You are on page 1of 64

IMPOTENT QUESTION

Windows Questions (Desktop Engineer Questions + System Admin Question


Q. What is the difference between Win2k Server and Win2k3? Answer : 1. We cant rename domain in Win2k,u can rename in Win2k3 2. IIS 5.0 in Win2k and IIS 6.0 in Win2k3 3. No o!ume S"adow #o$%in& in Win2k, its a'ai!a(!e in Win2k3 ). Acti'e *irector% +ederation S%stems in Win2k3 ,ike t"at some ot"er securit% -eatures added in Win2k3, main -eatures are a(o'e

Q. TELL ME WHY WE R USE !" E#$H%!"E SER&ER? Ans:. /"is is a mai! ser'er. we can use t"is Ser'er to send mai!s in Intranet as we!! as outside. Q .What is 'H$(? Ans:. /o assi&n i$ addresses automatica!!%. Q. 'H$( re)a* a+ent where t, -)ace it? Ans. *0#1 2e!a% a&ent u need to $!ace in So-tware 2outer. Q. what is f,rest? Ans. Is a co!!ection o- trees3 /ree is not"in& (ut co!!ection domains w"ic" is "a'in& same name s$ace. *omain contains domain contro!!ers.. +orest 4 /ree 4 *omain 5 *ont &et con-used.. 6nderstand care-u!!%. Q. what is "$? H,w .an* re/0ired f,r % Tree?

Ans :. 7!o(a! #ata!o& ser'er is a Searc"a(!e Inde8 (ook. Wit" t"is we can -ind out an% o(9ect in t"e Acti'e *irector%. A!so it works as !o&on aut"entication -or 7rou$ mem(ers"i$s. We can "a'e eac" domain contro!!er in domain or on!% -irst domain contro!!er in a domain.. Q. '!S 1,nes2 chr,nic)e rec,rds what are the*? Ans :. In Windows 2000 t"ere are main!% 3 :ones Standard 1rimar% 4 :one in-ormation writes in /8t -i!e Standard Secondar% 4 co$% o- 1rimar% Acti'e *irector% Inte&rated5 In-ormation stores in Acti'e *irector% in win2k3 one more :one is added t"at is Stu( :one 5Stu( is !ike secondar% (ut it contains on!% co$% o- S;A records, co$% o- NS records, co$% o- A records -or t"at :one. No co$% o- <=, S2 records etc., Wit" t"is Stu( :one *NS tra--ic wi!! (e !ow Q. What is 3SM4 R,)es? Ans :.+!e8i(!e Sin&!e <aster ;$eration 2o!es 1. *omain Namin& <aster 4 +orest Wide 2o!es 2. Sc"ema <aster 4 +orest Wide 2o!es 3. 2I* <aster 4 *omain Wide 2o!es ). 1*# >mu!ator 4 *omain Wide 2o!es 5. In-rastructure <aster 4 *omain Wide 2o!es 2I* <aster 4 It assi&ns 2I* and SI* to t"e new!% created o(9ect !ike 6sers and com$uters. I- 2I* master is down ?u can create securit% o(9ects u$to 2I* $oo!s are a'ia!a(!e in *#s@ e!se u cant create an% o(9ect one its down 1*# emu!ator : It works as a 1*# to an% N/ Adcs in %our en'ironment It works as /ime Ser'er ?to maintain same time in %our network@ It works to c"an&e t"e $asswords, !ockout etc., In-rastructure <aster: /"is works w"en we are renamin& an% &rou$ mem(er s"i$ o(9ect t"is ro!e takes care.

*omain Namin& <aster : Addin& B #"an&in& B *e!etin& an% *omain in a -orest it takes care Sc"ema <aster : It maintains structure o- t"e Acti'e *irector% in a -orest Q. 3T(2 !!T(2 SMT(2 5ER6ER4S2 '!S2 'H$(2 (4(3 -,rt n0.bers? %ns78 +/1 : 20, 21 ?20 is -or contro!!in&, 21 is /ransmittin&@ NN/1: 11C S</1: 25 Der(eros: EE *NS: 53 *0#1: 6F, 6E 1o$3: 110

Q D!"P PAT d#t#$#se p#t% &o'der Ans( ")*WINDOWS*system+,*d%-p Q. DNS D#t#$#se p#t% &o'der/ Ans ) 0 ")*WINDOWS*system+,*dns Q. Working o& ping( te'net( #nd gop%er. Ans. $in& is a com$uter network too! used to test w"et"er a $articu!ar "ost is
reac"a(!e across an I1 network. It works (% sendin& I#<1 Gec"o reHuestI $ackets to t"e tar&et "ost and !istenin& -or I#<1 Gec"o res$onseI re$!ies. $in& estimates t"e round.tri$ time, &enera!!% in mi!!iseconds, and records an% $acket !oss, and $rints a statistica! summar% w"en -inis"ed. />,N>/ ?/>,ecommunication N>/work@ is a network $rotoco! used on t"e Internet or !oca! area network ?,AN@ connections. It was de'e!o$ed in 1C6C (e&innin& wit" 2+# 15 and standardi:ed as I>/+ S/* E, one o- t"e -irst Internet standards. /"e term te!net a!so re-ers to so-tware w"ic" im$!ements t"e c!ient $art o- t"e $rotoco!. />,N>/ c!ients "a'e (een a'ai!a(!e on most 6ni8 s%stems -or man% %ears and are a'ai!a(!e -or 'irtua!!% a!! $!at-orms. <ost network eHui$ment and ;Ss wit" a /#1BI1

stack su$$ort some kind o- />,N>/ ser'ice ser'er -or t"eir remote con-i&uration ?inc!udin& ones (ased on Windows N/@. Aecause o- securit% issues wit" />,N>/, its use "as waned as it is re$!aced (% t"e use o- SS0 -or remote access. J/o te!netJ is a!so used as a 'er( meanin& to esta(!is" or use a />,N>/ or ot"er interacti'e /#1 connection, as in, J/o c"an&e %our $assword, te!net to t"e ser'er and run t"e $asswd commandJ. <ost o-ten, a user wi!! (e te!netin& to a 6ni8.!ike ser'er s%stem or a sim$!e network de'ice suc" as a switc". +or e8am$!e, a user mi&"t Jte!net in -rom "ome to c"eck "is mai! at sc"oo!J. In doin& so, "e wou!d (e usin& a te!net c!ient to connect -rom "is com$uter to one o- "is ser'ers. ;nce t"e connection is esta(!is"ed, "e wou!d t"en !o& in wit" "is account in-ormation and e8ecute o$eratin& s%stem commands remote!% on t"at com$uter, suc" as !s or cd. ;n man% s%stems, t"e c!ient ma% a!so (e used to make interacti'e raw./#1 sessions, e'en w"en t"at o$tion is not a'ai!a(!e, te!net sessions are eHui'a!ent to raw /#1 as !on& as (%te 255 ne'er a$$ears in t"e data. $acket internet &o$"er ?1IN7@ *e-inition <et"od used in determinin& t"e res$onse time o- an internet connection. 1IN7 so-tware sends a reHuest to an we(site, and times t"e recei$t o- re$!% ?ec"o@ ca!!ed $on&. A $art ot"e Internet 1rotoco!, 1IN7 is not direct!% accessi(!e to t"e user. $acket internet &o$"er ?1IN7@ is in t"e *ata <ana&ement, #ommunications, K Networks and Internet K Wor!d Wide We( su(9ects.

Q. W%#t is 1AID/ Types o& 1AID Ans)0 W%#t is # 1AID


,ets start wit" t"e (asics. 2AI* 2edundant Arra% o- Inde$endent *iscs. In t"e o!d da%s it a!so used to mean 2edundant Arra% o- Ine8$ensi'e *iscs. A 2AI* s%stem is a co!!ection o- "ard dri'es 9oined to&et"er usin& a 2AI* !e'e! de-inition ? see !e'e! (e!ow@. /"ere are man% uses -or 2AI*. +irst it can (e used to stri$e dri'es to&et"er to &i'e more o'era!! access s$eed ?!e'e! 0@. Second it can (e used mirror dri'es ?!e'e! 1@. /"ird it can (e used to increase u$time o- %our o'era!! stora&e (% stri$in& dri'es to&et"er and t"en kee$in& $arit% data, i- a dri'e s"ou!d -ai! t"e s%stem kee$s o$eratin& ?!e'e! 5@. <ost $eo$!e use 2AI* !e'e! 5 -or t"e u$time $ur$oses and its a(i!it% to 9oin to&et"er 16 dri'es, &i'in& a !ar&e stora&e (!ock. 2ead a(out 2AI* !e'e!s (e!ow and see w"ic" one suits %ou (est. !ot Sp#res A "ot s$are is a stand (% dri'e assi&ned to an arra% or assi&ned to a &rou$ o- arra%s ?&!o(a! s$are@. I- a dri'e &oes (ad in an arra% t"e "ot s$are wi!! take o'er -or -ai!ed dri'e

automatica!!% and %our arra% wi!! not su--er a $er-ormance de&radation. 0ot s$ares on!% make sense on !e'e!s 5, 5L0 , 0L5, 1L5 and 5L1. !ot Sw#p 0ot swa$ is a term used to descri(e t"e condition in w"ic" dri'es are attac"ed to t"e 2AI* contro!!er. Mou a!wa%s want "ot swa$ dri'es so t"at i- a dri'e &oes (ad it can (e re$!aced on t"e -!% wit"out incurrin& downtime. Ot%er &e#tures to #2oid downtime ;t"er -eatures o- $ro-essiona! 2AI*s inc!ude 0ot swa$ and redundant $ower su$$!ies. 0ot swa$ and redundant -ans. In some more e8$ensi'e 2AI* s%stems we e'en "a'e "ot swa$ and redundant 2AI* contro!!ers. 1AID 3e2e's "on&igure #nd pri-e # 1AID system 1AID 4 /"is is t"e sim$!est !e'e! o- 2AI*, and it 9ust in'o!'es stri$in&. *ata redundanc% is not e'en $resent in t"is !e'e!, so it is not recommended -or a$$!ications w"ere data is critica!. /"is !e'e! o--ers t"e "i&"est !e'e! o- $er-ormance out o- an% sin&!e 2AI* !e'e!. It a!so o--ers t"e !owest cost since no e8tra stora&e is in'o!'ed. At !east 2 "ard dri'es are reHuired, $re-era(!% identica!, and t"e ma8imum de$ends on t"e 2AI* contro!!er. None o- t"e s$ace is wasted as !on& as t"e "ard dri'es used are identica!. /"is !e'e! "as (ecome $o$u!ar wit" t"e mainstream market -or itNs re!ati'e!% !ow cost and "i&" $er-ormance &ain. /"is !e'e! is &ood -or most $eo$!e t"at donNt need an% data redundanc%. /"ere are man% S#SI and I*>BA/A im$!ementations a'ai!a(!e. +ina!!%, itNs im$ortant to note t"at ian% o- t"e "ard dri'es in t"e arra% -ai!s, %ou !ose e'er%t"in&. "on&igure #nd pri-e # 1AID system 1AID 5 /"is !e'e! is usua!!% im$!emented as mirrorin&. /wo identica! co$ies o- data are stored on two dri'es. W"en one dri'e -ai!s, t"e ot"er dri'e sti!! "as t"e data to kee$ t"e s%stem &oin&. 2e(ui!din& a !ost dri'e is 'er% sim$!e since %ou sti!! "a'e t"e second co$%. /"is adds data redundanc% to t"e s%stem and $ro'ides some sa-et% -rom -ai!ures. Some im$!ementations add an e8tra 2AI* contro!!er to increase t"e -au!t to!erance e'en more. It is idea! -or a$$!ications t"at use critica! data. >'en t"ou&" t"e $er-ormance (ene-its are not &reat, some mi&"t 9ust (e concerned wit" $reser'in& t"eir data. /"e re!ati'e sim$!icit% and !ow cost o- im$!ementin& t"is !e'e! "as increased its $o$u!arit% in mainstream 2AI* contro!!ers. <ost 2AI* contro!!ers nowada%s im$!ement some -orm o- 2AI* 1. "on&igure #nd pri-e # 1AID system

1AID , /"is !e'e! uses (it !e'e! stri$in& wit" 0ammin& code >##. /"e tec"niHue used "ere is somew"at simi!ar to stri$in& wit" $arit% (ut not rea!!%. /"e data is s$!it at t"e (it !e'e! and s$read o'er a num(er o- data and >## disks. W"en data is written to t"e arra%, t"e 0ammin& codes are ca!cu!ated and written to t"e >## disks. W"en t"e data is read -rom t"e arra%, 0ammin& codes are used to c"eck w"et"er errors "a'e occurred since t"e data was written to t"e arra%. Sin&!e (it errors can (e detected and corrected immediate!%. /"is is t"e on!% !e'e! t"at rea!!% de'iates -rom t"e 2AI* conce$ts ta!ked a(out ear!ier. /"e com$!icated and e8$ensi'e 2AI* contro!!er "ardware needed and t"e minimum num(er o- "ard dri'es reHuired, is t"e reason t"is !e'e! is not used toda%. "on&igure #nd pri-e # 1AID system 1AID + /"is !e'e! uses (%te !e'e! stri$in& wit" dedicated $arit%. In ot"er words, data is stri$ed across t"e arra% at t"e (%te !e'e! wit" one dedicated $arit% dri'e "o!din& t"e redundanc% in-ormation. /"e idea (e"ind t"is !e'e! is t"at stri$in& t"e data increasin& $er-ormance and usin& dedicated $arit% takes care o- redundanc%. 3 "ard dri'es are reHuired. 2 -or stri$in&, and 1 as t"e dedicated $arit% dri'e. A!t"ou&" t"e $er-ormance is &ood, t"e added $arit% does s!ow down writes. /"e $arit% in-ormation "as to (e written to t"e $arit% dri'e w"ene'er a write occurs. /"is increased com$utation ca!!s -or a "ardware contro!!er, so so-tware im$!ementations are not $ractica!. 2AI* 3 is &ood -or a$$!ications t"at dea! wit" !ar&e -i!es since t"e stri$e si:e is sma!!. "on&igure #nd pri-e # 1AID system 1AID 6 /"is !e'e! is 'er% simi!ar to 2AI* 3. /"e on!% di--erence is t"at it uses (!ock !e'e! stri$in& instead o- (%te !e'e! stri$in&. /"e ad'anta&e in t"at is t"at %ou can c"an&e t"e stri$e si:e to suit a$$!ication needs. /"is !e'e! is o-ten seen as a mi8 (etween 2AI* 3 and 2AI* 5, "a'in& t"e dedicated $arit% o- 2AI* 3 and t"e (!ock !e'e! stri$in& o- 2AI* 5. A&ain, %ouN!! $ro(a(!% need a "ardware 2AI* contro!!er -or t"is !e'e!. A!so, t"e dedicated $arit% dri'e continues to s!ow down $er-ormance in t"is !e'e! as we!!. "on&igure #nd pri-e # 1AID system 1AID 7 2AI* 5 uses (!ock !e'e! stri$in& and distri(uted $arit%. /"is !e'e! tries to remo'e t"e (ott!eneck o- t"e dedicated $arit% dri'e. Wit" t"e use o- a distri(uted $arit% a!&orit"m, t"is !e'e! writes t"e data and $arit% data across a!! t"e dri'es. Aasica!!%, t"e (!ocks o- data are used to create t"e $arit% (!ocks w"ic" are t"en stored across t"e arra%. /"is remo'es t"e (ott!eneck o- writin& to 9ust one $arit% dri'e. 0owe'er, t"e $arit% in-ormation sti!! "as to (e ca!cu!ated and written w"ene'er a write occurs, so t"e s!owdown in'o!'ed wit" t"at sti!! a$$!ies. /"e -au!t to!erance is maintained (% se$aratin& t"e $arit% in-ormation -or a (!ock -rom t"e actua! data (!ock. /"is wa% w"en one dri'e &oes, a!! t"e data on t"at dri'e can (e re(ui!t -rom t"e data on t"e ot"er dri'es. 2eco'er% is more com$!icated t"an usua!

