Windows Admin L1 Interview Question

Embed Size (px)

Citation preview

  • 7/29/2019 Windows Admin L1 Interview Question

    1/22

    Windows Admin L1 Interview Question

    1. What is the different between Workgroup and Domain?

    A workgroup is an interconnection of a number of systems that share resources such as files &printers without adedicated server .Each workgroup maintains a local database for user accounts, security etc. A domain, on theotherhand is an interconnection of systems that share resources with one or more dedicated server, which can beused to control security and permissions for all users in the domain. Domain maintains a centralized database andhence a centralized management of user accounts, policies etc are established. If you have a user account on

    domain then you can log on to any system without user account on that particular system. 2. How will assign Local Administrator rights for domain user?

    To assign a domain user with local administrative right in any client of domain we should log in to the respectedclient system then, Start->control panel->user accounts->give username, password and name of domain->add->advanced->locations->find now->select others(in that select administrator user)->ok->next->ok.3. How will you restrict user logon timing in domain? Start->dsa.msc->double click on users->right click on any users->properties->click on account->click on logonhours->logon denied->select time (by dragging mouse)->click on logon permission->ok.

    4. What is the purpose of sysvol?The sysvol folder stores the server's copy of the domain's public files. The contents such as group policy, usersetc of the sysvol folder are replicated to all domain controllers in the domain. The sysvol folder must be located

    on an NTFS volume.5. What is OU? Explain its Uses.An object is a set of attributes that represents a network resource, say a user, a computer, a group policy, etcand object attributes are characteristics of that object stored in the directory. Organizational units act as acontainer for objects. Objects can be arranged according to security and administrative requirement in anorganization. You can easily manage and locate objects after arranging them into organizational units.Administrator can delegate the authority to manage different organizational units and it can be nested to otherorganizational units. Create an OU if you want to:

    Create a company's structure and organization within a domain - Without OUs, all users are maintainedand displayed in a single list, the Users container, regardless of a user's department, location, or role.

    Delegate administrative control - Grant administrative permissions to users or groups of users at the OUlevel.

    Accommodate potential changes in a company's organizational structure - Users can easily be reorganizedbetween OUs, while reorganizing users between domains generally requires more time and effort.

    Group objects with similar network resources - This way it is easy to perform any administrative tasks.For example, all user accounts for temporary employees can be grouped in an OU.

    Restrict visibility - Users can view only the objects for which they have access.6. Explain different edition of windows 2003 Server?

    Windows Server 2003, Web Edition :- is mainly for building and hosting Web applications, Web pages, andXML Web Services.

    Windows Server 2003, Standard Edition :- is aimed towards small to medium sized businesses. Flexibleyet versatile, Standard Edition supports file and printer sharing, offers secure Internet connectivity, andallows centralized desktop application deployment

    Windows Server 2003, Enterprise Edition :- is aimed towards medium to large businesses. It is a full-function server operating system that supports up to eight processors and provides enterprise-classfeatures such as eight-node clustering using Microsoft Cluster Server (MSCS) software and support for upto 32 GB of memory.

    Windows Server 2003, Datacenter Edition:- is the flagship of the Windows Server line and designed forimmense infrastructures demanding high security and reliability.

    Windows Server 2003, Compute Cluster Edition:- is designed for working with the most difficultcomputing problems that would require high performance computing clusters.

    Windows Storage Server 2003:- is optimised to provide dedicated file and print sharing services. It is onlyavailable through OEMs when purchased pre-configured with network attached storage devices.

    http://www.systemadministrator.in/interview-question/170-windows-admin-l1-interview-question.htmlhttp://www.systemadministrator.in/interview-question/170-windows-admin-l1-interview-question.htmlhttp://www.systemadministrator.in/interview-question/170-windows-admin-l1-interview-question.html
  • 7/29/2019 Windows Admin L1 Interview Question

    2/22

    7. What is DNS Server?Domain Name System (or Service or Server), a service that resolves domain names into IP addresses and viceversa. Because domain names are alphabetic, they're easier to remember.The Internet however, is really basedon ip addresses. Every time you use a domain name, therefore, a DNS service must translate the name into thecorresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4.

    The DNS system is, in fact, its own network. If one DNS server doesn't know how to translate a particular domainname, it asks another one, and so on, until the correct IP address is returned.

    8. Why DNS server is required for Active Directory?

    The key reason for integrating DNS and AD is efficiency. This is particularly true where you have lots of replicationtraffic. You can't resolve host names. You can't find services, like a domain controller.

    9. What is the Purpose of A and PTR Record?A (Host) record is used to resolve name to ip address while PTR (pointer) record is used to resolve ip address toname.

    10. What is the purpose of DHCP Server?

    A DHCP server is the server that is responsible for assigning unique IP address to the computers on a network. Notwo computers (actually, no two network cards1 [even if two are in one computer]) can have the same IP addresson a network at the same time or there will be conflicts. To that end, DHCP servers will take a request from acomputer that has just been added (or is renewing) to the network and assign it a unique IP address that isavailable. These assignments typically only last for a limited time (an hour to a week usually) and so you arenever guaranteed that the IP address for a particular computer will remain the same when using a DHCP (some

    DHCP servers allow you to specify that a computer gets the same address all the time however). 11. Explain about Group Scopes?A DHCP scope is a valid range of IP addresses which are available for assignments or lease to client computers ona particular subnet. In a DHCP server, you configure a scope to determine the address pool of ip which the servercan provide to DHCP clients.Scopes determine which IP addresses are provided to the clients. Scopes should be defined and activated beforeDHCP clients use the DHCP server for its dynamic IP configuration. You can configure as many scopes on a DHCPserver as is required in your network environment

    12. How will you backup DNS Server?If you are using Active Directory-integrated DNS, then your DNS information is stored in Active Directory itself,and you'll need to back up the entire system state. If not, however, The Backup directory in the%SystemRoot%\System32\Dns folder contains backup information for the DNS configuration and the DNSdatabase.

    13. How will backup DHCP Server?The Backup directory in the %SystemRoot%\System32\DHCP folder contains backup information for the DHCPconfiguration and the DHCP database. By default, the DHCP database is backed up every 60 minutesautomatically. To manually back up the DHCP database at any time, follow these steps:

    1. In the DHCP console, right-click the server you want to back up, and then click Backup.

    2. In the Browse For Folder dialog box, select the folder that will contain the backup DHCP database, and thenclick OK.

    14. Explain APIPA.A Windows-based computer that is configured to use DHCP can automatically assign itself an Internet Protocol(IP) address if a DHCP server is not available or does not exist. The Internet Assigned Numbers Authority (IANA)has reserved 169.254.0.0-169.254.255.255 for Automatic Private IP Addressing(APIPA).

    15. Explain about AD Database.Windows 2003 Active Directory data store, the actual database file, is %SystemRoot%\ntds\NTDS.DIT. Thentds.dit file is the heart of Active Directory including user accounts. Active Directory's database engine is theExtensible Storage Engine ( ESE ) which is based on the Jet database used by Exchange 5.5 and WINS. The ESEhas the capability to grow to 16 terabytes which would be large enough for 10 million objects.Only the Jetdatabase can manipulate information within the AD datastore.

    16. Explain about Group Policy.Group policies are used by administrators to configure and control user environment settings. Group PolicyObjects (GPOs) are used to configure group policies which are applied to sites, domains, and organizational units(OUs). Group policy may be blocked or set so it cannot be overridden. The default is for subobjects to inherit thepolicy of their parents. There is a maximum of 1000 applicable group policies.

    Group policies are linked to domains, organizational units, or sites in Active Directory. A policy must be linked to a

    container object in Active Directory to be effective. They are stored in any domain for storage but can be linked toother domains to make them effective there also. The policy must be linked to the container (site, domain, or OU)that it is stored in to be effective in that container. One policy object can be linked to several containers. Severalpolicy objects can be linked to one container.

  • 7/29/2019 Windows Admin L1 Interview Question

    3/22

    17. What is the default time for group policy refresh interval time?The default refresh interval for policies is 90 minutes. The default refresh interval for domain controllers is 5minutes. Group policy object's group policy refresh intervals may be changed in the group policy object.

    18. Explain Hidden Share.Using hidden shares on your network is useful if you do not want a shared folder or drive on the network to beeasily accessible. Hidden shares can add another layer of protection for shared files against unauthorized peopleconnecting to your network. Using hidden shares helps eliminate the chance for people to guess your password(or be logged into an authorized Windows account) and then receive access to the shared resource.

    Windows automatically shares hard drives by default for administrative purposes. They are hidden shares namedwith the drive letter followed by a dollar sign (e.g., C$) and commented as Default Share. Thus, certainnetworking and administrator functions and applications can work properly. Not that preventing Windows fromcreating these hidden or administrative shares by default each time your computer boots up takes a registrychange.19. What ports are used by DHCP and the DHCP clients?

    Requests are on UDP port 68, Server replies on UDP 67.

