You are on page 1of 18

Technical Questions

HP
Net bios name max length
Ans: The NetBIOS naming convention allows for 16 characters in a NetBIOS name. Microsoft, however,
1)

limits NetBIOS names to 15 characters and uses the 16th character as a NetBIOS suffix.

The NetBIOS suffix is used by Microsoft Networking software to identify functionality installed on the registered
device.
2) Windows NT is using netbios? True or false details
Ans: Yes because Microsoft networking services running on a Windows NT-based
computer are identified by using NetBIOS names.

Windows 2000 supports net bios or not?
Ans: Yes. Using WINS it allow a NetBIOS name to be converted to an IP address. Therefore
3)

computers using WINS must be using NBT (NetBIOS over TCP/IP). The purpose of WINS is to allow a
NetBIOS name to be converted to an IP address. Therefore computers using WINS must be using NBT
(NetBIOS over TCP/IP).

What are the tools for backup-third party?
Ans: Tivoli, Veritos, Netvault
4)

What is the cluster?
Ans: A group of independent computer systems known as nodes or hosts, that work together as a
5)

single system to ensure that mission-critical applications and resources remain available to clients. A
server cluster is the type of cluster that the Cluster service implements. Network Load Balancing
provides a software solution for clustering multiple computers running Windows 2000 Server that
provides networked services over the Internet and private intranets. In file systems a cluster is the
smallest amount of disk space that can be allocated to hold a file. All file systems used by Windows
2000 organize hard disks based on clusters, also called allocation units. The smaller the cluster size,
the more efficiently a disk stores information. If no cluster size is specified during formatting, Windows
2000 picks defaults based on the size of the volume and the file system used. These defaults are
selected to reduce the amount of space lost and the amount of fragmentation on the volume.
6)

What are the steps for trouble shooting 2000 server?

Accenture:
1)

How to create backup in NT?

Ans: Windows NT Server includes a graphical tool called Backup that makes it
easy to back up your Windows NT Server-based data to tape drive. Backup allows you
to: Back up and restore both local and remote files on NTFS, FAT, or HPFS
partitions from a single location.
2) How to create boot floppy in NT?
Ans: 1) Format a floppy disk
2) Copy the following the files from HDD to FDD (copy c:\ to A:\)


NTLDR
BOOTSECT.DOS

These are hidden files

Each DHCP server in your environment should have at least one scope that does not overlap with any other DHCP server scope in your environment. If the PDC fails then a BDC can be promoted to a PDC. 6. However. BDC Explain.exe (Refer D:\d_back\madhan\madhan\ ntfinal. In the Windows Components Wizard. 5) Without promoting BDC TO PDC. A PDC can be demoted to a BDC if one of the BDC's is promoted to the PDC. you must create a scope (a range of valid IP addresses that are available for lease to the DHCP clients). 5. and then click Details. click Finish. 3) When PDC is down. click Settings. The Primary Domain Controller maintains the master copy of the directory database and validates users.COM    BOOT. Click Start. A Backup Domain Controller contains a read only copy of the directory database and can validate users. 4. 2. when you install and configure the DHCP service on a member server.exe /OX  For creating the startup disk. WINS. Double-click Add/Remove Programs. To authorize a DHCP server: 1.doc) 3) Give command C:\I386\winnt. and then click Control Panel. Click to select the Dynamic Host Configuration Protocol (DHCP) check box if it is not already selected. Insert the Windows 2000 Advanced Server CD-ROM into the CD-ROM drive if you are prompted to do so. and a BDC is a Backup Domain Controller. NTDETECT. When you install and configure the DHCP service on a domain controller. In the Windows Component Wizard. Possible data loss is user changes that have not yet been replicated from the PDC to the BDC.INI Ntbootdd. Note A stand-alone DHCP server cannot be authorized against an existing Windows Active Directory. and then click DHCP. users can easily login to the secondary server and continue operations with minimal downtime and data loss. Etc? 7) How to configure ADS? ) How to install configure DHCP in win 2000? f:\madhan\interview tips\technical\sources\ windows 2000 configure dhcp server. the server is typically authorized the first time that you add the server to the DHCP console. we can access the network resources or not? is it possible? 4) 6) How to configure DNS. You must install a PDC before any other domain servers. Configuring the DHCP Service After you install and start the DHCP service. DHCP. When Setup is complete. In Windows 2000. and then click OK. DHCP servers within an Active Directory domain environment must be authorized to prevent rogue DHCP servers from coming online and authorizing a DHCP Server. Click Start. click Administrative Tools.sys - These is a Read only file SCSI Drivers Ntoskrnl. and then click Add/Remove Windows Components.htm To install the DHCP Service on an existing Windows 2000 Server: 1. click Networking Services in the Components box. IIS RAS. Ans: A PDC is a Primary Domain Controller. that time we can possible to access network or not? A: Yes. If the primary server fails. click Next to start Windows 2000 Setup. you need to authorize the DHCP server. 3. . Setup copies the DHCP server and tool files to your computer. 4) RDISK Command for creating ERD PDC. click Programs.

