the application runs on the Client side, then it is Fat clients. It

    is used for decision support and personal software.

    If the bulk of the application runs on the Server side, then it is Fat servers. It

    tries to minimize network interchanges by creating more abstract levels of

    services.

    42. What is meant by Horizontal scaling and Vertical scaling?

    Horizontal scaling means adding or removing client workstations with only a

    slight performance impact. Vertical scaling means migrating to a larger and

    faster server machine or multiservers.

    43. What is Groupware server?

    Groupware addresses the management of semi-structured information such

    as text, image, mail, bulletin boards and the flow of work. These

    Client/Server systems have people in direct contact with other people.

    44. What are the two broad classes of middleware?

    General middleware

    Service-specific middleware.

    45. What are the types of Servers?

    File servers

    Database servers Transaction servers Groupware servers

    Object servers Web servers.

    46. What is a File server?

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    12/23

    File servers are useful for sharing files across a network. With a file server,

    the client passes requests for file records over nerwork to file server.

    47. What are the five major technologies that can be used to create

    Client/Server applications?

    Database Servers

    TP Monitors

    Groupware

    Distributed Objects

    Intranets.

    48. What is Client/Server?

    Clients and Servers are separate logical entities that work together over a

    network to accomplish a task. Many systems with very different architectures

    that are connected together are also called Client/Server.

    49. List out the benefits obtained by using the Client/Server oriented

    TP Monitors?

    Client/Server applications development framework.

    Firewalls of protection.

    High availability.

    Load balancing.

    MOM integration.

    Scalability of functions.

    Reduced system cost.

    50. What are the services provided by the Operating System?

    Extended services - These are add-on modular software components that

    are layered on top of base service.

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    13/23

    BANDWIDTH EXPLAINED

    BandWidth Explained

    Most hosting companies offer a variety of bandwidth options in their

    plans. So exactly what is bandwidth as it relates to web hosting? Put simply,

    bandwidth is the amount of traffic that is allowed to occur between your web

    site and the rest of the internet. The amount of bandwidth a hosting

    company can provide is determined by their network connections, both

    internal to their data center and external to the public internet.

    Network Connectivity :

    The internet, in the most simplest of terms, is a group of millions of

    computers connected by networks. These connections within the internet can

    be large or small depending upon the cabling and equipment that is used at a

    particular internet location. It is the size of each network connection that

    determines how much bandwidth is available. For example, if you use a DSL

    connection to connect to the internet, you have 1.54 Mega bits (Mb) of

    bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are

    grouped in bytes which form words, text, and other information that is

    transferred between your computer and the internet.

    If you have a DSL connection to the internet, you have dedicated bandwidth

    between your computer and your internet provider. But your internet

    provider may have thousands of DSL connections to their location. All of

    these connection aggregate at your internet provider who then has their own

    dedicated connection to the internet (or multiple connections) which is much

    larger than your single connection. They must have enough bandwidth to

    serve your computing needs as well as all of their other customers. So while

    you have a 1.54Mb connection to your internet provider, your internet

    provider may have a 255Mb connection to the internet so it can

    accommodate your needs and up to 166 other users (255/1.54).

    Traffic :

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    14/23

    A very simple analogy to use to understand bandwidth and traffic is to think

    of highways and cars. Bandwidth is the number of lanes on the highway and

    traffic is the number of cars on the highway. If you are the only car on a

    highway, you can travel very quickly. If you are stuck in the middle of rush

    hour, you may travel very slowly since all of the lanes are being used up.

    Traffic is simply the number of bits that are transferred on network

    connections. It is easiest to understand traffic using examples. One Gigabyte

    is 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024

    megabytes. To put this in perspective, it takes one byte to store one

    character. Imagine 100 file cabinets in a building, each of these cabinets

    holds 1000 folders. Each folder has 100 papers. Each paper contains 100characters - A GB is all the characters in the building. An MP3 song is about

    4MB, the same song in wav format is about 40MB, a full length movie can be

    800MB to 1000MB (1000MB = 1GB).

