You are on page 1of 144

1000 INTERVIEW QUESTIONS

GET READY FOR THE INDUSTRY

  • 1. What is hardware?

1000 INTERVIEW QUESTIONS GET READY FOR THE INDUSTRY 1. What is hardware? A. The physical components
  • A. The physical components of a system which can to touched and feel is called hardware

  • 2. What is cache memory? And its types?

    • A. It is small and fast memory which stores the data that is required for the processor for processing.

    • B. L1, L2 &L3.

  • 3. What is the difference between DDR1, DDR2 & DDR3?

  •  

    DDR 1

    DDR 2

    DDR 3

    VOLTAG

    E

    2.5

    1.8

    1.5

    PINS

    184

    240

    240

     

    266/333/40

    533/667/800M

    1066/1333/1600/1866M

    FSB

    0 MHz

    Hz

    Hz

    • 4. What is the difference between core 2 duo and dual core?

    DUAL CORE: separate cache memory for each core. CORE 2 DUO: shared cache for both cores.

    1000 INTERVIEW QUESTIONS GET READY FOR THE INDUSTRY 1. What is hardware? A. The physical components
    • 5. Name some processor manufactures?

    Intel, AMD.

    • 6. What are the latest processor of Intel and AMD?

    • 7. What is file system and what is the example for the same?

    FAT 32

    NTFS

    Size of Cluster is 4KB

    Size of Cluster is 4KB

    No security and quota options are available

    Security and quota options are available

    in this file system.

    in this file system.

    4tb(tera byte)volume size

    volume size can be of 16eb(exa byte)

    Max file size is 4GB

    Max file 16TB minus 64KB

    It defines the way in which files or folders are named, stored and organized. FAT (File Allocation Table), FAT32 & NTFS (New Technology File System)

    • 8. What is the difference between FAT32 and NTFS?

    • 9. Converting FAT to NTFS?

    Conver driveletter:/fs ntfs (Example: convert c:/fs ntfs)

    Student’s Sign Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 10. <a href=what type of problems are associated with operating system like window XP? Answer : If that PC having Windows XP Operating System Given below are the problems 1. Select boot device in BIOS 2. If you are installed Multiple operating system, select which one you want it (that files Boot.ini) 3. ntldr misssing press ctrl+alt+del to restart 4. ntdetect.com file is missing press 5. Kernel file is missing press c+a+d to restart (ntkernol) 6. Chkdsk error 7. No media device 8. Bad RAM 9. Fatal Error (Blue Screen) 10. Once enter the OS it is showing low disk space / low virtual memory, etc .. 11. Not properly installed hardware and software drivers (see the device manager) 12. Your HDD having Bad Sectors 13. Again and again restart 14. System is hanging 11. What is boot loader? Answer: Boot loader is called Master Boot Record (MBR), where our os is loaded. 12. What is the technical difference between Desktop Support & Help Desk? The difference between desktop support and helpdesk are the following: 1. Desktop support is the one doing the troubleshooting on hand. 2. Helpdesk support is the one receiving the call and troubleshoot it remotely. 13. What are the core files required to boot Windows XP? Answer: ntldr, boot.ini, bootsect.dos, ntdetect.com, ntbootdd.sys, ntoskrnl.exe, hal.dll, system, device drivers (s.sys) 14. A user calls you they can’t login in said they have tried several times what is the best way to troubleshoot this Answer: 1. Ask the user check username, password. 2. Check the network connectivity 3. Check the server is on / off 4. Check the system is member of domain/not. If not please connect the system to domain. 15.What do you mean by formatting and its types? It is a process of erasing data or creating tracks and sectors and selecting the file system is called formatting. Low level formatting and high level formatting. Low level formatting: creating tracks and sectors is called low level formatting and it is also called as physical formatting. Student’s Sign Trainer’s Sign Ameerpet : 9866539988 Dilsukhnagar: 9866547860 " id="pdf-obj-1-4" src="pdf-obj-1-4.jpg">

    Answer : If that PC having Windows XP Operating System Given below are the problems

    • 1. Select boot device in BIOS

    • 2. If you are installed Multiple operating system, select which one you want it

    (that files Boot.ini)

    • 3. ntldr misssing press ctrl+alt+del to restart

    • 4. ntdetect.com file is missing press

    • 5. Kernel file is missing press c+a+d to restart (ntkernol)

    • 6. Chkdsk error

    • 7. No media device

    • 8. Bad RAM

    • 9. Fatal Error (Blue Screen)

      • 10. Once enter the OS it is showing low disk

    space / low virtual memory, etc ..

    • 11. Not properly installed hardware and software drivers (see the device

    manager)

    • 12. Your HDD having Bad Sectors

    • 13. Again and again restart

    • 14. System is hanging

    11.What is boot loader? Answer: Boot loader is called Master Boot Record (MBR), where our os is

    1000 INTERVIEW QUESTIONS 10. <a href=what type of problems are associated with operating system like window XP? Answer : If that PC having Windows XP Operating System Given below are the problems 1. Select boot device in BIOS 2. If you are installed Multiple operating system, select which one you want it (that files Boot.ini) 3. ntldr misssing press ctrl+alt+del to restart 4. ntdetect.com file is missing press 5. Kernel file is missing press c+a+d to restart (ntkernol) 6. Chkdsk error 7. No media device 8. Bad RAM 9. Fatal Error (Blue Screen) 10. Once enter the OS it is showing low disk space / low virtual memory, etc .. 11. Not properly installed hardware and software drivers (see the device manager) 12. Your HDD having Bad Sectors 13. Again and again restart 14. System is hanging 11. What is boot loader? Answer: Boot loader is called Master Boot Record (MBR), where our os is loaded. 12. What is the technical difference between Desktop Support & Help Desk? The difference between desktop support and helpdesk are the following: 1. Desktop support is the one doing the troubleshooting on hand. 2. Helpdesk support is the one receiving the call and troubleshoot it remotely. 13. What are the core files required to boot Windows XP? Answer: ntldr, boot.ini, bootsect.dos, ntdetect.com, ntbootdd.sys, ntoskrnl.exe, hal.dll, system, device drivers (s.sys) 14. A user calls you they can’t login in said they have tried several times what is the best way to troubleshoot this Answer: 1. Ask the user check username, password. 2. Check the network connectivity 3. Check the server is on / off 4. Check the system is member of domain/not. If not please connect the system to domain. 15.What do you mean by formatting and its types? It is a process of erasing data or creating tracks and sectors and selecting the file system is called formatting. Low level formatting and high level formatting. Low level formatting: creating tracks and sectors is called low level formatting and it is also called as physical formatting. Student’s Sign Trainer’s Sign Ameerpet : 9866539988 Dilsukhnagar: 9866547860 " id="pdf-obj-1-48" src="pdf-obj-1-48.jpg">

    loaded. 12.What is the technical difference between Desktop Support & Help Desk? The difference between desktop support and helpdesk are the following:

    • 1. Desktop support is the one doing the troubleshooting on hand.

    • 2. Helpdesk support is the one receiving the call and troubleshoot it remotely.

    13. What are the core files required to boot Windows XP? Answer: ntldr, boot.ini, bootsect.dos, ntdetect.com, ntbootdd.sys, ntoskrnl.exe, hal.dll, system, device drivers (s.sys)

    14.A user calls you they can’t login in said they have tried several times what is the best way to troubleshoot this Answer:

    • 1. Ask the user check username, password.

    • 2. Check the network connectivity

    • 3. Check the server is on / off

    • 4. Check the system is member of domain/not. If not please connect the

    system to domain.

    15.What do you mean by formatting and its types?

    It is a process of erasing data or creating tracks and sectors and selecting the file system is called formatting. Low level formatting and high level formatting. Low level formatting: creating tracks and sectors is called low level formatting

    and it is also called as physical formatting.

    Student’s Sign Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS High level formatting: selecting the file system is called high level formatting and

    High level formatting: selecting the file system is called high level formatting and it is also called as logical formatting.

    16.How many USB devices can a single pc support?

    127

    17.ow many PCI devices can we attach to single pc?

    It depends upon the mother board manufactures.

    18.What do you mean by track, sector and cluster?

    Concentric circles on the disk are called tracks. Sector is the part of track and the size of the sector is 512bytes. Cluster is a group of sectors.

    19.What is the size of sector?

    512

    bytes

    20.What is MBR and what does it contains?

    MBR stands for Master Boot Record. First sector of the hard disk is called MBR. It contains list of bootable files of O.S and partition information.

    21.What do you mean by SMPS? What is the function of SMPS? List out the different voltages given by SMPS?

    Voltage

    Blue white black orange red yellow -12 V -5 V 0 +3.3 V +5 V +12
    Blue
    white
    black
    orange
    red
    yellow
    -12 V
    -5 V
    0
    +3.3 V
    +5 V
    +12 V

    SMPS (Switch Mode Power Supply): it is used to convert AC to DC.

    22.List out the different connectors of SMPS and its uses?

    Molex, ATX 20/24pin, Mini plug 4pin, Mini or Berg 4pin, SATA power connector.

    23.What is BUS?

    BUS is the interface through which data is transferred.

    24.What is FSB & BSB?

    FSB (Front Side Bus): it is the path used by the processor to communicate with

    RAM. BSB (Back Side Bus): it is the path between L2 cache and L3 cache

    25.What do you mean by jumper setting in IDE devices?

    It is used to set master and slave configuration.

    26.What is the difference between IDE & SATA?

     

    SATA(Serail

    Advanced

    IDE(Interated Drive

    Technology

    Electronic)

    Aattachment)

    it has 40 pin

    it is 7 pin

    it transfer the data 16bit at a time with a spped of

    it transfer the data 1 bit at a time with

    100/133Mbps

    a speed of 600Mbps

    Student’s Sign Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS we can connect 2 IDE devices we can connect 1 to single cable

    we can connect 2 IDE devices

    we can connect 1

    to single cable

    device for one cable

    max IDE cable length is 45CM

    max SATA cable length is 1M

    27.What do you mean by RAID and its types?

    RAID (Redundant Array of Inexpensive Disk) or (Redundant Array of Independent Disk): it is used for fault tolerance. Fault Tolerance provides continuous availability for data.

    28.What is the speed of USB 2.0 and USB3.0?

    480Mbps and 5000Mbps.

    29.List out the different I/O ports of mother board with uses and no of pins?

    30.

    31.What is BIOS and what is the function of BIOS?

    BIOS (Basic Input Output System) The BIOS software is built into the PC, and is the first code run by a PC when powered on ('boot firmware').

    The primary function of the BIOS is to set up the hardware and load and start an operating system

    32.What is the function of Northbridge and south bridge?