(ecause o- t"e distri(uted nature o- t"e $arit%. Oust as in 2AI* ), t"e stri$e si:e can (e c"an&ed to suit t"e needs o- t"e a$$!ication. A!so, usin& a "ardware contro!!er is $ro(a(!% t"e more $ractica! so!ution. 2AI* 5 is one o- t"e most $o$u!ar 2AI* !e'e!s (ein& used toda%. <an% see it as t"e (est com(ination o- $er-ormance, redundanc%, and stora&e e--icienc%. "on&igure #nd pri-e # 1AID system 1AID 54 or 4+5 #om(inin& ,e'e!s o- 2AI* /"e sin&!e 2AI* !e'e!s donNt address e'er% a$$!ication reHuirement t"at e8ist. So, to &et more -unctiona!it%, someone t"ou&"t o- t"e idea o- com(inin& 2AI* !e'e!s. W"at i- %ou can com(ine two !e'e!s and &et t"e ad'anta&es o- (ot"3 We!! t"at was t"e moti'ation (e"ind creatin& t"ese new !e'e!s. /"e main (ene-it o- usin& mu!ti$!e 2AI* !e'e!s is t"e increased $er-ormance. 6sua!!% com(inin& 2AI* !e'e!s means usin& a "ardware 2AI* contro!!er. /"e increased !e'e! o- com$!e8it% o- t"ese !e'e!s means t"at so-tware so!utions are not $ractica!. 2AI* 0 "as t"e (est $er-ormance out o- t"e sin&!e !e'e!s and it is t"e one most common!% (ein& com(ined. Not a!! com(inations o- 2AI* !e'e!s e8ist. /"e most common com(inations are 2AI* 0L1 and 1L0. /"e di--erence (etween 0L1 and 1L0 mi&"t seem su(t!e, and sometimes com$anies ma% use t"e terms interc"an&ea(!%. 0owe'er, t"e di--erence !ies in t"e amount o- -au!t to!erance. Aot" t"ese !e'e!s reHuire at !east ) "ard dri'es to im$!ement. ,etNs !ook at 2AI* 0L1 -irst. /"is com(ination uses 2AI* 0 -or itNs "i&" $er-ormance and 2AI* 1 -or itNs "i&" -au!t to!erance. I actua!!% mentioned t"is !e'e! w"en I ta!ked a(out addin& stri$in& to mirrorin&. ,etNs sa% %ou "a'e E "ard dri'es. Mou can s$!it t"em into 2 arra%s o- ) dri'es eac", and a$$!% 2AI* 0 to eac" arra%. Now %ou "a'e 2 stri$ed arra%s. /"en %ou wou!d a$$!% 2AI* 1 to t"e 2 stri$ed arra%s and "a'e one arra% mirrored on t"e ot"er. I- a "ard dri'e in one stri$ed arra% -ai!s, t"e entire arra% is !ost. /"e ot"er stri$ed arra% is !e-t, (ut contains no -au!t to!erance i- an% o- t"e dri'es in it -ai!. 2AI* 1L0 a$$!ies 2AI* 1 -irst t"en 2AI* 0 to t"e dri'es. /o a$$!% 2AI* 1, %ou s$!it t"e E dri'es into ) sets o- 2 dri'es eac". Now eac" set is mirrored and "as du$!icate in-ormation. /o a$$!% 2AI* 0, %ou t"en stri$e across t"e ) sets. In essence, %ou "a'e a stri$ed arra% across a num(er o- mirrored sets. /"is com(ination "as (etter -au!t to!erance t"an 2AI* 0L1. As !on& as one dri'e in a mirrored set is acti'e, t"e arra% can sti!! -unction. So t"eoretica!!% %ou can "a'e u$ to "a!- t"e dri'es -ai! (e-ore %ou !ose e'er%t"in&, as o$$osed to on!% two dri'es in 2AI* 0L1. /"e $o$u!arit% o- 2AI* 0L1 and 1L0 stems -rom t"e -act t"at itNs re!ati'e!% sim$!e to im$!ement w"i!e $ro'idin& "i&" $er-ormance and &ood data redundanc%. Wit" t"e increased reduction o- "ard dri'e $rices, t"e ) "ard dri'e minimum isnNt unreasona(!e to t"e mainstream an%more. 0owe'er, %ou sti!! "a'e t"e 50P waste in stora&e s$ace w"ene'er %ou are dea!in& wit" mirrorin&. >nter$rise a$$!ications and ser'ers are o-ten

wi!!in& to sacri-ice stora&e -or increased $er-ormance and -au!t to!erance. Some ot"er com(inations o- 2AI* !e'e!s t"at are used inc!ude, 2AI* 0L3, 3L0, 0L5, 5L0, 1L5, and 5L1. /"ese !e'e!s are o-ten com$!icated to im$!ement and reHuire e8$ensi'e "ardware. Not a!! o- t"e com(inations I mentioned a(o'e are used

Q. Types O& A-ti2e Dire-tory P#rtitions/


Ans. Dom#in d#t# /"e domain data "o!ds in-ormation a(out o(9ects wit"in a domain. /"is is in-ormation suc" as e.mai! contacts, user and com$uter account attri(utes, and $u(!is"ed resources t"at are o- interest to administrators and users. +or e8am$!e, w"en a user account is added to %our network, a user account o(9ect and attri(ute data are stored in t"e domain data. W"en c"an&es to %our or&ani:ationNs director% o(9ects occur, suc" as o(9ect creation, de!etion, or attri(ute modi-ication, t"is data is stored in t"e domain data. "on&igur#tion d#t# /"e con-i&uration data descri(es t"e to$o!o&% o- t"e director%. /"is con-i&uration data inc!udes a !ist o- a!! domains, trees, and -orests and t"e !ocations o- t"e domain contro!!ers and &!o(a! cata!o&s. S-%em# d#t# /"e sc"ema is t"e -orma! de-inition o- a!! o(9ect and attri(ute data t"at can (e stored in t"e director%. *omain contro!!ers runnin& Windows Ser'er 2003 inc!ude a de-au!t sc"ema t"at de-ines man% o(9ect t%$es, suc" as user and com$uter accounts, &rou$s, domains, or&ani:ationa! units, and securit% $o!icies. Administrators and $ro&rammers can e8tend t"e sc"ema (% de-inin& new o(9ect t%$es and attri(utes or (% addin& new attri(utes -or e8istin& o(9ects. Sc"ema o(9ects are $rotected (% access contro! !ists, ensurin& t"at on!% aut"ori:ed users can a!ter t"e sc"ema App'i-#tion d#t# *ata stored in t"e a$$!ication director% $artition is intended to satis-% cases w"ere in-ormation needs to (e re$!icated (ut not necessari!% on a &!o(a! sca!e. A$$!ication director% $artitions are not $art o- t"e director% data store (% de-au!tQ t"e% must (e created, con-i&ured, and mana&ed (% t"e administrator.

Q. what is an ,r+ani1ati,na) 0nit? n %ctive 'irect,r*2

Ans:- An organizational unit (OU) is a subdivision within an Active Directory into which you can place users, groups, computers, and other organizational units !ou can create organizational units to mirror your organization"s #unctional or business structure $ach domain can implement its own organizational unit hierarchy %# your organization contains several domains, you can create organizational unit structures in each domain that are independent o# the structures in the other domains

&he term 'organizational unit' is o#ten shortened to 'OU' in casual conversation '(ontainer' is also o#ten applied in its place, even in )icroso#t"s own documentation All terms are considered correct and interchangeable At %ndiana University, most OUs are organized #irst around campuses, and then around departments* sub-OUs are then individual divisions within departments +or e,ample, the BL container represents the -loomington campus* the BLUITS container is a subdivision that represents the University %n#ormation &echnology .ervices (U%&.) department, and there are subcontainers below that &his method o# organization is not an en#orced rule at %U* it is merely chosen #or convenience, and there are e,ceptions .ome o# this in#ormation was adapted #rom )icroso#t"s /nowledge base +or more in#ormation about Active Directory structures, you can access )icroso#t"s /nowledge base at:

Q.W%#t #re t%e re8uirements &or inst#''ing AD on # new ser2er/


Ans.

An NTFS partition with enough free space An Administrator's username and password The correct operating system version A NIC Properly configured TCP/IP IP address! su"net mas# and $ optional $ default gateway% A networ# connection to a hu" or to another computer via a crossover ca"le% An operational &NS server which can "e installed on the &C itself% A &omain name that you want to use The 'indows Server ())* C& media or at least the i*+, folder%

Q. What is 5erber,s? Which versi,n is c0rrent)* 0sed b* Wind,ws? H,w d,es 5erber,s w,rk? Ans :. Der(eros is t"e user aut"entication used in Win2000 and Win2003 Acti'e *irector% ser'ers Der(eros 'ersion in 5.0 1ort is : EE Its more secure and encr%$ted t"an N/,< ?N/ aut"entication@ Q. 'escribe the )ease -r,cess ,f the 'H$( server.

Ans : A *0#1 !ease is t"e amount o- time t"at t"e *0#1 ser'er &rants to t"e *0#1 c!ient $ermission to use a $articu!ar I1 address. A t%$ica! ser'er a!!ows its administrator to set t"e !ease time. Q. 'isaster Rec,ver* ()an? Ans: *ea!s wit" t"e restoration o- com$uter s%stem wit" a!! attendant so-tware and connections to -u!! -unctiona!it% under a 'ariet% o- dama&in& or inter-erin& e8terna! condtions. Q.Which -r,t,c,) is 0sed f,r (0b)ic 3,)der ? ANS: S</1 Q.What is the 0se ,f !!T( with e9chan+e ? ANS: /"is $rotoco! is used t"e news &rou$ in e8c"an&e. Q.H,w wi)) take back0- ,f %ctive 'irect,r* ? Ans: /ake t"e s%stem state data (acku$. /"is wi!! (acku$ t"e acti'e director% data(ase. <icroso-t recomend on!% +u!! (acku$ o- s%stem state data(ase W"at are t"e content o- S%stem State (acku$ 3 /"e cotents are Aoot -!es,s%stem -i!es Acti'e director% ?i- its done on *#@ S%s'o! -o!der?i- it done on *#@ #er-icate ser'ice ? on a #A ser'er@ #!uster data(ase ? on a c!sture ser'er@ re&istr% 1er-ormance couter con-i&uration inormation #o$onet ser'ices c!ass re&istration data(ase Q. What is the difference between wind,ws server 2::3... A@ In 2000 we cannot rename domain w"ereas in 2003 we can rename *omain A@ In 2000 it su$$orts o- E $rocessors and 6) 7A 2A< ?In 2000 Ad'ance Ser'er@ w"ereas in 2003 su$$orts u$ to 6) $rocessors and ma8 o- 5127A 2A< #@2000 Su$$orts IIS 5.0 and 2003 Su$$orts IIS6.0 *@ 2000 doesnt su$$ort *ot net w"ereas 2003 Su$$orts <icroso-t .N>/ 2.0

>@ 2000 "as Ser'er and Ad'ance Ser'er editions w"ereas 2003 "as Standard, >nter$rise, *atacentre and We( ser'er >ditions. +@ 2000 doesnt "a'e an% 6) (it ser'er o$eratin& s%stem w"ereas 2003 "as 6) (it ser'er o$eratin& s%stems ?Windows Ser'er 2003 =6) Std and >nter$rise >dition@ 7@ 2000 "as (asic conce$t o- *+S ?*istri(uted +i!e s%stems@ wit" de-ined roots w"ereas 2003 "as >n"anced *+S su$$ort wit" mu!ti$!e roots. 0@ In 2000 t"ere is com$!e8a!it% in administerin& #om$!e8 networks w"ereas 2003 is eas% administration in a!! K #om$!e8 networks I@ In 2000 we can create 1 mi!!ion users and in 2003 we can create 1 (i!!ion users. O@ In 2003 we "a'e conce$t o- o!ume s"adow co$% ser'ice w"ic" is used to create "ard disk sna$ s"ot w"ic" is used in *isaster reco'er% and 2000 doesnt "a'e t"is ser'ice. D@ In 2000 we dont "a'e end user $o!ic% mana&ement, w"ereas in 2003 we "a'e a >nd user $o!ic% mana&ement w"ic" is done in 71<# ?7rou$ $o!ic% mana&ement conso!e@. ,@ In 2000 we "a'e cross domain trust re!ation s"i$ and 2003 we "a'e #ross -orest trust re!ations"i$. <@ 2000 Su$$orts ).node c!usterin& and 2003 su$$orts E.node c!usterin&. N@ 2003 "as 0i&" 0#, Su$$ort ?0ardware #om$ati(i!it% ,ist@ issued (% <icroso-t ;@ #ode name o- 2000 is Win N/ 5.0 and #ode name o- 2003 is Win N/ 5.1 1@ 2003 "as ser'ice ca!!ed A*+S ?Acti'e *irector% +ederation Ser'ices@ w"ic" is used to communicate (etween (ranc"es wit" sa-e aut"entication. Q@ In 2003 t"eir is im$ro'ed stora&e mana&ement usin& ser'ice +i!e Ser'er 2esource <ana&er ?+S2<@ 2@ 2003 "as ser'ice ca!!ed Windows S"are $oint Ser'ices ?It is an inte&rated $ort-o!io oco!!a(oration and communication ser'ices desi&ned to connect $eo$!e, in-ormation, $rocesses, and s%stems (ot" wit"in and (e%ond t"e or&ani:ationa! -irewa!!.@ S@ 2003 "as Im$ro'ed 1rint mana&ement com$ared to 2000 ser'er /@ 2003 "as te!net sessions a'ai!a(!e. 6@ 2000 su$$orts I1 ) w"ereas 2003 su$$orts I1 ) and I1 6

Q. Di&&eren-e $etween router and swit-%

Ans:. In t"ose ear!% da%s w"en router is router and swit-% is swit-%, t"ese two are di--erent in se'era! wa%s:

1outer understand I1 "ead, and swit-% dea! wit" <A# address 1outer "as its own I1 address?es@, and swit-% dont 1outer "as an o$eratin& s%stem runnin& inside, and a!!ow administrator to !o&in into t"e s%stem. Mou ?network administrator@ must con-i&ure routin& ta(!e to make it works. Swit-% is usua!!% read% to use. 1outer "as routin& so-tware runnin& inside, inc!udin& route disco'er% $rotoco!. 2outin& so-tware know "ow to dea! wit" di--erent I1 $acket, suc" as I#<1 and ot"er I1 o$tion -unctiona!it%. Switc"es dont. <u!ti$!e routers can (e connected to&et"er as a network. Mou cant direct!% mu!ti$!e switc"es to&et"er to -orm a !ar&e network.

Q. What's the difference between Windows 2000 and Windows XP?


Ans-$ 'indows ())) and 'indows .P are essentially the same operating system #nown internally as 'indows NT /0) and 'indows NT /01! respectively0% 2ere are some considerations if you're trying to decide which version to useWindows 2000 benefits 'indows ())) has lower system re3uirements! and has a simpler interface no 4Styles4 to mess with%0 'indows ())) is slightly less e5pensive! and has no product activation0 'indows ())) has "een out for a while! and most of the common pro"lems and security holes have "een uncovered and fi5ed0 Third$party software and hardware products that aren't yet .P$compati"le may "e compati"le with 'indows ()))6 chec# the manufacturers of your devices and applications for .P support "efore you upgrade0 Intended For 'indows .P 'indows ()))

Windows XP benefits 'indows .P is somewhat faster than 'indows ()))! assuming you have a fast processor and tons of memory although it will run fine with a *))7h8 Pentium II and 1(+79 of :A7%0 The new 'indows .P interface is more cheerful and colorful than earlier versions! although the less$cartoony 4Classic4 interface can still "e used if desired0 'indows .P has more "ells and whistles! such as the 'indows 7ovie 7a#er! "uilt$in C& writer support! the Internet Connection Firewall! and :emote &es#top Connection0

'indows .P has "etter support for games and comes with more games than 'indows ()))0 'indows .P is the latest ;S $ if you don't upgrade now! you'll pro"a"ly end up migrating to .P eventually anyway! and we mere mortals can only ta#e so many ;S upgrades0 7anufacturers of e5isting hardware and software products are more li#ely to add 'indows .P compati"ility now than 'indows ())) compati"ility0

Q. W%#t #re t%e per8uisite &or inst#''#tion o& E9-%#nge Ser2er / Ans. /"e $re reHuisite are IIS S</1 WWW ser'ice NN/1 .N>/ +ramework AS1.N>/ /"en run +orest $re$ /"e run domain $re$ Q. 3#test ser2i-e p#-k windows,444Pro&ession#' Ans. Windows ,444 Pro Ser2i-e P#-k 6 Ans . Windows :P Pro& ser2i-e P#-k , Ans Windows ,444 Ad2#n-e Ser2er 6 Ans .Windows ,44+ ser2er ser2i-e p#-k , Q. W%#t is IP Address
Ans:-

%0 address
Last .,dified7 Th0rsda*2 %0+0st ;22 2::<

An identi-ier -or a com$uter or de'ice on a /#1BI1 network. Networks usin& t"e /#1BI1 $rotoco! route messa&es (ased on t"e I1 address o- t"e destination. /"e

-ormat o- an I1 address is a 32.(it numeric address written as -our num(ers se$arated (% $eriods. >ac" num(er can (e :ero to 255. +or e8am$!e, 1.160.10.2)0 cou!d (e an I1 address. Wit"in an iso!ated network, %ou can assi&n I1 addresses at random as !on& as eac" one is uniHue. 0owe'er, connectin& a $ri'ate network to t"e Internet reHuires usin& re&istered I1 addresses ?ca!!ed Internet addresses@ to a'oid du$!icates.

