You are on page 1of 22

1) What is Active Directory?

A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments. For example we can create, manage and administrator users, computers and printers in the network from active directory. 2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS? What are A records and mx records? DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request. Forward lookup: Converting names to IP address is called forward lookup. Reverse lookup: Resolving IP address to names is called reverse lookup. 'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of which DNS can find out the IP address of a name. 'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is also found in DNS. 3) What id DHCP? Why it is used? What are scopes and super scopes? DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy. Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network. Superscope: When we combine two or more scopes together its called super scope. 4) What are the types of LAN cables used? What is a cross cable? Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can support 1Gbps of speed. Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.

5) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the LAN cable? The way the paired wires are connected to the connector (RJ45) is different in cross cable and normal LAN cable. The theoretical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal. 6) What would you use to connect two computers without using switches? Cross cable. 7) What is IPCONFIG command? Why it is used? IPCONFIG command is used to display the IP information assigned to a computer. From the output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer. 8) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available? When DHCP server is not available the Windows client computer assigns an automatic IP address to itself so that it can communicate with the network computers. This ip address is called APIPA. ITs in the range of 169.254.X.X. APIPA stands for Automatic private IP addressing. Its in the range of 169.254.X.X. 9) What is a DOMAIN? What is the difference between a domain and a workgroup? Domain is created when we install Active Directory. It's a security boundary which is used to manage computers inside the boundary. Domain can be used to centrally administrator computers and we can govern them using common policies called group policies. We can't do the same with workgroup. 10) Do you know how to configure outlook 2000 and outlook 2003 for a user? Please visit the link below to find out how to configure outlook 2000 and outlook 2003. http://www.it.cmich.edu/quickguides/qg_outlook2003_server.asp 11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express? PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express used odb file. 12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it? BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is "Last known good configuration".

It also receives the traffic and sends it across but it uses the routing protocols to do so. VPN is used to connect to the corporate network to access the resources like mail and files in the LAN. VPN can be configured using the steps mentioned in the KB: http://support.microsoft. Install the OS with the lates patches. On no manageable switches we can't do so. We go for RIS or imaging/ghosting because installing OS every time using a CD can be a very time consuming task. Antivirus with latest updates. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware.If this doesn't work than boot the computer in safe mode.com/technet/prodtechnol/windowsserver2003/technologi /directory/ 18) What is the difference between a switch and a hub? Switch sends the traffic to the port to which its meant for. 16) Your system is infected with Virus? How to recover the data? Install another system. 19) What is a router? Why we use it? Router is a switch which uses routing protocols to process and send the traffic. A reboot of the computer fixes the problem. Once done scan and clean the secondary HDD. So to save that time we can go for RIS/Ghosting/imaging. 13) What is RIS? What is Imaging/ghosting? RIS stands for remote installation services. If it boots up than the problems with one of the devices or drivers.microsoft. 20) What are manageable and non manageable switches? Switches which can be administered are called manageable switches. 17) How to join a system to the domain? What type of user can add a system to the domain? Please visit the article below and read "Adding the Workstation to the Domain" http://www. What to do to resolve this issue? Update the network card driver. Connect the infected HDD as secondary drive in the system. Hub sends the traffic to all the ports.com/kb/305550 15) Your computer slowly drops out of network. 14) What is VPN and how to configure it? VPN stands for Virtual private network. Once done copy the files to the new system. . For example we can create VLAN for on such switch. Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We can use it to deploy both server and client OS.

what are the steps do you follow to overcome? Rank Answer Posted By Question Submitted By :: Arun Kumar This Interview Question Asked @ Genpact I also faced this Question!! Answer This plm we are facing sometimes because of virus. then u can do one thing just remove the domain and add the work group.com 0 Krishna Question there are 2 network printers. Rank Answer Posted By . and again add the domain then u can check the system working or not .and it's stored in printque but now i want to change printque to another printer without deleting printque. after u have to restart the system .how can u solve the problem.i have given print to one of the networkprinter.com 0 Gangadharan Question There are 50 systems.in that one of the pc got disconnected from the domain suddenly. all systems are joined in domaincontroller.Back to Questions Page What applications does not use VSS? Question Rank Answer Posted By Question Submitted By :: Guest I also faced this Question!! Answer VSS doeasnot allow allow the backup of SQL transcation © ALL Interview ...due to some reason it's not print.? © ALL Interview .