    If you were to transfer this MP3 song from a web site to your computer, you

    would create 4MB of traffic between the web site you are downloading from

    and your computer. Depending upon the network connection between the

    web site and the internet, the transfer may occur very quickly, or it could

    take time if other people are also downloading files at the same time. If, for

    example, the web site you download from has a 10MB connection to the

    internet, and you are the only person accessing that web site to download

    your MP3, your 4MB file will be the only traffic on that web site. However, if

    three people are all downloading that same MP at the same time, 12MB (3 x

    4MB) of traffic has been created. Because in this example, the host only has

    10MB of bandwidth, someone will have to wait. The network equipment at

    the hosting company will cycle through each person downloading the file and

    transfer a small portion at a time so each person's file transfer can take

    place, but the transfer for everyone downloading the file will be slower. If

    100 people all came to the site and downloaded the MP3 at the same time,

    the transfers would be extremely slow. If the host wanted to decrease the

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    15/23

    time it took to download files simultaneously, it could increase the bandwidth

    of their internet connection (at a cost due to upgrading equipment).

    Hosting Bandwidth :

    In the example above, we discussed traffic in terms of downloading an MP3

    file. However, each time you visit a web site, you are creating traffic,

    because in order to view that web page on your computer, the web page is

    first downloaded to your computer (between the web site and you) which is

    then displayed using your browser software (Internet Explorer, Netscape,

    etc.) . The page itself is simply a file that creates traffic just like the MP3 file

    in the example above (however, a web page is usually much smaller than a

    music file).

    A web page may be very small or large depending upon the amount of text

    and the number and quality of images integrated within the web page. For

    example, the home page for CNN.com is about 200KB (200 Kilobytes =

    200,000 bytes = 1,600,000 bits). This is typically large for a web page. In

    comparison, Yahoo's home page is about 70KB.

    How Much Bandwidth Is Enough?

    It depends (don't you hate that answer). But in truth, it does. Since

    bandwidth is a significant determinant of hosting plan prices, you should take

    time to determine just how much is right for you. Almost all hosting plans

    have bandwidth requirements measured in months, so you need to estimate

    the amount of bandwidth that will be required by your site on a monthly

    basis

    If you do not intend to provide file download capability from your site, theformula for calculating bandwidth is fairly straightforward:

    Average Daily Visitors x Average Page Views x Average Page Size x 31 x

    Fudge Factor

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    16/23

    If you intend to allow people to download files from your site, your bandwidth

    calculation should be:

    [(Average Daily Visitors x Average Page Views x Average Page Size) +

    (Average Daily File Downloads x Average File Size)] x 31 x Fudge Factor

    Let us examine each item in the formula:

    Average Daily Visitors - The number of people you expect to visit your

    site, on average, each day. Depending upon how you market your site, this

    number could be from 1 to 1,000,000.

    Average Page Views - On average, the number of web pages you expect a

    person to view. If you have 50 web pages in your web site, an average

    person may only view 5 of those pages each time they visit.

    Average Page Size - The average size of your web pages, in Kilobytes (KB).

    If you have already designed your site, you can calculate this directly.

    Average Daily File Downloads - The number of downloads you expect tooccur on your site. This is a function of the numbers of visitors and how

    many times a visitor downloads a file, on average, each day.

    Average File Size - Average file size of files that are downloadable from

    your site. Similar to your web pages, if you already know which files can be

    downloaded, you can calculate this directly.

    Fudge Factor - A number greater than 1. Using 1.5 would be safe, whichassumes that your estimate is off by 50%. However, if you were very unsure,

    you could use 2 or 3 to ensure that your bandwidth requirements are more

    than met.

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    17/23

    Usually, hosting plans offer bandwidth in terms of Gigabytes (GB) per month.

    This is why our formula takes daily averages and multiplies them by 31.

    Summary :

    Most personal or small business sites will not need more than 1GB of

    bandwidth per month. If you have a web site that is composed of static web

    pages and you expect little traffic to your site on a daily basis, go with a low

    bandwidth plan. If you go over the amount of bandwidth allocated in your

    plan, your hosting company could charge you over usage fees, so if you think

    the traffic to your site will be significant, you may want to go through the

    calculations above to estimate the amount of bandwidth required in a hosting

    plan.

    SETTING UP A VPN IN WINDOWS IS A TWO STEP PROCESS.

    Setting up a VPN in Windows is a two step process:

    Set up one computer to share files (server).