/"e -our num(ers in an I1 address are used in di--erent wa%s to identi-% a $articu!ar network and a "ost on t"at network. +our re&iona! Internet re&istries .. A2IN, 2I1> N##, ,A#NI# and A1NI# .. assi&n Internet addresses -rom

t"e -o!!owin& t"ree c!asses. #!ass A . su$$orts 16 mi!!ion "osts on eac" o- 126 networks #!ass A . su$$orts 65,000 "osts on eac" o- 16,000 networks #!ass # . su$$orts 25) "osts on eac" o- 2 mi!!ion networks /"e num(er o- unassi&ned Internet addresses is runnin& out, so a new c!ass!ess sc"eme ca!!ed #I*2 is &radua!!% re$!acin& t"e s%stem (ased on c!asses A, A, and # and is tied to ado$tion o- I1'6. A!so see 6nderstandin& I1 Addressin& in t"e *id Mou Dnow . . .3 section oWe(o$edia.
Q. What is getaway?
Ans. A gateway is a networ/ point that acts as an entrance to another networ/ On the

%nternet, a node or stopping point can be either a gateway node or a host (end-point) node -oth the computers o# %nternet users and the computers that serve pages to users are host nodes &he computers that control tra##ic within your company"s networ/ or at your local %nternet service provider (%.0) are gateway nodes (an transcode or allow di##erent protocols to tal/ to each other Q. T*-es 4f User (r,fi)es
Ans Local User Profile

This profile is automatically created the first time a user logs on to the computer! and it is stored on the computer's local hard drive0 Any changes made to the local user profile are specific to the computer where the change was made0 Roa ing User Profile <ou! as the administrator! create this profile! and

store it on a networ# server0 This profile is availa"le when a user logs on to any computer on the networ#0 Any changes made to roaming user profiles are automatically updated on the server when the user logs off0 !andatory User Profile 7andatory user profiles are stored on a networ# server and are downloaded each time the user logs on0 This profile does not update when the user logs off0 It is useful for situations where consistent or =o"$specific settings are needed ;nly administrators can ma#e changes to mandatory user profiles0 If the mandatory user profile is unavaila"le! the user cannot log on0 Types of event viewer logs

System >vent ?iewer Tips 9y Nino 9ilic Although >vent ?iewer is a 7icrosoft@ 'indows@ operating system tool! and not a 7icrosoft >5change Server tool! >vent ?iewer is useful when trou"leshooting >5change Server pro"lems0 This article descri"es >vent ?iewer "asic concepts and new helpful features0

&efinitions0 ;verview
o o

Types of Aogs Found in >vent ?iewer Types of >vents Aogged

>vent Anatomy 'hat Format to Save InB 2ow So <ou Cnow It ;pened ProperlyB >vent ?iewer &ifferences 9etween 'indows Server ())*! 'indows .P! 'indows ())) Server! and 'indows NT Server D0)

Tips
o o o o o

Increasing the Aog File Si8e Filtering >vents Searching for Ceywords If on 'indows .P! Ese New Functionality Fet All Aogs that <ou 7ight Need

For 7ore Information &efinitions

The following terms and definitions are used in this article-

>vent

Any significant occurrence in the system or an application

that re3uires users to "e notified or an entry to "e added to a log0

>vent log service

A service that records events in the System!

Security! and Application logs0

>vent logging

The process of recording an audit entry in the audit

trail whenever certain events occur! such as services starting and stopping! or users logging on! logging off! and accessing resources0

>vent ?iewer

A component you can use to view and manage event

logs! gather information a"out hardware and software pro"lems! and monitor security events0 >vent ?iewer maintains logs a"out program! security! and system events0 ;verview Esing the event logs in >vent ?iewer! you can gather information a"out hardware! software! and system pro"lems! and you can monitor 'indows operating system security events0 Types of Logs Found in Event Viewer 7icrosoft 'indows ServerG ())*! 'indows .P! 'indows ())) Server! and 'indows NT@ record events in three #inds of logs

Application log

The Application log contains events logged "y

applications or programs0 For e5ample! a data"ase program might record a file error in the Application log0 The program developer decides which events to record0

System log

The System log contains events logged "y the 'indows

operating system components0 For e5ample! the failure of a driver or other system component to load during startup is recorded in the System log0 The event types logged "y system components are predetermined "y the 'indows operating system0

Security log

The Security log can record security events such as

valid and invalid logon attempts as well as events related to resource

use! such as creating! opening! or deleting files0 An administrator can specify what events are recorded in the Security log0 For e5ample! if you have ena"led logon auditing! attempts to log on to the system are recorded in the Security log0 Servers running 'indows Server ())* and 'indows ())) Server that are domain controllers might have the following additional logs in >vent ?iewer

&irectory Service log

'indows Server ())* and 'indows ()))

Server directory service logs events in the &irectory Service log0 This includes any information regarding the Active &irectory@ directory service and Active &irectory data"ase maintenance0

File :eplication Service log

File :eplication Service F:S% logs its

events in this log0 This service is used for replication of files! such as domain policies! "etween domain controllers0

&NS Server service log

This log includes events related to the

&omain Name System &NS% Server service running on 'indows Server ())* and 'indows ())) Server0 This will show only on &NS servers running 'indows Server ())* and 'indows ())) Server0 Types of Events Logged The icon on the left side of the >vent ?iewer screen descri"es the classification of the event "y the 'indows operating system0 >vent ?iewer displays these types of events

>rror

A significant pro"lem! such as loss of data or loss of

functionality0 For e5ample! if a service fails to load during startup! an error will "e logged0

'arning

An event that is not necessarily significant! "ut may

indicate a possi"le future pro"lem0 For e5ample! when dis# space is low! a warning will "e logged0

Information

An event that descri"es the successful operation of an

application! driver! or service0 For e5ample! when a networ# driver loads successfully! an information event will "e logged0

Success Audit

An audited security access attempt that succeeds0

For e5ample! a user's successful attempt to log on to the system will "e logged as a Success Audit event0

Failure Audit

An audited security access attempt that fails0 For

e5ample! if a user tries to access a networ# drive and fails! the attempt will "e logged as a Failure Audit event0 >vent Anatomy The main event components are as follows

Source

The software that logged the event! which can "e either an

application name! such as 7icrosoft SHA ServerG! or a component of the system or of a large application! such as 7S>5changeIS! which is the 7icrosoft >5change Information Store service0

Category

A classification of the event "y the event source0 For

e5ample! the security categories include Aogon and Aogoff! Policy Change! Privilege Ese! System >vent! ;"=ect Access! &etailed Trac#ing! and Account 7anagement0

>vent I& Eser

A uni3ue num"er for each source to identify the event0

The user name for the user who was logged on and wor#ing

when the event occurred0 N/A indicates that the entry did not specify a user0

Computer occurred0

The computer name for the computer where the event

&escription

This field provides the actual te5t of the event! or how

the application that logged the event e5plains what has happened0

&ata

&isplays "inary data generated "y the event in he5adecimal

"ytes% or &';:&S words% format0 Not all events generate "inary data0 Programmers and support professionals familiar with source application can interpret this information0 'hat Format to Save InB

Fenerally! you want to use the >vent Aog 0evt% format only0 This is the easiest format to read and search through! "ecause it can "e opened with >vent ?iewer on your server0 'hen you want to see events for services that you do not have installed on your computer! such as Cluster service or third$party services! save logs in 0csv format0 The 0csv files can "e opened in 7icrosoft ;ffice >5cel0 The least desira"le format that you can save logs in is 0t5t file format0 Te5t files are searcha"le! "ut they can "e cluttered with information! and it is easy to miss critical events0 Ese 0t5t format only when necessary0 2ow &o <ou Cnow It ;pened ProperlyB

The following is an e5ample of an event that does not show information properly0 Event Type : I n fo rmat i on Event Source : MSExchange IS Pr i va te Event ategory: !"#$ Event I%: &##" %ate: '()*(&##) Time: ):+,:#& PM -ser: .(/ omputer: SE0VE0./ME %escription: The description for Event I% ! &##" $ in Source ! MSExchangeIS Private $ cannot 1e found2 The 3oca3 computer may not have the necessary registry information or message %LL fi3es to disp3ay messages from a remote computer2 The fo33owing information is part of the event:

The following is the same event displayed properly0 Event Type: Information Event Source: MSExchangeIS Private Event ategory: Transport Sending Event I%: &##" %ate: '()*(&##) Time: ):+,:#& PM

-ser : .(/ o mpute r : SE0VE0./ME %escription: There are no messages ready to send2 The send thread is s3eeping2 The first event e5ample is the event as it appeared when opened on a computer without >5change Server0 The second e5ample is that same event log entry when opened on a computer running >5change Server0 If you want to open an event log and see event descriptions properly! you must open the log on the computer that has those applications or services installed0 If you need to display the event log for events that were created "y a third$party application on another computer! you might want to save the log in 0csv format to see what those events say0 There will always "e some events that you will not see properly! such as third$party services! hardware drivers! audio visual software! and "ac#up software! "ut at least you will see >5change Server events as they should appear! if you open the log on the >5change server0 >vent ?iewer &ifferences 9etween 'indows Server ())*! 'indows .P! 'indows ())) Server! and 'indows NT Server D0) In >vent ?iewer! when you press the C;P< "utton! the whole te5t recorded in the event is copied to the Clip"oard0 <ou can then paste the information anywhere you need it0 In 'indows Server ())* and 'indows .P! you can direct >vent ?iewer to loo# up registry entries on some other computer when you are opening the log0 For e5ample! on a computer running 'indows .P Professional! you can create additional shortcuts for launching >vent ?iewer0 >ach of the shortcuts can point to another computer! one for >5change Server version /0/! another for >5change ())) Server! and a third one for Cluster service! so you can open the associated event logs on your wor#station computer0

<ou can open event logs created on 'indows Server ())*! 'indows ())) Server! and 'indows NT Server D0)0 In almost all cases! all events will appear properly0 There might "e a case when 'indows NT Server D0) events will appear as something totally different when viewed on 'indows Server ())* or 'indows ())) Server0 For information! see 7icrosoft Cnowledge 9ase article *1((1,! 4&etailed Esage of the >vent ?iewer /AE.S;E:C> Switch ;ption04 Tips The following sections provide information that can help you when trou"leshooting >5change Server0 Increasing the Log Fi3e Si4e 9y default! the log file si8e is /1( #ilo"ytes C9%! which is not enough if you want to see activity over several days0 ;n a "usy application server! with some diagnostics logging! /1( C9 can "e filled with information within a few hours0 Consider increasing the log file si8e0 A log file si8e of 1) mega"ytes 79% or larger will in most cases give you enough history to show a few days of information0 >vent logs compress well0 It is common for a I) 79 Application log to compress to a ( 79 file0 Fi3tering Events If you are loo#ing for a specific event I& in the log! or you want to see =ust errors! warnings! or events logged "y a specific component! use filtering0 ;n 'indows NT Server D0)! clic# ?iew! and then clic# Filter >vents0 ;n 'indows Server ())* or 'indows ())) Server! select the log you want to filter! clic# ?iew! and then clic# Filter0 This is a useful feature when viewing large event logs0 Searching for 5eywords Consider that you want to search all events in a particular event log that mention one specific user or server0 In >vent ?iewer! clic# ?iew! and then

clic# Find0 Type a word that you want to find in any event in the &escription field! or you can search for specific information! such as event I&s or source0 If on 6indows 7P8 -se .ew Functiona3ity As mentioned previously! there is new functionality in 'indows Server ())* and 'indows .P0 <ou can redirect >vent ?iewer to loo# up registry settings and &AAs on another computer0 This is a useful and timesaving feature0 It allows you to view event logs for any type of application that you might have installed on any servers in your environment! from your computer running 'indows .P0 For more information! see 7icrosoft Cnowledge 9ase Article *1((1,! 4&etailed Esage of the >vent ?iewer /AE.S;E:C> Switch ;ption04 9et /33 Logs that :ou Might .eed In most cases! you should loo# at the Application log when trou"leshooting >5change Server0 2owever! with >5change Server ())* and >5change ())) Server! you should always also chec# the System log! "ecause of the interrelationship "etween >5change! Active &irectory! and &NS0 Consider getting "oth logs at the same time0 :eviewing "oth might show you errors on the 'indows operating system level that might e5plain the >5change Server "ehavior0

Windows Server 2003 Active Directory and Security questions

Windows inter'iew Huestions 1. W%#t;s t%e di&&eren-e $etween 'o-#'( g'o$#' #nd uni2ers#' groups/ *omain !oca! &rou$s assi&n access $ermissions to &!o(a! domain &rou$s -or !oca! domain resources. 7!o(a! &rou$s $ro'ide access to resources in ot"er trusted domains. 6ni'ersa! &rou$s &rant access to resources in a!! trusted domains. 2. I #m trying to -re#te # new uni2ers#' user group. W%y -#n;t I/ 6ni'ersa! &rou$s are a!!owed on!% in nati'e.mode Windows Ser'er 2003 en'ironments. Nati'e mode reHuires t"at a!! domain contro!!ers (e $romoted to Windows Ser'er 2003 Acti'e *irector%. 3. W%#t is 3SDOU/ Its &rou$ $o!ic% in"eritance mode!, w"ere t"e $o!icies are a$$!ied to 3oca! mac"ines, Sites, Domains and Or&ani:ationa! Units.

). W%y doesn;t 3SDOU work under Windows NT/ I- t"e NTConfig.pol -i!e e8ists, it "as t"e "i&"est $riorit% amon& t"e numerous $o!icies. 5. W%ere #re group po'i-ies stored/ PS%stem2ootPS%stem32R7rou$1o!ic% 6. W%#t is <PT #nd <P"/ 7rou$ $o!ic% tem$!ate and &rou$ $o!ic% container. F. W%ere is <PT stored/ PS%stem2ootPRSMS ;,Rs%s'o!RdomainnameR1o!iciesR76I* E. =ou -%#nge t%e group po'i-ies( #nd now t%e -omputer #nd user settings #re in -on&'i-t. W%i-% one %#s t%e %ig%est priority/ /"e com$uter settin&s take $riorit%. C. =ou w#nt to set up remote inst#''#tion pro-edure( $ut do not w#nt t%e user to g#in #--ess o2er it. W%#t do you do/ &$oname5S 6ser #on-i&uration5S Windows Settin&s5S 2emote Insta!!ation Ser'ices5S #"oice ;$tions is %our -riend. 10. W%#t;s -ont#ined in #dministr#ti2e temp'#te -on&.#dm/ <icroso-t Net<eetin& $o!icies 11. !ow -#n you restri-t running -ert#in #pp'i-#tions on # m#-%ine/ ia &rou$ $o!ic%, securit% settin&s -or t"e &rou$, t"en So-tware 2estriction 1o!icies. 12. =ou need to #utom#ti-#''y inst#'' #n #pp( $ut MSI &i'e is not #2#i'#$'e. W%#t do you do/ A .zap te8t -i!e can (e used to add a$$!ications usin& t"e So-tware Insta!!er, rat"er t"an t"e Windows Insta!!er. 13. W%#t;s t%e di&&eren-e $etween So&tw#re Inst#''er #nd Windows Inst#''er/ /"e -ormer "as -ewer $ri'i!e&es and wi!! $ro(a(!% reHuire user inter'ention. 1!us, it uses .:a$ -i!es. 1). W%#t -#n $e restri-ted on Windows Ser2er ,44+ t%#t w#sn;t t%ere in pre2ious produ-ts/ 7rou$ 1o!ic% in Windows Ser'er 2003 determines a users ri&"t to modi-% network and dia!.u$ /#1BI1 $ro$erties. 6sers ma% (e se!ecti'e!% restricted -rom modi-%in& t"eir I1 address and ot"er network con-i&uration $arameters. 15. !ow &re8uent'y is t%e -'ient po'i-y re&res%ed/ C0 minutes &i'e or take. 16. W%ere is secedit/ Its now gpupdate. 1F. =ou w#nt to -re#te # new group po'i-y $ut do not wis% to in%erit. <ake sure %ou c"eck >'o-k in%erit#n-e amon& t"e o$tions w"en creatin& t"e $o!ic%. 1E. W%#t is ?t#ttooing? t%e 1egistry/ /"e user can 'iew and modi-% user $re-erences t"at are not stored in maintained $ortions o- t"e 2e&istr%. I- t"e &rou$ $o!ic% is remo'ed or c"an&ed, t"e user $re-erence wi!! $ersist in t"e 2e&istr%. 1C. !ow do you &ig%t t#ttooing in NT@,444 inst#''#tions/ Mou cant. 20. !ow do you &ig%t t#ttooing in ,44+ inst#''#tions/ 6ser #on-i&uration . Administrati'e /em$!ates . S%stem . 7rou$ 1o!ic% . ena(!e . >n-orce S"ow 1o!icies ;n!%. 21. W%#t does Inte''iMirror do/ It "e!$s to reconci!e deskto$ settin&s, a$$!ications, and stored -i!es -or users, $articu!ar!% t"ose w"o mo'e (etween workstations or t"ose w"o must $eriodica!!% work o--!ine. 22. W%#t;s t%e m#Aor di&&eren-e $etween BAT #nd NTBS on # 'o-#' m#-%ine/ +A/ and +A/32 $ro'ide no securit% o'er !oca!!% !o&&ed.on users. ;n!% nati'e N/+S $ro'ides e8tensi'e $ermission contro! on (ot" remote and !oca! -i!es.