... © ALL Interview ..com 0 Jyoti ... 0 Jai Question 2003 what is the diffrence between 2000 to Rank Answer Posted By Question Submitted By :: Vijay This Interview Question Asked @ TCS I also faced this Question!! Answer it is a most secure os... © ALL Interview .....com 0 Abhijit Paul Answer Not possible......com 1 Vijay Answer difference between win 2000 and win2k3 is theres is one new service added in win 2k3 sercvice that is vscs(Volume shadow copy service) 3 Harinder Singh Question and core 2duo processor what is the difference between dual core Rank Answer Posted By Question Submitted By :: Abhishekdixit03 I also faced this Question!! Answer Dual core means two processors on a single silicon chip whereas core 2 duo is the second version of dual core processor..Question Submitted By :: Arun Kumar This Interview Question Asked @ Genpact I also faced this Question!! Answer Change the port or IP of the printer © ALL Interview ..

com 0 Mak Question a work of RAM in a computer device.vista need more hardware configuration then windows 7.com 0 Vishal Awasthi Question window 7 what is the difference between vista and Rank Answer Posted By Question Submitted By :: Abhishekdixit03 I also faced this Question!! Answer both are Latest operating system of Microsoft. as performance level windows 7 is very better then Vista.. MAK 9595959869 © ALL Interview . What is a full form of RAM ? And what is Rank Answer Posted By Question Submitted By :: Chintan Desai I also faced this Question!! Answer The full form of RAM is : Random Access © ALL Interview . thanks.Answer Core 2deo have 4 processor on 1 silicon chip 0 Hemant Arya Question ddr2 and ddr3 what is the difference between ddr1 and Rank Answer Posted By Question Submitted By :: Abhishekdixit03 This Interview Question Asked @ HCL .. What Is Van I also faced this Question!! Answer ddr1 ram is 184 pins fsb of 333mhx and ddr2 is 240 pins and fsb of 666mhz and ddr 3 too is 240 and fsb of 1333mhz © ALL Interview .com 0 Chintan Desai .

The data processing and the speed of computer is depend on this types of memory. 9. © ALL Interview . Rank Answer Posted By Question Submitted By :: Chintan Desai I also faced this Question!! Answer The data are store in computer as a binary language. 4. 5. 8. Because the computer only known binary language so when we store the data in a computer that time computer convert them in binary language and after that store them. 0 Sunita Question which language the data are store in compute. 3. When user performs any operation then the intermediate results and data is stored in RAM. 7. 6.com 1. And how the computer known what we tell them. What is MTU? How does TCP handshake work? How does SSL handshake work? What are the different phases in VPN establishment? How does DH (deffie helman) work? What is TCP window sizing? What is the difference between passive FTP and active FTP? What is the difference between socket and session? How does network management station work? The Answers: . 2.Memory The RAM is a valentine memory. Answer RAM stands for Random Access Memory.

Passive FTP solves this problem. Active FTP may cause problems if your client is behind a firewall. 2. An SSL session is a mechanism through which connections can be established by reusing previously negotiated handshakes. but creates other problems. This is why many users have difficulty using FTP to download files from behind a firewall. How does TCP handshake work? Transmission Control Protocol/Internet Protocol. 2. What is the difference between socket and session? 1.) Active FTP was invented first. which remains “passive”. 3. The client initiates a connection on the server’s command port. (This is one of the reasons it is superior to HTTP for transferring large files. Perhaps you should discuss the matter with your firewall administrator. 3. 1. notably where FTP server security is concerned. 4. As a rule. Browser checks the certificate to make sure that the site you are connecting to is the real site and not someone intercepting. A socket is one endpoint of a two-way communication link between two programs running on the network. the client initiates both connections with the server. 1. the web browser shows the encrypting icon. What is the difference between passive FTP and active FTP? FTP is an unusual protocol in that it uses two ports. 2. one for commands and the other for data. There are 3 steps. the FTP server that is trying to initiate a connection with your client looks like an intruder and is usually blocked. Most firewall administrators do not like this. Local device acknowledges receipt of the sequence number and segment size information. From the firewall’s point of view. If you experience difficulty using your FTP client from behind a firewall. this is likely the reason. The browser and Server start talking using the encryption. The server then initiates a connection with the client from its data port. Network elements . 5. Local device sends sequence number and maximum segment size. A socket is bound to a port number so that the TCP layer can identify the application that data is destined to be sent. 4. Destination device responds by sending its sequence number and maximum segment size back to local device. The server must listen on a large number of ports. 2. Browser and Server send each other unique codes to use when scrambling (or encrypting) the information that will be sent. Determine encryption types that the browser and web site server can both use to understand each other. you do not need to be concerned about passive and active FTP unless you administer an FTP server or a firewall. and web pages are processed secured. In Passive FTP.1. 3. There are 4 steps. This requires the firewall to let a lot of unqualified traffic through. How does SSL handshake work? Secure Sockets Layer. How does network management station work? Network management stations execute management applications which monitor and control network elements.