    1000 INTERVIEW QUESTIONS we can connect 2 IDE devices we can connect 1 to single cable

    North Bridge: it controls the communication between RAM, AGP and processor. South bridge: it controls the communication between other parts of the mother board.

    33.

    My monitor display a message “Please check signal cable” what might be problem and how to troubleshoot the problem?

    VGA cable not connected, VGA cable problem, VGA port problem, RAM or RAM slot problem. Note: if the monitor is displaying “frequency out of range” or HZ symbol then

    problem with resolution.

    34.My monitor display a message “Disk boot failure” or “insert boot media and select proper boot device” what might be problem and how to troubleshoot the problem?

    Hard disk power or data cable is not connected. IDE/SATA on board interfaces may be disable in BIOS. OS not available.

    35.My pc is continuously restarting what might be the problem? Virus.

    VIRUS stands for (Vital Information Resource Under Seize)

    36.My pc is restarting after certain time? What might be the problem?

    Overheating. Apply heat sink paste also called as thermal compound and also

    check CPU fan.

    37.What is fire wire port? IEEE standard for fire wire?

    It is used to transfer videos and photos at high speed.IEEE standard for fire

    wire is IEEE 1394a(400Mbps) and IEEE 1394b(800mbps)

    Student’s Sign Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    38.What are IRQ lines?

    1000 INTERVIEW QUESTIONS 38.What are IRQ lines? IRQ(Interrupt ReQuest) lines: this are the lines used by

    IRQ(Interrupt ReQuest) lines: this are the lines used by the processor to

    communicate with the other devices.

    39.What is the difference between IDE and SCSI? SCSI(Small Computer IDE(Interated Drive Electronic) System Interface) it
    39.What is the difference between IDE and SCSI?
    SCSI(Small Computer
    IDE(Interated Drive Electronic)
    System Interface)
    it has 40 pin
    58,68 and 80pin
    hard disk rotation speed is 7200RPM
    hard disk rotation speed is
    1000 to 15000RPM
    data transmission speed is
    data transmission speed is 100/133Mbps
    320Mbps.
    we can connect 2 IDE devices to single cable
    it depends up on the cable.
    Max 32 devices
    max IDE cable length is 45CM
    max SATA cable length is 25M
    40.What is SCSI?
    Small Computer System Interface
    41.MODEM stands for? What is the function of modem?
    MODEM stands for Modulation and Demodulation. MODEM is used to convert
    digital signal to analog signal and vice versa.

    42.“Blue screen of death” what might be problem?

    It may be problem drivers compatibility or RAM problem or Bad sectors.

    43.Edition of OS(XP, Vista & WIN 7)

    XP

    VISTA

    WINDOWS-7

    XP-Home

    home basic

    Starter

    XP-

    home

    Professional

    premium

    home basic

     

    home

     

    Business

    premium

     

    Enterprise

    professional

     

    Ultimate

    business

     

    enterprise

     

    ultimate

    44.Min requirement to install operating system

     

    RECOMDE

    WINDOWS-7

     

    D

    XP for all

    VISTA for all

    for all

    RAM

    128MB

    1 GB

    1 GB

    PROCESSO

    300MHz

    1.0GHz

    1.0GHz

    Student’s Sign Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS R HARD DISK 2GB 15 GB 15 GB 45.Types of user Accounts ?

    R

    HARD DISK

    2GB

    15 GB

    15 GB

    45.Types of user Accounts ?

    Administrator, standard and guest.

    46.What is kernel? What is the kernel file for windows?

    Kernel is the interface between hardware and OS. NTOSKRNL is the kernel files for windows.

    47.What is shell?

    Shell is the interface between kernel and hardware.

    48.What do you mean by booting?

    1000 INTERVIEW QUESTIONS R HARD DISK 2GB 15 GB 15 GB 45.Types of user Accounts ?

    Booting is the process of downloading OS form hard disk to RAM.

    49.What do you mean by cold booting and worm booting?

    Cold booting: Starting the computer by turning power on is called cold

    booting.

    Warm booting: Restarting the computer by performing a

    reset operation (pressing reset, Ctrl-Alt-Del, etc.) while the computer is still turned on

    50.What do you mean by dual booting?

    It is the process of selecting operating system is called dual booting if multiple

    O.S is installed.

    51.What are the bootable files for XP, VISTA & WINDOWS-7?

    XP: NTLDR, Boot.ini VISTA & WINDOWS-7: Bootmgr, winresume.exe and winload.exe

    52.How to update windows?

    Student’s Sign Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS Control panel  security setting  windows update 53.What do you mean by

    Control panel security setting windows update

    53.What do you mean by updates?

    Process of downloading new features is called updates.

    54.What is the I.E version of XP, VISTA & WIN-7?

    XP-6.0, VISTA-7.0 and WIN-7 8.0

    55.What does u mean by service pack?

    Service pack is a collection of updates and hot fixes. A hot fix is code (sometimes called a patch) that fixes a bug in a product a bug is a coding error in a computer program.

    1000 INTERVIEW QUESTIONS Control panel  security setting  windows update 53.What do you mean by

    56.What is antivirus? Types of antivirus?

    Antivirus is a program which is used to detect and delete the virus.

    57.What is the difference between remote desktop and remote assistance?

    By using remote desktop only single user can interact with the desktop where as in remote assistance both users can interact with same desktop.

    58.What is Backup? Types of backups?

    Creating a duplicate copy of an existing data is called backup.

    XP: normal backup, daily backup, copy backup, incremental backup and differential backup. Vista/win-7: normal and incremental backup.

    Student’s Sign Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 59.What is the difference between incremental and differential backup? Incremental backup takes more

    59.What is the difference between incremental and differential backup?

    Incremental backup takes more time for backup and restoration is fast where as in differential backup it takes less time for backup and more time for restoration.

    60.What is the difference between backup and copy?

    COPY

    BAKCUP

    size of data will be same

    it will compress the size

    modification is possible

    it does not allow you to modified

    copy cannot be schedule

    backup can be schedule

    automatic restoration is not possible to its original location

    we can restore the data to its original location dynamically

    1000 INTERVIEW QUESTIONS 59.What is the difference between incremental and differential backup? Incremental backup takes more

    61.What is re store point?

    A restore point is a saved "snapshot" of a computer's data at a specific time. By creating a restore point, you can save the state of the operating system and your own data so that if future changes cause a problem, you can restore the system and your data to the way it was before the changes were made

    62.What is last known good configuration?

    The Last Known Good Configuration is basically a copy of a computer’s hardware configuration and its driver settings. It is taken from the system’s registry readings when a computer has a good, clean boot up.

    This copy is made for whenever a computer fails to boot up successfully. When that happens, the system’s operating system is able to pull up the good

    copy and perform a successful startup.

    63.What are the features of windows 7?

    Windows aero, improved graphics, I.E version 8.0, virtual hard disk, windows

    power shell and bit drive locker.

    64.What is bit locker drive?

    It is a feature in win-7 which is used to protect the drive by assigning

    password.

    Student’s Sign Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    65.What is printer and types of printer?

    1000 INTERVIEW QUESTIONS 65.What is printer and types of printer? Printer is a output device which

    Printer is a output device which is used to convert softcopy into hardware copy. Types of printers: impact and non-impact Impact—dot matrix Non-impact – laser, inkjet.

    66.What is print spooler?

    A software program responsible for managing all print jobs currently being

    sent to the Computer printer

    67.What is partition and types of partitions?

    Logical division of an hard disk is called partition. Partition are of three types. 1 primary partition 2. Extended partition 3. Logical partition. Max we can create 4 primary partitions, 1 extended partition and n no of logical partition.

    1000 INTERVIEW QUESTIONS 65.What is printer and types of printer? Printer is a output device which

    68.What is the difference between basic disk and dynamic disk?

    By default every hard disk is basic disk. The main difference between basic disk and dynamic is we can combine space from multiple hard disks as single

    logic unit.

    69.What is defragmentation?

    The process of moving data to the adjacent cluster is called defragmentation.

    Defragmentation improves the performance of the disk.

    70.What is roll back drivers?

    If the device fails after updating the driver, we can restore the old driver by

    using roll back option.

    Student’s Sign Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 71.What is device driver? And types? Device driver is the program or software

    71.What is device driver? And types? Device driver is the program or software which is the interface between computer and hardware. Drivers are of two types. 1) signed drivers 2) Unsigned drivers A signed driver is basically a digitally signed driver, which means that the driver software is associated with a digital certificate given by micro soft. Run sigverif is the command to verify list of signed and unsigned drivers

    72.What is the use of device manager?

    Device manger is a console which display the status of device and drivers. By using device manger we can trouble shoot the device.

    XP Yellow color question markdevice is connected drivers are not installed. Red color cross markdevice is disabled. VISTA AND WIN-7 Yellow color question markdevice is connected drivers are not installed. Down arrowdevice is disabled.

    1000 INTERVIEW QUESTIONS 71.What is device driver? And types? Device driver is the program or software

    73.What is ICS?

    ICS stands for Internet Connection Sharing which is used to share the internet.

    74.Question about 'When I choose ''Shut Down'' from the Start Menu, my computer restarts instead of shutting down Answer : Change the registry setting:

    >HKEY_LOCAL_MACHINE\software\microsoft\windows NT\current version\winlogon Change >PowerdownAftershutdown from 0 to 1.

    75.How to remove start-up items?

    Answer: Having programs run when windows loads slows down your start. There are two ways do disable programs that may be in your startup (like icq, messanger,) The easiest is to do the following:

    1. start --> run --> msconfig

    Student’s Sign Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 2. Click on the "startup" tab (furthest right)\ 3. Unclick any items you

    2. Click on the "startup" tab (furthest right)\ 3. Unclick any items you don't want to load when windows starts.

    76.When I choose "Shut Down" from the Start Menu, my computer hangs at the "Please Wait" screen Answer:

    Most likely, one or more of your drivers is not allowing itself to be unloaded. This, supposedly, is less of a problem in Windows 98 and Windows Me than in Windows 95 (most drivers are no longer unloaded when you shut down), but it still seems to trip up Windows from time to time. Try hitting Enter when it hangs to "wake it up." Try holding Shift while clicking Ok in the "Shut Down" dialog - this might allow you to shut down faster, and bypass whatever is causing your system to hang. This can also happen if the sound file for Shutdown becomes corrupted. Double-click on the Sounds icon in Control Panel and remove or change the sound event for Shutdown.

    1000 INTERVIEW QUESTIONS 2. Click on the "startup" tab (furthest right)\ 3. Unclick any items you

    77.When I boot the system, the fans turn on, but I see nothing on screen.