1 to an ending address of 192. Right-click the server. and then click Next. Click Add to place the default gateway address into the list.0. but it has since stopped. 5. NTFS5. FAT32. type the new subnet mask. such as . 9) What is the default File system in 2000? Ans:During the text-based portion of Windows 2000 Setup. for example. Click Yes.100. 3. and then click New Scope. I want to configure these options now. but it should be descriptive enough to identify the purpose of the scope on your network. Note To restart the DHCP service. The server should display a green arrow in the bottom-right corner to indicate that the server has been authorized.168. Type the range of addresses that can be leased as part of this scope. the server has not yet been authorized. 2. a starting IP address of 192. and then click Authorize. It features full support for new Windows 2000 features. 7. Type the IP address for the default gateway that should be used by clients that obtain an IP address from this scope. To create a new scope: 1. I want to activate this scope now. After a few moments. 4. EFS. Right-click the server. Note When DNS servers already exist on your network. Click Next. Click Finish. select the DHCP server on which you want to create the new DHCP scope. select the new DHCP server. verify that the client has a valid network connection and that all related client hardware devices (including cables and network adapters) are working properly. Click Start. Back to the top Troubleshooting • Clients are unable to obtain an IP address If a DHCP client does not have a configured IP address. Type the name of your DNS server. This determines the length of time that a client can hold a leased address without renewing it. 6. If you want to use a different subnet mask. you might use Administration Building Client Addresses. click Run. the server may not have been authorized to operate on the network. If you were previously able to start the DHCP service. • The DHCP server is unavailable When a DHCP server does not provide leased addresses to clients.Note You must be logged on to the server with an account that is a member of the Enterprise Administrators group. they should all be valid addresses for your network and not currently in use. Because these addresses are given to clients. and then click DHCP. 2. 3. type cmd. But it supports FAT. click Start. use Event Viewer to check the system log for any entries that may explain the cause. In the New Scope Wizard. Click Next. This is either because of a network problem or because the DHCP server is unavailable.100. and minutes before an IP address lease from this scope expires. Type net start dhcpserver. This can be any name that you choose. right-click the server again and then click Refresh. to activate the scope and allow clients to obtain leases from it. click Programs. Type any IP addresses that you want to exclude from the range you entered. Click Next to select Yes. and then click Resolve to ensure that your DHCP server can contact the DNS server and determine its address.CDFS Also. and then press ENTER. and then click Next. Type the number of days. 4. it is often because the DHCP service has failed to start. If this is the case. Click Next.100.0 The version used with Windows 2000. by default you can choose to convert your hard disk from the FAT32 file system to the NTFS file system. it generally means that the client has not been able to contact a DHCP server. For example. Notes: NTFS 5. click Next.168. point to Administrative Tools. Note In the console tree. In the console tree of the DHCP snap-in. If there is a red arrow in the bottomright corner of the server object. and then press ENTER. Click Next. and then type a name and description for the scope. and then extend the wizard to include settings for the most common DHCP options. type your organization's domain name in Parent domain. This includes any addresses that may have already been statically assigned to various computers in your organization. If the DHCP server has started and other clients have been able to obtain a valid address. hours. Then click Add to include that server in the list of DNS servers that are assigned to the DHCP clients.

1 pc IP shoud be 172.DIT Active Directory Includes: 11) What is system state backup? Ans: System State A collection of system-specific data that can be backed up and restored. in XP 1) Start-->Settings--> Printer and Faxes 2) Now right click on that box or select File -> select Add Printers 3) Now welcome wizard will be open -->click next 4) Select the network printer by giving correct path and finish the setup.2.16. 5) Now the right click created printer shortcut 6) Select properties--> then select Securities and assign the permission..1 5) now printer configuration Settiings page will open now u can change the IP address Etc. the class registration database. You must back up and restore system state components together. 12) How to install network printer? Ans: 1) We have to take the printout of the printer settings in the printer (by pressing big button) 2) From that printout you can get the default assigned ip address for that printer (Its assigned default by the manufacurer) 3) Then connect the printer to one of the pc using cross cable Note:Pc ip shoud be the same class what printer has Ex: if Printer IP is 172.. 13) How to create roaming profile? 1) Create a User open user properties 2) Select profile TAB give Profile path in user profile column Ex:\\server1\madhan 3) Share and give the permission for that folder . For Windows 2000 Server. the system state data also includes Active Directory and the Sysvol directory. and encryption. the System State data includes the registry. For all Windows 2000 operating systems. If the server is a domain controller. How to create ADS backup? 10) Active Directory is backed up as part of system state.16.16.4. Default path for active directory is C:\Winnt\NTDS\NTDS..0 with Service Pack 4 or later Note: If you created NTFS volumes on Windows NT 4..2 or 3. disk quotas. the volumes aren't upgraded automatically to NTFS 5.0.2. You must specifically choose to upgrade the volumes during installation of the operating system or when you install Active Directory on a Windows 2000 server.0 and upgraded to Windows 2000. It is only supported by Windows 2000 and minimally by Windows NT 4. the system state data also includes the Certificate Services database (if the server is operating as a certificate server). a collection of system components that depend on each other.Active Directory directory service.2.. 4) If u go to internet explore type http:\\172. To configure with print server and assign permission. and the system boot files.