7. Based on Ralph Merkle’s public key cryptosystem. Ideally you are looking for a Window Size >= Bandwidth * RTT. What is TCP window sizing? The window size is the maximum number of bytes of data that can be transmitted in one segment. Event-MIB 6. When the end user responds to the challenge. Phase 1 of a 2 phase VPN tunnel establishment process. 1. There are a few network management features that may be used to provide network monitoring for this advisory. terminal servers. the response is forwarded to the IPsec peers for an additional level of authentication completing Phase 2. 8. The Simple Network Management Protocol (SNMP is used to communicate management information between the network management stations and the agents in the network elements. gateways. RMON Alarm and Events 5. Public key cryptography is a form of cryptography which generally allows users to communicate securely without having prior access to a shared secret key. 2. Device Availability Monitoring 2. the client waits for a “username/password” challenge after the IKE Phase 1 SA has been established. Phase 2 of 2 phase VPN tunnel establishment process. SNMP MIB object monitoring 3. . designated as public key and private key. This packet also contains the header and trailer information. Increasing the window size for a TCP-based file transfer would increase throughput until the slowest link in the path saturates. which are like addresses for each packet that are required by the routers on the network. the ACKs would return more quickly and more of the bandwidth would be used. There would be less buffering. and the like. which are related mathematically. CiscoWorks RME Network Show Commands and CLI scripting 6. Using the Xauth feature. 1. Phase 2 uses the agreed parameters from Phase 1 to bring the tunnel up. What is MTU? Maximum Transmission Unit. The greatest amount of data or “packet” size that can be transferred in one physical frame on a network.are devices such as hosts. How does DH (deffie helman) work? Diffie-Hellman key agreement was invented in 1976 during a collaboration between Whitfield Diffie and Martin Hellman and was the first practical method for establishing a shared secret over an unprotected communications channel. Cisco Service Assurance Agent (Cisco SAA) 4. Phase 1 authentication establishes session keys. Phase 1 negotiates the security parameter agreement. What are the different phases in VPN establishment? Successful VPN establishment consists of two levels of SA’s known as phases. by using a pair of cryptographic keys. 9. It would be preferable to have a window size appropriate to the size of the link. which have management agents responsible for performing the network management functions requested by the network management stations.