    20. How do I configure a client machine to use a specific IP Address?Reservation using mac address in DHCP.

    21. Name 3 benefits of using AD-integrated zones.1. We can give easy name resolution to your clients.2. By creating AD- integrated zone you can also trace hacker and spammer by creating reverse zone.

    3. AD integrated zoned all for incremental zone transfers which on transfer changes and not the entire zone. Thisreduces zone transfer traffic.4. AD Integrated zones support both secure and dynamic updates.5. AD integrated zones are stored as part of the active directory and support domain-wide or forest-widereplication through application partitions in AD.

    22. How do you backup & Restore AD?You can backup Active Directory by using the NTBACKUP tool that comes built-in with Windows Server 2003.Backing up the Active Directory is done on one or more of your Active Directory domain Control lers, and isperformed by backing up the System State on those servers. The System State contains the local Registry, COM+Class Registration Database, the System Boot Files, certificates from Certificate Server (if its installed), Clusterdatabase (if its installed), NTDS.DIT, and the SYSVOL folder. the tombstone is 60 days (Windows 2000/2003DCs), or 180 days (Windows Server 2003 SP1 DCs).You can use one of the three methods to restore Active Directory from backup media: Primary Restore, NormalRestore (i.e. Non Authoritative), and Authoritative Restore.Primary Restore: This method rebuilds the first domain controller in a domain when there is no other way torebuild the domain. Perform a primary restore only when all the domain controllers in the domain are lost, andyou want to rebuild the domain from the backup. Members of the Administrators group can perform the primaryrestore on local computer. On a domain controller, only members of the Domain Admins group can perform thisrestore.Normal Restore: This method reinstates the Active Directory data to the state before the backup, and thenupdates the data through the normal replication process. Perform a normal restore for a single domain controllerto a previously known good state.Authoritative Restore: You perform this method in tandem with a normal restore. An authoritative restore marksspecific data as current and prevents the replication from overwriting that data. The authoritative data is thenreplicated through the domain. Perform an authoritative restore for individual object in a domain that has multipledomain controllers. When you perform an authoritative restore, you lose all changes to the restore object thatoccurred after the backup. You need to use the NTDSUTIL command line utility to perform an authoritative

    restore. You need to use it in order to mark Active Directory objects as authoritative, so that they receive a higherversion recently changed data on other domain controllers does not overwrite System State data duringreplication.

    23. How do you change the DS Restore admin password? Microsoft Windows 2000 uses the Setpwd utility to reset the DS Restore Mode password. In Microsoft WindowsServer 2003, that functionality has been integrated into the NTDSUTIL tool. Note that you cannot use theprocedure if the target server is running in DSRM.

    24. How can you forcibly remove AD from a server?In run use the command ->dcpromo /forceremoval

    25. What is the SYSVOL folder?The sysvol folder stores the server's copy of the domain's public files. The contents such as group policy, usersetc of the sysvol folder are replicated to all domain controllers in the domain. The sysvol folder must be locatedon an NTFS volume

    26. What is the entire problem if DNS Server fails?If your DNS server fails, you can't resolve host names. You can't resolve domain controller IP Address.

    27. How can you restrict running certain applications on a machine?The Group Policy Object Editor and the Software Restriction Policies extension of Group Policy Object Editor areused to restrict running certain applications on a machine. For Windows XP computers that are not participating in

  • 7/29/2019 Windows Admin L1 Interview Question

    4/22

    a domain, you can use the Local Security Settings snap-in to access Software Restriction Policies.

    28. What can you do to promote a server to DC?Start->Run->DCPROMO

    29. How will map a folder through AD?Navigate domain user properties->give path in profile tab in the format \\servername\sharename.

    30. Explain Quotas.Disk Quota is a feature or service of NTFS which helps to restrict or manage the disk usage from the normal user.It can be implemented per user user per volume basis.By default it is disabled. Administrative privilege is requiredto perform the task. In 2003server we can control only drive but in 2008server we can establish quota in folder

    level.31. Explain Backup Methodology.The different types of backup methodologies are:

    Normal Backup:-This is default backup in which all files are backed up even if it was backed up before. Incremental Backup:-In this type of backup only the files that havent been backed up are taken care of

    or backed up.

    Differential Backup:-This backup is similar to incremental backup because it does not take backup ofthose files backed up by normal backup but different from incremental because it will take backup ofdifferentially backed up files at next time of differential backup.

    Copy Backup:-This type of backup is which is used during system state backup and asr backup. It is usedin special conditions only.

    Daily Backup:-This type of backup takes backup of only those files that are created on that particular day. System Backup:-This type of backup takes backup of files namely, Boot file, COM+Class Registry,

    Registry. But in server it takes backup of ads.

    ASR Backup:-This type of backup takes backup of entire boot partition including OS and user data. Thisshould be the last troubleshooting method to recover an os from disaster.

    32. Explain how to publish printer through AD.The group policy setting Automatically publish new printers in AD when disabled, prevents the Add PrinterWizard from automatically publishing shared printers. In addition, Group policy setting Allow printers to bepublished should be enabled(default) for printers to be published on that computers.

    33. Explain the functionality of FTP Server?The FTP server is to accept incoming FTP requests. Copy or move the files that you want to make available to the

    FTP publishing folder for access. The default folder is drive:\Inetpub\Ftproot, where drive is the drive on which IISis installedIn the client-server model, a file server is a computer responsible for the central storage and management of datafiles so that other computers on the same network can access the files. A file server allows users to shareinformation over a network without having to physically transfer files by floppy diskette or some other externalstorage device.

    34. Specify the Port Number for AD, DNS, DHCP, HTTP, HTTPS, SMTP, POP3 & FTPAD- uses LDAP Udp 389 and UDP 135,DNS- 53,DHCP-67,68,HTTP-80,HTTPS-,SMTP-25,POP3-110 & FTP-20,21.

    35. Explain Virtual Directory in IIS?A virtual server can have one home directory and any number of other publishing directories. These otherpublishing directories are referred to as virtual directories.36. What is Exclusion Range in DHCP Server?Exclusion Range is used to reserve a bank of ip addresses so computer that require only static ip address such as

    DNS servers, legacy printers can use reserved assigned addresses .These are not assigned by DHCP server.37. Explain SOA Record.Start Of Authority(SOA) Records indicate that NameServer is authoritative server for the domain.

    Desktop Administrator Interview Question

    1. What is the difference between Windows XP & Windows 7?Windows Defender, Parental Control, Windows Touch and Tap instead of point and Click, MultipleActive Firewall.2. One Fine Morning System is not booting up. Explain what would be the problem.

    2x2 or 2x4 Power Connector Not Plugged In Processor Issues

    Memory Issues Monitor Issues Power Supply and Chassis Issues Cable Issues

    http://www.systemadministrator.in/interview-question/132-desktop-administrator-interview-question.htmlhttp://www.systemadministrator.in/interview-question/132-desktop-administrator-interview-question.htmlhttp://www.systemadministrator.in/interview-question/132-desktop-administrator-interview-question.html
  • 7/29/2019 Windows Admin L1 Interview Question

    5/22

    Electrical Short or Overload Defective Components

    3. System No Display. What the steps are to Diagnoses the problem?Check the monitor is switched on and the power indicator LED of the monitor is glowing. Check themonitor power connection.Adjust the contrast/brightness knob of the monitor to maximum.Check whether the monitor is connected properly to the video adapter of the system.If your system has add-on video adapter, switch off the system and remove the power.Check whether the CPU, memory are connected properly to the motherboard.

    4. System is power on, but beep sound occurs. What would be the problem?One long beep: Memory problemOne long and two short beeps: Video errorOne long and three short beeps: Video errorContinuous beeps: Video/memory problemOther beeps: Check the motherboard manual5. Different and NTFS and FAT32.NTFS

    Allows access local to w2k w2k3 XP win NT4 with SP4 & later may get access for some file. Maximum size of partition is 2 Terabytes & more. Maximum File size is up to 16TB. File & folder Encryption is possible only in NTFS.

    FAT 32

    Fat 32 Allows access to win 95 98 win millennium win2k xp on local partition. Maximum size of partition is up to 2 TB. Maximum File size is up to 4 GB. File & folder Encryption is not possible.

    6. How will you convert FAT32 to NTFS?To convert a volume to NTFS from the command promptOpen Command Prompt.In the command prompt window, type

    convert drive_letter: /fs:ntfsFor example, typing convert D: /fs:ntfs would format drive D: with the ntfs format. 7. What are primary Partition, Extended Partition and Logical Partition?A primary partition contains one file system. The first partition (C:) must be a primary partition..An extended partition is a primary partition which contains secondary partition(s). A hard disk may contain onlyone extended partition..Extended partition that is sub divided into many drives is called as Logical partition..8. In a computer how many primary partition can be held.Four Primary partitions can be done...9. Difference between Microsoft outlook and Outlook Express.

    Microsoft Outlook:

    Files will be saved in .PST Format. Have some Additional Features like Address Book, Contacts, and Remainderetc... Not a free product have to purchase it..

    Outlook Express:

    Files will be saved in .DBX Format. Dont have any additional features. Free product that comes along with the OS Installation.