    If no video or audio (no beeps or anything), check to be sure the PC speaker is connected properly. If it is and you still are getting no feedback, then you may have a

    bad motherboard or a device connected to it is faulty. Could be faulty RAM or a CPU. Check the connections between all these devices and the motherboard. But, nonetheless, since the computer is doing nothing, something is faulty at the hardware level. If no video, but static from the PC speaker, then you need to go after the motherboard or key system device. Pretty much the same as above. If you're getting a pattern of beeps from the PC speaker, then consult the beep codes section for a clue as to where to start.

    78.Scandisk says I have bad sectors, is this serious? Answer:

    Hard disks can form bad sectors over time if they become too old. If ScanDisk only finds a few bad sectors, then ignore the problem since ScanDisk will prevent the sectors from being used by your hard disk. If, however, you have a lot of bad sectors, seriously think of replacing your hard disk before you lose all your data!

    79.My evaluation copy of Windows Vista is expiring. What should I do now? Answer:

    Don't panic, just purchase a copy of Windows Vista. You cannot purchase an activation key, you need the Windows Vista CD. Do a clean install, and make sure you back up all of your data before installing.

    Student’s Sign Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 80.Vista not recognizing external USB hard drive. How do I fix this? Answer:

    80.Vista not recognizing external USB hard drive. How do I fix this? Answer:

    Three things I could think of to solve this:

    • 1. Possible fix - download the "Reliability update for the USB stack in Windows Vista".

    Search it in Google or Microsoft Vista support site.

    • 2. Try connecting the external USB hard drive into an Add-in USB card.

    • 3. Last resort - access your computer BIOS and disable all USB support for legacy

    drives.

    81.You receive a "Microsoft Internet Explorer has encountered a problem and needs to close.

    When I double click the explorer icon, it gives me an error message that states,

    "Internet Explorer has encountered a problem and needs to close. We are sorry for the inconvenience." "If you were in the middle of something, the information you were working on might be lost. Error Signature: AppName: iexplore.exe AppVer: 6.02800.1106 ModName: winshow.dll ModVer:1.0.0.1 Offset: 00009901 Answer: To manually disable script debugging in Internet Explorer, follow these steps:

    1000 INTERVIEW QUESTIONS 80.Vista not recognizing external USB hard drive. How do I fix this? Answer:
    • 1. Start Internet Explorer.

    • 2. On the Tools menu, click Internet Options.

    • 3. On the Advanced tab, under the Browsing section, click to select the Disable script debugging (Internet Explorer) check box and the Disable script debugging (Other) check box if it is present.

    • 4. Click OK, and then restart your computer.

    If these steps resolved the error message, you are finished.

    If these steps did not resolve the error message, go to the "Download the updates to the Pdm.dll from the product update Web site" section.

    82.What are the display problems?

    83.What is network and its type s?

    Network is a collection of connected devices together through a transmission media for sharing resources.

    Types of networks:

    LAN (Local Area Network): if the devices are connected with in a diameter of

    1Km is called LAN. CAN (Campus Area Network): if the devices are connected with in a diameter of 5Km to 10Km is called CAN.

    Student’s Sign Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS MAN (Metropolitan Area Network): if the devices are connected with in a diametercommand-line interface (usually, of an operating system ) on a remote host Student’s Sign Trainer’s Sign Ameerpet : 9866539988 Dilsukhnagar: 9866547860 " id="pdf-obj-12-4" src="pdf-obj-12-4.jpg">

    MAN (Metropolitan Area Network): if the devices are connected with in a diameter of 2Km to 100Km is called MAN. WAN (Wide Area Network): WAN is a collection of two or more LAN. It covers entire geographical area.

    84. I remotely connected to a machine on my network. I deleted a file and then went to see if I could locate it in either the remote machine's or my recycle bin, but could not. Is there a way to recover

    Answer : I think you can use the "Undelete" command from prompt. Open a prompt window and go to the folder from which the file was deleted. e.g. c:\some directory> Then type undelete at the prompt. It should look for recently deleted files and the tool will ask you to provide the first letter of the file if it finds any deleted files.

    85.What is networking?

    Creating communication between connected devices on a network is called networking.

    1000 INTERVIEW QUESTIONS MAN (Metropolitan Area Network): if the devices are connected with in a diametercommand-line interface (usually, of an operating system ) on a remote host Student’s Sign Trainer’s Sign Ameerpet : 9866539988 Dilsukhnagar: 9866547860 " id="pdf-obj-12-16" src="pdf-obj-12-16.jpg">

    86.What is protocol?

    Protocol is a set of rules which are predefined for the purpose of communication.

    87.What is port no? what are the port no for DHCP,DNS,FTP,HTTP,HTTPS,TFTP,Telnet,SMTP,POP3 &IMAP?

    PROTOC

    OL

    DHCP

    DNS

    FTP

    TFTP

    HTTP

    HTTPS

    POP3

    IMAP

    Telnet

    S

     

    SERVER-

                   

    67

    DATA-20

    CLIENT-

    CONTROL

    PORT NO

    68

    53

    -21

    69

    80

    443

    110

    143

    23

    2

    Every service protocol has its own service address which is known as Port no.

    88.What is telnet?

    Telnet provided access to a command-line interface (usually, of an operating

    system) on a remote host

    Student’s Sign Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    89.List out the OSI Layers.

    1000 INTERVIEW QUESTIONS 89.List out the OSI Layers. Application layer, Presentation layer, Session layer, Transport layer,Internet standard that extends the format of e- mail 94.What is the function of session layer? It is responsible for establishing, managing and terminating sessions. 95.What are the protocols works at session layer? PPTP (Point to Point Tunneling Protocol), L2TP (Layer2 Tunneling Protocol), NetBIOS (Network Basic Input Output System) Student’s Sign Trainer’s Sign Ameerpet : 9866539988 Dilsukhnagar: 9866547860 " id="pdf-obj-13-6" src="pdf-obj-13-6.jpg">

    Application layer, Presentation layer, Session layer, Transport layer, Network layer, Data link layer, and Physical layer.

    90.What is the function of application layer?

    It is responsible for providing access to the network resources. It is also called as user interaction layer.

    91.What are the protocols works at application layer?

    DHCP, DNS, FTP, Telnet, SMTP, HTTP

    1000 INTERVIEW QUESTIONS 89.List out the OSI Layers. Application layer, Presentation layer, Session layer, Transport layer,Internet standard that extends the format of e- mail 94.What is the function of session layer? It is responsible for establishing, managing and terminating sessions. 95.What are the protocols works at session layer? PPTP (Point to Point Tunneling Protocol), L2TP (Layer2 Tunneling Protocol), NetBIOS (Network Basic Input Output System) Student’s Sign Trainer’s Sign Ameerpet : 9866539988 Dilsukhnagar: 9866547860 " id="pdf-obj-13-18" src="pdf-obj-13-18.jpg">

    92.What is the function of presentation layer?

    It is responsible for translation, encryption and data compression.

    93.What are the protocols works at presentation layer?

    SSL(Secure Socket Layer) it is similar to telnet, MMIE:Multipurpose Internet Mail Extensions (MIME) is an Internet standard that extends the format of e-

    94.What is the function of session layer?

    It is responsible for establishing, managing and terminating sessions.

    95.What are the protocols works at session layer?

    PPTP (Point to Point Tunneling Protocol), L2TP (Layer2 Tunneling Protocol),

    NetBIOS (Network Basic Input Output System)

    Student’s Sign Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 96.What is the function of transport layer? It is responsible for end to

    96.What is the function of transport layer?

    It is responsible for end to end delivery of entire message. It is also

    responsible for segmentation.

    97.Transport layer is also called as

    ____CORE____

    layer?

    98.What are the protocols works at transport layer?

    UDP(User Datagram Protocol), TCP(Transmission Control Protocol)

    99.What is the function of network layer?

    Network layer is responsible for end to end delivery of packets and routing. Routing is the process of selecting the best path if multiple path are available. Data unit at network layer is called Packet which contains source IP address and Destination IP address.

    1000 INTERVIEW QUESTIONS 96.What is the function of transport layer? It is responsible for end to
    • 100. What are the protocols works at network layer? IP, IPSec, ICMP, and APPLE TALK. ICMP (Internet Control Message Protocol): it is used to send error and query messages to the sending device.

    • 101. What are the devices works at network layer? Router, Layer3switch. Layer3 switch has functionality of Router and Switch.

    • 102. What is the function of data link layer? It is responsible for node to node delivery of frames. A frame contains source MAC address and destination MAC address. Data unit at the data link layer is called Frames.

    • 103. What are the sub layers of data link layer? Data link layer has two sub layers. 1) MAC (Media Access Control) 2) LLC (Logic Link Control)

    Student’s Sign Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 104. What are the protocols works at data link layer? PPP (Point to
    • 104. What are the protocols works at data link layer? PPP (Point to Point Protocol), HDLC (High-Level Data Link Control)

    • 105. What are the devices works at data link layer? Switch, Layer3switch and NIC.

    • 106. What is the function of physical layer? Physical layer is responsible for actual transmission of bits over the medium. It deals with electrical and mechanical functions.

    1000 INTERVIEW QUESTIONS 104. What are the protocols works at data link layer? PPP (Point to
    • 107. What are the devices works at physical layer? Repeater and Hub

    • 108. At which layer error will be detected? At data link layer error will be detected.

    • 109. At which layer error will be corrected? At transport layer error will be corrected.

    • 110. What is FTP and its function? FTP stand for (File Transfer Protocol) it is used to upload and downloading of files and folders from server to client and client to server.

    • 111. What is TFTP and its function? TFTP stands for (Trivial File Transfer Protocol) its function similar to that of FTP but it is a connectionless protocol.

    Student’s Sign Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    • 112. What is SMTP and its function?

    1000 INTERVIEW QUESTIONS 112. What is SMTP and its function? SMTP stands for (Simple Mail Transfer

    SMTP stands for (Simple Mail Transfer Protocol): it is used to transfer the mails

    from one mail sever to another mail server.

    • 113. What is ARP and RARP? ARP stand for (Address Resolution Protocol): it is used to find MAC address of the device if IP address is known. RARP stands for (Reverse Address Resolution Protocol): it is used to find the IP address of the device if MAC address is known.