6. How do you double-boot a Win 2003 server box? The Boot. 7. Winkey + B moves the focus to the notification area. . Winkey + CTRL + F opens the Search panel with Search for Computers module selected. Winkey + TAB moves the focus to the next application in the taskbar. documents. If you uninstall Windows Server 2003. use the System option in Control Panel from the Advanced tab and select Startup. XP. workstations. Winkey + SHIFT + TAB moves the focus to the previous application in the taskbar. An underlying principle of the Active Directory is that everything is considered an object—people. system. Winkey + F opens the Search panel. and makes these resources available to authorized users and groups. and devices. 4. 3. Win 98. you must run the compatibility mode function. Winkey + SHIFT+ M undoes minimization.ini file is set as read-only. Winkey + E opens Windows Explorer showing My Computer. which operating systems can you revert to? Win ME. that you cannot upgrade from ME and 98 to Windows Server 2003. and hidden to prevent unwanted editing. To change the Boot. Winkey + D shows the desktop. What do you do if earlier application doesn’t run on Windows Server 2003? When an application that ran on an earlier legacy version of Windows cannot be loaded during the setup function or if it later malfunctions. How do you get to Internet Firewall settings? Start –> Control Panel –> Network and Internet Connections –> Network Connections. Each object has certain attributes and its own security access control list (ACL). Winkey + BREAK displays the System Properties dialog box. printers. Now all domain controllers share a multimaster peer-to-peer read and write relationship that hosts copies of the Active Directory. 2. Winkey + L locks the computer. Note. What is Active Directory? Active Directory is a network-based object store and service that locates and manages resources.ini timeout and default settings. Winkey + M minimizes all. servers.Windows Server 2003 interview and certification questions By admin | December 7. Winkey + U opens the Utility Manager. 5. 2000. however. This is accomplished by right-clicking the application or setup program and selecting Properties –> Compatibility –> selecting the previously supported operating system. What are the Windows Server 2003 keyboard shortcuts? Winkey opens or closes the Start menu. Winkey + R opens Run dialog. Where are the Windows NT Primary Domain Controller (PDC) and its Backup Domain Controller (BDC) in Server 2003? The Active Directory replaces them. Winkey + F1 opens Help. 2003 1.

and modifications to the Local Security Authority (LSA). 10. the Active Directory Installation Wizard contacts an existing DC to update the directory and replicate from the DC the required portions of the directory. The structural class is important to the system administrator in that it is the only type from which new Active Directory objects are created. This type does not use the . What types of classes exist in Windows Server 2003 Active Directory? o Structural class. These changes include account and individual user lockout policies. Unique trade or brand names often give rise to separate DNS identities. Rather than apply numerous attributes when creating a structural class. Active Directory Users and Group Manager. The Active Directory Installation Wizard verifies a proper configuration of the DNS infrastructure. What snap-in administrative tools are available for Active Directory? Active Directory Domains and Trusts Manager. When should you create a forest? Organizations that operate on radically different bases may require separate trees with distinct namespaces. The auxiliary class is a list of attributes.500 specification was adopted. Active Directory Schema Manager (optional. How can you authenticate between forests? Four types of authentication are used across forests: (1) Kerberos and NTLM network logon for remote access to a server in another forest. The 88 class includes object classes defined prior to 1993. 9. available from adminpak) 13. Think of abstract classes as frameworks for the defining objects. How long does it take for security changes to be replicated among the domain controllers? Security-related modifications are replicated within a site immediately. it provides a streamlined alternative by applying a combination of attributes with a single include action. changes to computer account passwords. and (4) user principal name (UPN) credentials. In order to be located on a network. it performs debugging and reports what caused the failure and how to fix the problem. o 88 class. Active Directory Replication (optional. 12. Abstract classes are so named because they take the form of templates that actually create other templates (abstracts) and structural and auxiliary classes. (3) Kerberos delegation to N-tier application in another forest. (2) Kerberos and NTLM interactive logon for physical logon outside the user’s home forest. If the wizard fails to locate a DC. changes to password policies. All DNS configuration debugging and reporting activity is done with the Active Directory Installation Wizard. Active Directory Sites and Services Manager. o Auxiliary class. o Abstract class.8. available from the Resource Kit). Organizations merge or are acquired and naming continuity is desired. every DC must register in DNS DC locator DNS records. What’s new in Windows Server 2003 regarding the DNS management? When DC promotion occurs with an existing forest. Structural classes are developed from either the modification of an existing structural type or the use of one or more abstract classes. a separately defined tree can enforce more direct administrative and security restrictions. when the 1988 X. Organizations form partnerships and joint ventures. 11. While access to common resources is desired.