    10. What is Virus?Vital Information Resource under Seige.It is an executable Program which Performs Malicious activities in thesystem.11. What is Antivirus?

    An Antivirus Is a Software that protects the system from Virus Attack..12. What is the difference between Delete and Quarantine in Action methodology for Virus Scanning?Delete will delete all the virus infected files and Quarantine create a copy from an infected file and produce a newone..13. What are the procedures for cleaning an infected virus system?Unplug the system from the Network if it is in a Network & Scan the System with the Updated Antivirus..

  • 7/29/2019 Windows Admin L1 Interview Question

    6/22

    14. What is SMTP Protocol? What is the port Number used by SMTP?Simple Mail Transfer Protocol which performs all outgoing Mail. The port number is 25.15. What is POP3 Protocol? What is the port Number used by POP3?Post Office Protocol which performs all incoming mails. The Port number is 110.16. Tell me the procedure for Backup and Restore Mail in Outlook Express.Go to C:\Documents & Setting\User Profile\Application Data\Local Settings\Identities\Outlook Express & Copy the.DBX files and Save it in another location as a Backup. Copy the files from the location that was saved as a Backup& Go to the same path & Paste it.17. Tell me the Procedure for Backup and Restore Mail in Microsoft Express.

    Go to C:\Documents & Setting\User Profile\Application Data\Local Settings\Microsoft \Outlook Express & Copy the.PST files and Save it in another location as a Backup..Copy the files from the location that was saved as a Backup & Go to the same path & Paste it. 18. How will you repair a PST Files?Using scanpst.exe files19. How to set Password for PST Files?

    Select Go | Folder List from the menu. Click on the root item of the desired PST file with the right mouse button. If you want to protect only certain email folders with a password, you can move them to a newly created

    PST file and assign a password only for that file.

    Select Properties for... from the menu. Click Advanced.... Now click Change Password.... Enter the desired password under both New password: and Verify password:. If a password had already been set for the PST file, enter that phrase under Old password:. If you assign a password to a previously unprotected PST file, leave the Old password: field blank. To remove the password from a PST file, enter it under Old password: and leave both New password: and

    Verify password: blank.

    Click OK. Click OK again.

    Now click Cancel.

    20. How to set store a mail copy in Server for 30 days while configuring mail in Microsoft outlook?Go to Outlook 2007's Tools, Account Settings, and With the Account Settings dialog open, select the account andclick Change, then click More Settings. Look on the Advanced tab..21. How to set Rules in Microsoft outlook in order to organize mailbox?Open Microsoft Outlook.

    Click Tools. Click Rules Wizard. Click the New button and run through the wizard..

    22. Explain about Junk Mail option in outlook.

    Low. This level is designed to catch only the most obvious junk e-mail messages. You can make the filter moreaggressive, but if you do it may catch legitimate messages sometimes. Any message that is caught by the Junk E-mail Filter is moved to a special Junk E-mail folder. You should review messages in the Junk E-mail folder fromtime to time to make sure that they are not legitimate messages that you want to see.23. Explain about Registry?This is a database used by Microsoft Windows to store configuration information about the software installed on acomputer. This information includes things like the desktop background, program settings, and file extensionassociations.24. How to backup and Restore Registry?Import and Export from regedit.25. When system booting NTLDR file Missing Error. What would be the solution?

    Boot the System from the OS cd and Select Repair Option26. When XP is booting up system gets restart automatically. What would be the solution?May be RAM problem so replace it...Virus would have affected..27. Explain about Windows Firewall?Firewall Restricts the System from Unwanted Traffic.28. Difference between Administrators and Power Users?Members of the Administrator group have total control over the computer and everything on it. The user named

  • 7/29/2019 Windows Admin L1 Interview Question

    7/22

    Administratoris the default account within this groupThe Power User class can perform any task except for those reserved for Administrators. They are allowed to carryout functions that will not directly affect the operating system or risk security29. What is Service Pack? Is it needed to be installed in all the system?A service pack (in short SP) is a collection of updates, fixes and/or enhancements to a software programdelivered in the form of a single installable package.Yes it should be installed in all the systems.30. What is Device Drivers? Why it is needed?A device driver is a program that controls a particular type of device that is attached to your computer. There aredevice drivers for printers, displays, CD-ROM readers, diskette drives, and so on

    31. Explain about Local Printer and Network Printer?A network printer is shared by more than one computer using the IP Address that is assigned to the printer.A local printer is directly connected to one computer & shared using sharing & security32. Explain detail how to install a Network Printer?To install the printer using an IP address, go to Start>Control Panel>Printers and Faxes and then click the AddPrinter icon. Next, click Create a new port, then select Standard TCP/IP Port from the drop-down menu. Youwill then be asked to enter an IP address. Enter the IP address of the print server and click Next. You will beasked to select the printer manufacturer and the model from the list. If you do not see your printer listed, insertthe disk that came with the printer and click Have Disk.If you do not know the IP address of the printer, you can sometime select Browse for printer in the beginning ofthe process. If the networked printer is attached to another computer is being shared, you will need to enter thename of the computer followed by the share name of the printer. For example: \\computername\printername.33. How does virus get loaded into computer?

    Through Exe Files, Pen drive, CD, E-mail, Internet Etc...34. What is Boot Process in a computer?First is the POST, this stands for Power On Self-Test, for the computer. This process tests memory as well as anumber of other subsystems. You can usually monitor this as it runs each test. After that is complete the systemwill run POST for any device that has BIOS (Basic Input-Output System).35. What is the difference between RAM & ROM?RAM Random Access Memory which is called as Temporary Memory..ROM- Read Only Memory which stores the data Permanently.36. What is Cache Memory?Cache memory is fast memory that is used to hold the most recently accessed data in slower main memory. Theidea is that frequently accessed data will stay in cache, which allows the CPU to access it more quickly, whichmeans it doesn't have to wait for the data to arrive.37. What is the difference between Primary Storage and Secondary Storage?Usually the primary storage is a hard drive(s). Secondary is a flash drive(s), cd and so on. But nowadays, it's

    mostly a game of words.The primary memory of CPU is the place where computer program and data is stored during processing. thisstorage unite is often called either main memory or primary memory..There is usually two types primary memory1. RAM 2:.ROMThe devices of computer that store information such as software and data permanently are called secondarystorage device.There are many types of secondary storage devices such as ,magneticdisk, Hard disk floppy disk , CD Rom ,magnetic tape etc...38. How to increase or set virtual memory in Window XP?

    Click Start, and then click Control Panel. ClickPerformance and Maintenance, and then click System. On the Advanced tab, under Performance, click Settings. On the Advanced tab, under Virtual memory, click Change. UnderDrive [Volume Label], click the drive that contains the paging file that you want to change. UnderPaging file size for selected drive, click to Custom size check box. You can enter the amount of

    memory you would like to reserve for Virtual memory by entering the initial and maximum size. ClickSet

    39. What are the advantages of having SATA HDD over PATA HDD?SATA HDD uses different channel for incoming and outgoing traffic. Wherelse PATA HDD uses same Channel forincoming and outgoing traffic.40. What are Bidirectional and Unidirectional Bus?The address bus (sometimes called the memory bus) transports memory addresses which the processor wants toaccess in order to read or write data. It is a unidirectional bus.

    The data bus transfers instructions coming from or going to the processor. It is a bidirectional bus.41. How does the browser know to go to a certain IP address when you enter a domain likegoogle.com?Whenever an address is typed on the browser it immediately connects with the DNS.This DNS Finds the IP addressrelated to the Domain & connects with the Server & the requested web page will be displayed.

  • 7/29/2019 Windows Admin L1 Interview Question

    8/22

    42. Whats the difference between L1 and L2 cache?Short for Level 1 cache, a memory cache built into the microprocessor.Short for Level 2 cache, cache memory that is external to the microprocessor. In general, L2 cache memory, alsocalled the secondary cache, resides on a separate chip from the microprocessor chip.43. What is BIOS? How to clear password for BIOS?BIOS or Basic Input/output System is the first program accessed by the processor during start up to ensure thatall the other basic programs, hard drives, ports, peripherals and the central processing unit are in good workingcondition.In order to clear the password for BIOS Just Remove the CMOS Battery & Insert it again after Sometime orChange the Jumper Settings.