bat copy the file and paste to "c:\winnt\system32\repl\Import\scripts" If you are using windows 2003 server c:\windows\sysvol\sysvol\scripts\ repl and sysvol should be on sharing then only it will work Mandatory Profile : All the concept is same as like Roaming profile we have the change the fileextension type as ntuser.dat to ntuser. 14) Difference between Switch and Hub? Ans: HUB and SWITCH is categorized under Inter-Connecting Devices in LAN. In case of Switch it will forward the Data to the particular port using the MAC -ADDRESS -TABLE . b) Logon Script : If we need to share the map drive network in Roaming users we have to create one batch file or any script file Batch file creation process : Open the notepad type this command to net use u: \\server-name\share-name\ then saveas to .In 2000 and 2003 how to create Roaming Profile? Roaming Profile: Create the normal user in server pc and go to select the profile tab give the profile path \\servername\sharename\%username% Note: You have to give full permission and include ownership of sharename folder. then only we can able to open and use that profile in server. the HUB will Flood (Broadcast) the data to all ports .man.Switch creates the mac table with the help of Application Specific Integrated Circuit (ASIC). CSC 1) What is DFS? Ans: Distributed file system (Dfs) A Windows 2000 service consisting of software residing on network servers and clients that transparently links shared folders located on different file servers into a single namespace for improved load sharing and data availability 2) How to install DFS in win 2000? . When a data is received from a port. The Network Speed is increased while using the Switch since the entire speed of the NIC card is not Shared to all ports .

To create a Dfs root: 1. This option requires the host server for the Dfs root or Dfs link to be a domain member. Click Start. and then click Next. If one of the physical disks fails. 9. a striped volume was known as a stripe set. RAID5 . and then click Next. and then click New Dfs Link. Click Start. 5. Striped volumes cannot be mirrored or extended. and then click Next. If the Dfs partition is NTFS. A mirrored volume is slower than a RAID-5 volume in read operations but faster in write operations. NOTE: To add an additional Dfs root share.1. 3) What is RAID? What are the RAID concept supports in 2000 server? A method used to standardize and categorize fault-tolerant disk systems. RAID 1 A fault-tolerant volume that duplicates data on two physical disks. Enter the name of the host computer for the Dfs root or click Browse to select a server name. and then click OK. Striped volumes offer the best performance of all volumes available in Windows 2000. point to Administrative Tools. 3. enter the name of a shared folder. or click Browse to select from the list of available shared folders. In the Send the user to this shared folder box. How do configure RAID 0. In the Specify the Dfs Root Share window. point to Programs. Level 1 (mirroring). and then click Next. and then click Next. If you are creating a domain-based Dfs root. 4. Data in a striped volume is allocated alternately and evenly (in stripes) to these disks. reliability. On the Action menu. 2. 2. Mirrored volumes can only be created on dynamic disks. right-click the Dfs root to which you want to assign a shared folder. Click Finish to create the new Dfs root. but they do not provide fault tolerance. click an existing shared folder or specify the path and name of a new shared folder to create. The mirror is always located on a different disk. In Windows NT 4. Accept the default name for the Dfs root or specify a new name. 1.0. point to Programs. choose one of the following: • Click to select the Join Replication check box to have the files that are located in the Dfs root or Dfs link that you selected automatically replicate as changes occur to the source file. and then click Distributed File System. click to select Create a domain Dfs root. 7. 4. 3. Windows 2000 provides three of the RAID levels: Level 0 (striping) which is not fault-tolerant. click New Dfs Root. In the Link Name box. click the name of the domain where you want to create the Dfs root. and Level 5 (striped volume with parity). Restart your computer. Six levels gauge various mixes of performance. point to Administrative Tools. • Click to select the No Replication check box to have the source file remain unchanged. repeat the above procedure.0. a mirrored volume was known as a mirror set. In Windows NT 4. but the system continues to operate by using the unaffected disk. To add a Dfs shared folder: NOTE: The first shared folder is added when you create the Dfs link.5? RAID 0 A volume that stores data in stripes on two or more physical disks. If a disk in a striped volume fails. or Create a standalone Dfs root. enter the logical name for this subfolder. In the console tree. and cost. and then click Distributed File System. 8. and then click Next. 6. the data on the failed disk becomes unavailable. In the Select the Dfs Root Type window. You can create striped volumes only on dynamic disks. the data in the entire volume is lost.