23. !ow do BAT #nd NTBS di&&er in #ppro#-% to user s%#res/ /"e% dont, (ot" "a'e su$$ort -or s"arin&. 2). E9p'#n t%e List Folder Contents permission on t%e &o'der in NTBS. Same as 2ead K >8ecute, (ut not in"erited (% -i!es wit"in a -o!der. 0owe'er, new!% created su(-o!ders wi!! in"erit t"is $ermission. 25. I %#2e # &i'e to w%i-% t%e user %#s #--ess( $ut %e %#s no &o'der permission to re#d it. "#n %e #--ess it/ It is $ossi(!e -or a user to na'i&ate to a -i!e -or w"ic" "e does not "a'e -o!der $ermission. /"is in'o!'es sim$!% knowin& t"e $at" o- t"e -i!e o(9ect. >'en i- t"e user cant dri!! down t"e -i!eB-o!der tree usin& <% #om$uter, "e can sti!! &ain access to t"e -i!e usin& t"e 6ni'ersa! Namin& #on'ention ?6N#@. /"e (est wa% to start wou!d (e to t%$e t"e -u!! $at" o- a -i!e into 2unT window. 26. Bor # user in se2er#' groups( #re A''ow permissions restri-ti2e or permissi2e/ 1ermissi'e, i- at !east one &rou$ "as A!!ow $ermission -or t"e -i!eB-o!der, user wi!! "a'e t"e same $ermission. 2F. Bor # user in se2er#' groups( #re Deny permissions restri-ti2e or permissi2e/ 2estricti'e, i- at !east one &rou$ "as *en% $ermission -or t"e -i!eB-o!der, user wi!! (e denied access, re&ard!ess o- ot"er &rou$ $ermissions. 2E. W%#t %idden s%#res e9ist on Windows Ser2er ,44+ inst#''#tion/ AdminU, *ri'eU, I1#U, N>/,;7;N, $rintU and SMS ;,. 2C. W%#t;s t%e di&&eren-e $etween st#nd#'one #nd &#u't0to'er#nt DBS (Distri$uted Bi'e System inst#''#tions/ /"e standa!one ser'er stores t"e *-s director% tree structure or to$o!o&% !oca!!%. /"us, i- a s"ared -o!der is inaccessi(!e or i- t"e *-s root ser'er is down, users are !e-t wit" no !ink to t"e s"ared resources. A -au!t.to!erant root node stores t"e *-s to$o!o&% in t"e Acti'e *irector%, w"ic" is re$!icated to ot"er domain contro!!ers. /"us, redundant root nodes ma% inc!ude mu!ti$!e connections to t"e same data residin& in di--erent s"ared -o!ders. 30. We;re using t%e DBS &#u't0to'er#nt inst#''#tion( $ut -#nnot #--ess it &rom # WinCD $o9. 6se t"e 6N# $at", not c!ient, on!% 2000 and 2003 c!ients can access Ser'er 2003 -au!t.to!erant s"ares. 31. W%ere e9#-t'y do &#u't0to'er#nt DBS s%#res store in&orm#tion in A-ti2e Dire-tory/ In 1artition Dnow!ed&e /a(!e, w"ic" is t"en re$!icated to ot"er domain contro!!ers. 32. "#n you use St#rt0ESe#r-% wit% DBS s%#res/ Mes. 33. W%#t pro$'ems -#n you %#2e wit% DBS inst#''ed/ /wo users o$enin& t"e redundant co$ies o- t"e -i!e at t"e same time, wit" no -i!e.!ockin& in'o!'ed in *+S, c"an&in& t"e contents and t"en sa'in&. ;n!% one -i!e wi!! (e $ro$a&ated t"rou&" *+S. 3). I run Mi-roso&t "'uster Ser2er #nd -#nnot inst#'' &#u't0to'er#nt DBS. Mea", %ou cant. Insta!! a standa!one one. 35. Is Fer$eros en-ryption symmetri- or #symmetri-/ S%mmetric. 36. !ow does Windows ,44+ Ser2er try to pre2ent # midd'e0m#n #tt#-k on en-rypted 'ine/ /ime stam$ is attac"ed to t"e initia! c!ient reHuest, encr%$ted wit" t"e s"ared ke%.

3F. W%#t %#s%ing #'gorit%ms #re used in Windows ,44+ Ser2er/ 2SA *ata Securit%s <essa&e *i&est 5 ?<*5@, $roduces a 12E.(it "as", and t"e Secure 0as" A!&orit"m 1 ?S0A.1@, $roduces a 160.(it "as". 3E. W%#t t%ird0p#rty -erti&i-#te e9-%#nge proto-o's #re used $y Windows ,44+ Ser2er/ Windows Ser'er 2003 uses t"e industr% standard 1D#S.10 certi-icate reHuest and 1D#S.F certi-icate res$onse to e8c"an&e #A certi-icates wit" t"ird. $art% certi-icate aut"orities. 3C. W%#t;s t%e num$er o& permitted unsu--ess&u' 'ogons on Administr#tor #--ount/ 6n!imited. 2emem(er, t"ou&", t"at its t"e Administrator account, not an% account t"ats $art o- t"e Administrators &rou$. )0. I& %#s%ing is one0w#y &un-tion #nd Windows Ser2er uses %#s%ing &or storing p#sswords( %ow is it possi$'e to #tt#-k t%e p#ssword 'ists( spe-i&i-#''y t%e ones using NT3M25/ A cracker wou!d !aunc" a dictionar% attack (% "as"in& e'er% ima&ina(!e term used -or $assword and t"en com$are t"e "as"es. )1. W%#t;s t%e di&&eren-e $etween guest #--ounts in Ser2er ,44+ #nd ot%er editions/ <ore restricti'e in Windows Ser'er 2003. )2. !ow m#ny p#sswords $y de&#u't #re remem$ered w%en you -%e-k ?En&or-e P#ssword !istory 1emem$ered?/ 6sers !ast 6 $asswords.

Windows Server 2003 IIS and Scripting interview questions

Windows inter'iew Huestions 1. W%#t is present#tion '#yer responsi$'e &or in t%e OSI mode'/ /"e $resentation !a%er esta(!is"es t"e data -ormat $rior to $assin& it a!on& to t"e network a$$!ications inter-ace. /#1BI1 networks $er-orm t"is task at t"e a$$!ication !a%er. 2. Does Windows Ser2er ,44+ support IP2G/ Mes, run i$'6.e8e -rom command !ine to disa(!e it. 3. "#n Windows Ser2er ,44+ &un-tion #s # $ridge/ Mes, and its a new -eature -or t"e 2003 $roduct. Mou can com(ine se'era! networks and de'ices connected 'ia se'era! ada$ters (% ena(!in& I1 routin&. ). W%#t;s t%e di&&eren-e $etween t%e $#si- disk #nd dyn#mi- disk/ /"e (asic t%$e contains $artitions, e8tended $artitions, !o&ica! dri'ers, and an assortment ostatic 'o!umesQ t"e d%namic t%$e does not use $artitions (ut d%namica!!% mana&es 'o!umes and $ro'ides ad'anced stora&e o$tions 5. W%#t;s # medi# poo'/ It is an% com$i!ation o- disks or ta$es wit" t"e same administrati'e $ro$erties. 6. !ow do you inst#'' re-o2ery -onso'e/ C:\i386\win32 /cmdcons, assumin& t"at %our Win ser'er insta!!ation is on dri'e #. F. W%#t;s new in Termin#' Ser2i-es &or Windows ,44+ Ser2er/ Su$$orts audio transmissions as we!!, a!t"ou&" $re$are -or "ea'% network !oad. E. W%#t s-ripts s%ip wit% IIS G.4/ iisweb.vsb to create, de!ete, start, sto$, and !ist We( sites, iisftp.vsb to create, de!ete, start, sto$, and !ist +/1 sites, iisdir.vsb to

create, de!ete, start, sto$, and dis$!a% 'irtua! directories, iisftpdr.vsb to create, de!ete, start, sto$, and dis$!a% 'irtua! directories under an +/1 root, iiscnfg.vbs to e8$ort and im$ort IIS con-i&uration to an =<, -i!e. C. W%#t;s t%e n#me o& t%e user w%o -onne-ts to t%e We$ site #nonymous'y/ I6S2Vcom$utername 10. W%#t se-ure #ut%enti-#tion #nd en-ryption me-%#nisms #re supported $y IIS G.4/ Aasic aut"entication, *i&est aut"entication, Ad'anced di&est aut"entication, #erti-icate.(ased We( transactions t"at use 1D#S WFB1D#S W10, +orte::a, SS,, Ser'er.7ated #r%$to&ra$"%, /rans$ort ,a%er Securit% 11. W%#t;s t%e re'#tion $etween SS3 #nd T3S/ /rans$ort ,a%er Securit% ?/,S@ e8tends SS, (% $ro'idin& cr%$to&ra$"ic aut"entication. 12. W%#t;s t%e ro'e o& %ttp.sys in IIS/ It is t"e $oint o- contact -or a!! incomin& 0//1 reHuests. It !istens -or reHuests and Hueues t"em unti! t"e% are a!! $rocessed, no more Hueues are a'ai!a(!e, or t"e We( ser'er is s"ut down. 13. W%ere;s ASP -#-%e 'o-#ted on IIS G.4/ ;n disk, as o$$osed to memor%, as it used to (e in IIS 5. 1). W%#t is so-ket poo'ing/ Non.(!ockin& socket usa&e, introduced in IIS 6.0. <ore t"an one a$$!ication can use a &i'en socket. 15. Des-ri$e t%e pro-ess o& -'ustering wit% Windows ,44+ Ser2er w%en # new node is #dded. As a node &oes on!ine, it searc"es -or ot"er nodes to 9oin (% $o!!in& t"e desi&nated interna! network. In t"is wa%, a!! nodes are noti-ied o- t"e new nodes e8istence. I- ot"er nodes cannot (e -ound on a $ree8istin& c!uster, t"e new node takes contro! o- t"e Huorum resources residin& on t"e s"ared disk t"at contains state and con-i&uration data. 16. W%#t #pp'i-#tions #re not -#p#$'e o& per&orming in Windows ,44+ Ser2er -'usters/ /"e ones written e8c!usi'e!% -or NetA>6I and I1=. 1F. W%#t;s # %e#rt$e#t/ #ommunication $rocesses (etween t"e nodes desi&ned to ensure nodes "ea!t". 1E. W%#t;s # t%res%o'd in -'ustered en2ironment/ /"e num(er o- times a restart is attem$ted, w"en t"e node -ai!s. 1C. =ou need to -%#nge #nd #dmin p#ssword on # -'ustered Windows $o9( $ut t%#t re8uires re$ooting t%e -'uster( doesn;t it/ No, it doesnt. In 2003 en'ironment %ou can do t"at 'ia c!uster.e8e uti!it% w"ic" does not reHuire re(ootin& t"e entire c!uster. 20. Bor t%e do-ument o& siHe 5 M>( w%#t siHe wou'd you e9pe-t t%e inde9 to $e wit% Inde9ing Ser2i-e/ 150.300 DA, 15.30P is a reasona(!e e8$ectation. 21. Doesn;t t%e Inde9ing Ser2i-e introdu-e # se-urity &'#w w%en #''owing #--ess to t%e inde9/ No, (ecause users can on!% 'iew t"e indices o- documents and -o!ders t"at t"e% "a'e $ermissions -or. 22. W%#t;s t%e typi-#' siHe o& t%e inde9/ ,ess t"en 100D documents . u$ to 12E <A. <ore t"an t"at . 256L <A. 23. W%i-% -%#r#-ters s%ou'd $e en-'osed in 8uotes w%en se#r-%ing t%e inde9/ K, X, U, W, Y, ? @, and Z. 2). !ow wou'd you se#r-% &or "++/ Oust enter #LL, since L is not a s$ecia! c"aracter ?and neit"er is #@. 25. W%#t #$out >#rnesINo$'e/ S"ou!d (e searc"ed -or as AarnesKNo(!e.

26. Are t%e se#r-%es -#se0sensiti2e/ No. 2F. W%#t;s t%e order o& pre-eden-e o& >oo'e#n oper#tors in Mi-roso&t Windows ,44+ Ser2er Inde9ing Ser2i-e/ N;/, AN*, N>A2, ;2. 2E. W%#t;s # 2e-tor sp#-e 8uery/ A mu!ti$!e.word Huer% w"ere t"e wei&"t can (e assi&ned to eac" o- t"e searc" words. +or e8am$!e, i- %ou want to -i&"t in-ormation on [(!ack "o!e, (ut wou!d $re-er to &i'e more wei&"t to t"e word "o!e, %ou can enter black[1] hole[20] into t"e searc" window. 2C. W%#t;s # response 8ueue/ Its t"e messa&e Hueue t"at "o!ds res$onse messa&es sent -rom t"e recei'in& a$$!ication to t"e sender. 30. W%#t;s MQPing used &or/ /estin& <icroso-t <essa&e Queue ser'ices (etween t"e nodes on a network. 31. W%i-% #dd0on p#-k#ge &or Windows ,44+ Ser2er wou'd you use to monitor t%e inst#''ed so&tw#re #nd 'i-ense -omp'i#n-e/ S<S ?S%stem <ana&ement Ser'er@. 32. W%i-% ser2i-e do you use to set up 2#rious #'erts/ <;< ?<icroso-t ;$erations <ana&er@. 33. W%#t '#ngu#ges does Windows S-ripting !ost support/ A, AScri$t, OScri$t.
Windows Admin Interview Questions

1. Des-ri$e %ow t%e D!"P 'e#se is o$t#ined. Its a -our.ste$ $rocess consistin& o- ?a@ I1 reHuest, ?(@ I1 o--er, \ I1 se!ection and ?d@ acknow!ed&ement. 2. I -#n;t seem to #--ess t%e Internet( don;t %#2e #ny #--ess to t%e -orpor#te network #nd on ip-on&ig my #ddress is 5GC.,76.J.J. W%#t %#ppened/ /"e 16C.25).].] netmask is assi&ned to Windows mac"ines runnin& CEB2000B=1 i- t"e *0#1 ser'er is not a'ai!a(!e. /"e name -or t"e tec"no!o&% is A1I1A ?Automatic 1ri'ate Internet 1rotoco! Addressin&@. 3. We;2e inst#''ed # new Windows0$#sed D!"P ser2er( %owe2er( t%e users do not seem to $e getting D!"P 'e#ses o&& o& it. /"e ser'er must (e aut"ori:ed -irst wit" t"e Acti'e *irector%.
Windows Server 2003 Interview and Certification Questions

1. !ow do you dou$'e0$oot # Win ,44+ ser2er $o9/ /"e Aoot.ini -i!e is set as read.on!%, s%stem, and "idden to $re'ent unwanted editin&. /o c"an&e t"e Aoot.ini timeout and de-au!t settin&s, use t"e S%stem o$tion in #ontro! 1ane! -rom t"e Ad'anced ta( and se!ect Startu$. 2. W%#t do you do i& e#r'ier #pp'i-#tion doesn;t run on Windows Ser2er ,44+/ W"en an a$$!ication t"at ran on an ear!ier !e&ac% 'ersion o- Windows cannot (e !oaded durin& t"e setu$ -unction or i- it !ater ma!-unctions, %ou must run t"e com$ati(i!it% mode -unction. /"is is accom$!is"ed (% ri&"t.c!ickin& t"e a$$!ication or setu$ $ro&ram and se!ectin& 1ro$erties 5S #om$ati(i!it% 5S se!ectin& t"e $re'ious!% su$$orted o$eratin& s%stem.