    44. What difference between original motherboard & chipset motherboard?A chipset is a group of microchips designed to work as a unit in performing one or more related functions. Theyare chip or chips on a motherboard containing various functions supporting the CPU.Motherboard is the "heart" of your PC -- it handles system resources (IRQ lines, DMA channels, I/O locations), aswell as core components like the CPU, and all system memory. It accepts expansion devices such as sound andnetwork cards, and modems. The main printed circuit board in a computer that carries the system buses. It isequipped with sockets to which all processors, memory modules, plug-in cards, daughterboard, or peripheraldevices are connected.45. What is the SMPS? Explain about its output voltage?Switch Mode Power Supply is an electronic power supply Unit that incorporates a switching regulator in order toprovide the required output voltage46. What is Power Good Signal? Explain its functionality.In addition to the voltages and currents that a computer needs to operate, power supplies also provide a signal

    called the Power-Good signal, sometimes written as Power_OKor Power Goodor you can distinguish it by itsgray color. Its purpose is to tell the computer all is well with the power supply and that the computer can continueto operate normally. If the Power-Good signal is not present at startup, the CPU is held in reset state. If a Power-Good signal goes down during operation the CPU will shutdown. The Power-Good signal prevents the computerfrom attempting to operate on improper voltages and damaging itself.47. What is the difference between AGP and PCI graphics cards?AGP stands for 'Accelerated Graphics Port the speed at which the AGP bus transfers data to and from the videocard was too Fast.PCI stands for 'Peripheral Component Interconnect the speed at which the PCI bus transfers data to and from thevideo card was too Slow.48. While Installing Windows XP File Missing Error Occurs. What would be the Problem?If you are attempting to boot from a CD-ROM and are receiving this error message it is likely that the diskettedoes not have all the necessary files and/or is corrupt.49. What is Defragmentation? Why its needed?

    Defragmentation is a process that reduces the amount of fragmentation in file systems. It does this by physicallyorganizing the contents of the disk to store the pieces of each file close together and contiguously.50. One fine morning system is not able to login into domain. What could be the problem?May be Network problem.Password would have expired.May be some restriction policy applied.51. In a workgroup environment how many system can access a shared folder simultaneously.10 Systems52. What is command to view computer name?Ipconfig /all or hostname53. Explain Ping command in detail.Packet Internet Gopher is a simple command line network tool that you can use to verify your connectivity to anetwork.54. What would the problem if system gets restarted frequently?RAM problem, Virus Attack, Dust in processor FAN.55. What would the problem if the system gets hanged off?RAM problem,OS Corrupt,Virus Attack,Hard Disk Problem.56. What could be the problem if hard disk gets in problem?Disk boot failure, Hard Disk not detected, CableProblem, BlueScreen, No power supply, Bad Sectors.57. What is msconfig? Why it is used?Microsoft System Configuration Utility is a utility to troubleshoot the Windows startup process.58. What is Remote Desktop? Why it is used?Remote Desktop is used to take another network system remotely Remote desktop allows you to control thedesktop and, indeed, the entire contents of a computer from another machine entirely59. How to run legacy application in windows xp?In both XP , right click on the executable of the application you wish to run.Select "Properties".

    Select the "Compatibility" tab on the "Properties" dialogue box.There will be a number of options. Choose "Windows 95 or 98 compatibility mode"60. What is the command to shutdown and restart the computer?Shutdown s t 00

  • 7/29/2019 Windows Admin L1 Interview Question

    9/22

    61. What is system restore? Why it is used?System Restore helps you restore your computer's system files to an earlier point in time. It's a way to undosystem changes to your computer without affecting your personal files, such as email, documents, or photos.

    Network Administrator Interview Questions

    1. To monitor ipx traffic on a network, what command would you use? Show ipx traffic2. What command would you use to find out the names of Novell servers on a network? show ipx servers 3. "arpa" is used by the Cisco IOS for which encapsulation types?Ethernet_II4. To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. Howare services advertised to other networks?Each router builds its own SAP table and forwards that every 60 seconds.5. Which type of Ethernet framing is used for TCP/IP and AppleTalk?Ethernet SNAP6. Which type of Ethernet framing is used for TCP/IP and DECnet? Ethernet II 7. Which NetWare protocol works on layer 3--network layerof the OSI model?IPX8. Which NetWare protocol provides link-state routing?NLSP9. What is the Cisco name for the encapsulation type used on a serial interface?HDLC10. IGRP uses flash updates, poison reverse updates, holddown times, and split horizon. How often does itbroadcast its routing table updates?

    90 seconds11. When using RIP, routing updates are broadcast every ____ seconds.3012. A default route is analogous to?Default gateway13. What does the command "IP name-server 255.255.255.255" accomplish?It sets the domain name lookup to be a local broadcast.14. How would you configure one host name that points to two IP addresses?IP host jacob 1.0.0.5 2.0.0.815. Which IP Address Class can have 64,000 subnets with 64,000 hosts per subnet?Class B16. There are two processes to pair MAC address with IP addresses. Which process finds an IP address from aMAC address?RARP

    17. Where would network testing be included in an IP packet?IP Options field18. What field tells the Internet layer how to handle an IP packet?Type of Service19. What is the UDP datagram format?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data20. What is the function of DDR on Cisco routers?DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic. It initiates a call to aremote site when there is traffic to transmit.21. When using access lists, what does a Cisco router check first?The first thing checked is to see if the packet is routable or bridgeable. If it is not, the packet will be dropped.22. What do the following statements in an extended access list accomplish?access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21

    access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255

    This will block ftp traffic since ftp uses ports 20 and 21.23. Which protocol for PPP LCP (Link Control Protocol) performs a challenge handshake?CHAP24. Which form of PPP error detection on Cisco routers monitors data dropped on a link?The Quality protocol monitors data dropped on a link. Magic Number avoids frame looping.25. Which protocol for PPP provides load balancing across multiple links?Multilink Protocol (MP)26. Which OSI layer end to end communication, segmentation and re-assembly?Layer 4 the Transport layer performs this function.27. What IP command would you use to test the entire IP stack?Telnet is an application and it resides at the top of the stack it traverses down the stack and up the stack at the

    receiving end.28. What is the default bandwidth of a serial connection?Default bandwidth is T1.29. Which OSI layer handles physical address, network topology?Layer 2 the Data-Link layer performs this function.

    http://www.systemadministrator.in/interview-question/87-network-administrator-interview-questions.htmlhttp://www.systemadministrator.in/interview-question/87-network-administrator-interview-questions.htmlhttp://www.systemadministrator.in/interview-question/87-network-administrator-interview-questions.html
  • 7/29/2019 Windows Admin L1 Interview Question

    10/22

    30. Which OSI layer establishes, maintains and terminates sessions between hosts?Layer 5 the Session layer performs this function.31. Where Cisco IOS is stored?By default the Cisco IOS is stored in flash.32. Which layer is responsible for providing mechanisms for multiplexing upper-layer application, sessionestablishment, and tear down of virtual circuits?The Transport layer does the following: Responsible for end-to-end integrity of data transmission. Handlesmultiplexing upper-layer application, session establishment and tear down of virtual circuits. Hides details ofnetwork dependent info from the higher layers by providing transparent data transfer. The 'windows' works at this

    level to control how much information is transferred before an acknowledgement is required.33. What's the default CDP holdtime in seconds for Cisco routers?Cisco Discovery Protocol is a proprietary protocol to allow you to access configuration information on other routersand switches with a single command. It uses SNAP at the Data-Link Layer. By default CDP sends out a broadcastevery 60 seconds and it holds this information for 180 seconds. CDP is enabled by default.Hardware Interview Questions

    1. Explain what is DMA? DMA (direct memory acesses) it is used to transfer the data from the memory toI/O devices or vice versa without the intervention of processor.

    2. What is aliasing? When considering the reconstruction of a signal, we are familiar with the idea of theNyquist rate. This concept allows us to find the sampling rate that will provide for perfect reconstruction ofour signal. If we sample at too low of a rate (below the Nyquist rate), then problems will arise that willmake perfect reconstruction impossible - this problem is known as aliasing. Aliasing occurs when there is

    an overlap in the shifted, periodic copies of our original signal's FT, i.e. spectrum3. What are the types of memory management? Memory Management is a crucial role in every

    operating system. Memory management is there are many types such as 1. Storage memory Management2. I/O Memory Management etc...

    4. What is the difference between web service and web application? Web services can beimplemented at any client or server place to make data secure because even programmer cannot find thatdata while web services are used on server side. Web services use soap protocol while web applicationhttp protocol, 80% coding of banking is done by using web services.

    5. How virus does affect computer? Due to Malicious site visit, download of MP3, Games, DownloadingScreen Savers, through network, through Floppy, and many more.

    6. What are the basic functions of an operating system? Operating system controls and coordinates theuse of the hardware among the various applications programs for various uses. Operating system acts as

    resource allocator and manager. Since there are many possibly conflicting requests for resources theoperating system must decide which requests are allocated resources to operating the computer systemefficiently and fairly? Also operating system is control program which controls the user programs toprevent errors and improper use of the computer. It is especially concerned with the operation and controlof I/O devices.

    7. Explain briefly about, processor, assembler, compiler, loader, linker and the functions executedby them? Processor:--A processor is the part a computer system that executes instructions .It is alsocalled a CPU. Assembler: -- An assembler is a program that takes basic computer instructions andconverts them into a pattern of bits that the computer's processor can use to perform its basic operations.Some people call these instructions assembler language and others use the term assembly language.Compiler: --- A compiler is a special program that processes statements written in a particularprogramming language and turns them into machine language or "code" that a computer's processor uses.Typically, a programmer writes language statements in a language such as Pascal or C one line at a timeusing an editor. The file that is created contains what are called the source statements. The programmerthen runs the appropriate language compiler, specifying the name of the file that contains the sourcestatements. Loader:--In a computer operating system, a loader is a component that locates a givenprogram (which can be an application or, in some cases, part of the operating system itself) in offlinestorage (such as a hard disk), loads it into main storage (in a personal computer, it's called random accessmemory), and gives that program control of the compute. Linker: -- Linker performs the linking of librarieswith the object code to make the object code into an executable machine code.