In Windows 2000. and auxiliary definitions. the first time a roaming user logs on to a new system the logon process may take some time. 16. Every group to which the user belongs has an associated SID. 14. Where are the documents and settings for the roaming profile stored? All the documents and environmental settings for the roaming user are stored locally on the system. it is given a unique access number known as a security identifier (SID). Therefore. all changes to the locally stored profile are copied to the shared server folder.exe) . How do you delete a lingering object? Windows Server 2003 provides a command called Repadmin that provides the ability to delete lingering objects in the Active Directory. Anything special you should do when adding a user that has a Mac? "Save password as encrypted clear text" must be selected on User Properties Account Tab Options. 15. when the user logs off. 18. 17. DOS batch files (. Every domain has at least one GC that is hosted on a domain controller. Where are the settings for all the users stored on a given machine? \Document and Settings\All Users 23. 19. nor is it in common use for the development of objects in Windows Server 2003 environments. This can be useful for roaming users who move between computer systems. VPN. What remote access options does Windows Server 2003 support? Dial-in. would the SID and permissions stay the same? No. The user and related group SIDs together form the user account’s security token. the SID will be different.structural. 21.com. If you delete a user account and attempt to recreate it with the same user name and password. VBScript. What is Global Catalog? The Global Catalog authenticates network user logons and fields inquiries about objects across a forest or tree. there was typically one GC on every site in order to prevent user logon failures across the network. depending on how large his profile folder is. dial-in with callback. If I delete a user and then create a new account with the same username and password. 22. 20. and.bat. What do you do with secure sign-ons in an organization with many roaming users? Credential Management feature of Windows Server 2003 provides a consistent single sign-on experience for users. since the Macs only store their passwords that way. or even . SIDs from the security token are mapped to the access control list (ACL) of any object the user attempts to access. . What languages can you use for log-on scripts? JavaScript. The Credential Management feature provides a secure store of user credentials that includes passwords and X. How is user account security established in Windows Server 2003? When an account is created.509 certificates. abstract. which determines access levels to objects throughout the system and network.

(b) IP offer.254. 4. The most frequently used protocols should be at the top. Should we deploy IPSEC-based security or certificate-based security? They are really two different technologies. 9. The network layer will be responsible for addressing the frames. IPSec secures the TCP/IP communication and protects the integrity of the packets. 8.Administrator Interview Questions and Answers « On: January 10. the users do not seem to be getting DHCP leases off of it. 3.*. What authentication options do Windows 2000 Servers have for remote clients? PAP. Taking raw data bits and packaging them into frames. NetBEUI. don’t have any access to the corporate network and on ipconfig my address is 169. 10:31:01 AM » • Quote Windows Administrator Interview Questions and Answers 1. CHAP. What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP/IP? NWLink (Novell). I can’t seem to access the Internet. AppleTalk (Apple). while the physical layer is reponsible for retrieving and sending raw data bits. 6. How do cryptography-based keys ensure the validity of data transferred across the network? Each IP packet is assigned a checksum. but below the network layer. We’ve installed a new Windows-based DHCP server. 2009. How can you force the client to give up the dhcp lease if you have access to the client PC? ipconfig /release 5. SPAP. What happened? The 169. 11. Describe how the DHCP lease is obtained. however. The server must be authorized first with the Active Directory.254. 10. Certificate-based security ensures the validity of authenticated clients and servers. What is binding order? The order by which the network protocols are used for clientserver communications. 7. MS-CHAP and EAP. The name for the technology is APIPA (Automatic Private Internet Protocol Addressing). so if the checksums do not match on both receiving and transmitting ends. It’s a four-step process consisting of (a) IP request. What is data link layer in the OSI reference model responsible for? Data link layer is located above the physical layer.*. © IP selection and (d) acknowledgement. 2.*. the data was modified or corrupted.* netmask is assigned to Windows machines running 98/2000/XP if the DHCP server is not available. What is LMHOSTS file? It’s a file stored on a host machine that is used to resolve .

NetBIOS to specific IP addresses. What’s the difference between forward lookup and reverse lookup in DNS? Forward lookup is name-to-address. 12. UNC Universal Naming Convention \\servername\shared name (It is used to access the shared folder) MAC Media Access Control PDC Primary Domain Controllers BDC Backup Domain Controllers SMP Symmetric Multi Processors AMP Asymmetric Multi Processing EFS Encrypted File System FAT File Allocation Table HCL Hardware Compatibility List IIS Internet Information Service LSA Local Security Authority MMC Microsoft Management Console OU Organizational Unit RAS Remote Access Service RDP Remote Desktop Protocol (used for Terminal Services) RRAS Routing and Remote Access Service SID Security Identifier WINS Windows Internet Name Service GUID Globally Unique identifier IAS Internet Authentication Service UPN User Principle Name (Username@domainname. 13.com) BIOS . the reverse lookup is address-to-name. How can you recover a file encrypted using EFS? Use the domain recovery agent.