    114. What is POP & IMAP with its functions? POP(Post Office Protocol): it is used to
    114.
    What is POP & IMAP with its functions?
    POP(Post Office Protocol): it is used to download mails form mail server to
    client pc. IMAP(Internet Message Access Protocol):it is used to access the
    emails from a remote server and it does not download the mails.
    115.
    What is the difference between hub and switch?
    HUB
    SWITCH
    it is a broad cast device
    it is a unicast device
    it works at physical layer of OSI
    it works at data link layer of OSI
    model
    model
    max no of ports are 24
    max no of ports are 48
    it shares the bandwidth
    it does not shares the bandwidth
    • 116. What is bandwidth?

    It is the capacity of the medium to carry the signal.

    • 117. What is the difference between switch and router?

    SWITCH

    ROUTER

    it works at data link layer of OSI

    it works at network layer of OSI

    model

    model

    it works based up on MAC address

    it works based up on IP address

    switch transfer the data between

    Router transfer the data between

    LAN segments

    LAN and WAN segments

    it cannot share or transfer the

    Routers are capable of sharing an

    Student’s Sign

    data using internet connection

    internet connection

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 118. What is the difference between UDP & TCP? TCP UDP it is
    • 118. What is the difference between UDP & TCP?

    TCP

    UDP

    it is connection oriented

    it is connection less

    protocol

    protocol

    it is reliable

    it is not reliable

    it is slower

    it is faster

    acknowledgement is possibel

    no acknowledgement

    • 119. What do you mean by topology?

    Topology defines the physical and logical structure of the network.

    1000 INTERVIEW QUESTIONS 118. What is the difference between UDP & TCP? TCP UDP it is
    • 120. What are the types of topology?

    Physical topology: it defines the way in which the devices are connected over

    a network.

    Logical topology: it defines the way in which the devices are communicating

    with each other over the physical topology.

    • 121. Which cable support maximum distance and maximum speed?

    Fiber optic cable and its speed is 1Gbps to 10Gbps (theoretically unlimited)

    • 122. What is the max speed and distance supported by UTP cable and its

    types?

    1000Mbps and distance up to 100M.

    Cat-1,cat2,cat-3,cat4,cat-5,cat-5e,cat6-,cat7

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 123. What is the difference between cat5, cat5e, cat6 and cat7? Max speed

    123.

    What is the difference between cat5, cat5e, cat6 and cat7?

    Max speed of cat5, cat5e, cat6 and cat7 is same but the signaling frequency is

    different.

    Cat5 and Cat5e100MHz, Cat6250MHz, Cat7600MHz.

    124.

    What is IP address? Types of IP address?

    IP address is logical address which is used to identify the device on a network.

    IP address is of two types.

    Private IP address and Public IP address.

    Public IP address is given by ISP where as Private IP address is used in

    organization.

    125.

    What is the difference between broad band and base band signal?

    Base band

    Broad band

    digital signals are transmitted by using Base

    analog signals are transmitted by using Broad

    band

    band

    In a baseband transmission, the entire

    In broadband transmission, signals are sent on

    bandwidth of the cable is consumed by a

    multiple frequencies, allowing multiple signals

     

    single signa

    to be sent simultaneously.

    it is a bi-direction communication

    it is a uni-direction communication

    126.

    What is the difference between IPV4 and IPV6?

    1000 INTERVIEW QUESTIONS 123. What is the difference between cat5, cat5e, cat6 and cat7? Max speed

    IPV4

    IPV6

    it is a 32 bit address

    it is a 128bit address

    it is a binary address

    it is a hexadecimal address

    it is separated by .

    it is separated by colon :

    It is not well suited for mobile

    it is better suited to mobile

    network

    networks

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 127. What is subnet mask and what are the default subnet mask for
    • 127. What is subnet mask and what are the default subnet mask for class

    A, class B and class C?

    Subnet mask: it is used to identify the network bit and host bit of the network.

    CLASS

    SUBNET MASK

    A

    255.0.0.0

    B

    255.255.0.0

    C

    255.255.255.0

    • 128. What are the private IP address for class A, class B and class C?

    CLASS

    RANGE

    A

    10.0.0.0 to 10.255.255.255

    B

    172.16.0.0 to 172.31.255.255

     

    192.168.0.0 to

    C

    192.168.255.255

    1000 INTERVIEW QUESTIONS 127. What is subnet mask and what are the default subnet mask for
    • 129. What is wireless network? Wireless network is a network set up by using radio signal frequency to communicate among computers and other network devices

    • 130. What are the IEEE standards for wireless network?

    standa

    max

    rd

    speed

    range

     

    46meter

    802.11

    2Mbps

    s

    802.11

    54Mbp

    46meter

    a

    s

    s

    802.11

    11Mbp

    91meter

    b

    s

    s

    802.11

    54Mbp

    91meter

    g

    s

    s

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    • 131. What is Wi-Fi?

    1000 INTERVIEW QUESTIONS 131. What is Wi-Fi? Wi-Fi (wireless fidelity) is technically an industry term that

    Wi-Fi (wireless fidelity) is technically an industry term that represents a type of

    wireless local area network (LAN) protocol based on the 802.11 IEEE network

    standard

    • 132. What are WPA and WPA2 in wireless network? Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks

    133. What is SSID? A service set identifier (SSID) is a name that identifies a particular
    133.
    What is SSID?
    A service set identifier (SSID) is a name that identifies a particular 802.11
    wireless LAN
    • 134. What are the devices used to create wireless LAN? Wireless NIC card, Access point

    • 135. What is MAC address? MAC address is the hardware or physical address which is embedded in the device given by IEEE.

    • 136. What are the commands to view the MAC address? Get mac and ipconfig /all is the command to find the MAC address.

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 137. What is the difference between IP address and MAC address? IPV4 MAC
    • 137. What is the difference between IP address and MAC address?

    IPV4

    MAC

    It is a logical address

    it is a physical address

    it is a 32 bit binary address

    it is 48 bit hexa decimal address

    it is temporary address

    it is permanent address

    Separated by .

    separated by -

    1000 INTERVIEW QUESTIONS 137. What is the difference between IP address and MAC address? IPV4 MAC
    • 138. What is the max distance supported by fiber optic cable? 100KM

    • 139. What is host and node? Host: any device on a network with valid IP address is called as Host. (example: PC network printer) Node: any device on a network is called Node. (example: switch)

    • 140. What is gateway? The entrey and exit of the network

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 141. What are server and client? Server provides the services to the client

    141.

    What are server and client?

    Server provides the services to the client request.

     

    Client request for the services from the server.

    142.

    What are the difference between 2003 and 2008 server?

    2003

    2008

    no virtualization

    virtualization is available

    windows power shell is not

     
     

    available

    windows power shell is available

     

    no RODC

    RODC

    IIS 6.0

    IIS7.0

    RIS

    WDS

    143.

    What is domain? Domain is a collection of devices with centralized administrator. What is work group?

    What is domain?

    Domain is a collection of devices with centralized administrator.

    What is work group?

     

    144.

    Workgroup is a collection of devices without centralized administrator.

    145.

    What is domain controller?

    Domain controller is a server that control or responsible of provide to host

    access of all resoure like printer, files, mail within the domain.

     

    146.

    What is active directory?

    Active directory is data base which stores the information about the objects

    likes users, group,O.U etc

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 147. Where does active directory database is stored? Active directory information will be
    • 147. Where does active directory database is stored? Active directory information will be stored in a file NTDS.DIT (New Technology Directory Service.Directory Information Tree) default size of NTDS.DIT is 12.1Mb Default Location of NTDS.DIT is C:/Windows/NTDS

    • 148. What are the protocols for active directory and port no’s? Kerberos and LDAP are the protocol of active directory. Ports no for Kerberos (88) and LDAP(389)

    • 149. What is Kerberos? Kerberos is a computer network authentication protocol which works on the basis of "tickets" to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner

    1000 INTERVIEW QUESTIONS 147. Where does active directory database is stored? Active directory information will be
    • 150. What is Sysvol? The System Volume (Sysvol) is a shared directory that stores the server copy of the domain's public files that must be shared for common access and replication throughout a domain.

    • 151. What is tree and forest? Tree: The hierarchical of individual domains is called tree. Forest: The hierarchical of individual domains tree is called forest.

    • 152. Where the domain user information does is stored? NTDS.DIT file

    • 153. Where the local user information does is stored? SAM(Security Account Manager)

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 154. When do we called a server as active directory ? A sever
    • 154. When do we called a server as active directory? A sever which has FSMO roles is called is active directory.

    • 155. What is FSMO roles and how many types of FSMO Roles are there? FSMO stands for Flexible Single Master Operation. It has 5 roles and they are classified into two types forest wide and domain wide 1.Schema master (forest wide), 2. Domain Naming Master (forest wide), 3. PDC Emulator (domain wide), 4. PDC Emulator (domain wide), 5. RID Master (domain wide).

    1000 INTERVIEW QUESTIONS 154. When do we called a server as active directory ? A sever
    • 156. What is DCHP? What is the function of DHCP? DHCP (Dynamic Host Configuration Protocol) it is used to assign IP address to the client automatically.

    • 157. What do you mean by APIPA and its range? APIPA stands for Automatic Private IP Address. Whenever a DHCP server unable to assign IP address client system then client system generate an IP address itself is known as APIPA. Range of APIPA 169.254.0.1 to 169.254.255.254

    • 158. What is the default lease period of IP address? 8 days

    • 159. What do you mean by DHCP scope and what does it stores?

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS A DHCP scope is a valid range of IP addresses which are available

    A DHCP scope is a valid range of IP addresses which are available for

    assignments or lease to client computer. It contains IP address range(address

    pool), address leases, reservation and exclusion

    • 160. What do you mean by reservation, exclusion, address leases and

    address pool?

    Reservation: means a particular IP is reserved for a particular PC

    Address leases: it maintains the list of IP addresses which are assigned to the

    client PC’s.

    Address Pool: it contains range of IP address to be assigned to the clients.

    • 161. How to trouble shoot basic DHCP issues? Ipconfig /release is the command to remove the current IP address. Ipconfig /renew is the command to request for new IP address.

    1000 INTERVIEW QUESTIONS A DHCP scope is a valid range of IP addresses which are available
    • 162. What is DNS? What is the function of DNS? DNS mean Domain Naming Service/server used for name resolution. Name resolution: mapping host name with IP address and IP address with host name

    • 163. What do you mean by zone in DNS and its types? Zone is a place where resource records are stored. Zone is of two types. 1. Forward Lookup Zone: this contains information about hostname with IP address. 2. Reverse Lookup Zone: this contains information about IP address with hostname

    • 164. What are primary and secondary DNS servers? Primary DNS server are called master server where as Secondary DNS servers are called alternate or backup DNS servers.