    8. What is boot processing computer? As soon as the CPU is turned on, it initializes itself and looks forROM BIOS for the first instruction which is the Power on Self-Test (POST). This process checks theBIOS chip and then the CMOS RAM. After checking everything and detecting no power failure, it checksthe hardware devices and the storage device. Then CMOS looks through the boot sequence of drives tofind the OS. The boot sequence is the sequence of drives which the CMOS scans to find OS and load it.Generally, OS is stored in C drive. If it is not found there, the next drive to scan is a drive that is thefloppy drive.Hence on finding the OS, it is loaded. Its files are copied to main memory by BIOS, and from

    here, the Os takes the charge of boot process like loading device drivers etc.

    9. What is the difference between x86 and i386 computer? X86 refers to a popular set of instructionsmost commonly used in processors from Intel, AMD, VIA, and others. It usually implies a binarycompatibility with the 32-bit instruction set of the 80386 (a.k.a. i386). i386 (as eluded to above) is the

    http://www.systemadministrator.in/interview-question/86-hardware-interview-questions.htmlhttp://www.systemadministrator.in/interview-question/86-hardware-interview-questions.htmlhttp://www.systemadministrator.in/interview-question/86-hardware-interview-questions.html
  • 7/29/2019 Windows Admin L1 Interview Question

    11/22

    common name for the Intel386 (or 80386) based PCs. It is sometimes emphasized as x86-32 (for 32-bit)and x86-64 (also called x64 - for 64-bit).

    10. What are the difference between FAT32 and NTFS? NTFS : Operating System - Windows 2000,Windows XP, Windows 2003 Server and Windows VistaMax Volume Size - 2TB, Max Files on Volume -Nearly Unlimited, Max File Size - Limit Only by Volume Size, Max Clusters Number - Nearly Unlimited, MaxFile Name Length - Up to 255 characters, Built-In Security, Recoverability, Maximum Disk Space Economy,Maximum Fault Tolerance. FAT32: Operating System - DOS v7 and higher, Windows 98, Windows ME,Windows 2000 & Windows XP, Max Volume Size - 32GB for all OS. 2TB for some OS, Max Files on Volume 4194304,Max File Size - 4GB minus 2 Bytes, Max Clusters Number 4177918, Max File Name Length -

    Up to 255 characters, No Built-In Security, No Recoverability, Average Disk Space Economy , Minimal FaultTolerance

    11. What is NV RAM? Non volatile read write memory also called flash memory, it is also known as shadowRAM.

    12. What is called scratch pad of computer? Cache memory is scratch pad of computer.13. What is the difference between RAM and ROM? RAM: Read/Write memory, it performs at High speed,

    Volatile memory. ROM: Read only memory, it performs at Low speed, Non-volatile memory.

    14. What is cache memory? Cache memory is a small high speed memory. It is used for temporary storageof data& information between the main memory and the CPU.The cache memory is only in RAM.

    15. What is the difference between primary& secondary storage device? Primary storage: Capacityis Limited, volatile memory. Secondary storage: Capacity is larger, Non-volatile memory.

    16. Which processor structure is pipelined? All X86 processor have pipelined structure.17. How do difference between Windows XP, 2000 professionals and Windows server 2003?

    Windows XP, Windows 2000 is a client operating system .where as Windows server 2003 is serveroperating system. Windows XP and 2000 is 32 bit while server is 64 bit.

    18. What is virtual memory? Virtual Memory is a way of extending a computers memory by using a disk fileto simulate adds memory space. The OS keeps track of these adds memory addresses on the hard diskcalled pages, and the operation in bringing in pages is called page fault.

    19. What is a real time system? A real time system is a computer system that updates the information atthe same rate it receives it. It is of two types, hard real time system and a soft real time system.

    20. What is stack? Stack is a portion of RAM used for saving the content of Program Counter and generalpurpose registers.

    21. Can ROM be used as stack? ROM cannot be used as stack because it is not possible to write to ROM.22. What is a compiler? Compiler is used to translate the high-level language program into machine code at

    a time. It doesnt require special instruction to store in a memory, it stores automatically. The Executiontime is less compared to Interpreter.

    23. What is interrupt? Interrupt is a signal send by external device to the processor so as to request theprocessor to perform a particular work.

    24. Difference between static and dynamic RAM? Static RAM: No refreshing, 6 to 8 MOS transistors arerequired to form one memory cell, Information stored as voltage level in a flip flop. Dynamic RAM:Refreshed periodically, 3 to 4 transistors are required to form one memory cell; Information is stored as acharge in the gate to substrate capacitance.

    25. What is the full form of SATA hard disk? Serial Advanced Technology Attachment (is a computer busprimarily designed for transfer of data between a computer and mass storage devices such as hard diskdrives and optical drives. The main advantages over the older parallel ATA interface are faster.

    26. What is difference between TCP protocol& UDP protocol? TCP stands for Transmission controlprotocol and it is a connection oriented protocol. The sender will get acknowledged after receiving thepackets successively, by the receiver. No other packets were send till the acknowledgement from thereceiver.

    27. What is the requirement of DNS? Each and every system on the network has its individual and uniqueIP address but we cannot remember the IP address of all, so we have assigned a particular name to each Iaddress, which is known as domain name.

    28. What is the difference between domain & workgroup? Domain consists of server. Domain means alogical group of network. Domain is a centralized security and administration. Workgroup means there isno act as sever on the network. All the systems on network are equal.

    29. How do you configure Proxy Server in Windows? To configure proxy server in windows first installthe 2 LAN cards one for internet connection and another one for sharing internet connection to clients pc.now first configure Internet connection and then give the IP to 2nd LAN card for ex. 192.168.0.1

    30. How to change in domain name? This article describes how to change a computer's Domain NameSystem (DNS) server or servers from the command line, either locally or remotely. This operation requiresyou to use the Regfind.exe tool from either the Microsoft Windows NT Server Resource.

  • 7/29/2019 Windows Admin L1 Interview Question

    12/22

    31. What is Private IP? Give an example? The addresses which can't be routed through public (internet)are private IP addresses and it is schema of saving public addressex: in class A range is10.0.0.0 to10.255.255.255.

    32. What is the subnet mask of this network? Subnet Mask: 255.255.254.0No. of IP addresses assignedin that subnet: 2^9 -2=510Subnet ID: 130.237.14.0/23Broadcast ID: 130.237.15.255 ...

    33. Why WINS server is required? Windows Internet Naming Service (WINS) is an older network service (aprotocol) that takes computer names as input and returns the numeric IP address of the computer withthat name or vice versa. WINS was designed to replace the LMHOSTS file functionality.

    34. What is SSL? It's a secure socket layer. the Https.35. What is the role of network administrator? Here is a very short list of basic tasks for which a network

    administrator may be responsible: Setting up and configuring network hardware and software Installingand configuring network media and connections Connecting user nodes and peripherals of all.

    36. What is the advantage and disadvantage of local area networks? LAN Advantages: Workstationscan share peripheral devices like printers. This is cheaper than buying a printer for every workstations. Workstations do not necessarily need their own hard disk or CD-ROM drives which make them cheaper tobuy than stand-alone.

    37. What is a Microprocessor? - Microprocessor is a program-controlled device, which fetches theinstructions from memory, decodes and executes the instructions. Most Micro Processor is single- chipdevices.

    38. Give examples for 8 / 16 / 32 bit Microprocessor? - 8-bit Processor - 8085 / Z80 / 6800; 16-bitProcessor - 8086 / 68000 / Z8000; 32-bit Processor - 80386 / 80486.

    39. Why 8085 processor is called an 8 bit processor? - Because 8085 processor has 8 bit ALU (ArithmeticLogic Review). Similarly 8086 processor has 16 bit ALU.

    40. What is 1st / 2nd / 3rd / 4th generation processor? - The processor made of PMOS / NMOS / HMOS/ HCMOS technology is called 1st / 2nd / 3rd / 4th generation processor, and it is made up of 4 / 8 / 16 /32 bits.

    41. Define HCMOS? - High-density n- type Complementary Metal Oxide Silicon field effect transistor.42. What does microprocessor speed depend on? - The processing speed depends on DATA BUS WIDTH.43. Is the address bus unidirectional? - The address bus is unidirectional because the address information

    is always given by the Micro Processor to address a memory location of an input / output devices.

    44. Is the data bus is Bi-directional? - The data bus is Bi-directional because the same bus is used fortransfer of data between Micro Processor and memory or input / output devices in both the direction.