com] OSPF Open Shortest Path First (these two are routing protocols) RIP Routing Information Protocol POP3 Post Office Protocol (used to receive the mails) SMTP Simple Mail Transfer Protocol (Used to send the mails) SMPS Switch Mode Power Supply PING Packet Internet Grope Windows Server 2003 Interview Questions & Answers .Basic Input Output System Net BIOS Network Basic Input/Output System ARP Address Resolution Protocol DVD Digital Video Disk GPO Group Policy Object (LGPO Local Group Policy Object) IPsec Internet Protocol Security ISP Internet Service Provider NAT Network Address Translation MBT Master Boot Record USB Universal Serial Bus POST Power On Self Test SCSI Small Computer System Interface SMTP Simple Mail Transfer Protocol URL Uniform Resource Locator RAID Redundant Array of Independent Disk IDE Intelligent drive Electronicsor Integrated Drive Electronics FQDN Fully Qualified Domain Name (full computer name) [computername.domainname.

If you uninstall Windows Server 2003. Winkey + SHIFT + TAB moves the focus to the previous application in the taskbar. Winkey + F1 opens Help. Winkey + L locks the computer. Winkey + TAB moves the focus to the next application in the taskbar. Win 98. which operating systems can you revert to? Win ME.ini timeout and default settings. documents. 6. workstations. Winkey + BREAK displays the System Properties dialog box. Winkey + F opens the Search panel. 5. An underlying principle of the Active Directory is that everything is considered an object— people. 3. What is Active Directory? Active Directory is a network-based object store and service that locates and manages resources. however. 2000. Winkey + U opens the Utility Manager. servers. Winkey + CTRL + F opens the Search panel with Search for Computers module selected. Winkey + R opens Run dialog. and devices.1. 2. printers. Each object has certain attributes and its own security access control list (ACL).ini file is set as read-only. that you cannot upgrade from ME and 98 to Windows Server 2003. Winkey + SHIFT+ M undoes minimization. Winkey + M minimizes all. and hidden to prevent unwanted editing. Note. How do you double-boot a Win 2003 server box? The Boot. Where are the Windows NT Primary Domain Controller (PDC) and its Backup Domain Controller (BDC) in Server 2003? . 7. This is accomplished by right-clicking the application or setup program and selecting Properties –> Compatibility –> selecting the previously supported operating system. and makes these resources available to authorized users and groups. What are the Windows Server 2003 keyboard shortcuts? Winkey opens or closes the Start menu. To change the Boot. 4. system. What do you do if earlier application doesn’t run on Windows Server 2003? When an application that ran on an earlier legacy version of Windows cannot be loaded during the setup function or if it later malfunctions. Winkey + B moves the focus to the notification area. How do you get to Internet Firewall settings? Start –> Control Panel –> Network and Internet Connections –> Network Connections. use the System option in Control Panel from the advanced tab and select Startup. Winkey + E opens Windows Explorer showing My Computer. XP. Winkey + D shows the desktop. you must run the compatibility mode function.

Difference between windows 2000 server and windows 2003 server 1. changes to computer account passwords. 10. (3) Kerberos delegation to N-tier application in another forest. and modifications to the Local Security Authority (LSA). the Active Directory Installation Wizard contacts an existing DC to update the directory and replicate from the DC the required portions of the directory. The Active Directory Installation Wizard verifies a proper configuration of the DNS infrastructure. Unique trade or brand names often give rise to separate DNS identities. a separately defined tree can enforce more direct administrative and security restrictions. every DC must register in DNS DC locator DNS records. What’s new in Windows Server 2003 regarding the DNS management? When DC promotion occurs with an existing forest. These changes include account and individual user lockout policies. and (4) user principal name (UPN) credentials. How can you authenticate between forests? Four types of authentication are used across forests: (1) Kerberos and NTLM network logon for remote access to a server in another forest. All DNS configuration debugging and reporting activity is done with the Active Directory Installation Wizard. changes to password policies. In order to be located on a network. Now all domain controllers share a multimaster peer-to-peer read and write relationship that hosts copies of the Active Directory. If the wizard fails to locate a DC. 9. When should you create a forest? Organizations that operate on radically different bases may require separate trees with distinct namespaces. Organizations merge or are acquired and naming continuity is desired. Organizations form partnerships and joint ventures. While access to common resources is desired. (2) Kerberos and NTLM interactive logon for physical logon outside the user’s home forest. 11.The Active Directory replaces them. Domain rename is not possible in windows 2000 . How long does it take for security changes to be replicated among the domain controllers? Security-related modifications are replicated within a site immediately. it performs debugging and reports what caused the failure and how to fix the problem. 8.