Windows Server 2003 Interview and Certification Questions II

1. W%#t sn#p0in #dministr#ti2e too's #re #2#i'#$'e &or A-ti2e Dire-tory/ Acti'e *irector% *omains and /rusts <ana&er, Acti'e *irector% Sites and Ser'ices <ana&er, Acti'e *irector% 6sers and 7rou$ <ana&er, Acti'e *irector% 2e$!ication ?o$tiona!, a'ai!a(!e -rom t"e 2esource Dit@, Acti'e *irector% Sc"ema <ana&er ?o$tiona!, a'ai!a(!e -rom admin$ak@ 2. W%#t types o& -'#sses e9ist in Windows Ser2er ,44+ A-ti2e Dire-tory/ o Stru-tur#' -'#ss. /"e structura! c!ass is im$ortant to t"e s%stem administrator in t"at it is t"e on!% t%$e -rom w"ic" new Acti'e *irector% o(9ects are created. Structura! c!asses are de'e!o$ed -rom eit"er t"e modi-ication o- an e8istin& structura! t%$e or t"e use o- one or more a(stract c!asses.
Windows Server 2003 Active Directory and Security questions

1. W%#t;s t%e di&&eren-e $etween 'o-#'( g'o$#' #nd uni2ers#' groups/ *omain !oca! &rou$s assi&n access $ermissions to &!o(a! domain &rou$s -or !oca! domain resources. 7!o(a! &rou$s $ro'ide access to resources in ot"er trusted domains. 6ni'ersa! &rou$s &rant access to resources in a!! trusted domains. 2. I #m trying to -re#te # new uni2ers#' user group. W%y -#n;t I/ 6ni'ersa! &rou$s are a!!owed on!% in nati'e.mode Windows Ser'er 2003 en'ironments. Nati'e mode reHuires t"at a!! domain contro!!ers (e $romoted to Windows Ser'er 2003 Acti'e *irector%. 3. W%#t is 3SDOU/ Its &rou$ $o!ic% in"eritance mode!, w"ere t"e $o!icies are a$$!ied to 3oca! mac"ines, Sites, Domains and Or&ani:ationa! Units.
Windows Server 2003 Active Directory and Security questions II

1. !ow -#n you restri-t running -ert#in #pp'i-#tions on # m#-%ine/ ia &rou$ $o!ic%, securit% settin&s -or t"e &rou$, t"en So-tware 2estriction 1o!icies. 2. =ou need to #utom#ti-#''y inst#'' #n #pp( $ut MSI &i'e is not #2#i'#$'e. W%#t do you do/ A .zap te8t -i!e can (e used to add a$$!ications usin& t"e So-tware Insta!!er, rat"er t"an t"e Windows Insta!!er. 3. W%#t;s t%e di&&eren-e $etween So&tw#re Inst#''er #nd Windows Inst#''er/ /"e -ormer "as -ewer $ri'i!e&es and wi!! $ro(a(!% reHuire user inter'ention. 1!us, it uses .:a$ -i!es.
Networ ing questions

1. W%#t is # de&#u't g#tew#y/ . /"e e8it.$oint -rom one network and entr%.wa% into anot"er network, o-ten t"e router o- t"e network. 2. !ow do you set # de&#u't route on #n IOS "is-o router/ . i$ route 0.0.0.0 0.0.0.0 8.8.8.8 ^w"ere 8.8.8.8 re$resents t"e destination address_ 3. W%#t is t%e di&&eren-e $etween # dom#in 'o-#' group #nd # g'o$#' group/ . *omain !oca! &rou$s &rant $ermissions to o(9ects wit"in t"e domain in w"ic" t"e

). 5. 6. F.

reside. 7!o(a! &rou$s contain &rant $ermissions tree or -orest wide -or an% o(9ects wit"in t"e Acti'e *irector%. W%#t is 3DAP used &or/ . ,*A1 is a set o- $rotoco! used -or $ro'idin& access to in-ormation directories. W%#t too' %#2e you used to -re#te #nd #n#'yHe p#-ket -#ptures/ . Network <onitor in Win2D B Win2D3, >t"erea! in ,inu8, ;$ti iew Series II ?(% +!uke Networks@. !ow does !S1P work/ W%#t is t%e signi&i-#n-e o& t%e IP #ddress ,77.,77.,77.,77/ . /"e !imited (roadcast address is uti!i:ed w"en an I1 node must $er-orm a one.to.e'er%one de!i'er% on t"e !oca! network (ut t"e network I* is unknown.

Windows sysadmin interview questions

1. W%#t #re t%e re8uired -omponents o& Windows Ser2er ,44+ &or inst#''ing E9-%#nge ,44+/ . AS1.N>/, S</1, NN/1, W3S # 2. W%#t must $e done to #n AD &orest $e&ore E9-%#nge -#n $e dep'oyed/ . Setu$ B-orest$re$ 3. W%#t E9-%#nge pro-ess is responsi$'e &or -ommuni-#tion wit% AD/ . *SA##>SS ). W%#t + types o& dom#in -ontro''er does E9-%#nge #--ess/ . Norma! *omain #ontro!!er, 7!o(a! #ata!o&, #on-i&uration *omain #ontro!!er 5. W%#t -onne-tor type wou'd you use to -onne-t to t%e Internet( #nd w%#t #re t%e two met%ods o& sending m#i' o2er t%#t -onne-tor/ . S</1 #onnector: +orward to smart "ost or use *NS to route to eac" address 6. !ow wou'd you optimise E9-%#nge ,44+ memory us#ge on # Windows Ser2er ,44+ ser2er wit% more t%#n 5<$ o& memory/ . Add B37( switc" to (oot.ini F. W%#t wou'd # rise in remote 8ueue 'engt% gener#''y indi-#te/ . /"is means mai! is not (ein& sent to ot"er ser'ers. /"is can (e e8$!ained (% outa&es or $er-ormance issues wit" t"e network or remote ser'ers. E. W%#t wou'd # rise in t%e 3o-#' De'i2ery 8ueue gener#''y me#n/ . /"is indicates a $er-ormance issue or outa&e on t"e !oca! ser'er. 2easons cou!d (e s!owness in consu!tin& A*, s!owness in "andin& messa&es o-- to !oca! de!i'er% or S</1 de!i'er%. It cou!d a!so (e data(ases (ein& dismounted or a !ack o- disk s$ace. C. W%#t #re t%e st#nd#rd port num$ers &or SMTP( POP+( IMAP6( 1P"( 3DAP #nd <'o$#' "#t#'og/ . S</1 5 25, 1;13 5 110, I<A1) 5 1)3, 21# 5 135, ,*A1 5 3EC, 7!o(a! #ata!o& . 326E 10. N#me t%e pro-ess n#mes &or t%e &o''owing) System Attend#nt3 5 <A*.>=>, In-ormation Store 5 S/;2>.>=>, S</1B1;1BI<A1B;WA 5 IN>/IN+;.>=> 11. W%#t is t%e m#9imum #mount o& d#t#$#ses t%#t -#n $e %osted on E9-%#nge ,44+ Enterprise/ . 20 data(ases. ) S7s 8 5 *As. 12. W%#t #re t%e dis#d2#nt#ges o& -ir-u'#r 'ogging/ . In t"e e'ent o- a corru$t data(ase, data can on!% (e restored to t"e !ast (acku$.

Q. What is "#P$%P Ans0 &ransmission (ontrol 0rotocol1%nternet 0rotocol A protocol #or communication between computers, used as a standard #or transmitting data over networ/s and as the basis #or standard %nternet protocols Or &ransmission (ontrol 0rotocol1%nternet 0rotocol (ommunication protocol suite and standard #or all %nternet-connected machines

"y&es of bac'(&

The 9ac#up utility supports five methods of "ac#ing up data on your computer or networ#0
#o&y bac'(&

A copy "ac#up copies all the files you select! "ut does not mar# each file as having "een "ac#ed up in other words! the archive attri"ute is not cleared%0 Copying is useful if you want to "ac# up files "etween normal and incremental "ac#ups "ecause copying does not affect these other "ac#up operations0
)aily bac'(&

A daily "ac#up copies all the files that you select that have "een modified on the day the daily "ac#up is performed0 The "ac#ed$up files are not mar#ed as having "een "ac#ed up in other words! the archive attri"ute is not cleared%0
)ifferential bac'(&

A differential "ac#up copies files that have "een created or changed since the last normal or incremental "ac#up0 It does not mar# files as having "een "ac#ed up in other words! the archive attri"ute is not cleared%0 If you are performing a com"ination of normal and differential "ac#ups! restoring files and folders re3uires that you have the last normal as well as the last differential "ac#up0
%ncre ental bac'(&

An incremental "ac#up "ac#s up only those files that have "een created or changed since the last normal or incremental "ac#up0 It mar#s files as having "een "ac#ed up in other words! the archive attri"ute is cleared%0 If you use a com"ination of normal and

incremental "ac#ups! you will need to have the last normal "ac#up set as well as all incremental "ac#up sets to restore your data0
*or al bac'(&

A normal "ac#up copies all the files you select and mar#s each file as having "een "ac#ed up in other words! the archive attri"ute is cleared%0 'ith normal "ac#ups! you only need the most recent copy of the "ac#up file or tape to restore all of the files0 <ou usually perform a normal "ac#up the first time you create a "ac#up set0 9ac#ing up your data using a com"ination of normal "ac#ups and incremental "ac#ups re3uires the least amount of storage space and is the 3uic#est "ac#up method0 2owever! recovering files can "e time$ consuming and difficult "ecause the "ac#up set might "e stored on several dis#s or tapes0 9ac#ing up your data using a com"ination of normal "ac#ups and differential "ac#ups is more time$consuming! especially if your data changes fre3uently! "ut it is easier to restore the data "ecause the "ac#up set is usually stored on only a few dis#s or tapes0 Q. Di&&eren-e $etween DNS #nd WINS
/ns:; 2%3. 4 2indows %nternet 3ame .ervice '2indows' being /ey word

2%3. resolves netbios computer names to %0 address D3. resolves hostnames to an ip address %# you go through your networ/ settings #or the &(01%0 protocol, you will notice you can use a di##erent 'hostname' #rom 'computername' 2%3. 4 )y(omputer 4 567 589 : 5 D3. 4 )y(omputer )yDomain (om 4 567 589 : 5 %.S is primari3y used to reso3ve domain names to the IP addresses that are he3d in %omain .ame Servers2 6ithout %.S servers8 you wou3d have to type and IP address to get to a we1 site2 Servers use 6I.s to reso3ve .et1ios )< 3etter names to IP addresses2 6I.S is genera33y used on L/.S8 and not 6/.S2 %.S is primari3y used on 6/.S2

O.% )OD$;

The 4S M,de)
ntr,d0cti,n

&he %$$$ #ormed the 9:7 committee in +ebruary 569: with the aim o# standardizing the ;A3 architectures by de#ining the Open .ystem %nterconnection (O.%) model O# the O.% model, the Data ;in/ layer was split into two, the )edia Access (ontrol ()A() sub-layer and the 9:7 7 ;ogical ;in/ (ontrol (;;() sub-layer

!ou can ma/e up e,pressions to remember the order o# the < layers, #or e,ample, "Angus 0re#ers .ausages &o 3ibbling Dried 0or/" or "A 0retty .illy &ric/ 3ever Does 0lease" % remember it best using the natty e,pression "Application, 0resentation, .ession, &ransport, 3etwor/, Data lin/, 0hysical" %t =ust rolls o## the tongue>

&he O.% protocol set is rarely used today, however the model that was developed serves as a use#ul guide to re#er other protocol stac/s such as A&), &(01%0 and .0?1%0?

%--)icati,n La*er =
%t is employed in so#tware pac/ages which implement client-server so#tware 2hen an application on one computer starts communicating with another computer, then the Application layer is used &he header contains parameters that are agreed between applications &his header is o#ten only

sent at the beginning o# an application operation $,amples o# services within the application layer include: +&0 D3. .3)0 .)&0 gateways 2eb browser 3etwor/ +ile .ystem (3+.) &elnet and @emote ;ogin (rlogin) ? A:: +&A) Database so#tware 0rint .erver .o#tware

(resentati,n La*er >


&his provides #unction call e,change between host operating systems and so#tware layers %t de#ines the #ormat o# data being sent and any encryption that may be used $,amples o# services used are listed below: )%D% B&); C%+ &%++ D0$C A.(%% $-(D%(

Sessi,n La*er ?
&he .ession layer de#ines how data conversations are started, controlled and #inished &he messages may be bidirectional and there may be many o# them, the session layer manages these conversations and creates noti#ications i# some messages #ail %ndications show whether a pac/et is in the middle o# a conversation #low or at the end Only a#ter a completed conversation will the data be passed up to layer 8 $,amples o# .ession layer protocols are listed below: @0( .E; 3et-%O. names Appletal/ A.0 D$(net .(0

Trans-,rt La*er <


&his layer is resonsible #or the ordering and reassembly o# pac/ets that may have been bro/en up to travel across certain media .ome protocols in this layer also per#orm error recovery A#ter error recovery and reordering the data part is passed up to layer F $,amples are: &(0 UD0 .0?

!etw,rk La*er 3
&his layer is responsible #or the delivery o# pac/ets end to end and implements a logical addressing scheme to help accomplish this @outing pac/ets through a networ/ is also de#ined at this layer plus a method to #ragment large pac/ets into smaller ones depending on )&Us #or

di##erent media (0ac/et .witching) Once the data #rom layer 7 has been received, layer G e,amines the destination address and i# it is the address o# its own end station, it passes the data a#ter the layer G header to layer A $,amples o# ;ayer G protocols include: Appletal/ DD0 %0 %0?

'ata Link La*er 2


&his layer deals with getting data across a speci#ic medium and individual lin/s by providing one or more data lin/ connections between two networ/ entities $nd points are speci#ically identi#ied, i# reHuired by the 3etwor/ layer .eHuencing &he #rames are maintained in the correct seHuence and there are #acilities #or +low control and Euality o# .ervice parameters such as &hroughput, .ervice Availability and &ransit Delay

$,amples include: %$$$ 9:7 7 %$$$ 9:7 G 9:7 F - &o/en @ing BD;( +rame @elay +DD% A&) 000

&he Data lin/ layer per#orms the error chec/ using the +rame (hec/ .eHuence (+(.) in the trailer and discards the #rame i# an error is detected %t then loo/s at the addresses to see i# it needs to process the rest o# the #rame itsel# or whether to pass it on to another host &he data

between the header and the trailer is passed to layer G &he )A( layer concerns itsel# with the access control method and determines how use o# the physical transmission is controlled and provides the to/en ring protocols that de#ine how a to/en ring operates &he ;;( shields the higher level layers #rom concerns with the speci#ic ;A3 implementation

(h*sica) La*er ;
&his layer deals with the physical aspects o# the media being used to transmit the data &his de#ines things li/e pinouts, electrical characteristics, modulation and encoding o# data bits on carrier signals %t ensures bit synchronisation and places the binary pattern that it receives into a receive bu##er Once it decodes the bit stream, the physical layer noti#ies the data lin/ layer that a #rame has been received and passes it up $,amples o# speci#ications include: I 7A I GF $%A1&%A-7G7 $%A1&%A-AA6 +DD% 9:7 G 9:7 F $thernet @DAF 3@J 3@J%

!ou will notice that some protocols span a number o# layers (e g 3+., 9:7 G etc ) A bene#it o# the seven layer model is that so#tware can be written in a modular way to deal speci#ically with one or two layers only, this is o#ten called Modular Engineering

$ach layer has its own header containing in#ormation relevant to its role &his header is passed down to the layer below which in turn adds its own header (encapsulates) until eventually the 0hysical layer adds the layer 7 in#ormation #or passage to the ne,t device which understands the layer 7 in#ormation and can then strip each o# the layers" headers in turn to get at the data in the right location $ach layer within an end station communicates at the same layer within another end station

+,% !odel Layers


Application J Presentation J Session J Transport Networ# J &ata Ain# J Physical

Layer App'i-#tion
User Inter&#-e

-(nction
used -or a$$!ications s$eci-ica!!% written to run o'er t"e network a!!ows access to network ser'ices t"at su$$ort a$$!icationsQ direct!% re$resents t"e ser'ices t"at direct!% su$$ort user a$$!ications "and!es network access, -!ow contro! and error reco'er% >8am$!e a$$s are -i!e trans-er,e.mai!, NetAI;S. (ased a$$!ications /rans!ates -rom a$$!ication to network -ormat and 'ice.'ersa a!! di--erent -ormats -rom a!! sources are made into a common uni-orm -ormat t"at t"e rest o- t"e ;SI mode! can understand res$onsi(!e -or $rotoco! con'ersion, c"aracter con'ersion,data encr%$tion B decr%$tion, e8$andin& &ra$"ics commands, data com$ression sets standards -or di--erent s%stems to $ro'ide seam!ess communication -rom mu!ti$!e $rotoco! stacks

Protocols

*etwor' #o &onents

*NSQ +/1Q /+/1Q <#tew#y A;;/1Q SN<1Q2,;7INQ S</1Q <I<>Q N+SQ +IN7>2Q />,N>/Q N#1Q A11#Q A+1Q S<A

Present#tion
Tr#ns'#tion

<#tew#y 1edire-tor

Session
?syn-s #nd sessions?

not a!wa%s im$!emented in a network $rotoco! esta(!is"es, maintains and ends NetAI;S sessions across t"e network res$onsi(!e -or name Names 1i$es reco&nition ?identi-ication@ so on!% t"e desi&nated $arties can <ai! S!ots $artici$ate in t"e session $ro'ides s%nc"roni:ation 21# ser'ices (% $!annin& c"eck $oints in t"e data stream `S isession -ai!s, on!% data a-ter t"e most recent c"eck$oint need (e transmitted mana&es w"o can transmit data at a certain time and -or "ow !on& >8am$!es are interacti'e !o&in