    45. What is the disadvantage of microprocessor? - It has limitations on the size of data. MostMicroprocessor does not support floating-point operations.46. What is the difference between microprocessor and microcontroller? - In Microprocessor more op-

    codes, few bit handling instructions. But in Microcontroller: fewer op-codes, more bit handling Instructions,and also it is defined as a device that includes micro processor, memory, & input / output signal lines on asingle chip.

    47. What is meant by LATCH? - Latch is a D- type flip-flop used as a temporary storage device controlled bya timing signal, which can store 0 or 1. The primary function of a Latch is data storage. It is used in outputdevices such as LED, to hold the data for display.

    48. Why does microprocessor contain ROM chips? - Microprocessor contain ROM chip because it containinstructions to execute data.

    49. What is TCP/IP? Short for Transmission Control Protocol/Internet Protocol, the suite of communicationsprotocols used to connect hosts on the Internet.TCP/IP uses several protocols, the two main ones beingTCP and IP. TCP/IP is built into the UNIX operating system and is used by the Internet, making it the defacto standard for transmitting data over networks. Even network operating systems that have their ownprotocols, such as Netware, also support TCP/IP.

    50. How does the browser know to go to a certain IP address when you enter a domain likegoogle.com? It searches through local DNS cache, if nothing is there; it queries the ISPs DNS server.

    51. What are * and? When using them for wildcards in Windows? * Any characters, arbitraryamong? - Single character.

    52. How many logical drives is it possible to fit onto a physical disk? Maximum of 24 logical drives. Theextended partition can only have 23 logical drives.

    53. Whats the maximum hard drive size for FAT16-based Windows system? 2GB54. What are the speed and device maximum specs for Firewire? IEEE 1394 (Firewire) supports the

    maximum of 63 connected devices with speeds up to 400 Mbps.55. Whats the difference between L1 and L2 cache? Level 1 cache is internal to the chip, L2 is external.

    L1 (level 1) cache - L1 cache stores information for use by the processor. L1 cache is extremely quick butalso expensive. Most processors have an L1 cache divided into space for data and space for instructions.L2 (level 2) cache - L2 cache is the next step down from L1 cache. Most processors today have L2 cache,

  • 7/29/2019 Windows Admin L1 Interview Question

    13/22

    which increases cache performance. Most desktop processors have an L2 Cache of about 256KB, but somehigh-end processors can have as much as 2MB.

    56. Name the processor lines of two major manufacturers? High-end: Intel - Pentium (II, III, 4), AMD -Athlon. Low-end: Intel - Celeron, AMD - Duron. 64-bit: Intel - Itanium 2, AMD - Opteron.

    57. Where does CPU Enhanced mode originate from? 80386 was the first 32-bit processor, and since thecompany had to backward-support the 8086. All the modern Intel-based processors run in the Enhancedmode, capable of switching between Real mode (just like the real 8086) and protected mode, which is thecurrent mode of operation.

    58. Where does the Real mode on the CPU come from? The original 8086, which only had 1 MB ofmemory. This megabyte is split into low memory for IRQ tables, application memory and high memory.

    59. How do you clear CMOS password? Since CMOS is a special chip with its own battery, the best way toclear out a CMOS chip is to disconnect it from its power supply.

    60. What are the basic expansion card types? ISA and PCI, ISA can be used only on XT, AT and ATXboards. The industry now considers ISA obsolete. According to me Ext2 file system is like windows fat16type file system. Little information in fat16. It is the linux partition type. And vfat is related to windows filesystem. When we list the hard drive in the linux if there is already a windows o/s then it shows them Vfat.

    61. Which transistor is used in each cell of EPROM? Floating gate Avalanche Injection MOS (FAMOS)transistor is used in each cell of EPROM.

    62. What difference between original & chipset motherboard?Chipset: A chip set is a group ofintegrated circuits (microchips) that can be used together to serve a single function and are thereforemanufactured and sold as a unit. The most common chipset reference is the input/output control chips of a

    motherboard. Motherboard: The "heart" of your PC -- it handles system resources (IRQ lines, DMAchannels, I/O locations), as well as core components like the CPU, and all system memory. It acceptsexpansion devices such as sound and network cards, and modems.

    Windows Administrator Interview Question

    1. Describe how the DHCP lease is obtained.Its a four-step process consisting of (a) IP request, (b) IP offer, (c) IP selection and (d)acknowledgement.

    2. I cant seem to access the Internet, dont have any access to the corporate network and onipconfig my address is 169.254.*.*. What happened?The 169.254.*.* netmask is assigned to Windows machines running 98/2000/XP if the DHCP server is notavailable. The name for the technology is APIPA (Automatic Private Internet Protocol Addressing).

    3. Weve installed a new Windows-based DHCP server, however, the users do not seem to begetting DHCP leases off of it.The server must be authorized first with the Active Directory.

    4. How can you force the client to give up the DHCP lease if you have access to the client PC?ipconfig /release

    5. What authentication options do Windows 2000 Servers have for remote clients?PAP, SPAP, CHAP, MS-CHAP and EAP.

    6. What is data link layer in the OSI reference model responsible for? Data link layer is locatedabove the physical layer, but below the network layer.Taking raw data bits and packaging them into frames. The network layer will be responsible for addressingthe frames, while the physical layer is responsible for retrieving and sending raw data bits.

    7. What is binding order?The order by which the network protocols are used for client-server communications. The most frequently

    used protocols should be at the top.

    8. What is LMHOSTS file?Its a file stored on a host machine that is used to resolve NetBIOS to specific IP addresses.

    9. Whats the difference between forward lookup and reverse lookup in DNS?Forward lookup is name-to-address; the reverse lookup is address-to-name.

    10. How can you recover a file encrypted using EFS?Use the domain recovery agent.

    11. Explain hidden shares.Hidden or administrative shares are share names with a dollar sign ($) appended to their names.Administrative shares are usually created automatically for the root of each drive letter. They do notdisplay in the network browse list.

    12. How do the permissions work in Windows 2000? What permissions does folder inherit from theparent?When you combine NTFS permissions based on users and their group memberships, the least restrictivepermissions take precedence. However, explicit Deny entries always override Allow entries.

    13. Why cant I encrypt a compressed file on Windows 2000?You can either compress it or encrypt it, but not both.

    http://www.systemadministrator.in/interview-question/83-windows-administrator-interview-question.htmlhttp://www.systemadministrator.in/interview-question/83-windows-administrator-interview-question.htmlhttp://www.systemadministrator.in/interview-question/83-windows-administrator-interview-question.html
  • 7/29/2019 Windows Admin L1 Interview Question

    14/22

    14. If I rename an account, what must I do to make sure the renamed account has the samepermissions as the original one?Nothing, its all maintained automatically.

    15. Whats the most powerful group on a Windows system?Administrators.

    16. What are the accessibility features in Windows 2000?Sticky Keys, Filter Keys Narrator, Magnifier, and On-Screen Keyboard.

    17. Why cant I get to the Fax Service Management console?You can only see it if a fax had been installed.

    18. What do I need to ensure before deploying an application via a Group Policy?Make sure its either an MSI file, or contains a ZAP file for Group Policy.

    19. How do you configure mandatory profiles?Rename ntuser.dat to ntuser.man

    20. I cant get multiple displays to work in Windows 2000.Multiple displays have to use peripheral connection interface (PCI) or Accelerated Graphics Port (AGP) portdevices to work properly with Windows 2000.

    21. Whats a maximum number of processors Win2k supports?2

    22. I had some NTFS volumes under my Windows NT installation. What happened to NTFS after Win2k installation?It got upgraded to NTFS 5.

    23. How do you convert a drive from FAT/FAT32 to NTFS from the command line?convert c: /fs:ntfs

    24. How does Internet Connection Sharing work on Windows 2000?Internet Connection Sharing (ICS) uses the DHCP Allocator service to assign dynamic IP addresses toclients on the LAN within the range of 192.168.0.2 through 192.168.0.254. In addition, the DNS Proxyservice becomes enabled when you implement ICS.\

    25. What is Active Directory?Active Directory is a Meta Data. Active Directory is a data base which stores a data base like your userinformation, computer information and also other network object info. It has capabilities to manage and

    administer the complete Network which connect with AD.Active Directory service is an extensible and scalable directory service that enables you to managenetwork resources efficiently.Active Directory is directory service that stores information about objects on a network and makes thisinformation available to users and network administrators.Active Directory gives network users access to permitted resources anywhere on the network using asingle logon process. It provides network administrators with an intuitive, hierarchical view of the networkand a single point of administration for all network objects.Active directory is a domain controller which isuse to authenticate and administrate the group of computer, user, server etc. remotely. All the policiesand security will be applicable on the client machine which one is join the domain. And all this policies andsecurity is defined in active directory.

    26. What is the Global Catalog?Global Catalog is a server which maintains the information about multiple domains with trust relationship

    agreement. The global catalog is a distributed data repository that contains a searchable, partialrepresentation of every object in every domain in a multidomain Active Directory forest. The global catalogis stored on domain controllers that have been designated as global catalog servers and is distributedthrough multimaster replication. Searches that are directed to the global catalog are faster because theydo not involve referrals to different domain controllers.