10) Switch working with which OSI model? Layer 2 switch works with Data Link Layer Layer 3 Switch works in Network Layer 11) Hub working with which OSI model how Ans: Works in Physical Layer its Assists with the activation. Adds a range of excluded addresses to the current scope. Also known as a striped volume with parity. and deactivation of physical connectivity between devices 13) What are commands for Trouble Shooting with DHCP server and Clients? DHCP Server Commands The following table lists the netsh dhcp commands that are used in this example procedure. Pcanyware. you can recreate the data that was on the failed portion from the remaining data and parity. RAID-1 and RAID-5. Windows 2000 Advanced Server supports three types of Software RAID: RAID-0. do you know? Dameware. Command server Description Shifts the current DHCP command-line context to the server that is specified by either its add scope scope add iprange add excluderange set optionvalue set state name or IP address. Adds a range of IP addresses to the current scope.VNC 7) What is Remote Management. Adds a new scope to the specified DHCP server.because of Traffic will be less. Because only RAID-1 and RAID-5 provide for fault tolerance. Parity is a calculated value that is used to reconstruct data after a failure. DHCP Client Commands IPCONFIG /RELEASE IPCONFIG /RENEW IPCONFIG /ALL IBM 3) How to create Active Directory Site? . If a portion of a physical disk fails. Switches the command context to the DHCP scope that is specified by its IP address.A fault-tolerant volume with data and parity striped intermittently across three or more physical disks. Sets or resets the state of the current scope to either an active or inactive state. How? 8) /24how many hosts will be created? Ans: 30 Hosts 9) What is sub netting? Subnetting allows large networks into small networks. Sets an option value for the current scope. maintenance. this section will cover only these two solutions 4) Which hard disk mainly used for RAID? Ans: SCSI 5) How Do you know about new hard disks support RAID? 6) What are the remote tools.

Enter a name for the site (e. basically one pc how it works? What are the Difference between Winnt4 & Windows 2000 Ans: Diff bet winnt & 2000 File system difference (ntfs. This allows users. Alternatively. DEFAULTIPSITELINK. FSMO? WIPRO Tell me. Right-click the Site branch.) 2. Authoritative. Site from the context menu. Copying is useful if you want to back up files between normal and incremental backups because copying does not affect these other backup operations.A NEW TOOLTO RECOVER FILES Window 2003 server includes IIS server in it.. computers. That is the biggest advantage on top of better file system management In 2003 server u can change the domain name at any time without rebuilding the domain Also Windows 2003 does introduce the ability to create a transitive trust between separate forests as long as all domains and forest are at full Windows 2003 functional level. 2000 server can any time any moment become server or member of server simple add/remove dcpromo. But in win2003 no limitation 5) What is DNS? How it works? Domain Name System (DNS) DNS provides a service for mapping DNS domain names to IP addresses. exists by default). 1. The name must be 63 characters or fewer and can’t contain spaces or periods. and applications to query the DNS to specify remote systems by fully qualified domain names rather than by IP addresses 6) Directory Services. and vice versa.g. You must also select a site link (only one site link.fat32) In winnt server concept pdc and bdc but there is no concept in 2000 In winnt server sam database r/w format in pdc and read only format in bdc In 2000 domain and every domain controller sam database read/writer format . select Programs. Click OK. (From the Start menu. Where as in 2000 u have to rebuild the entire domain to change the domain name In windows 2000 support maximum 10 users access shared folder at a time through network. Daily backup . 4) What is difference between 2000 and 2003 server? In windows 2003 support SHADOW COPIES . fat. 3.Start the MMC Active Directory Sites and Services snap-in. and select New. Non-Authoritative.But in winnt you have to reinstall operating system.. Active Directory Sites and Services Manager. 1) 2) 3) How many backups available in 2000? Copy backup A copy backup copies all selected files but does not mark each file as having been backed up (in other words. NewYork). Administrative Tools. enter IP 4. the archive attribute is not cleared).