    Set up another computer to access them (client).

    Begin by setting up the server:Open Internet Explorer and go to www.whatismyip.com. Write down the IP

    address. You will need it to configure the client.

    1. Click the Start button and click Run.

    2. Type control and hit Enter.

    3. Click Network and Internet Connections.

    4. Click Network Connections .

    5. Click Create a New Connection, which is the first option on the left

    toolbar.

    6. The New Connection Wizard will open. Click Next.

    7. Choose Set up an advanced connection, the last element on the list.

    Click Next .

    8. Choose Accept incoming connections. Click Next.

    http://www.whatismyip.com/http://www.whatismyip.com/
  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    18/23

    9. You will see the Devices for Incoming Connections screen.

    10. Do not select anything on this screen. Click Next.

    11. Select Allow virtual private connections. Click Next.

    12. Select to whom you want to give access. Click Next. If a user is

    not listed, you will have to add an account. See "Related Wikihows" for

    more information.

    13. Do not change anything on the Networking Software screen.

    Click Next.

    That's it! Your computer is now set up to allow for VPNs. Click Finish to

    complete the wizard.

    Now proceed to connect the client:

    1. Click the Start button and click Run.

    2. Type control and hit Enter.

    3. Click Network and Internet Connections.

    4. Click Network Connections.

    5. Click Create a New Connection, which is the first option on the left

    toolbar.6. The New Connection Wizard will open. Click Next.

    7. Select Connect to the network at my workplace and click Next.

    8. Select Virtual Private Network connection and click Next.

    9. Type the name of your network in the blank box. Click Next.

    10. Enter the IP address you wrote down earlier and click Next.

    11. Select Add a shortcut to this connection to my desktop and click

    Finish.

    Tips :

    1. Both computers must be connected to the internet.

    2. The user name and password must be entered exactly as you saved

    them.

    3. The IP address must be written exactly as listed on the screen.

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    19/23

    4. If the VPN doesn't work, turn off your firewall.

    Warnings :

    Do not give access to the "guest" account. It does not require a password,allowing anyone to access the VPN.

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    20/23

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    21/23

    MCSE Sample Questions : General MCSE SampleQuestions

    General MCSE Sample Questions

    Following are some MCSE sample questions:

    1. What is the GUI tool used to build the UNATTEND.TXT file

    included with the Windows 2000 Resource Kit?

    A. SETUPMGR.EXE

    B. UNATTEND.EXE

    C. PREBUILD.EXE

    D. SYSLOAD.SYSE. SETUP.EXE

    Answer: A

    2. Which component of the Windows 2000 Executive is

    responsible for handling input and output from installed

    devices?

    A. The Device Manager

    B. The Cache Manager

    C. The I/O ManagerD. The Device Manager

    E. none of the above

    Answer: C

    3. Which of the following IRQs are used for LPT1?

    A. 1

    B. 3

    C. 5

    D. 7

    E. 9

    Answer: D

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    22/23

    4. Which layer(s) of the OSI model is/are included in the NDIS

    specification?

    A. 1

    B. 2

    C. 3

    D. 4

    E. 5

    Answer: B

    5. Windows 2000 Professional can access drives compressed with

    DriveSpace.

    A. TRUE

    B. FALSE

    Answer: B

    6. What should the impedance on RG-58 cable be?

    A. 50

    B. 75

    C. 90

    D. 93

    E. 98

    Answer: A

    7. What is another name for 10BaseT?

    A. Baseband

    B. Broadband

    C. Thicknet

    D. Thinnet

    E. Twisted Pair

    Answer: E

    8. Which of the following categories for UTP has the least

    expensive cable?

    A. 1

    B. 2

    C. 3

  • 8/2/2019 Networking & MCSE Interview Questions and Answers

    23/23

    D. 4

    E. 5

    Answer: C

    9. Which of the following modules manages bindings in NDIS?

    A. Protocol manager

    B. Binding manager

    C. Redirector

    D. The registry

    E. None of the above

    Answer: A

    10. If a network has a Windows NT domain controller, what kind ofnetwork is it?

    A. WAN

    B. High-speed

    C. Peer-to-peer

    D. Server-based

    E. Server-to-server

    Answer: D