    27. What is LDAP?LDAP (light weight directory access protocol) is an internet protocol which Email and other services is usedto look up information from the server.

    28. What is KCC?KCC (knowledge consistency checker) is used to generate replication topology for inter site replication andfor intrusive replication. Within site replication traffic are done via remote procedure calls over ip, whilebetween sites it is done through either RPC or SMTP.

    29. Where is the AD database held? What other folders are related to AD?The AD data base is store in NTDS.DIT file

    30. What is the SYSVOL folder?The sysVOL folder stores the servers copy of the domains public files. The contents such as group policy,users etc of the sysvol folder are replicated to all domain controllers in the domain.

  • 7/29/2019 Windows Admin L1 Interview Question

    15/22

    31. What is the ISTG? Who has that role by default?Windows 2000 Domain controllers each create Active Directory Replication connection objects representinginbound replication from intra-site replication partners. For inter-site replication, one domain controller persite has the responsibility of evaluating the inter-site replication topology and creating Active DirectoryReplication Connection objects for appropriate bridgehead servers within its site. The domain controller ineach site that owns this role is referred to as the Inter-Site Topology Generator (ISTG).

    32. What is REPLMON?Replmon displays information about Active Directory Replication.

    33. What is ADSIEDIT?ADSIEdit is a Microsoft Management Console (MMC) snap-in that acts as a low-level editor for ActiveDirectory. It is a Graphical User Interface (GUI) tool. Network administrators can use it for commonadministrative tasks such as adding, deleting, and moving objects with a directory service. The attributesfor each object can be edited or deleted by using this tool. ADSIEdit uses the ADSI applicationprogramming interfaces (APIs) to access Active Directory. The following are the required files for using thistool: ADSIEDIT.DLL ADSIEDIT.MSCNETDOM.

    34. What is NETDOM?NETDOM is a command-line tool that allows management of Windows domains and trust relationships. It isused for batch management of trusts, joining computers to domains, verifying trusts, and secure channels.

    35. What is REPADMIN?This command-line tool assists administrators in diagnosing replication problems between Windowsdomain controllers. Administrators can use Repadmin to view the replication topology (sometimes referredto as RepsFrom and RepsTo) as seen from the perspective of each domain controller. In addition,

    Repadmin can be used to manually create the replication topology (although in normal practice this shouldnot be necessary), to force replication events between domain controllers, and to view both the replicationmetadata and up-to-datedness vectors.

    36. How to take the backup of AD?For taking backup of active directory you have to do this : first go to START -> PROGRAM ->ACCESORIES-> SYSTEM TOOLS -> BACKUP when the backup screen is flash then take the backup of SYSTEM STATE itwill take the backup of all the necessary information about the system including AD backup , DNS ETC.

    37. How to restore the AD?For this do the same as above in the question 36 but in place of backup you select the restore option andrestore the system state.

    38. What are the DS* commands?You really are spoilt for choice when it comes to scripting tools for creating Active Directory objects. Inaddition to CSVDE, LDIFDE and VBScript, we now have the following DS commands: the da family built inutility DSmod - modify Active Directory attributesDSrm - to delete Active Directory objectsDSmove - torelocate objectsDSadd - create new accountsDSquery - to find objects that match your queryattributesDSget - list the properties of an object

    39. Whats the difference between LDIFDE and CSVDE? Usage considerations?CSVDE is a command that can be used to import and export objects to and from the AD into a CSV-formatted file. A CSV (Comma Separated Value) file is a file easily readable in Excel. I will not go to lengthinto this powerful command, but I will show you some basic samples of how to import a large number ofusers into your AD. Of course, as with the DSADD command, CSVDE can do more than just import users.Consult your help file for more info.Like CSVDE, LDIFDE is a command that can be used to import and export objects to and from the AD intoa LDIF-formatted file. A LDIF (LDAP Data Interchange Format) file is a file easily readable in any texteditor; however it is not readable in programs like Excel. The major difference between CSVDE andLDIFDE (besides the file format) is the fact that LDIFDE can be used to edit and delete existing AD objects

    (not just users), while CSVDE can only import and export objects.

    40. What is tombstone lifetime attribute?The number of days before a deleted object is removed from the directory services. This assists inremoving objects from replicated servers and preventing restores from reintroducing a deleted object. Thisvalue is in the Directory Service object in the configuration NIC.

    41. What are the requirements for installing AD on a new server?1)The Domain structure2)The Domain Name3)storage location of the database and log file4)Location of the shared system volume folder5)DNS config Method6)DNS configuration

    42.What are application partitions? When do I use them?AN application directory partition is a directory partition that is replicated only to specific domaincontroller. Only domain controller running windows Server 2003 can host a replica of application directorypartition. Using an application directory partition provides redundany, availabiltiy or fault tolerance byreplicating data to specific domain controller pr any set of domain controllers anywhere in the forest.

  • 7/29/2019 Windows Admin L1 Interview Question

    16/22

    43. You want to standardize the desktop environments (wallpaper, My Documents, Start menu,printers etc.) on the computers in one department. How would you do that? How it is possible?Login on client as Domain Admin user change whatever you need add printers etc go to system-Userprofiles copy this user profile to any location by select Everyone in permitted to use after copy changentuser.dat to ntuser.man and assign this path under user profile

    44. How do you create a new application partition?Use the DnsCmd command to create an application directory partition. To do this, use the followingsyntax: DnsCmd Server Name /CreateDirectoryPartition FQDN of partition Global catalog provide a centralrepository of domain information for the forest by storing partial replicas of all domain directory partitions.

    These partial replicas are distributed by multimaster replication to all global catalog servers in a forest. Itsalso used in universal global membership.

    45. How do you view all the GCs in the forest?C:\>repadmin /showreps where domain_controller is the DC you want to query todetermine whether its a GC. The output will include the text DSA Options: IS_GC if the DC is a GC. . . .

    46. Trying to look at the Schema, how can I do that?Type adsiedit.msc in run or command prompt

    47. Can you connect Active Directory to other 3rd-party Directory Services?Name a few options. Yes, you can use dirXML or LDAP to connect to other directories In Novell you canuse E-directory

    48. What is Page File and Virtual Memory?Page File Is Storage Space For The Virtual Memory, Page File Uses Hard Disk Space As a Memory ToProvide Memory Allocation...

    49. What is the difference between DNS in Windows 2000 & Windows 2003 Server?We can rename or moved the domain name without rebuilding in windows 2003 server, but in windows2000 server, we can't do that.

    50. Shadow copy feature available in windows2003 server but not in windows2000 server. A new tool to recover files. There are 220 new group polices are added in windows2003 server overwindows2000 server. In windows2000 server support maximum 10 users access shared folders at a timethrough network, but windows2003 server no limitation. Windows 2003 server includes IIS in it.

    51. How do you double-boot a Win 2003 server box?The Boot.ini file is set as read-only, system, and hidden to prevent unwanted editing. To change theBoot.ini timeout and default settings, use the System option in Control Panel from the advanced tab andselect Startup.

    52. What do you do if earlier application doesnt run on Windows Server 2003?When an application that ran on an earlier legacy version of Windows cannot be loaded during the setupfunction or if it later malfunctions, you must run the compatibility mode function. This is accomplished byright-clicking the application or setup program and selecting Properties > Compatibility > selecting thepreviously supported operating system.

    53. If you uninstall Windows Server 2003, which operating systems can you revert to?Win ME, Win 98, 2000, XP. Note, however, that you cannot upgrade from ME and 98 to Windows Server2003.

    54. How do you get to Internet Firewall settings?Start > Control Panel > Network and Internet Connections > Network Connections.

    55. Where are the Windows NT Primary Domain Controller (PDC) and its Backup Domain Controller(BDC) in Server 2003?The Active Directory replaces them. Now all domain controllers share a multimaster peer-to-peer read and

    write relationship that hosts copies of the Active Directory.56. How long does it take for security changes to be replicated among the domain controllers?

    Security-related modifications are replicated within a site immediately. These changes include account andindividual user lockout policies, changes to password policies, changes to computer account passwords,and modifications to the Local Security Authority (LSA).

    57. Whats new in Windows Server 2003 regarding the DNS management?When DC promotion occurs with an existing forest, the Active Directory Installation Wizard contacts anexisting DC to update the directory and replicate from the DC the required portions of the directory. If thewizard fails to locate a DC, it performs debugging and reports what caused the failure and how to fix theproblem. In order to be located on a network, every DC must register in DNS DC locator DNS records. TheActive Directory Installation Wizard verifies a proper configuration of the DNS infrastructure. All DNSconfiguration debugging and reporting activity is done with the Active Directory Installation Wizard.

    58. When should you create a forest?Organizations that operate on radically different bases may require separate trees with distinctnamespaces. Unique trade or brand names often give rise to separate DNS identities. Organizations mergeor are acquired and naming continuity is desired. Organizations form partnerships and joint ventures.While access to common resources is desired, a separately defined tree can enforce more directadministrative and security restrictions.