click Users. point to Administrative Tools. the archive attribute is cleared). point to Programs. you need only the most recent copy of the backup file or tape to restore all of the files. In the To box. for example: \\server\users\tester • • You can substitute username for the last subfolder in the path. follow these steps: a. With normal backups. the archive attribute is cleared). For example. Assign a Home Folder to a User from the Command Line You can use the net user command to assign a home folder to a user from the command line. type the following command. If you use a combination of normal and incremental backups. and users is the shared folder. and then click Active Directory Users and Computers. 4) 5) What are the backup devices you used explain? How to create Home Folder? 1. If you are performing a combination of normal and differential backups. b. and then press ENTER: net user tester /homedir:\\server\tester$ 6) How to install Recovery Console. It does not mark files as having been backed up (in other words. the archive attribute is not cleared). the archive attribute is not cleared). at the command line. To assign a home folder on a network server. Click OK. and then click Properties. In the console tree. for example: \\server\users\username Note In these examples. you will need to have the last normal backup set as well as all incremental backup sets in order to restore your data. restoring files and folders requires that you have the last normal as well as the last differential backup. It marks files as having been backed up (in other words. Normal backup A normal backup copies all selected files and marks each file as having been backed up (in other words. type the folder information. type a path. 2. 3. This path can be any one of the following types: Network path. Differential backup A differential backup copies files created or changed since the last normal or incremental backup. Incremental backup An incremental backup backs up only those files created or changed since the last normal or incremental backup. 4. In the Details pane. click Connect. server is the name of the file server housing the home folders. 5. right-click the user account.A daily backup copies all selected files that have been modified the day the daily backup is performed. 6. You usually perform a normal backup the first time you create a backup set. Click Start. click Profile. Explain? . Under the Home folder. To do this. In the Properties dialog box. and then specify a drive letter. The backed-up files are not marked as having been backed up (in other words.

It doesn't contain all of the data for a given zone.  Copies of A records for all name servers authoritative for the zone RAID levels Type of Backups. FSMO roles 1. What will be the cause? 5. click Run. Note To use the recovery console for an installation. you need the local Administrator password.Install the Windows Recovery Console After Windows is Already Installed on the Computer 1. Global catalog A domain controller that contains a partial replica of every domain directory partition in the forest as well as a full replica of its own domain directory partition and the schema and configuration directory partitions. 2. 2. Difference between Incremental and differential backup? What will be the drive letter of 25th hard drive? Ans: Z 8. Click Start. follow the instructions on the screen to finish Setup.exe /cmdcons in the Open box. 4. you need the Administrator password that is used in the Directory Service Restore mode TCS Port no of various services.  Copies of NS records for all name servers authoritative for the zone. Click OK. This zone contains only enough data to identify the DNS servers that are authoritative for the zone and all the records for that zone. You can't update it. The Global Catalog enables users and applications to find objects in Active Directory given one or more attributes of the target object. "The network path was not found?" is the error u r getting when u try to access the resource but u could able to ping the machine. 7. For Domain Controllers. Stub Zone In DNS A stub zone (slide 7) is a read-only copy of a zone. 6. The attributes in the Global Catalog are those most frequently used in search operations (such as a user's first and last names) and those attributes that are required to locate a full replica of the object. without knowing what domain holds the object. but each object includes a limited number of its attributes. where CD-ROM drive letter is the drive letter assigned to your CD-ROM drive. and then restart your computer. and then type CD-ROM drive letter:\i386\winnt32. The Active Directory replication system builds the Global Catalog 3. Forest migration 9. Basically what we have here is a zone that contains specific information on what DNS servers are authoritative for that zone.    Check whether firewall enabled Check File print sharing may enabled or not Make sure that you have enabled NetBIOS over TCP/IP if this is a mixed OS network .  A copy of the SOA record for the zone. The Global Catalog holds a replica of every object in Active Directory.

Port no of various services. There can be only one PDC emulator in a domain.MyDomain.  Supporting Active Directory (AD) replication to Win2K domain controllers and NTLM replication to BDCs. What is the difference between WINS and DNS? Why should we use DNS instead of WINS? WINS resolves netbios computer names to IP address. you will notice you can use a different "hostname" from "computername". WINS = MyComputer = 192. a Win2K domain assigns a domain controller to act as a PDC for NT BDCs.  Handling account modifications.1 Note: DNS is primarily used to resolve domain names to the IP addresses that are held in Domain Name Servers. What are the switches available with Dcpromo command? DCPROMO /Answer[:filename] DCPROMO /adv 12. you would have to type and IP address to get to a web site.168.0.1 DNS = MyComputer. . including:  Emulating as a PDC and replicating account information to BDCs.  Acting as a master browser for NT clients. If you go through your network settings for the TCP/IP protocol.168. Why we are not able to add WINNT in native modes? In mixed mode. the first domain controller in a Win2K domain acts as a PDC emulator.0.10. Without DNS servers. DNS is primarily used on WANS 11. The PDC emulator performs several important tasks in mixed mode.and not WANS. ACCENTURE II 1.Com = 192. What is LDAP? Ans: Lightweight Directory Access Protocol (LDAP) A directory service protocol that runs directly over TCP/IP and the primary access protocol for Active Directory. Servers use WINs to resolve Netbios 15 letter names to IP addresses. LDAP version 3 is defined by a set of Proposed Standard documents in Internet Engineering Task Force (IETF) RFC 2251.  Providing NT LAN Manager (NTLM) authentication services. DNS resolves hostnames to an ip address. including password changes. 2. WINS is generally used on LANS. By default. and you can assign the role to any domain controller in a domain.