<#tew#y

Windows sysadmin interview questions

1. W%#t #re t%e re8uired -omponents o& Windows Ser2er ,44+ &or inst#''ing E9-%#nge ,44+/ . AS1.N>/, S</1, NN/1, W3S # 2. W%#t must $e done to #n AD &orest $e&ore E9-%#nge -#n $e dep'oyed/ . Setu$ B-orest$re$ 3. W%#t E9-%#nge pro-ess is responsi$'e &or -ommuni-#tion wit% AD/ . *SA##>SS ). W%#t + types o& dom#in -ontro''er does E9-%#nge #--ess/ . Norma! *omain #ontro!!er, 7!o(a! #ata!o&, #on-i&uration *omain #ontro!!er 5. W%#t -onne-tor type wou'd you use to -onne-t to t%e Internet( #nd w%#t #re t%e two met%ods o& sending m#i' o2er t%#t -onne-tor/ . S</1 #onnector: +orward to smart "ost or use *NS to route to eac" address 6. !ow wou'd you optimise E9-%#nge ,44+ memory us#ge on # Windows Ser2er ,44+ ser2er wit% more t%#n 5<$ o& memory/ . Add B37( switc" to (oot.ini F. W%#t wou'd # rise in remote 8ueue 'engt% gener#''y indi-#te/ . /"is means mai! is not (ein& sent to ot"er ser'ers. /"is can (e e8$!ained (% outa&es or $er-ormance issues wit" t"e network or remote ser'ers. E. W%#t wou'd # rise in t%e 3o-#' De'i2ery 8ueue gener#''y me#n/ . /"is indicates a $er-ormance issue or outa&e on t"e !oca! ser'er. 2easons cou!d (e s!owness in consu!tin& A*, s!owness in "andin& messa&es o-- to !oca! de!i'er% or S</1 de!i'er%. It cou!d a!so (e data(ases (ein& dismounted or a !ack o- disk s$ace. C. W%#t #re t%e st#nd#rd port num$ers &or SMTP( POP+( IMAP6( 1P"( 3DAP #nd <'o$#' "#t#'og/ . S</1 5 25, 1;13 5 110, I<A1) 5 1)3, 21# 5 135, ,*A1 5 3EC, 7!o(a! #ata!o& . 326E 10. N#me t%e pro-ess n#mes &or t%e &o''owing) System Attend#nt3 5 <A*.>=>, In-ormation Store 5 S/;2>.>=>, S</1B1;1BI<A1B;WA 5 IN>/IN+;.>=> 11. W%#t is t%e m#9imum #mount o& d#t#$#ses t%#t -#n $e %osted on E9-%#nge ,44+ Enterprise/ . 20 data(ases. ) S7s 8 5 *As. 12. W%#t #re t%e dis#d2#nt#ges o& -ir-u'#r 'ogging/ . In t"e e'ent o- a corru$t data(ase, data can on!% (e restored to t"e !ast (acku$.
Networ ing questions

1. W%#t is # de&#u't g#tew#y/ . /"e e8it.$oint -rom one network and entr%.wa% into anot"er network, o-ten t"e router o- t"e network. 2. !ow do you set # de&#u't route on #n IOS "is-o router/ . i$ route 0.0.0.0 0.0.0.0 8.8.8.8 ^w"ere 8.8.8.8 re$resents t"e destination address_ 3. W%#t is t%e di&&eren-e $etween # dom#in 'o-#' group #nd # g'o$#' group/ . *omain !oca! &rou$s &rant $ermissions to o(9ects wit"in t"e domain in w"ic" t"e reside. 7!o(a! &rou$s contain &rant $ermissions tree or -orest wide -or an% o(9ects wit"in t"e Acti'e *irector%. ). W%#t is 3DAP used &or/ . ,*A1 is a set o- $rotoco! used -or $ro'idin& access to in-ormation directories.

5. W%#t too' %#2e you used to -re#te #nd #n#'yHe p#-ket -#ptures/ . Network <onitor in Win2D B Win2D3, >t"erea! in ,inu8, ;$ti iew Series II ?(% +!uke Networks@. 6. !ow does !S1P work/ F. W%#t is t%e signi&i-#n-e o& t%e IP #ddress ,77.,77.,77.,77/ . /"e !imited (roadcast address is uti!i:ed w"en an I1 node must $er-orm a one.to.e'er%one de!i'er% on t"e !oca! network (ut t"e network I* is unknown. Q. W%#t is t%e de&#u't dom#in &un-tion#' 'e2e' in Windows Ser2er ,44+ Ans! 'efa0)t ',.ain f0ncti,na) )eve) Mi9 .,de

',.ain 30ncti,na) Leve)


Domain #unctionality activates #eatures that a##ect the whole domain and that domain only &he #our domain #unctional levels, their corresponding #eatures, and supported domain controllers are as #ollows:
Wind,ws 2::: .i9ed @defa0)tA
.upported domain controllers: )icroso#t 2indows 3& A :, 2indows 7:::, 2indows .erver 7::G Activated #eatures: local and global groups, global catalog support

Wind,ws 2::: native

.upported domain controllers: 2indows 7:::, 2indows .erver 7::G K Activated #eatures: group nesting, universal groups, .idBistory, converting groups between security groups and distribution groups, you can raise domain levels by
increasing the #orest level settings

3eat0res ,f E9chan+e server 2::=


%ns. Anti"spam and Antivirus
-eat(re *ew or )escri&tion U&dated in ,P.

>dge Transport server role

/"is ser'er ro!e is -or $erimeter network de$!o%ment. It su$$orts Sim$!e <ai! /rans-er 1rotoco! ?S</1@ routin&, $ro'ides anti. s$am -i!terin& tec"no!o&ies and su$$ort -or anti'irus e8tensi(i!it%. /"e >d&e /rans$ort ser'er s"ou!d (e iso!ated -rom t"e Acti'e *irector% director% ser'ices, (ut can sti!! !e'era&e Acti'e *irector% -or reci$ient -i!terin& (% usin& Acti'e *irector% A$$!ication <ode ?A*A<@. >d&eS%nc in >8c"an&e Ser'er 200F $u(!is"es $ertinent or&ani:ation in-ormation, encr%$ted, to t"e >d&e /rans$ort ser'er -or use in ro(ust reci$ient -i!terin& and res$ects <icroso-t ;ut!ook sa-e sender !ists on t"e >d&e. #ommunications (etween t"e >d&e /rans$ort ser'er and t"e

-eat(re

*ew or )escri&tion U&dated in ,P.

interna! network in an >8c"an&e Ser'er 200F or&ani:ation are encr%$ted (% de-au!t. >d&e /rans$ort inc!udes anti.s$am tec"no!o&ies t"at $rotect at man% !a%ers.
Anti$spam- Connection Filtering >5change Server ())K provides an integrated! IP "ased "loc#$and$allow list "ased on sender reputation0 Aists are automatically updated as new versions "ecome availa"le0 Administrators can esta"lish additional IP allow$or$deny lists as needed0 Anti$spam- Sender and :ecipient Filtering Sender reputation is dynamically analy8ed and updated0 'hen the >dge Transport server spots specific trends from a given domain! it can impose certain actions to either 3uarantine or re=ect incoming messages0 Sender I& is also used to verify that each e$mail message originates from the Internet domain from which it claims to come from "ased on the sender's S7TP server IP address0 ;nce a Sender I& record has "een verified! the results can "e cross$referenced to past traffic patterns and sender reputation! creating an associate weight into the domain reputation0 Finally! recipients are validated! and administrators have the a"ility to "loc# messages sent to non$e5istent user accounts or internal$only distri"ution lists Anti$spam- Safe Sender Aist Aggregation Anti$spam- Sender I& ?ia >dgeSync! the >dge Transport server respects ;utloo# ())* and ;utloo# ())K safe sender lists to help reduce false positives0 >5change Server ())K em"eds support for Sender I&! an e$mail industry initiative designed to verify that each e$mail message originates from the Internet domain from which it claims to come "ased on the sender's S7TP server IP address0 Sender I& helps prevent domain spoofing and protect legitimate sendersL domain names and reputation and helps recipients more effectively identify and filter =un# e$mail and phishing scams0 Anti$spam- Content Filtering Content is analy8ed using the Intelligent 7essage Filter I7F%! >5change Server's implementation of 7icrosoft SmartScreen content filtering technology0 SmartScreen is "ased on 7icrosoft :esearch's patented machine$learning technology0 Anti$phishing capa"ilities are also "uilt$in to the I7F to help detect fraudulent lin#s or spoofed domains and protect users from these types of online scams0 'hen used with ;utloo# ())K! a phishing warning or "loc# appears in the user interface0 Customers are protected from emerging spam attac#s through the automatic filter updates for >5change Server ())K! which are pu"lished

-eat(re

*ew or )escri&tion U&dated in ,P. on a fre3uent "asis0 Should the administrator re3uire additional control! the >dge Transport server ena"les customi8ation! including the a"ility to add words or phrases to the filter0

Anti$spam- ;utloo# >$7ail Postmar#

>5change ())K verifies ;utloo# >$mail Postmar#s attached to messages sent from ;utloo# ())K0 The ;utloo# >$mail Postmar# can reduce false positives for messages from legitimate senders that have little to no reputation0

Anti$spam- Spam Assessment

In addition to scanning message content! the I7F consolidates guidance from Connection! Sender/:ecipient! Sender :eputation! Sender I& verification! and ;utloo# >$mail Postmar# validation to apply a Spam Confidence Aevel SCA% rating to a given message0 Administrators can preconfigure actions on the message "ased on this SCA rating0 Actions may include deliver to the in"o5 or =un# mail folder! deliver to the spam 3uarantine! or re=ect outright and no deliver0

Anti$spam- Service :esilience

The >dge Transport server role controls the in"ound S7TP message receipt rate for increased availa"ility0 This control! coupled with the a"ility to detect open pro5y machines! can aid in preventing denial of service attac#s0 Tar pitting is supported to slow the server response for certain S7TP communication patterns! minimi8ing e5posure to directory harvest attac#s0

Anti$spam- Anti$spam Stamp

7essages filtered "y the >dge Transport server role are stamped with information! including why the message was considered spam and which com"ination of filters and reputation services IP! domain! sender! recipient! content% determined its spam assessment0 Administrators may use this information in an aggregate way to understand the effectiveness of filtering across their multilayered approach and tune appropriately0

Anti$spam- Two$Tiered Spam Huarantine

The >5change Server ())K environment ena"les two$tiered spam 3uarantine0 First! administrators have access to a Spam Huarantine housed in the perimeter networ#0 Esing ;utloo#! administrators can access the Spam Huarantine to search for messages! release to the recipient! or re=ect and delete0 7essages with "orderline SCA ratings "orderline definition configured "y the administrator% may "e released to the end user's =un# mail folder in ;utloo#! and are converted to plain te5t for further protection0

Anti$spam- Consolidated 7anagement

7anagement of the >dge Transport Server role and corresponding rules is consistent with the rest of the >5change environment and can "e performed using the >5change 7anagement Console graphical interface

-eat(re

*ew or )escri&tion U&dated in ,P. or the >5change 7anagement Shell for automation0 Finally! the administrator can leverage notifications through 7icrosoft ;perations 7anager 7;7% or reports within >5change to analy8e the effectiveness of their anti$spam filters0

Antivirus >5tensi"ility-Attachment Filtering Antivirus >5tensi"ility- >dge Protocol :ules

To effectively protect against worms delivered via e$mail! the administrator can strip attachments "ased on their si8e! content or file type0 Mip file manifests can "e e5amined as well for offending file types0 As a reactive defense mechanism! protocol rules provide a layer of protection "efore antivirus signature updates "ecome availa"le0 Administrators can filter on #nown te5t patterns in malware carriers and drop the connection0

Antivirus >5tensi"ilityAntivirus Stamp

7essages scanned in the >5change environment can "e assigned an antivirus stamp0 This stamp identifies which engine did the scanning! which signature was used! and when the message was last scanned0

Antivirus >5tensi"ility- &eep Integration for Antivirus Scanning

Antivirus solutions can "e more tightly integrated in the >5change Server ())K environment0 Antivirus solutions have access to the 7ultipurpose Internet 7ail >5tensions 7I7>% parsers and can scan the message stream in transport on >dge Transport or 2u" Transport servers%0 Catching viruses in transport helps prevent their delivery and storage in >5change mail"o5es0

2osted Filtering Integration

>5change Server ())K provides integration with >5change 2osted Services! offering off$site protection against spam and viruses0

Confidentia# $essaging
-eat(re *ew or U&dated in ,P. )escri&tion

Intra$;rg >ncryption

All mail traveling within an >5change Server ())K organi8ation is encrypted "y default0 Transport Aayer Security TAS% is used for server$to$server traffic! :emote Procedure Call :PC% is used for ;utloo# connections! and Secure Soc#et Aayers SSA% is used for Client Access traffic ;utloo# 'e" Access! >5change ActiveSync! and 'e" Services%0 This prevents spoofing and provides confidentiality messages in transit0

SSA Certificates Automatically Installed ;pportunistic TAS

SSA certificates are installed "y default in >5change Server ())K! ena"ling "road use of SSA and TAS encryption from clients such as ;utloo# 'e" Access and other S7TP servers0

If the destination S7TP server supports TAS via the NSTA:TTASO S7TP command% when sending out"ound e$mail from >5change Server ())K! >5change Server will

-eat(re

*ew or U&dated in ,P.

)escri&tion

>ncryption

automatically encrypt the out"ound content using TAS0 In addition! in"ound e$mail sent to >5change Server ())K from the internet will "e encrypted if the sending server supports TAS >5change Server ())K automatically installs SSA certificates%0

S/7I7> Support

<es

Secure 7ultipurpose Internet 7ail >5tensions S/7I7>% ena"les users to send signed and encrypted e$mail to one another from a variety of devices! including ;utloo#! ;utloo# 'e" Access! and 'indows 7o"ile ,0) using >5change ActiveSync0

Comp#iance
-eat(re *ew or U&dated in ,P. <es )escri&tion

Transport :ules

>5change Server ())K includes a policy engine "ased on rules that e5ecute on 2u" Transport servers0 'ith Transport :ules! administrators and compliance officers can esta"lish and enforce regulatory or corporate policies on internal or out"ound e$mail! voice mail! or fa50 For e5ample! using a wi8ard in the >5change 7anagement Console or the command line in >5change 7anagement Shell! rules can "e written that would prohi"it communication "etween mem"ers of distinct distri"ution lists! append a disclaimer to any message "eing sent e5ternally! or 9CC the compliance officer anytime a specific phrase appears in the su"=ect or content of a message0

7essaging :ecords 7anagement

?arious corporate retention policies e5ist for e$mail! voice mail! and fa5 communications0 'ith 7anaged Folders! a user can organi8e messages into ;utloo# folders that are provisioned and managed "y the administrator0 An automated process scans the in"o5 and these folders to retain! e5pire! or =ournal communications "ased on compliance re3uirements0

Fle5i"le Pournaling

Pournaling is fle5i"le in >5change Server ())K0 Pournaling can "e triggered per data"ase! per distri"ution list! or per user0 All messages can "e =ournaled! or =ust those sent internally or e5ternally0

7ulti$ 7ail"o5 Search

Esing the 7icrosoft standard search technology! content in >5change Server ())K mail"o5es is fully inde5ed and searcha"le using a variety of criteria0 If compliance or legal re3uirements re3uire information discovery! administrators can search across multiple mail"o5es within an organi8ation with a single 3uery! routing the results to a 7icrosoft 'indows SharePoint Services site! a new or e5isting local PST file! or mail"o5 that can "e made availa"le via ;utloo# to 2:! compliance officers! or others0

Archive Integration

Pournaled messages can "e archived to any S7TP address! including an >5change mail"o5 or 'indows SharePoint Services site0

%usiness Continuity

-eat(re

*ew or U&dated in ,P.

)escri&tion

Aocal Continuous :eplication

Availa"ility can "e increased using continuous replication of data across multiple dis#s on a single server0 This esta"lishes a second copy of the production data"ase on the local server that is #ept up$to$date automatically0 In the event of a dis# failure or data corruption! switching over to the copy data"ase provides a less costly and less comple5 recovery solution for the administrator0

Cluster Continuous :eplication

Availa"ility can "e increased using replication in an active/passive cluster0 &ata recorded on the active server node is copied to the passive server node! ena"ling a copy of not only server configuration and settings "ut data as well0 9y not re3uiring shared storage! the active node and passive node can "e located in separate geographical locations without the performance impact of synchronous replication solutions0 Automated failover to the passive server node is transparent to the end user! dramatically reducing the ris# of data loss "y relying on logs and 3ueues and providing a less costly and less comple5 recovery solution for the administrator0

Stand"y Continuous :eplication

<es

Availa"ility can "e increased using replication "etween geographically dispersed data centers in com"ination with AC: and CC:0 &ata recorded on the source server node is copied to a destination server node the stand"y server% and multiple destination servers can "e created for a single source server0 In the event of a dis# failure! data corruption! or complete site failure! the administrator can switch to the stand"y server preventing data loss and ena"ling a seamless transition for users! providing a less costly and less comple5 recovery solution for the administrator0

Fast and Fewer 9ac#ups

9ac#ups can "e run against the copy of the production data"ase on either the local server or passive server node! decreasing the performance impact on production0 Continuous :eplication also reduces the fre3uency of costly! full dis# or tape "ac#ups currently used for disaster recovery0

&ata"ase Porta"ility

In the case of a complete server failure! an empty dial tone mail"o5 data"ase can "e created on a new server! ena"ling users to send and receive e$mail while recovery is underway0 A "ac#up of the mail"o5 data"ase can then "e recovered into the dial tone data"ase even though the original data"ase in the "ac#up was created on a different server0

Top of page

Anyw&ere Access

>8c"an&e Ser'er 200F o--ers -eatures t"at a!!ow %ou and %our em$!o%ees an%w"ere access to e.mai!, ca!endarin&, and more. See w"at -eatures are inc!uded wit" >8c"an&e Ser'er 200F -or an%w"ere access in t"e ta(!e (e!ow.
Ca#endaring

-eat(re

*ew or U&dated in ,P.