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 165. How to verify DNS is properly configure or not? nslookup is the
    • 165. How to verify DNS is properly configure or not?

    nslookup is the command to check the DNS is correctly configured or not.

    • 166. What are the features of Windows 2008 server? Virtualization, RODC, built in drivers, group policy comment etc.

    • 167. What is IIS? IIS(Internet Information Service) is tool which is used for hosting of web sites.

    1000 INTERVIEW QUESTIONS 165. How to verify DNS is properly configure or not? nslookup is the

    Website is a collection of web pages.

    • 168. What is the version of IIS in 2003 and 2008? 2003 IIS v 6.0 and in 2008 server IIS v 7.0

    • 169. What is network and its type s? Network is a collection of connected devices together through a transmission media for sharing resources. Types of networks: LAN (Local Area Network): if the devices are connected with in a diameter of 1Km is called LAN. CAN (Campus Area Network): if the devices are connected with in a diameter of 5Km to 10Km is called CAN. MAN (Metropolitan Area Network): if the devices are connected with in a diameter of 2Km to 100Km is called MAN. WAN (Wide Area Network): WAN is a collection of two or more LAN. It covers entire geographical area.

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 170. I remotely connected to a machine on my network. I deleted acommand-line interface (usually, of an operating system ) on a remote host 175. List out the OSI Layers. Application layer, Presentation layer, Session layer, Transport layer, Network layer, Data link layer, and Physical layer. Student’s Sign Trainer’s Sign Ameerpet : 9866539988 Dilsukhnagar: 9866547860 " id="pdf-obj-27-4" src="pdf-obj-27-4.jpg">

    170.

    I remotely connected to a machine on my network. I deleted a file

     

    and then went to see if I could locate it in either the remote machine's

    or my recycle bin, but could not. Is there a way to recover

     

    Answer : I think you can use the "Undelete" command from prompt. Open a prompt

     

    window and go to the folder from which the file was deleted.

     

    e.g. c:\some directory>

     

    Then type undelete at the prompt. It should look for recently deleted files and the

     

    tool will ask you to provide the first letter of the file if it finds any deleted files.

    171.

    What is networking?

     

    Creating communication between connected devices on a network is called

     

    networking.

     

    172.

    What is protocol?

     

    Protocol is a set of rules which are predefined for the purpose of

     

    communication.

       

    173.

    What is port no? what are the port no for

    What is port no? what are the port no for

    DHCP,DNS,FTP,HTTP,HTTPS,TFTP,Telnet,SMTP,POP3 &IMAP?

     

    PROTOC

     

    OL

    DHCP

    DNS

    FTP

    TFTP

    HTTP

    HTTPS

    POP3

    IMAP

    Telnet

    S

     

    SERVER-

                   

    67

    DATA-20

    CLIENT-

    CONTROL

    PORT NO

    68

    53

    -21

    69

    80

    443

    110

    143

    23

    2

     

    Every service protocol has its own service address which is known as Port no.

     

    174.

    What is telnet?

     

    Telnet provided access to a command-line interface (usually, of an operating

     

    system) on a remote host

     

    175.

    List out the OSI Layers.

    Application layer, Presentation layer, Session layer, Transport layer, Network

    layer, Data link layer, and Physical layer.

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 176. What is the function of application layer? It is responsible for providingInternet standard that extends the format of e- mail 180. What is the function of session layer? It is responsible for establishing, managing and terminating sessions. 181. What are the protocols works at session layer? PPTP (Point to Point Tunneling Protocol), L2TP (Layer2 Tunneling Protocol), NetBIOS (Network Basic Input Output System) 182. What is the function of transport layer? It is responsible for end to end delivery of entire message. It is also responsible for segmentation. 183. Transport layer is also called as ____ CORE ____ layer? Student’s Sign Trainer’s Sign Ameerpet : 9866539988 Dilsukhnagar: 9866547860 " id="pdf-obj-28-4" src="pdf-obj-28-4.jpg">
    • 176. What is the function of application layer? It is responsible for providing access to the network resources. It is also called as user interaction layer.

    • 177. What are the protocols works at application layer? DHCP, DNS, FTP, Telnet, SMTP, HTTP

    • 178. What is the function of presentation layer? It is responsible for translation, encryption and data compression.

    1000 INTERVIEW QUESTIONS 176. What is the function of application layer? It is responsible for providingInternet standard that extends the format of e- mail 180. What is the function of session layer? It is responsible for establishing, managing and terminating sessions. 181. What are the protocols works at session layer? PPTP (Point to Point Tunneling Protocol), L2TP (Layer2 Tunneling Protocol), NetBIOS (Network Basic Input Output System) 182. What is the function of transport layer? It is responsible for end to end delivery of entire message. It is also responsible for segmentation. 183. Transport layer is also called as ____ CORE ____ layer? Student’s Sign Trainer’s Sign Ameerpet : 9866539988 Dilsukhnagar: 9866547860 " id="pdf-obj-28-15" src="pdf-obj-28-15.jpg">
    • 179. What are the protocols works at presentation layer? SSL(Secure Socket Layer) it is similar to telnet, MMIE:Multipurpose Internet Mail Extensions (MIME) is an Internet standard that extends the format of e- mail

    • 180. What is the function of session layer? It is responsible for establishing, managing and terminating sessions.

    • 181. What are the protocols works at session layer? PPTP (Point to Point Tunneling Protocol), L2TP (Layer2 Tunneling Protocol), NetBIOS (Network Basic Input Output System)

    • 182. What is the function of transport layer? It is responsible for end to end delivery of entire message. It is also responsible for segmentation.

    • 183. Transport layer is also called as

    ____CORE____

    layer?

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 184. What are the protocols works at transport layer? UDP(User Datagram Protocol), TCP(Transmission
    • 184. What are the protocols works at transport layer? UDP(User Datagram Protocol), TCP(Transmission Control Protocol)

    • 185. What is the function of network layer? Network layer is responsible for end to end delivery of packets and routing. Routing is the process of selecting the best path if multiple path are available. Data unit at network layer is called Packet which contains source IP address and Destination IP address.

    • 186. What are the protocols works at network layer? IP, IPSec, ICMP, and APPLE TALK. ICMP (Internet Control Message Protocol): it is used to send error and query messages to the sending device.

    1000 INTERVIEW QUESTIONS 184. What are the protocols works at transport layer? UDP(User Datagram Protocol), TCP(Transmission
    • 187. What are the devices works at network layer? Router, Layer3switch. Layer3 switch has functionality of Router and Switch.

    • 188. What is the function of data link layer? It is responsible for node to node delivery of frames. A frame contains source MAC address and destination MAC address. Data unit at the data link layer is called Frames.

    • 189. What are the sub layers of data link layer? Data link layer has two sub layers. 1) MAC (Media Access Control) 2) LLC (Logic Link Control)

    • 190. What are the protocols works at data link layer? PPP (Point to Point Protocol), HDLC (High-Level Data Link Control)

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 191. What are the devices works at data link layer? Switch, Layer3switch and
    • 191. What are the devices works at data link layer? Switch, Layer3switch and NIC.

    • 192. What is the function of physical layer? Physical layer is responsible for actual transmission of bits over the medium. It deals with electrical and mechanical functions.

    • 193. What are the devices works at physical layer? Repeater and Hub

    • 194. At which layer error will be detected? At data link layer error will be detected.

    1000 INTERVIEW QUESTIONS 191. What are the devices works at data link layer? Switch, Layer3switch and
    • 195. At which layer error will be corrected? At transport layer error will be corrected.

    • 196. What is FTP and its function? FTP stand for (File Transfer Protocol) it is used to upload and downloading of files and folders from server to client and client to server.

    • 197. What is TFTP and its function? TFTP stands for (Trivial File Transfer Protocol) its function similar to that of FTP but it is a connectionless protocol.

    • 198. What is SMTP and its function? SMTP stands for (Simple Mail Transfer Protocol): it is used to transfer the mails from one mail sever to another mail server.

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 199. What is ARP and RARP? ARP stand for (Address Resolution Protocol): it

    199.

    What is ARP and RARP?

    ARP stand for (Address Resolution Protocol): it is used to find MAC address of

    the device if IP address is known.

    RARP stands for (Reverse Address Resolution Protocol): it is used to find the IP

    address of the device if MAC address is known.

     

    200.

    What is POP & IMAP with its functions?

    POP(Post Office Protocol): it is used to download mails form mail server to

    client pc. IMAP(Internet Message Access Protocol):it is used to access the

    emails from a remote server and it does not download the mails.

     

    201.

    What is the difference between hub and switch?

    HUB SWITCH it is a broad cast device it is a unicast device it works at
    HUB
    SWITCH
    it is a broad cast device
    it is a unicast device
    it works at physical layer of OSI
    it works at data link layer of OSI
    model
    model
    max no of ports are 24
    max no of ports are 48
    it shares the bandwidth
    it does not shares the bandwidth
    202.
    What is bandwidth?

    It is the capacity of the medium to carry the signal.

    203.

    What is the difference between switch and router?

    SWITCH

    ROUTER

    it works at data link layer of OSI

    it works at network layer of OSI

    model

    model

    it works based up on MAC address

    it works based up on IP address

    switch transfer the data between

    Router transfer the data between

    LAN segments

    LAN and WAN segments

    it cannot share or transfer the

    Routers are capable of sharing an

    data using internet connection

    internet connection

    204.

    What is the difference between UDP & TCP?

     

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS TCP UDP it is connection oriented it is connection less protocol protocol it

    TCP

    UDP

    it is connection oriented

    it is connection less

    protocol

    protocol

    it is reliable

    it is not reliable

    it is slower

    it is faster

    acknowledgement is possibel

    no acknowledgement

    • 205. What do you mean by topology?

    Topology defines the physical and logical structure of the network.

    • 206. What are the types of topology? Physical topology: it defines the way in which the devices are connected over a network. Logical topology: it defines the way in which the devices are communicating

    1000 INTERVIEW QUESTIONS TCP UDP it is connection oriented it is connection less protocol protocol it

    with each other over the physical topology.

    • 207. Which cable support maximum distance and maximum speed?

    Fiber optic cable and its speed is 1Gbps to 10Gbps (theoretically unlimited)

    • 208. What is the max speed and distance supported by UTP cable and its

    types?

    1000Mbps and distance up to 100M.

    Cat-1,cat2,cat-3,cat4,cat-5,cat-5e,cat6-,cat7

    • 209. What is the difference between cat5, cat5e, cat6 and cat7?

    Max speed of cat5, cat5e, cat6 and cat7 is same but the signaling frequency is

    different.

    Cat5 and Cat5e100MHz, Cat6250MHz, Cat7600MHz.