and then press ENTER.If a Win2K site in mixed mode contains Win2K clients. type Ntdsutil in the Open box. and then press ENTER again 6. How do u seize the role? f:\madhan\interview tips\technical\sources\ seizing fsmo roles. to seize the RID Master role. Type seize <role>. If a client doesn’t find a Win2K domain controller. Type connections. 3. where <role> is the role you want to seize. click Start. 4. NT doesn’t support group policies so your Win2K client users won’t be able to take advantage of either the group policies or the logon scripts. Obviously.doc Operations Master Scope Schema Master Forestwide Domain Naming Master Forestwide Primary Domain Controller (PDC) Emulator Specific to a domain Relative Identifier (RID) Master Specific to a domain Infrastructure Master Specific to a domain 4. At the server connections: prompt. and then click OK 2) Type roles. where <servername> is the name of the server you want to use. click Run. it’ll try to use NTLM to log on to an NT domain controller. . Note: To see a list of available commands at any of the prompts in the Ntdsutil tool. and then press ENTER. type q. you would type seize rid master: 7. make sure there’s at least one Win2K domain controller in that site because the Win2K clients first attempt to locate Win2K domain controllers using DNS. 3. and then press ENTER. FSMO roles ? f:\madhan\Interview Tips\Technical\Sources\fsmo. Type connect to server <servername>. 5. For example. Click on Yes. . and then press ENTER. You will receive a warning window asking if you want to perform the seize.htm 1) On any domain controller. type ?. . .

This type of restore is typically used if a DC fails for hardware or software reasons. An authoritative restoration restores the DC's directory to the state it was in when the backup was made. If the first domain controller is out of the forest then seize all roles. then replicates the objects that you mark as authoritative to the other DCs. 7. and apply all other changes made since the backup to the restored DC from its replication partners. Repeat steps 6 and 7 until you've seized all the required FSMO roles.Note: All five roles need to be in the forest. The default Directory Services restore mode is a nonauthoritative restoration. its replication partners send all updates that have occurred in the past 2 days. This is because a GC server holds a partial replica of every object in the forest. you could restore an AD backup to a DC. Determine which roles are to be on which remaining domain controllers so that all five roles are not on only one server 8. Windows updates the rest of the restored database by using information from the other DCs to bring the directory up-to-date. type q. . The difference between seizing a role and transferring it is that when transferring a role. the DC receives from its replication partners new information that's been processed since the backup. What is the difference between Authoritative and Non-Authoritative restoration? Although you might have several domain controllers (DCs) providing fault tolerance for your domain. 9. an organizational unit (OU). let's say we restore a DC using a 2-day-old backup. The methods of the DomainController object available for these operations are SeizeRoleOwnership and TransferRoleOwnership What is the protocol used in logon? Ans: In Windows NT NTLM 3. Note: Do not put the Infrastructure Master (IM) role on the same domain controller as the Global Catalog server.32 if controller supports 8. What is the maximum and minimum hard drive for RAID5? 3. for example. After you seize or transfer the roles. After the DC starts. 5. thereby removing any changes made since the backup. and then press ENTER until you quit the Ntdsutil tool. then overwrites all other DCs to match the restored DC. Windows will ignore the fact that the OU was previously deleted. mark the OU as authoritative. This type of restore is most useful if you deleted. You don't have to perform an authoritative restoration of the entire directory--you can choose to make only certain objects authoritative. For example. then start the DCs normally. In this mode. In this case. Windows backs up AD as part of the System State and restores the directory by booting a DC into the Directory Services restore mode. What is the difference between seizing and transferring the roles? Transferring FSMO Roles FSMO roles can be either seized or relocated to another server.0 Version used for Authendication In Windows 2000 Kerberos For Remote login Telnet 6. Then. When you restore only parts of the directory. Because you marked the OU as authoritative. you still need to perform regular backups. Windows restores a DC's directory from the backup. the domain controller that currently holds the role is still online. replicate the OU to the other DCs. If the Infrastructure Master runs on a GC server it will stop updating object information because it does not contain any references to objects that it does not hold.