)escri&tion

Calendar Attendant

The Calendar Attendant reduces scheduling conflicts "y limiting calendar items re3uest! declines! accepts% in the in"o5 to the latest version0 The Calendar Attendant also mar#s meeting re3uests as tentative on recipient calendars until users can act on the re3uest and relies on the >5change Server ())K free/"usy 'e" service for always up$to$date availa"ility information0

:esource 9oo#ing Attendant

The :esource 9oo#ing Attendant ena"les resources! including meeting rooms or other e3uipment! to "e automatically managed0 :esources can auto$accept re3uests when availa"le or decline and provide details e5plaining the decline0 Administrators can set granular policies on resources! including availa"le hours or scheduling permissions0

Scheduling Assistant

The Scheduling Assistant helps users efficiently schedule meetings "y providing visual guidance on the "est and worst dates and times to meet "ased on meeting invitees and re3uired resources0

Schedula"le ;ut of ;ffice

;ut of ;ffice ;;F% messages can now "e scheduled to "egin and end on specific dates and times! reducing the li#elihood of a userLs out of ;;F not "eing set0 A separate out of office message can "e sent to e5ternal recipients! a capa"ility the administrator can ena"le or disa"le0 ;ut of ;ffice messages can also "e set or unset from a mo"ile device0

$o'i#e $essaging
-eat(re *ew or U&dated in ,P. )escri&tion

Search

Information can "e 3uic#ly found from a mo"ile device using the search capa"ility of >5change ActiveSync0 'hen e5ecuting a search from a mo"ile device! "oth the local device store and the userLs entire >5change mail"o5 are 3ueried0 :esults found through the over$the$air search of the >5change mail"o5 can "e rapidly retrieved to the device0 This capa"ility ena"les access to information sent or received days! wee#s! or even months "efore! regardless of the storage limitations of the mo"ile device0

&irect Push

7o"ile devices incorporating >5change ActiveSync maintain a secure connection with >5change Server ())K! receiving new or updated e$mail! calendar! contacts! and tas#s as soon as they arrive on the server0 This push method optimi8es "andwidth usage while #eeping users up$to$date0

:ich >5perience on a 9readth of &evices

Esers can get a familiar e5perience on a range of mo"ile devices without re3uiring the organi8ation to deploy e5pensive third$party software or services0 The >5change Server ())K ActiveSync protocol is licensed for use "y 'indows 7o"ile! No#ia! Sym"ian! 7otorola! Sony >ricsson! Palm! and &ata?i80 Fiven the "readth of partners! device choice continues to e5pand0

&evice

<es

Administrators may choose to enforce policies on devices used in their organi8ations

-eat(re

*ew or U&dated in ,P.

)escri&tion

Security and 7anagement

including re3uiring PINs of varying length and strength and enforcing a device wipe of data and applications! should the device "e lost or stolen0 These controls "ecome granular with >5change Server ())K! allowing per$user policies0 &evice usage can "e trac#ed and managed centrally within the >5change Server environment0 Service Pac# 1 SP1% includes (+ new policies across device! networ#! application! and security control0

Ain#Access

'hen a user receives a lin# to a 'indows SharePoint Services site or file share while using a mo"ile device! >5change Server ())K uses Ain#Access to retrieve and display the document! no ?PN or tunnel re3uired0

Calendaring and ;ut of ;ffice

'ith >5change Server ())K! users have many new options when accessing their calendar from a mo"ile device using >5change ActiveSync0 They can reply to a meeting invitation with a message! forward the invitation to another person! and view acceptance trac#ing for meeting attendees0 ;ut of ;ffice messages can also "e set from the mo"ile device0

We'"'ased $essaging
-eat(re *ew or U&dated in ,P. <es )escri&tion

;utloo# ())K >5perience

;ut!ook We( Access, an AOA= a$$!ication since its -irst re!ease wit" >8c"an&e Ser'er 5.5, $ro'ides a ric", ;ut!ook !ike e8$erience in a (rowser. New -eatures in ;ut!ook We( Access 200F ena(!e users to:

-eat(re

*ew or U&dated in ,P.

)escri&tion

a a a a a a a a a a a
Access Security

Schedule ;ut of ;ffice messages and send to internal and/or e5ternal recipients Ese the Scheduling Assistant to efficiently "oo# meetings Access SharePoint documents without a ?PN or tunnel using Ain#Access Ese 'e":eady &ocument ?iewing to read attachments in 2T7A even if the application that created the document is not installed locally Access :SS su"scriptions ?iew content in 7anaged >$mail Folders :etrieve voice mail or fa5 messages through Enified 7essaging integration Search the Flo"al Address Aist >dit and manage server$side mail"o5 rules Send and receive S/7I7> messages Access to Pu"lic Folder items

;utloo# 'e" Access ())K security is improved0 Two$factor authentication is supported! and administrators can enforce 2T7A$only document viewing to avoid information "eing left "ehind on pu"lic #ios#s0

Self$ Service Support

<es

The ;utloo# 'e" Access ())K ;ptions menu allows users to 3uic#ly and easily resolve many of the most common sources of helpdes# calls on their own0 ;'A users can re3uest a Enified 7essaging voice mail PIN reset! issue a remote wipe re3uest to their mo"ile device should it "e lost or stolen! and add senders to their safe or "loc# list all within ;utloo# 'e" Access0 Service Pac# 1 SP1% includes a confirmation from >5change when the remote wipe re3uest is successfully completed0

;utloo# 'e" Access Aight Search

<es

;utloo# 'e" Access Aight provides a rich ;utloo# 'e" Access e5perience over slow connections and ena"les many of the new features in ;utloo# 'e" Access ())K! including schedula"le ;ut of ;ffice messages internal and e5ternal%! :eally Simple Syndication :SS% su"scriptions! and 7anaged >$7ail Folder access0 >5change Server ())K mail"o5es are fully inde5ed "y default! allowing users to 3uic#ly search for information from ;utloo# 'e" Access0 :e$inde5ing is significantly faster than >5change Server ())*! and search spans "oth content within the e$mail itself and data contained in attachments0

-eat(re

*ew or U&dated in ,P.

)escri&tion

:emote &ocument AccessAin#Access :emote &ocument Access'e":eady &ocument ?iewing <es

'hen a user receives a lin# to a 'indows SharePoint Services site or file share while wor#ing remotely using ;utloo# 'e" Access! >5change Server ())K uses Ain#Access to retrieve and display the document! no virtual private networ# ?PN% or tunnel re3uired0 ;utloo# 'e" Access ())K can transcode a variety of document types Q including 7icrosoft 'ord! 7icrosoft >5cel! 7icrosoft PowerPoint! and P&F files Q from their native format into 2T7A so that they can "e viewed in a client "rowser even if the application that created the document is not installed on the client0 This allows users to "e productive from almost any machine and #eeps viewed documents safe! even on #ios# machines! since 2T7A documents are purged "y ;utloo# 'e" Access at logoff or session timeout0 Service Pac# 1 SP1% includes support for 7icrosoft ;ffice ())K file formats0

(nified $essaging
-eat(re *ew or U&dated in ,P. )escri&tion

?oice 7essaging System

?oice mail can now "e stored in the mail"o5 and accessed from a unified in"o5 in ;utloo#! ;utloo# 'e" Access! on a mo"ile device! or from a standard telephone0 This unification improves employee productivity "y simplifying access to the most common types of communications0 It also dramatically reduces cost "y removing the need for a standalone voice mail system and "y ta#ing advantage of any e5isting investments in Active &irectory0 >5change Server ())K Enified 7essaging can "e connected with a legacy private "ranch e5change P9.% infrastructure through an IP gateway! or can "e directly connected with certain IP P9. installations0

Fa5 7essaging System Speech$ >na"led Automated Attendant Self$ Service ?oice 7ail Support ;utloo# ?oice Access

Fa5es can now "e stored in the mail"o5 and accessed from the userLs unified in"o5 in ;utloo#! ;utloo# 'e" Access! or their mo"ile device0 Enified 7essaging centrali8es the management of in"ound fa5 services within the >5change infrastructure0 The Attendant answers calls using an automated operator! with customi8a"le menus e0g0 Npress 1 for salesO%! and glo"al address list directory loo#ups e0g0 Nwho would you li#e to contactBO%0 Callers can interact with the Automated Attendant through touch tone menus or their voice using speech recognition0 Esing ;utloo# 'e" Access! users can re3uest a reset of their voice mail PIN! set their voice mail greeting! record their out$of$office voice message! and specify mail"o5 folders to access when calling in "y phone to hear e$mail messages through te5t$to$speech translation0 Esers can access their >5change mail"o5 using a standard telephone! availa"le anywhere0 Through touch tone or speech$ena"led menus! they can hear and act on their calendar! listen to e$mail messages translated from te5t to speech%! listen to

-eat(re

*ew or U&dated in ,P.

)escri&tion

voice mail messages! call their contacts! or call users listed in the directory0 Play on Phone >5change Enified 7essaging allows users to play"ac# voice messages received in their >5change in"o5 on a designated phone0 This feature is useful when a user is in a pu"lic place and does not want to play the voice mail over their computer spea#ers0 Play on Phone routes the voice mail to a cell phone! des# phone! or other num"er specified "y the user0 New ?oice 7ail Alerts <es 'hen com"ined with ;ffice Communication Server ())K ;CS%! users can get an indicator on their ;ffice Communicator client or ;C$ena"led des#top phone that a new voice mail message is in their in"o50 &irect &ial <es into ;utloo# ?oice Access
Top of page

Esing ;ffice Communicator! users can dial into ;utloo# ?oice Access with a single clic#! without the need to input their e5tension or PIN0

)perationa# *fficiency

>8c"an&e Ser'er 200F "e!$s I/ $ro-essiona!s administer, automate, and de$!o% more e--icient!%. See w"at -eatures are inc!uded wit" >8c"an&e Ser'er 200F -or o$erationa! e--icienc% in t"e ta(!e (e!ow.
Administration and Automation
-eat(re *ew or U&dated in ,P. <es )escri&tion

>5change 7anagement Console

Improves the graphical user interface for management0 7anagement actions are easily discovered through the action pane! and the navigation tree is simplified to three levels deep0 >5change management and trou"leshooting tools are integrated in the tool"o50 The >5change 7anagement Console is "uilt upon the >5change 7anagement Shell6 actions ta#en in the Console are also availa"le! and visi"le! through the command line shell0

>5change 7anagement Shell

<es

The >5change 7anagement Shell! "ased on 7icrosoft 'indows PowerShell! is a highly e5tensi"le and fle5i"le management environment that complements the graphical interface availa"le through the >5change 7anagement Console0 It ena"les rapid management through a scripta"le command line for automation! "atching! and reporting and integrates with

-eat(re

*ew or U&dated in ,P.

)escri&tion

Active &irectory0 To help administrators 3uic#ly learn the synta5 of the >5change 7anagement Shell and "uild custom scripts! wi8ards in the graphical >5change 7anagement Console display the command line synta5 for each action the administrator has specified via the wi8ard0 This te5t can "e cut and pasted directly into the >5change 7anagement Shell or into a script file0 >5tended Integration with Active &irectory Ese of Active &irectory sites helps automate new server discovery and configuration within the organi8ation0 The topology of an >5change Server ())K environment is defined and managed through Active &irectory! alongside other servers in the infrastructure0 >5change 7anagement Pac# for 7icrosoft ;perations 7anager 7anual configuration for synthetic transactions has "een dramatically reduced or eliminated0 All synthetic transactions are now accessi"le from the >5change 7anagement Shell0 :ules directly align with >5change Server ())K server roles0 New reports are introduced for >5change ActiveSync! unified messaging service availa"ility! message hygiene features! and server performance0 >5change 9est Practices Analy8er >59PA% integration features are also included0 >5change Trou"leshooting Tools In addition to the deep integration of >5change 9est Practices Analy8er! >5change Server ())K provides several trou"leshooting tools within the tool"o5 in the >5change 7anagement Console0 These tools are #ept up$to$date with the latest information and capa"ilities through integration with 7icrosoft Epdate0 Included in the tool"o5 are the >5change 7ail Flow Trou"leshooter! >5change &ata"ase Trou"leshooter! and the >5change Performance Trou"leshooter0 The >5change 7ail Flow Trou"leshooter can diagnose and help remediate in"ound and out"ound e$mail failures0 The >5change &ata"ase Trou"leshooter isolates data"ase mounting failures! is used to manage recovery storage groups! and wal#s the administrator through dial tone recovery0 Finally! the >5change Performance Trou"leshooter identifies the cause of ;utloo# or >5change performance pro"lems and advises on remediation0 Pu"lic Folder 7anagement Console <es In addition to >5change 7anagement Shell! the Pu"lic Folder 7anagement Console will ena"le administrators to 3uic#ly manage pu"lic folders! including creation! deletion! and replication configuration of individual folders0

-eat(re

*ew or U&dated in ,P.

)escri&tion

Fle5i"le Permission 7odel

Permissions "ecome more granular and straightforward to manage in the >5change Server ())K environment0 The permissions model ena"les a set of new! predefined administrator Nroles0O

Automatic Server Epdates

Automates >5change Server updating and patching using either 7icrosoft Epdate on the 'e"! 'indows Epdate Server on$site! or 7icrosoft Systems 7anagement Server! soon to "e released as System Center Configuration 7anager0

Dep#oyment
-eat(re *ew or U&dated in ,P. )escri&tion

Server :oles

>5change Server ())K is a modular system of five server rolesQ >dge Transport! 2u" Transport! 7ail"o5! Client Access! and Enified 7essaging Q that reduces the time re3uired for installation6 minimi8es manual! post$install configuration "y the administrator6 and limits the surface area availa"le for attac# to increase security0 Administrators also gain the fle5i"ility to deploy only the features and services necessary on a given server and manage accordingly0 All server roles! with the e5ception of >dge Transport! can "e deployed on a single server! and only the 2u" Transport and 7ail"o5 server roles are re3uired for >5change Server ())K installation0

Setup

<es

A new setup process goes from installation to configuration and reduces comple5ity "y incorporating the modular! server role architecture of >5change Server ())K into the process0 7icrosoft 'indows Installer technology provides distinct installation pac#ages and smart default settings0 >5change 9est Practices Analy8er >59PA% is integrated with a setup process to perform prere3uisite chec#ing and identify potential deployment errors0 To ease deployments in large environments! >5change 7anagement Shell scripts can "e used to automate server installation and provisioning0 The >5change Server ())K SP1 installation is slipstreamed! ena"ling a straightforward! integrated setup if youLre deploying >5change Server ())K SP1 for the first time or upgrading from an e5isting >5change Server ())K deployment0

>5change 9est

>m"edded in the >5change Server ())K setup process and availa"le through the >5change 7anagement Console tool"o5!

-eat(re

*ew or U&dated in ,P.

)escri&tion

Practices Analy8er

the >5change 9est Practices Analy8er can "e used to proactively e5amine the topology and individual servers for configuration discrepancies that may lead to service outages and relia"ility pro"lems in the future0 The Analy8er surfaces warnings or error messages to the administrator and information on how to address the warning or error0 It is recommended that the >5change 9est Practice Analy8er "e run periodically against an >5change environment to ensure optimal configuration0

Autodiscover

Configuring ;utloo# ())K to connect with >5change is easier than ever "efore0 If logged on to the networ#! >5change Server ())K automatically completes all inputs re3uired for the user to initiate the connection0 >ven for users not logged on to the networ#! connecting ;utloo# ())K to >5change Server ())K using ;utloo# Anywhere formerly #nown as :PC over 2TTP or :PC/2TTP% re3uires only the user name! e$mail address! and password6 no >5change server name is re3uired0 In the event of a mail"o5 move! migration or disaster! Autodiscover eliminates the need for users to change their settings "y automatically detecting the new server and reconfiguring the connection0

Single 7igration >ngine

>5change Server ())K provides a single! comprehensive tool for administrators to perform intra or inter$organi8ational migrations! minimi8ing migration comple5ity0

Sca#a'i#ity and +erformance


-eat(re *ew or U&dated in ,P. )escri&tion

Native 5,D

As a native ,D$"it application! >5change can access more memory! ensuring high performance and relia"ility as mail"o5 si8es and the num"er of user accounts per server increase0

'indows Server ())+ Support

<es

'indows Server ())+ support provides added security features as well as deployment and administrative e5perience "enefits to administrators while ena"ling >5change to run on the newest 'indows Server platform0

Storage ;ptimi8ation

'ith reduced input/output I/;% re3uirements up to K/ percent reduction in I/; per second% ena"led "y the larger memory caches availa"le on 5,D systems! >5change Server ())K ma#es "etter use of e5isting storage systems and also allows administrators to use low$cost options li#e &irect Attached

-eat(re

*ew or U&dated in ,P.