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 210. What is IP address? Types of IP address? IP address is logical

    210.

    What is IP address? Types of IP address?

    IP address is logical address which is used to identify the device on a network.

    IP address is of two types.

    Private IP address and Public IP address.

    Public IP address is given by ISP where as Private IP address is used in

    organization.

    211.

    What is the difference between broad band and base band signal?

    Base band

    Broad band

    digital signals are transmitted by using Base

    analog signals are transmitted by using Broad

    band

    band

    In a baseband transmission, the entire

    In broadband transmission, signals are sent on

    bandwidth of the cable is consumed by a

    multiple frequencies, allowing multiple signals

    single signa

    to be sent simultaneously.

    it is a bi-direction communication

    it is a uni-direction communication

    212.

    IPV4 IPV6 it is a 32 bit address it is a 128bit address it is a
    IPV4
    IPV6
    it is a 32 bit address
    it is a 128bit address
    it is a binary address
    it is a hexadecimal address
    it is separated by .
    it is separated by colon :
    It is not well suited for mobile
    it is better suited to mobile
    network
    networks

    What is the difference between IPV4 and IPV6?

    213.

    What is subnet mask and what are the default subnet mask for class

    A, class B and class C?

    Subnet mask: it is used to identify the network bit and host bit of the network.

    CLASS

    SUBNET MASK

    A

    255.0.0.0

    B

    255.255.0.0

    C

    255.255.255.0

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 214. What are the private IP address for class A, class B and
    • 214. What are the private IP address for class A, class B and class C?

    CLASS

    RANGE

    A

    10.0.0.0 to 10.255.255.255

    B

    172.16.0.0 to 172.31.255.255

     

    192.168.0.0 to

    C

    192.168.255.255

    • 215. What is wireless network? Wireless network is a network set up by using radio signal frequency to

    standa max rd speed range 46meter 802.11 2Mbps s 802.11 54Mbp 46meter a s s 802.11
    standa
    max
    rd
    speed
    range
    46meter
    802.11
    2Mbps
    s
    802.11
    54Mbp
    46meter
    a
    s
    s
    802.11
    11Mbp
    91meter
    b
    s
    s
    802.11
    54Mbp
    91meter
    g
    s
    s

    communicate among computers and other network devices

    • 216. What are the IEEE standards for wireless network?

    • 217. What is Wi-Fi? Wi-Fi (wireless fidelity) is technically an industry term that represents a type of wireless local area network (LAN) protocol based on the 802.11 IEEE network standard

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 218. What are WPA and WPA2 in wireless network? Wi-Fi Protected Access (WPA)
    • 218. What are WPA and WPA2 in wireless network? Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks

    • 219. What is SSID? A service set identifier (SSID) is a name that identifies a particular 802.11 wireless LAN

    1000 INTERVIEW QUESTIONS 218. What are WPA and WPA2 in wireless network? Wi-Fi Protected Access (WPA)
    • 220. What are the devices used to create wireless LAN? Wireless NIC card, Access point

    • 221. What is MAC address? MAC address is the hardware or physical address which is embedded in the device given by IEEE.

    • 222. What are the commands to view the MAC address? Get mac and ipconfig /all is the command to find the MAC address.

    • 223. What is the difference between IP address and MAC address?

    IPV4

    MAC

    It is a logical address

    it is a physical address

    it is a 32 bit binary address

    it is 48 bit hexa decimal address

    it is temporary address

    it is permanent address

    Separated by .

    separated by -

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 224. What is the max distance supported by fiber optic cable ? 100KM
    • 224. What is the max distance supported by fiber optic cable? 100KM

    • 225. What is host and node? Host: any device on a network with valid IP address is called as Host.

    1000 INTERVIEW QUESTIONS 224. What is the max distance supported by fiber optic cable ? 100KM

    (example: PC network printer)

    Node: any device on a network is called Node. (example: switch)

    • 226. What is gateway? The entrey and exit of the network

    • 227. What are server and client? Server provides the services to the client request. Client request for the services from the server.

    • 228. What are the difference between 2003 and 2008 server?

    2003

    2008

    no virtualization

    virtualization is available

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS windows power shell is not available windows power shell is available no RODC

    windows power shell is not

    available

    windows power shell is available

    no RODC

    RODC

    IIS 6.0

    IIS7.0

    RIS

    WDS

    • 229. What is domain? Domain is a collection of devices with centralized administrator.

    • 230. What is work group? Workgroup is a collection of devices without centralized administrator.

    1000 INTERVIEW QUESTIONS windows power shell is not available windows power shell is available no RODC
    • 231. What is domain controller? Domain controller is a server that control or responsible of provide to host access of all resoure like printer, files, mail within the domain.

    • 232. What is active directory? Active directory is data base which stores the information about the objects likes users, group,O.U etc

    • 233. Where does active directory database is stored? Active directory information will be stored in a file NTDS.DIT (New Technology Directory Service.Directory Information Tree) default size of NTDS.DIT is 12.1Mb Default Location of NTDS.DIT is C:/Windows/NTDS

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 234. What are the protocols for active directory and port no’s? Kerberos and
    • 234. What are the protocols for active directory and port no’s? Kerberos and LDAP are the protocol of active directory. Ports no for Kerberos (88) and LDAP(389)

    • 235. What is Kerberos? Kerberos is a computer network authentication protocol which works on the basis of "tickets" to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner

    • 236. What is Sysvol? The System Volume (Sysvol) is a shared directory that stores the server copy of the domain's public files that must be shared for common access and replication throughout a domain.

    1000 INTERVIEW QUESTIONS 234. What are the protocols for active directory and port no’s? Kerberos and
    • 237. What is tree and forest? Tree: The hierarchical of individual domains is called tree. Forest: The hierarchical of individual domains tree is called forest.

    • 238. Where the domain user information does is stored? NTDS.DIT file

    • 239. Where the local user information does is stored? SAM(Security Account Manager)

    • 240. When do we called a server as active directory? A sever which has FSMO roles is called is active directory.

    • 241. What is FSMO roles and how many types of FSMO Roles are there?

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS FSMO stands for Flexible Single Master Operation. It has 5 roles and they

    FSMO stands for Flexible Single Master Operation.

    It has 5 roles and they are classified into two types forest wide and domain

    wide

    1.Schema master (forest wide), 2. Domain Naming Master (forest wide), 3.

    PDC Emulator (domain wide), 4. PDC Emulator (domain wide), 5. RID Master

    (domain wide).

    • 242. What is DCHP? What is the function of DHCP? DHCP (Dynamic Host Configuration Protocol) it is used to assign IP address to the client automatically.

    • 243. What do you mean by APIPA and its range? APIPA stands for Automatic Private IP Address. Whenever a DHCP server unable to assign IP address client system then client system generate an IP address itself is known as APIPA.

    1000 INTERVIEW QUESTIONS FSMO stands for Flexible Single Master Operation. It has 5 roles and they

    Range of APIPA 169.254.0.1 to 169.254.255.254

    • 244. What is the default lease period of IP address? 8 days

    • 245. What do you mean by DHCP scope and what does it stores? A DHCP scope is a valid range of IP addresses which are available for assignments or lease to client computer. It contains IP address range(address pool), address leases, reservation and exclusion

    • 246. What do you mean by reservation, exclusion, address leases and

    address pool?

    Reservation: means a particular IP is reserved for a particular PC

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS Address leases: it maintains the list of IP addresses which are assigned to

    Address leases: it maintains the list of IP addresses which are assigned to the

    client PC’s.

    Address Pool: it contains range of IP address to be assigned to the clients.

    • 247. How to trouble shoot basic DHCP issues? Ipconfig /release is the command to remove the current IP address. Ipconfig /renew is the command to request for new IP address.

    • 248. What is DNS? What is the function of DNS? DNS mean Domain Naming Service/server used for name resolution. Name resolution: mapping host name with IP address and IP address with host name

    1000 INTERVIEW QUESTIONS Address leases: it maintains the list of IP addresses which are assigned to
    • 249. What do you mean by zone in DNS and its types? Zone is a place where resource records are stored. Zone is of two types. 1. Forward Lookup Zone: this contains information about hostname with IP address. 2. Reverse Lookup Zone: this contains information about IP address with hostname

    • 250. What are primary and secondary DNS servers? Primary DNS server are called master server where as Secondary DNS servers are called alternate or backup DNS servers.

    • 251. How to verify DNS is properly configure or not?

    nslookup is the command to check the DNS is correctly configured or not.

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 252. What are the features of Windows 2008 server? Virtualization, RODC, built in
    • 252. What are the features of Windows 2008 server? Virtualization, RODC, built in drivers, group policy comment etc.

    • 253. What is ADC and RODC ? ADC (Additional Domain Controller): additional domain is the backup domain which is used for

    load balancing and fault tolerance.

    RODC Read Only Domain Controller

    • 254. What is terminal server? It is a service where multiple users can take remote desktop of the server at a time. By default only two remote desktop are available.

    1000 INTERVIEW QUESTIONS 252. What are the features of Windows 2008 server? Virtualization, RODC, built in
    • 255. What is DFS? Distributed file system maintains the load balance between the file servers and allows users to access the data on file severs

    • 256. What is Group policy? GROUP POLICY: It is an administrative tool for managing user’s settings and computers settings across the network.

    • 257. What is OU?

    It is a logical container which contains active directory objects (users, groups,

    computer etc

    )

    It is also called sub tree and OU is the smallest scope or unit

    to which you can assign group policy setting or delegate administrative

    authorize.

    • 258. What is VPN?

    A virtual private network (VPN) is a secure way of connecting to a private

    Local Area Network at a remote location, using the Internet.

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 259. What are the VPN encryption protocols ? PPTP (Point to Point Tunnelinghard disk . 261. What is firewall? Firewall which block unwanted and unauthorized access to the network and system. 262. What is IP Sec? Short for IP Security, a set of protocols developed by the IETF to support secure exchange of packets at the IP layer. 263. What is the version of server 2008? a. Operating systems . Released to manufacturing officially released on February 27, 2008 264. What is mean by delegation control? a. Delegation of Control is assigning a person or group specific Student’s Sign Trainer’s Sign Ameerpet : 9866539988 Dilsukhnagar: 9866547860 " id="pdf-obj-42-4" src="pdf-obj-42-4.jpg">
    • 259. What are the VPN encryption protocols? PPTP (Point to Point Tunneling Protocol), L2TP (Layer 2 Tunneling Protocol),SSTP(Secure Socket Tunneling Protocol)

    • 260. What is hibernate mode? In hibernate mode the current state of the system is saved to the hard drive, and the system will power down. When a user turns the system power back on, the saved information is read from the hard disk.