because it will create unique RID database for each domain so conflicts won’t happen 11.Cluster service information Note: For Windows 2000 Server. If the server is a domain controller.using two cable we can connect same type of 2 hard disk drive for disk dupluxion (Ex: Primary Master. including the system files . and includes support for 2 way server clustering. 13. Windows 2000 Advanced Server is designed for high end mission critical platforms. Difference between windows2000 standard and advanced edition? Windows 2000 Server supports 4 processors and is designed to fill the role of typical domain controller. Windows 2000 DataCenter Server goes even further than Advanced Server in that it can support up to 32 processors. What is the difference between mirroring and duplexing? Disk Mirroring :. Secondary Master)  What are the categories of event viewer available in a DC? Application Directory Service DNS Server File Replication Service Security System 12. and other common tasks. COM+ Class Registration database . file and print server. and no more than 2 drives can be used) 10. and 32 node network load balancing. primary slave)  Disk dupluction :. FRS replicates the updated file or folder to other servers. When FRS detects that a change has been made to a file or folder within a replicated shared folder.Boot files. 14. .Certificate Services database Active Directory directory service . cascading failover among 4 nodes.9. Is it recommended that having RID master role in global catalog server and why? Yes. What are the things (files) will be backed up in system state backup? Registry . 15.SYSVOL directory . the system state data also includes the Certificate Services database (if the server is operating as a certificate server). the system state data also includes Active Directory and the Sysvol directory. application server. What is the maximum hard drive for RAID1? RAID 1 requires 2 hard disks (2 drives are required.using one cable we can connect same type of 2 hard disk drive for disk mirroring (ex: primary master. What is FRS? Ans: File Replication service (FRS) is a technology that replicates files and folders stored in the SYSVOL shared folder on domain controllers and Distributed File System (DFS) shared folders. supports 8 processors.

it is a good idea to put them on a separate volume from the operating system files to improve performance.log.ini.log file. an Edbtemp. The system then puts a dire warning on the screen prompting you to take action to free up disk space quickly before Active Directory gets corrupted. A Global Catalog server stores the partial naming context replicas in the Ntds. 18. Generally. The original Edb.dit during the initial promotion of a domain controller.log file fills up. what will be the cause assuming that physical network is working fine? Scope not activated or DHCP server not authorized in the domain If multiple scopes present activate correct scope 17.dit. This file is used to initialize the Ntds.  Schema. This is a checkpoint file. During lulls in CPU activity.log. you have certain trust relationships that are enabled by default and created automatically: a two-way transitive trust relationship between a parent domain and all child . and Edbtemp. What is default data path for Active Directory? 16. You may see more than one Edbxxxxx. It is used by the transaction logging system to mark the point at which updates are transferred from the log files to Ntds. When the Edb.  Ntds.dit.log is renamed to Edb. ESENT uses circular logging. Any changes made to objects in Active Directory are first saved to a transaction log.edb.  Temp. the pointer tells the system how far along a given set of commits had progressed before the termination. The default path is in the boot partition under \Windows\NTDS.dit database. This is a transaction log.If a client is not able to get an IP from a DHCP server. The DIT stands for Directory Information Tree. you may run into problems as you run out of drive space with online database defragmentation (compaction). What is the difference between share permission and file permission? share permissions apply to files or folders shared over the network and file permissions are used to restrict a user who is logged onto that machine. As transactions are committed. Entries that have not been committed to Ntds. Transaction log files used by the ESE engine are always 10MB.dit file on a particular domain controller contains all naming contexts hosted by that domain controller. the database engine commits the transactions into the main Ntds. This can cause Active Directory to stop working if the indexes cannot be rebuilt.log file is renamed to Edb00001. Excess log files are deleted after they have been committed.dit are kept in memory to improve performance.chk. 19. NTDS stands for NT Directory Services.log.dit during compaction. If the hard drive fills to capacity just as the system is attempting to create an Edbxxxxx. this is the main AD database. the space reserved by the Res log files is used.log.  Res1. If the system terminates abnormally. and the process starts over again. Also.log and Res2.log file is opened.log file. Is it necessary to establish trust between domains in the same forest? In Windows 2000 and Windows Server 2003 Active Directory. and fragmentation increases exponentially as free space diminishes. These are auxiliary transaction logs used to store changes if the main Edb. File fragmentation is a big performance thief. It is not used after that has been accomplished.  Edb.log file gets full before it can be flushed to Ntds. These are reserve log files.  Edbxxxxx.chk file.  Edb. The Ntds. the checkpoint moves forward in the Edb.dit. including the Configuration and Schema naming contexts. You should never let a volume containing Active Directory files get even close to being full. The xxxxx stands for a sequential number in hex.dit right along with the full Domain naming context for its domain. This ensures that the database can be recovered in the event of a system crash. This is a scratch pad used to store information about in-progress transactions and to hold pages pulled out of Ntds.log file if a busy domain controller has many updates pending.