)escri&tion

Storage! even in demanding! enterprise environments0 ;ptimi8ed 9rowser Access ;utloo# 'e" Access ;'A% ())K delivers improved performance and decreased latency0 Increased client caching reduces server roundtrips! there"y reducing "andwidth usage and providing an optimal user e5perience when accessing over slow connections0 Simplified :outing and ;ptimi8ed 9andwidth 7essage routing is automatically determined! and mail is delivered using the most direct route "y default0 Administrators can also configure schedule and priority to optimi8e "andwidth usage0

*,tensi'i#ity and +rogramma'i#ity


-eat(re *ew or U&dated in ,P. )escri&tion

'e" Services <es Application Programming Interface API% ;'A 'e" Parts

&evelopers now have a simple way to em"ed information from the >5change Server ())K mail"o5 or calendar within line$of$ "usiness or other custom applications0 The >5change 'e" Services API provides a single! documented! standards$"ased API to "e called from any client! language! or platform0 &evelopers can easily em"ed ;utloo# 'e" Access functionality into their custom portals and portal applications using ;'A 'e" Parts0

Free/9usy 'e" Service

The Free/9usy 'e" Service offers a fle5i"le! e5tensi"le way to access free/"usy information in >5change Server ())K0 Esed "y clients such as ;utloo#! ;utloo# 'e" Access! and mo"ile devices "ased on >5change ActiveSync! the Free/9usy 'e" Service allows developers to em"ed free/"usy information in line$of$ "usiness or custom applications

0N>T Integration

Commands or scripts used in the >5change 7anagement Shell can "e called from managed code such as CR or ?90N>T0 This allows developers to "uild custom applications which organi8ations may use to e5ecute common management tas#s in the messaging environment0

Networ ing interview questions W&at is -S$)

T#ke#w#y) Dnow t"e $!acement o- ser'er ro!es wit"in t"e -orest and domain and "ow to &o a(out mo'in& t"ose ro!es to ot"er domain contro!!ers, eit"er (% trans-errin& t"em or sei:in& t"em. Windows administrators know t"at one o- t"e most im$ortant as$ects in'o!'ed wit" mana&in& Acti'e *irector% is understandin& t"e 'arious ro!es t"at ser'ers need to $!a%. 1re'ious!%, I discussed t"e -unctions o- t"e -i'e -!e8i(!e sin&!e.master o$erations ?+S<;@ ro!es in Acti'e *irector%. Now INm &oin& to ta!k a(out t"e $!acement o- t"ose ro!es wit"in t"e -orest and domain, and e8$!ain "ow to &o a(out mo'in& t"ose ro!es to ot"er domain contro!!ers, eit"er (% trans-errin& t"em or sei:in& t"em. 1!acin& +S<; ro!es in t"e network As I mentioned in t"e -irst artic!e, t"e two -orest.!e'e! ro!es4sc"ema master and domain namin& master4are insta!!ed (% de-au!t on t"e -irst domain contro!!er in t"e -orest. /"e t"ree domain.!e'e! ro!es42I* master, 1*# emu!ator, and in-rastructure master4are a!! insta!!ed (% de-au!t in t"e -irst domain contro!!er in t"e domain. In a sma!! o--ice wit" one domain, it is 'er% !ike!% t"at a!! -i'e ro!es are -ound on a sin&!e domain contro!!er. Aut in a !ar&e enter$rise network, %ou s"ou!d not a!!ow t"at to "a$$en. ItNs (est to make sure t"at t"e two -orest.!e'e! ro!es are !ocated in t"eir own domain contro!!er, wit" domain.!e'e! ro!es se$arate -rom t"em. I- %ou c"oose to insta!! t"e ro!es on more t"an one domain contro!!er, t"ose *#s s"ou!d (e re$!ication $artners. At t"e same time, %ou canNt i&nore t"e domain contro!!ers t"at "ost t"e &!o(a! cata!o&. 2emem(er t"at t"e domain.namin& master ust (e on a *# "ostin& t"e &!o(a! cata!o&. Not on!% t"at, (ut t"e in-rastructure master ust not (e on a *# "ostin& t"e &!o(a! cata!o&. ?/"e on!% e8ce$tion to t"at is i- a!! t"e *#s are &!o(a! cata!o& ser'ers, w"ic" s"ou!d not (e t"e case in an enter$rise network.@ /"ere are numerous wa%s %ou ma% decide to $!ace %our +S<; ro!es. Bigure A s"ows one e8am$!e. +i&ure A

/rans-errin& ro!es /"ere are two (asic reasons -or mo'in& an +S<; ro!e -rom one *# to anot"er. ;ne reason is (ecause %ou want to. /"at is, t"e mo'ement is $!anned -or some reason, suc" as decommissionin& a ser'er t"at "o!ds one or more o- t"e +S<; ro!es. W"en %ou are carr%in& out a $!anned mo'e, it is ca!!ed transferring t"e ro!e. /"e ot"er reason to mo'e a ro!e is (ecause %ou "a'e to. +or instance, %ou mi&"t (e -orced to mo'e a ro!e w"en a ser'er t"at "o!ds one or more +S<; ro!es "as su--ered catastro$"ic "ardware -ai!ure. W"en %ou carr% out an un$!anned mo'e, it is ca!!ed seizing t"e ro!e. Mou s"ou!d ne'er sei:e a ro!e un!ess %ou a(so!ute!% "a'e to. /rans-errin& a ro!e can (e done eit"er t"rou&" t"e &ra$"ic user inter-ace ?76I@ or t"rou&" t"e command !ine inter-ace ?#,I@, w"i!e sei:in& a ro!e can on!% (e carried out 'ia t"e command !ine. W"et"er done t"rou&" t"e 76I or t"e #,I, mo'in& a ro!e is done in two ste$s: 1. #onnect to a domain contro!!er 2. /rans-er or sei:e t"e ro!e ,etNs -irst !ook at trans-errin& a ro!e t"rou&" t"e 76I. A-ter t"at, IN!! s"ow %ou "ow itNs done usin& t"e #,I. 6sin& t"e 76I

/o c"an&e a domain.!e'e! ro!e, c!ick on Start Z Administrati'e /oo!s Z Acti'e *irector% 6sers And #om$uters. Ne8t, as s"own in Bigure >, ri&"t.c!ick on t"e domain and t"en se!ect #onnect /o *omain #ontro!!erT +i&ure A

Ne8t, %ou wi!! see a dia!o& (o8 in w"ic" %ou can s$eci-% to w"ic" *# %ou want to connect ?see Bigure "@. +i&ure #

;nce %ou "a'e connected to t"e domain contro!!er to w"ic" %ou wi!! trans-er a ro!e, ri&"t. c!ick once a&ain on t"e domain and se!ect J;$erations <astersTJ /"is wi!! (rin& u$ t"e dia!o& (o8 %ou see in Bigure D. +i&ure *

/"is dia!o& (o8 wi!! a!!ow %ou to trans-er a domain.!e'e! ro!e -rom one *# to anot"er, $ro'ided t"at %ou "a'e a!read% connected to t"at *#. I- %ou "a'e not connected to t"e *#, t"e same name wi!! a$$ear in (ot" (o8es. /o c"an&e a -orest.!e'e! ro!e, c!ick on Start Z Administrati'e /oo!s Z Acti'e *irector% *omains and /rusts. Ne8t, as s"own in Bigure E, ri&"t.c!ick on *omains and /rusts, and t"en se!ect #onnect /o *omain #ontro!!erT +i&ure >

;nce %ou "a'e connected to t"e ot"er *#, ri&"t.c!ick once a&ain on Acti'e *irector% *omains And /rusts, and se!ect ;$erations <asterT /"is wi!! (rin& u$ a dia!o& (o8 ?see Bigure B@ simi!ar to t"e one %ou used to trans-er a domain.!e'e! ro!e. +i&ure +

6sin& t"e command !ine inter-ace Mou can $er-orm a!! o- t"ese same o$erations -rom t"e command !ine, usin& t"e Acti'e *irector% *ia&nostic /oo!, ntdsuti!.e8e. /"is too! is interacti'e, in t"at, w"en %ou in'oke it, %ou "a'e se'era! su(menus at %our dis$osa!. In t"is case, since I am ta!kin& a(out trans-errin& and sei:in& ro!es, I wi!! use t"e J2o!esJ su(menu. /o do t"at, t%$e Jntdsuti!J at t"e command !ine. /"e $rom$t wi!! t"en c"an&e to re-!ect t"e current !e'e! o- t"e menu. In t"is case, at t"e Jntdsuti!J $rom$t, %ou wou!d t%$e Jro!es.J /"e command $rom$t wi!! t"en c"an&e to +S<; <aintenance ?as %ouN!! see

(e!ow in Bigure <@. /"e commands a'ai!a(!e -rom t"e 2o!es su(menu are:

#onnections Sei:e domain namin& master Sei:e in-rastructure master Sei:e 1*# Sei:e 2I* master Sei:e sc"ema master Se!ect o$eration tar&et /rans-er domain namin& master /rans-er in-rastructure master /rans-er 1*# /rans-er 2I* master /rans-er sc"ema master

+i&ure 7 i!!ustrates usin& t"e too! to make a connection to anot"er domain contro!!er. +i&ure 7

Bigure ! i!!ustrates usin& ntdsuti! to trans-er a ro!e. +i&ure 0

Sei:in& a ro!e /rans-errin& can on!% (e done i- t"e ori&ina! *# is a!i'e on t"e network. I- a domain

contro!!er "ostin& a sin&!e o$erations master ro!e is no !on&er a'ai!a(!e ?$ossi(!% due to catastro$"ic -ai!ure@, %ou wi!! not (e a(!e to trans-er t"at ro!e to anot"er domain contro!!er. I- t"at is t"e case, t"en %ou can mo'e t"at ro!e to anot"er *# (% seizing t"e ro!e. Sei:in& a ro!e can on!% (e done t"rou&" t"e command !ine inter-ace usin& ntdsuti!.e8e. It is e8treme!% im$ortant to remem(er two t"in&s a(out sei:in& +S<; ro!es: 1. Ne'er sei:e a ro!e un!ess it is %our !ast resort. I- a *# "ostin& a ro!e is on!% &oin& to (e down tem$orari!%, donNt worr% a(out it. Mour network wi!! sur'i'e a s"ort time wit"out it. 2. I- eit"er t"e sc"ema master, domain namin& master, or 2I* master ro!e is sei:ed -rom a domain contro!!er, t"at domain contro!!er must ne'er (e a!!owed to come (ack on!ine. /ake +S<; ro!es serious!% Networks usin& Acti'e *irector% sti!! tend to (e re!ati'e!% %oun&, so in a!! !ike!i"ood t"ere "as (een 'er% !itt!e need -or administrators to concern t"emse!'es muc" wit" +S<; ro!es u$ unti! now. Aut as t"e network a&es and it comes time -or ser'ers to (e re$!aced, &reat care wi!! need to (e taken to $reser'e t"e inte&rit% o- t"ose ro!es. At some $oint, domain contro!!ers "ostin& +S<; ro!es wi!! need to (e re$!aced. Admins wi!! need to understand w"ere t"e ro!es are !ocated and "ow to trans-er t"e ro!es i- an outa&e is $!anned, or "ow to sei:e a ro!e i- t"e outa&e is un$!anned.
Disadvantages of -A./0

*isad'anta&es o- +A/16 are:

Advantages of -A.32

a /"e root -o!der can mana&e a ma8imum o- 512 entries. /"e use o- !on& -i!e names can
si&ni-icant!% reduce t"e num(er o- a'ai!a(!e entries.

a +A/16 is !imited to 65,536 c!usters, (ut (ecause certain c!usters are reser'ed, it "as a

$ractica! !imit o- 65,52). >ac" c!uster is -i8ed in si:e re!ati'e to t"e !o&ica! dri'e. I(ot" t"e ma8imum num(er o- c!usters and t"eir ma8imum si:e ?32 DA@ are reac"ed, t"e !ar&est dri'e is !imited to ) 7A on Windows 2000. /o maintain com$ati(i!it% wit" <S.*;S, Windows C5, and Windows CE, a +A/16 'o!ume s"ou!d not (e !ar&er t"an 2 7A.

a /"e (oot sector is not (acked u$. a /"ere is no (ui!t.in -i!e s%stem securit% or -i!e com$ression wit" +A/16. a +A/16 can waste -i!e stora&e s$ace in !ar&er dri'es as t"e si:e o- t"e c!uster increases.
/"e s$ace a!!ocated -or storin& a -i!e is (ased on t"e si:e o- t"e c!uster a!!ocation &ranu!arit%, not t"e -i!e si:e. A 10.DA -i!e stored in a 32.DA c!uster wastes 22 DA odisk s$ace. +A/32 a!!ocates disk s$ace muc" more e--icient!% t"an $re'ious 'ersions o- +A/. *e$endin& on t"e si:e o- %our -i!es, t"ere is a $otentia! -or tens and e'en "undreds ome&a(%tes more -ree disk s$ace on !ar&er "ard disk dri'es. In addition, +A/32 $ro'ides t"e -o!!owin& en"ancements:

a a

/"e root -o!der on a +A/32 dri'e is now an ordinar% c!uster c"ain, so it can (e !ocated an%w"ere on t"e 'o!ume. +or t"is reason, +A/32 does not restrict t"e num(er o- entries in t"e root -o!der. It uses s$ace more e--icient!% t"an +A/16. +A/32 uses sma!!er c!usters ?) DA -or dri'es u$ to E 7A@, resu!tin& in 10 to 15 $ercent more e--icient use o- disk s$ace re!ati'e to !ar&e +A/16 dri'es. +A/32 a!so reduces t"e resources necessar% -or t"e com$uter to o$erate.

a
+A/32 is more ro(ust t"an +A/16. +A/32 "as t"e a(i!it% to re!ocate t"e root director% and use t"e (acku$ co$% o- t"e +A/ instead o- t"e de-au!t co$%. In addition, t"e (oot record on +A/32 dri'es "as (een e8$anded to inc!ude a (acku$ o- critica! data structures. /"is means t"at +A/32 'o!umes are !ess susce$ti(!e to a sin&!e $oint o- -ai!ure t"an +A/16 'o!umes.
Top of page

Disadvantages of -A.32

*isad'anta&es o- +A/32 inc!ude:

a
+A/32 'o!umes are not accessi(!e -rom an% ot"er o$eratin& s%stems ot"er t"an Windows C5 ;S22 and Windows CE.

a
/"e (oot sector is not (acked u$.

/"ere is no (ui!t.in -i!e s%stem securit% or com$ression wit" +A/32.

Bi'e Systems E9posed (P#rt 5


A% <o"ammad Mouse- Z Au&ust 200) W"at is a -i!e s%stem3 Mou mi&"tN'e noticed it in %our dri'esN $ro$erties. A -i!e s%stem is an o$eratin& s%stemNs o'era!! structure in w"ic" -i!es are named, stored, and or&ani:ed. I- %ouNre a Windows =1 user, %ouN'e &ot 3 c"oices -or a -i!e s%stem: N/+S, +A/, and +A/32. Aut w"atNs t"e di--erence (etween t"em3 2ead on as I &i'e %ou a detai!ed re'iew o- t"e -i!e s%stems and te!! %ou ?w"at I t"ink is@ %our (est c"oice. +o!!owin& are <icroso-tNs Windows 7!ossar% de-initions -or eac" o- t"e 3 -i!e s%stems: 1. Bi'e A''o-#tion T#$'e (BAT ) A -i!e s%stem used (% <S.*;S and ot"er Windows.(ased o$eratin& s%stems to or&ani:e and mana&e -i!es. /"e -i!e a!!ocation ta(!e ?+A/@ is a data structure t"at Windows creates w"en %ou -ormat a 'o!ume (% usin& t"e +A/ or +A/32 -i!e s%stems. Windows stores in-ormation a(out eac" -i!e in t"e +A/ so t"at it can retrie'e t"e -i!e !ater.

2. BAT+,) A deri'ati'e o- t"e +i!e A!!ocation /a(!e ?+A/@ -i!e s%stem. +A/32 su$$orts sma!!er
c!uster si:es and !ar&er 'o!umes t"an +A/, w"ic" resu!ts in more e--icient s$ace a!!ocation on +A/32 'o!umes.

3. NTBS) An ad'anced -i!e s%stem t"at $ro'ides $er-ormance, securit%, re!ia(i!it%, and ad'anced
-eatures t"at are not -ound in an% 'ersion o- +A/. +or e8am$!e, N/+S &uarantees 'o!ume consistenc% (% usin& standard transaction !o&&in& and reco'er% tec"niHues. I- a s%stem -ai!s, N/+S uses its !o& -i!e and c"eck$oint in-ormation to restore t"e consistenc% o- t"e -i!e s%stem. In Windows 2000 and Windows =1, N/+S a!so $ro'ides ad'anced -eatures suc" as -i!e and -o!der $ermissions, encr%$tion, disk Huotas, and com$ression. As it mi&"t seem o('ious -rom t"e de-initions, N/+S is %our (est o$tion. Wait -or m% seHue! w"ere IN!! demonstrate more in.de$t" in-o t"at wi!! assure %ou w"et"er N/+S is a$t -or %ou.

You might also like