IE6 5.Windows 2k doesn't have 64 bit version 7.1 13. Schema version has changed from ver.In 2000 we can create 1 million users and in 2003 we can create 1 billion users. windows 2k . Shadow copying has introduced.Windows 2k .II6 4.0 and Code name of 2003 is Win NT 5.Win2000 Supports 4-node clustering and 2003 supports 8-node clustering.Code name of 2000 is Win NT 5. 12. 3. 9.IIS 5 and windows 2k3 .13 to ver. 14. Terminal service are enhanced in win2k3 6.In w 2003 server inbuilt firewall is there. 10.Win2003 has Improved Print management .2.IE 5 and Windows 2k3 .30. 8. DNS Stub zone has introduced in win2k3. 11Win 2003 has High HCL Support (Hardware Compatibility List) issued by Microsoft.

.0 19. 17In Win 2000 server we can apply 620 group policies but in 2003 we can apply nearly 720 so Win2003 server is more secure than win 2000 server. Enterprise.NET 2.compared to 2000 server.Win2003 has telnet sessions available.In 2000 it supports of 8 processors and 64 GB RAM (In 2000 Advance Server) whereas in 2003 supports up to 64 processors and max of 512GB RAM.Win2000 supports IPV4 whereas 2003 supports IPV4 and IPV6. 18.Win2000 has basic concept of DFS (Distributed File systems) with defined oots whereas 2003 has Enhanced DFS support with multiple roots. Datacenter and Web server Editions.Win2000 has Server and Advance Server editions whereas 2003 has Standard.Win2000 doesn’t support Dot net whereas 2003 Supports Microsoft . 15. 20. 16. 21.

27.22. whereas in 2003 we have a End user policy management which is done in GPMC (Group policy management console). 28. 26.In 2000 we don’t have end user policy management.In 2000 there is complexality in administering Complex networks whereas 2003 is easy administration in all & Complex networks.2003 has service called ADFS (Active Directory Federation Services) which is used to communicate between branches with safe authentication. 23.In 2003 we have concept of Volume shadow copy service which is used to create hard disk snap shot which is used in Disaster recovery and 2000 doesn’t have this service.In 2003 their is improved storage management using service File Server Resource Manager (FSRM).2003 has service called Windows Share point Services (It is an integrated portfolio of . 25In 2000 we have cross domain trust relation ship and 2003 we have Cross forest trust relationship. 24.

Domain partition. There is only three AD partition. Win2000 ADS :1.2 Million object can be created .When installing terminal services for win2000 u r prompted to select application server functions or administrative functions sets can be installed sequently on one server but it performs only one function at one time. Win2003 ADS :1. But 2k only Emergency Repair Disk(ERD) is there.Only one million object can be created. 3. 2.Universal group membership is not present. and systems both within and beyond the organizational firewall). In Win 2000 server we can apply 620 group policies. Between parent and child. 6. 29. schema partition. configuration partition. 5.collaboration and communication services designed to connect people. information.It is called as non-transitive trust. processes. . But in 2003 still distinguishes between application and administrative services but installation and management are now consolidated. there is no built in trust . 4.

Automated System Recovery (ASR) is there.Between parent and child.2.com/2009/02/difference-between-windows-2000server. Same partitions are there in 2003. 5.blogspot. Read more: http://newadmins. there is built in trust .It is called as transitive trust. but one additional partition called Application directory partition is present.html#ixzz0rxXluA8a . 4. but in 2003 we can apply nearly 720 so Win2003 server is more secure than win 2000 Server. 3.