    1000 INTERVIEW QUESTIONS 259. What are the VPN encryption protocols ? PPTP (Point to Point Tunnelinghard disk . 261. What is firewall? Firewall which block unwanted and unauthorized access to the network and system. 262. What is IP Sec? Short for IP Security, a set of protocols developed by the IETF to support secure exchange of packets at the IP layer. 263. What is the version of server 2008? a. Operating systems . Released to manufacturing officially released on February 27, 2008 264. What is mean by delegation control? a. Delegation of Control is assigning a person or group specific Student’s Sign Trainer’s Sign Ameerpet : 9866539988 Dilsukhnagar: 9866547860 " id="pdf-obj-42-14" src="pdf-obj-42-14.jpg">
    • 261. What is firewall? Firewall which block unwanted and unauthorized access to the network and system.

    • 262. What is IP Sec? Short for IP Security, a set of protocols developed by the IETF to support secure exchange of packets at the IP layer.

    • 263. What is the version of server 2008?

    • 264. What is mean by delegation control?

      • a. Delegation of Control is assigning a person or group specific

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    administrative permissions

    • 265. What is packet?

    A block of information with IP address

    • 266. What is segment?

    1000 INTERVIEW QUESTIONS administrative permissions 265. What is packet? A block of information with IP address

    A segment is a defined portion or section of something larger such as a data

    file

    What is frame?

    A block of information with MAC address

    • 267. What is port number?

    Every service protocol has its own service address is known as port number

    settings for
    settings for
    • 268. What is Network ID?

    It represents the IPaddress to which network

    • 269. What is the Registry?

    Registry is the database most Windows-based operating systems use to keep

    track of the

    • 270. When would you use a crosslink cable?

    To connect the similar devices

    • 271. What are the main advantages and disadvantages of Fiber-Optic-

    based networks?

    Advantage Data transfer rate is speed compared to other

    • 272. What is Internet?

    It is a World Wide Collection of computer networks co-operating with

    each other to

    exchange data using

    • 273. Define Trust relation?

    Creating the communication between two Domains.

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    • 274. What are the main features of ICS?

    1000 INTERVIEW QUESTIONS 274. What are the main features of ICS? Address translation, Public and private

    Address translation, Public and private interface, Firewall, DHCP allocator and

    DNS proxy.

    • 275. What is the use of tracert command

    This checks the path of a data packet flowing from one router to another,

    until it reaches its

    destination.

    • 276. What is the use of ping command?

    It checks weather a computer can transmit data over a network.

    • 277. What is an offline file?

    1000 INTERVIEW QUESTIONS 274. What are the main features of ICS? Address translation, Public and private

    A file on a remote server that is temporarily stored locally. In order to

    allow users access to data when they are not on the network

    • 278. Ping tool work using which protocol?

    ICMP

    • 279. What are the requirements for ADDS?

    Windows 2000/2003 Server Operating System

    TCP/IP protocol and IP address

    Network Card with Active state

    NTFS partition

    • 280. Explain about RAID-1

    Min. and max. 2 Hard disk

    If anyone disk fails data can be recovered from other disk

    50% space wastage

    No read/write performance improvement

    Good for storing Operating system

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 281. Explain about RAID-5 ? Data is stored in distributed format across all
    281. Explain about RAID-5 ? Data is stored in distributed format across all the disk Min
    281.
    Explain about RAID-5 ?
    Data is stored in distributed format across all the disk
    Min 3 max. 32
    If anyone disk fails data can be recovered using parity
    Parity space wastage eg. Parity = total space \ no of disk
    Good for storing data.
    282.
    Difference between Windows NT , 2003 and 2008 ?
    Win NT
    Win 2k3
    Win 2k8
    Active Directory Domain
    Directory Service
    Active Directory Service
    Services
    FAT16 and NTFS 4.0
    FAT16
    FAT16, FAT32 and NTFS 5.0
    FAT32 and NTFS 5.0
    Compression, Encryption and Disk
    Compression
    Quota
    No IPSec
    IPSec built-in
    IPSec built-in
    No Shadow Copy
    Shadow Copy
    Shadow Copy
    Basic disk
    Basic and Dynamic Disk
    Basic and Dynamic Disk
    IIS Ver 4
    IIS Ver 6
    IIS Ver 7
    System Policy
    Group Policy
    Group Policy
    283.
    Difference between Windows XP home and Windows XP prof
    Xp Home Basic
    Xp Profosnal
    no Remote desktop
    Remote desktop
    NO
    Offline folders
    Offline folders
    1 processor
    2 processor
    workgroup member
    Workgroup and domain member
    NO
    Encryption
    Encryption
    NO GPO
    GPO
    No ASR
    ASR
    284.
    What is mail server ?

    Mail server is software which maintains user mailboxes. eg : Exchange server

    Lotus domino, etc.

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 285. Port numbers for various application and services There are total 65536 ports
    • 285. Port numbers for various application and services There are total 65536 ports available. Below is the list of some well-known ports

    • 286. What is Logon script ? Logon script is a bat file or script file which runs when a user logs on.

    • 287. Where are logon script stored? They are stored in Sysvo folder of DC

    1000 INTERVIEW QUESTIONS 285. Port numbers for various application and services There are total 65536 ports
    • 288. What two hardware considerations should be an important part of

    the planning process for a Windows Server 2008 deployment?

    Ans: Any server on which you will install Windows Server 2008 should have at

    least the minimum hardware requirement for running the network operating

    system. Server hardware should also be on the Windows Server 2008 Hardware

    Compatibility List to avoid the possibility of hardware and network operating

    system incompatibility.

    • 289. Which Control Panel tool enables you to automate the running of

    server utilities and other applications?

    The Task Scheduler enables you to schedule the launching of tools such as

    Windows Backup and Disk Defragmenter.

    • 290. When a child domain is created in the domain tree, what type of trust

    relationship exists between the new child domain and the trees root

    domain?

    Child domains and the root domain of a tree are assigned transitive trusts. This

    means that the root domain and child domain trust each other and allow

    resources in any domain in the tree to be accessed by users in any domain in the

    tree.

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 291. What is the primary function of domain controllers? The primary function of
    • 291. What is the primary function of domain controllers?

    The primary function of domain controllers is to validate users to the network.

    However, domain controllers also provide the catalog of Active Directory objects to

    users on the network.

    • 292. What are some of the other roles that a server running Windows

    Server 2008 could fill on the network?

    A server running Windows Server 2008 can be configured as a domain controller,

    a file server, a print server, a web server, or an application server. Windows

    servers can also have roles and features that provide services such as DNS,

    DHCP, and Routing and Remote Access.

    • 293. Which Windows Server 2008 tools make it easy to manage and

    configure a servers roles and features?

    The Server Manager window enables you to view the roles and features installed

    on a server and also to quickly access the tools used to manage these various

    1000 INTERVIEW QUESTIONS 291. What is the primary function of domain controllers? The primary function of

    roles and features. The Server Manager can be used to add and remove roles and

    features as needed.

    • 294. What Windows Server 2008 service is used to install client operating

    systems over the network?

    Windows Deployment Services (WDS) enables you to install client and server

    operating systems over the network to any computer with a PXE-enabled network

    interface.

    • 295. What domain services are necessary for you to deploy the Windows

    Deployment Services on your network?

    Windows Deployment Services requires that a DHCP server and a DNS server be

    installed in the domain

    • 296. How is WDS configured and managed on a server running Windows

    Server 2008?

    The Windows Deployment Services snap-in enables you to configure the WDS

    server and add boot and install images to the server.

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 297. What is the difference between a basic and dynamic drive in the
    • 297. What is the difference between a basic and dynamic drive in the

    Windows Server 2008 environment?

    A basic disk embraces the MS-DOS disk structure; a basic disk can be divided into

    partitions (simple volumes).

    Dynamic disks consist of a single partition that can be divided into any number of

    volumes. Dynamic disks also support Windows Server 2008 RAID

    implementations.

    • 298. What is RAID in Windows Server 2008?

    RAID, or Redundant Array of Independent Disks, is a strategy for building fault

    tolerance into your file servers. RAID enables you to combine one or more

    volumes on separate drives so that they are accessed by a single drive letter.

    Windows Server 2008 enables you to configure RAID 0 (a striped set), RAID 1 (a

    mirror set), and RAID 5 (disk striping with parity).

    • 299. What types of Active Directory objects can be contained in an

    Organizational Unit?

    Organizational Units can hold users, groups, computers, contacts, and other OUs.

    1000 INTERVIEW QUESTIONS 297. What is the difference between a basic and dynamic drive in the

    The Organizational Unit provides you with a container directly below the domain

    level that enables you to refine the logical hierarchy of how your users and other

    resources are arranged in the Active Directory.

    • 300. What are Active Directory sites in Windows Server 2008?

    Active Directory sites are physical locations on the network’s physical topology.

    Each regional domain that you create is assigned to a site. Sites typically

    represent one or more IP subnets that are connected by IP routers. Because sites

    are separated from each other by a router, the domain controllers on each site

    periodically replicate the Active Directory to update the Global Catalog on each

    site segment.

    • 301. Can servers running Windows Server 2008 provide services to clients

    when they are not part of a domain?

    Servers running Windows Server 2008 can be configured to participate in a

    workgroup. The server can provide some services to the workgroup peers but

    does not provide the security and management tools provided to domain

    controllers.

    • 302. What does the use of Group Policy provide you as a network

    administrator?

    Group Policy provides a method of controlling user and computer configuration

    settings for Active Directory containers such as sites, domains, and OUs. GPOs are

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS linked to a particular container, and then individual policies and administrative templates are

    linked to a particular container, and then individual policies and administrative

    templates are enabled to control the environment for the users or computers

    within that particular container.

    • 303. What tools are involved in managing and deploying Group Policy?

    GPOs and their settings, links, and other information such as permissions can be

    viewed in the Group Policy Management snap-in.

    • 304. How do you deal with Group Policy inheritance issues?

    GPOs are inherited down through the Active Directory tree by default. You can

    block the inheritance of settings from upline GPOs (for a particular container such

    as an OU or a local computer) by selecting Block Inheritance for that particular

    1000 INTERVIEW QUESTIONS linked to a particular container, and then individual policies and administrative templates are

    object. If you want to enforce a higher-level GPO so that it overrides directly

    linked GPOs, you can use the Enforce command on the inherited (or upline) GPO.

    • 305. How can you make sure that network clients have the most recent

    Windows updates installed and have other important security features

    such as the Windows Firewall enabled before they can gain full network

    access?