why? TCP/IP protocol Explain? What is color-coding for cross cabling and Straight Cabling? How to change computer name in windows 2000 or XP? How to create a folder in NTFS? How is set NTFS security for a folder? What is ghost? Explain? How to use Ghost? What is advantage? What is Ms-Outlook and Outlook Express? And what is the difference? What is the page file? What is the default location of Ms-Outlook data file? What is port no of SMTP. A two-way trust relationship means that users in Domain A can access resources in Domain B using the same trust relationship that allows users in Domain B to access resources in Domain A. and POP3? How to get backup in MS-Outlook? TCS 1. Windows System/Desktop Support 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) 11) 12) 13) 14) 15) 16) 17) 18) What is the reason for hanging a pc? Explain What is the reason for slowing pc? Explain How to speed up pc while it was slow? If a pc is in no display why? How to set virtual memory in 2000? Beep sound will be long. Forest migration > 9. Stub Zone In DNS > 5. Type of Backups. "The network path was not found?" is the error u r getting when u > try to access the resource but u could able to ping the machine. Difference between Incremental and differential > backup? > 7.domains that are created beneath it. FSMO roles > 4. What is LDAP? > 12. and a two-way transitive trust between the root domains of multiple domain trees within a single forest. What are the switches available with Dcpromo command? > > > > > ACCENTURE iii . What is the difference between WINS and DNS? Why should we use DNS > instead of WINS? > 11. > 2. What will be the drive letter of 25th hard drive? > 8. Port no of various services. Global catalog > 3. TCP/IP. RAID levels > 6. What will > be the cause? > 10.

Is it recommended that having RID master role in global catalog > server and why? > 11. Difference between windows2000 standard and advanced edition? > 15. What is the difference between seizing and transferring the roles? > 6. What are the things (files) will be backed up in system state > backup? > 16. FSMO roles > 4. What is the protocol used in logon? > 7. Forest. If a client is not able to get an IP from a DHCP server. Port no of various services. What is the difference between mirroring and duplexing? > 12. What is the difference between share permission and file > permission? > 19. Is it necessary to establish trust between domains in the same > forest? Windows Server Administration 1) What it is domain controller? 2) What is ADC? 3) What is ADS? And how to install it? 4) How to create Roaming profiles in 2000 Server? 5) Difference Between FAT and NTFS? 6) What File system 2000 Supports? 7) What is RAID? 8) How do configure RAID 0. Why we are not able to add WINNT in native modes? > 3. > 2. What is the maximum hard drive for RAID1? > 10. Child 22) How to Share printer? 23) Difference between NT and 2000 Servers? . What is default data path for Active Directory? > 18. what will > be the cause assuming that physical network is working fine? > 17. How do u seize the roles > 5.5? 9) How to install Network Printers? 10) Explain OSI model? 11) Difference Between Switch and Hub? 12) What is DHCP? 13) How to set a Scope in DHCP? 14) What is DNS? 15) How to configure DNS? 16) Difference between 2000 server and 2003 server? 17) How to configure mail server in 2000? 18) How to configure Outlook Express and Ms out look 19) In 2000 and 2003? 20) How to configure Trust relationship between domains? 21) What is Domain Tree.1. What is the difference between Authoritative and NonAuthoritative > restoration? > 8. What is FRS? > 14. What is the maximum and minimum hard drive for RAID5? > 9. What are the categories of event viewer available in a DC? > 13.1.

DHCP. 1. 6. Class concepts.ini Active Partition Ntdetect. DNS.com Active Partition Ntoskrnl. Others How will you do the security updates in servers? what is Global catalog? What is Changedata? What are the types of backup? What is the advantage & disadvantage of DHCP? How can you get the report that contains list of users in a particular group? How can you backup the DHCP? If IP is not assigning to a client system and no problem in server side.Windows Terminal Server. and the SCSI adapter does not have a SCSI BIOS enabled. what could be the reason? 9.Group policies.exe %SystemRoot%\System32 Hal.dll %SystemRoot%\System32 SYSTEM key %SystemRoot%\System32\Config Device drivers %SystemRoot%\System32\Drivers Ntbootdd. 2. What is the format of the file we are using to update the sus server? 10. 7. .dos is required only for multiple booting. TCP/IP Networking. Bootsect.24) How to take backup in 2000 Server? 25) Difference Type of Backups? 26) 2000 Booting Process? Power-on self test (POST) Initial startup Bootstrap loader process Select operating system Detecting hardware Selecting a configuration Loading and initializing the kernel(Ntoskrnl. 11.sys is required only if you are using a SCSI-controlled boot partition.Ghost or equivalent.exe) Log on The boot process requires the following files: File Location NTLDR Active Partition Boot. 4. 8. IP Addresses. 3. HDD Imaging . 5. WINS. Prepare on the following topics for system admin interview: ADS.