  • 7/29/2019 Windows Admin L1 Interview Question

    17/22

    59. How can you authenticate between forests?Four types of authentication are used across forests: (1) Kerberos and NTLM network logon for remoteaccess to a server in another forest; (2) Kerberos and NTLM interactive logon for physical logon outsidethe users home forest; (3) Kerberos delegation to N-tier application in another forest; and (4) userprincipal name (UPN) credentials

    60. What snap-in administrative tools are available for Active Directory? Active Directory Domains andTrusts Manager, Active Directory Sites and Services Manager, Active Directory Users and Group Manager,Active Directory Replication (optional, available from the Resource Kit), Active Directory Schema Manager(optional, available from adminpak)

    61. What types of classes exist in Windows Server 2003 Active Directory?Structural class. The structural class is important to the system administrator in that it is the only typefrom which new Active Directory objects are created. Structural classes are developed from either themodification of an existing structural type or the use of one or more abstract classes. Abstract class.Abstract classes are so named because they take the form of templates that actually create othertemplates (abstracts) and structural and auxiliary classes. Think of abstract classes as frameworks for thedefining objects. Auxiliary class. The auxiliary class is a list of attributes. Rather than apply numerousattributes when creating a structural class, it provides a streamlined alternative by applying a combinationof attributes with a single include action. 88 class. The 88 class includes object classes defined prior to1993, when the 1988 X.500 specification was adopted. This type does not use the structural, abstract, andauxiliary definitions, nor is it in common use for the development of objects in Windows Server 2003environments.

    62. How do you delete a lingering object?Windows Server 2003 provides a command called Repadmin that provides the ability to delete lingeringobjects in the Active Directory.

    63. How is user account security established in Windows Server 2003?When an account is created, it is given a unique access number known as a security identifier (SID). Everygroup to which the user belongs has an associated SID. The user and related group SIDs together formthe user accounts security token, which determines access levels to objects throughout the system andnetwork. SIDs from the security token is mapped to the access control list (ACL) of any object the userattempts to access.

    64. If I delete a user and then create a new account with the same username and password, wouldthe SID and permissions stay the same?No. If you delete a user account and attempt to recreate it with the same user name and password, theSID will be different.

    65. What do you do with secure sign-ones in an organization with many roaming users?Credential Management feature of Windows Server 2003 provides a consistent single sign-on experiencefor users. This can be useful for roaming users who move between computer systems. The CredentialManagement feature provides a secure store of user credentials that includes passwords and X.509certificates.

    66. What remote access options does Windows Server 2003 support?Dial-in, VPN, dial-in with callback.

    67. Where are the documents and settings for the roaming profile stored?All the documents and environmental settings for the roaming user are stored locally on the system, and,when the user logs off, all changes to the locally stored profile are copied to the shared server folder.Therefore, the first time a roaming user logs on to a new system the logon process may take some time,depending on how large his profile folder is.

    68. Where are the settings for all the users stored on a given machine?\Document and Settings\All Users

    69. What languages can you use for log-on scripts?JavaScript, VBScript, DOS batch files (.com, .bat, or even .exe)

    70. Whats the difference between local, global and universal groups? Domain local groups assign access permissions to global domain groups for local domain resources. Globalgroups provide access to resources in other trusted domains. Universal groups grant access to resources inall trusted domains.

    71. I am trying to create a new universal user group. Why cant I?Universal groups are allowed only in native-mode Windows Server 2003 environments. Native moderequires that all domain controllers be promoted to Windows Server 2003 Active Directory.

    72. What is LSDOU?Its group policy inheritance model, where the policies are applied to Local machines, Sites, Domains andOrganizational Units.

    73. Why doesnt LSDOU work under Windows NT?If the NTConfig.pol file exists, it has the highest priority among the numerous policies.

    74. Where are group policies stored?%SystemRoot%System32\Group Policy

  • 7/29/2019 Windows Admin L1 Interview Question

    18/22

    75. What are GPT and GPC?Group policy template and group policy container.

    76. Where is GPT stored?%System Root%\SYSVOL\sysvol\domain name\Policies\GUID

    77. You change the group policies, and now the computer and user settings are in conflict. Whichone has the highest priority?The computer settings take priority.

    78. You want to set up remote installation procedure, but do not want the user to gain access overit. What do you do?

    gponame> User Configuration> Windows Settings> Remote Installation Services> Choice Options isyour friend.

    79. Whats contained in administrative template conf.adm?Microsoft NetMeeting policies

    80. How can you restrict running certain applications on a machine?Via group policy, security settings for the group, then Software Restriction Policies.

    81. You need to automatically install an app, but MSI file is not available. What do you do?A .zap text file can be used to add applications using the Software Installer, rather than the WindowsInstaller.

    82. Whats the difference between Software Installer and Windows Installer?The former has fewer privileges and will probably require user intervention. Plus, it uses .zap files.

    83. What can be restricted on Windows Server 2003 that wasnt there in previous products?Group Policy in Windows Server 2003 determines a users right to modify network and dial-up TCP/IPproperties. Users may be selectively restricted from modifying their IP address and other networkconfiguration parameters.

    84. How frequently is the client policy refreshed?90 minutes give or take.

    85. Where is secedit?Its now gpupdate.

    86. You want to create a new group policy but do not wish to inherit. Make sure you check Blockinheritance.among the options when creating the policy.

    87. What is tattooing the Registry?The user can view and modify user preferences that are not stored in maintained portions of the Registry.

    If the group policy is removed or changed, the user preference will persist in the Registry.

    88. How do you fight tattooing in NT/2000 installations?You cant.

    89. How do you fight tattooing in 2003 installations?User Configuration - Administrative Templates - System - Group Policy - enable - Enforce Show PoliciesOnly.

    90. What is Super Scope?A super scope is an administrative feature of DHCP servers running Windows Server 2003 that you cancreate and manage through the DHCP console. Using a super scope, you can group multiple scopes as asingle administrative entity. With this feature, a DHCP server can: Support DHCP clients on a singlephysical network segment (such as a single Ethernet LAN segment) where multiple logical IP networks areused. When more than one logical IP network is used on each physical subnet or network, such

    configurations are often called multinets. Support remote DHCP clients located on the far side of DHCP andBOOTP relay agents (where the network on the far side of the relay agent uses multinets).

    91. What is the requirement of DNS?Each and every system on the network has its individual and unique IP address but we cannot rememberthe IP address of all, so we have assigned a particular name to each Ip address, which is mapped with adomain name.

    92. Why WINS server is required?Windows Internet Naming Service (WINS) is an older network service (a protocol) that takes computernames as input and returns the numeric IP address of the computer with that name or vice versa.

    93. What is the role of network administrator?Setting up and configuring network hardware and software Installing and configuring network media andconnections Connecting user nodes and peripherals of all.

    94. What are the Advantages and Disadvantages of DHCP?Advantages: All the IP configuration information gets automatically configured for your client machine bythe DHCP server. If you move your client machine to a different subnet, the client will send out itsdiscover message at boot time and work as usual. However, when you first boot up there you will not beable to get back the IP address you had at your previous location regardless of how little time has passed.Disadvantage: Your machine name does not change when you get a new IP address. The DNS (Domain

  • 7/29/2019 Windows Admin L1 Interview Question

    19/22

    Name System) name is associated with your Ipaddress and therefore does change. This only presents aproblem if other clients try to access your machine by its DNS name.

    95. What does IntelliMirror do?It helps to reconcile desktop settings, applications, and stored files for users, particularly those who movebetween workstations or those who must periodically work offline.

    96. Whats the major difference between FAT and NTFS on a local machine? FAT and FAT32 provide no security over locally logged-on users. Only native NTFS provides extensivepermission control on both remote and local files.

    97. How do FAT and NTFS differ in approach to user shares?They dont, both have support for sharing.

    98. Explain the List Folder Contents permission on the folder in NTFS.Same as Read & Execute, but not inherited by files within a folder. However, newly created subfolders willinherit this permission.

    99. I have a file to which the user has access, but he has no folder permission to read it. Can heaccess it?It is possible for a user to navigate to a file for which he does not have folder permission. This involvessimply knowing the path of the file object. Even if the user cant drill down the file/folder tree using MyComputer, he can still gain access to the file using the Universal Naming Convention (UNC). The best wayto start would be to type the full path of a file into Run window.

    100.For a user in several groups, are Allow permissions restrictive or permissive?Permissive, if at least one group has Allow permission for the file/folder, user will have the same

    permission.101.For a user in several groups, are Deny permissions restrictive or permissive?

    Restrictive, if at least one group has Deny permission for the file/folder, user will be denied access,regardless of other group permissions.

    102.What hidden shares exist on Windows Server 2003 installation?Admin$, Drive$, IPC$, NETLOGON, print$ and SYSVOL.

    103.Whats the difference between standalone and fault-tolerant DFS (Distributed File System)installations?The standalone server stores the Dfs directory tree structure or topology locally. Thus, if a shared folder isinaccessible or if the Dfs root server is down, users are left with no link to the shared resources. A fault-tolerant root node stores the Dfs topology in the Active Directory, which is replicated to other domaincontrollers. Thus, redundant root