    You can configure a Network Policy Server (a service available in the Network

    Policy and Access Services role). The Network Policy Server can be configured to

    compare desktop client settings with health validators to determine the level of

    network access afforded to the client.

    • 306. What is the purpose of deploying local DNS servers?

    A domain DNS server provides for the local mapping of fully qualified domain

    names to IP addresses. Because the DNS is a distributed database, the local DNS

    servers can provide record information to remote DNS servers to help resolve

    remote requests related to fully qualified domain names on your network.

    • 307. In terms of DNS, what is a caching-only server?

    A caching-only DNS server supplies information related to queries based on the

    data it contains in its DNS cache. Caching-only servers are often used as DNS

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS forwarders. Because they are not configured with any zones, they do not generateActive Directory access and replication topology to take advantage of the physical network 311. Logical Diagram of Active Directory?, what is the difference between child domain & additional domain Server? Well, if you know what a domain is then you have half the answer. Say you have the domain Microsoft.com. Now Microsoft has a server named server1 in that domain, which happens to the be parent domain. So it’s FQDN is server1.microsoft.com. If you add an additional domain server and name it server2, then it’s FQDN is server2.microsoft.com. Now Microsoft is big so it has offices in Europe and Asia. So they make child domains for them and their FQDN would look like this: europe.microsoft.com & asia.microsoft.com. Now lets say each of them have a server in those child domains named server1. Their FQDN would then look like this: server1.europe.microsoft.com & server1.asia.microsoft.com .. 227. What are Active Directory Groups? Groups are containers that contain user and computer objects within them as members. When security permissions are set for a group in the Access Control Student’s Sign Trainer’s Sign Ameerpet : 9866539988 Dilsukhnagar: 9866547860 " id="pdf-obj-50-4" src="pdf-obj-50-4.jpg">

    forwarders. Because they are not configured with any zones, they do not generate

    network traffic related to zone transfers.

    • 308. How the range of IP addresses is defined for a Windows Server 2008

    DHCP server?

    The IP addresses supplied by the DHCP server are held in a scope. A scope that

    contains more than one subnet of IP addresses is called a superscope. IP

    addresses in a scope that you do not want to lease can be included in an

    exclusion range.

    • 309. How do you view replication properties for AD?

    By using Active Directory Replication Monitor.

    Start–> Run–> Replmon

    1000 INTERVIEW QUESTIONS forwarders. Because they are not configured with any zones, they do not generateActive Directory access and replication topology to take advantage of the physical network 311. Logical Diagram of Active Directory?, what is the difference between child domain & additional domain Server? Well, if you know what a domain is then you have half the answer. Say you have the domain Microsoft.com. Now Microsoft has a server named server1 in that domain, which happens to the be parent domain. So it’s FQDN is server1.microsoft.com. If you add an additional domain server and name it server2, then it’s FQDN is server2.microsoft.com. Now Microsoft is big so it has offices in Europe and Asia. So they make child domains for them and their FQDN would look like this: europe.microsoft.com & asia.microsoft.com. Now lets say each of them have a server in those child domains named server1. Their FQDN would then look like this: server1.europe.microsoft.com & server1.asia.microsoft.com .. 227. What are Active Directory Groups? Groups are containers that contain user and computer objects within them as members. When security permissions are set for a group in the Access Control Student’s Sign Trainer’s Sign Ameerpet : 9866539988 Dilsukhnagar: 9866547860 " id="pdf-obj-50-28" src="pdf-obj-50-28.jpg">
    • 310. whatt are sites what are they used for?

    One or more well-connected (highly reliable and fast) TCP/IP subnets. A site allows

    administrators to configure Active Directory access and replication topology to

    take advantage of the physical network

    • 311. Logical Diagram of Active Directory?, what is the difference between

    child domain & additional domain Server?

    Well, if you know what a domain is then you have half the answer. Say you have

    the domain Microsoft.com. Now Microsoft has a server named server1 in that

    domain, which happens to the be parent domain. So it’s FQDN is

    server1.microsoft.com. If you add an additional domain server and name it

    server2, then it’s FQDN is server2.microsoft.com.

    Now Microsoft is big so it has offices in Europe and Asia. So they make child

    domains for them and their FQDN would look like this: europe.microsoft.com &

    asia.microsoft.com. Now lets say each of them have a server in those child

    domains named server1. Their FQDN would then look like this:

    server1.europe.microsoft.com & server1.asia.microsoft.com ..

    • 227. What are Active Directory Groups?

    Groups are containers that contain user and computer objects within them as

    members. When security permissions are set for a group in the Access Control

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS List on a resource, all members of that group receive those permissions. Domain

    List on a resource, all members of that group receive those permissions.

    Domain Groups enable centralized administration in a domain. All domain

    groups are created on a domain controller.

    In a domain, Active Directory provides support for different types of groups

    and group scopes. The group type determines the type of task that you

    manage with the group. The group scope determines whether the group can

    have members from multiple domains or a single domain

    • 312. What are the types of Group Types?

    * Security groups: Use Security groups for granting permissions to gain access

    to resources. Sending an e-mail message to a group sends the message to all

    members of the group. Therefore security groups share the capabilities of

    distribution groups.

    * Distribution groups: Distribution groups are used for sending e-main

    messages to groups of users. You cannot grant permissions to security groups.

    Even though security groups have all the capabilities of distribution groups,

    distribution groups still requires, because some applications can only read

    distribution groups.

    1000 INTERVIEW QUESTIONS List on a resource, all members of that group receive those permissions. Domain
    • 313. Where are group policies stored?

    Ans : %SystemRoot%System32\GroupPolicy

    • 314. What is GPT and GPC?

    Ans:Group policy template and group policy container.

    • 315. Where is GPT stored?

    Ans %SystemRoot%\SYSVOL\sysvol\domainname\Policies\GUID

    • 316. How can you restrict running certain applications on a machine?

    Ans :Via group policy, security settings for the group, then Software Restriction

    Policies.

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 317. .What’s the major difference between FAT and NTFS on a local machine?
    • 317. .What’s the major difference between FAT and NTFS on a local

    machine?

    Ans: FAT and FAT32 provide no security over locally logged-on users. Only native

    NTFS provides extensive permission control on both remote and local files.

    • 318. What’s the difference between standalone and fault-tolerant DFS

    (Distributed File System) installations?

    Ans :The standalone server stores the Dfs directory tree structure or topology

    locally. Thus, if a shared folder is inaccessible or if the Dfs root server is down,

    users are left with no link to the shared resources. A fault-tolerant root node

    stores the Dfs topology in the Active Directory, which is replicated to other

    domain controllers. Thus, redundant root nodes may include multiple connections

    to the same data residing in different shared folders.

    1000 INTERVIEW QUESTIONS 317. .What’s the major difference between FAT and NTFS on a local machine?
    • 319. Where exactly do fault-tolerant DFS shares store information in

    Active Directory?

    Ans : In Partition Knowledge Table, which is then replicated to other domain

    controllers.

    • 320. How do you double-boot a Win 2003 server box?

    The Boot.ini file is set as read-only, system, and hidden to prevent unwanted

    editing. To change the Boot.ini timeout and default settings, use the System

    option in Control Panel from the Advanced tab and select Startup.

    • 321. What do you do if earlier application doesn’t run on Windows Server

    2008?

    Ans :When an application that ran on an earlier legacy version of Windows cannot

    be loaded during the setup function or if it later malfunctions, you must run the

    compatibility mode function. This is accomplished by right-clicking the application

    or setup program and selecting Properties –> Compatibility –> selecting the

    previously supported operating system.

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 322. What are the Windows Server keyboard shortcuts? Ans :Winkey opens or closes
    • 322. What are the Windows Server keyboard shortcuts?

    Ans :Winkey opens or closes the Start menu. Winkey + BREAK displays the

    System Properties dialog box. Winkey + TAB moves the focus to the next

    application in the taskbar. Winkey + SHIFT + TAB moves the focus to the previous

    application in the taskbar. Winkey + B moves the focus to the notification area.

    Winkey + D shows the desktop. Winkey + E opens Windows Explorer showing My

    Computer. Winkey + F opens the Search panel. Winkey + CTRL + F opens the

    Search panel with Search for Computers module selected. Winkey + F1 opens

    Help. Winkey + M minimizes all. Winkey + SHIFT+ M undoes minimization. Winkey

    + R opens Run dialog. Winkey + U opens the Utility Manager. Winkey + L locks

    the computer.

    • 323. What is Active Directory?

    Ans :Active Directory is a network-based object store and service that locates and

    manages resources, and makes these resources available to authorized users and

    1000 INTERVIEW QUESTIONS 322. What are the Windows Server keyboard shortcuts? Ans :Winkey opens or closes

    groups. An underlying principle of the Active Directory is that everything is

    considered an object—people, servers, workstations, printers, documents, and

    devices. Each object has certain attributes and its own security access control list

    (ACL).

    • 324. How can you force the client to give up the dhcp lease if you have

    access to the client PC?

    Ans: ipconfig /release

    • 325. I can’t seem to access the Internet, don’t have any access to the

    corporate network and on ipconfig my address is 169.254.*.*. What

    happened?

    Ans: The 169.254.*.* net mask is assigned to Windows machines running

    98/2000/XP if the DHCP server is not available. The name for the technology is

    APIPA (Automatic Private Internet Protocol Addressing).

    • 326. How much is the weight of 20 mangoes and 30 oranges?

    i. 1 orange weighs twice that of 1 mango

    ii. 2 mangoes and 3 oranges weigh 2 kg

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 327. Secure services in your network require reverse name resolution to make it
    • 327. Secure services in your network require reverse name resolution to

    make it more difficult to launch successful attacks against the services.

    To set this up, you configure a reverse lookup zone and proceed to add

    records. Which record types do you need to create?

    Ans :PTR Records

    • 328. What is the main purpose of a DNS server?

    Ans :DNS servers are used to resolve FQDN hostnames into IP addresses and vice

    versa

    • 329. SOA records must be included in every zone. What are they used

    for?

    Ans :SOA records contain a TTL value, used by default in all resource records in

    the zone. SOA records contain the e-mail address of the person who is responsible

    for maintaining the zone. SOA records contain the current serial number of the

    zone, which is used in zone transfers.

    • 330. What is the main purpose of SRV records?

    Ans : SRV records are used in locating hosts that provide certain network services

    1000 INTERVIEW QUESTIONS 327. Secure services in your network require reverse name resolution to make it
    • 331. Before installing your first domain controller in the network, you installed a

    DNS server and created a zone, naming it as you would name your AD domain.

    However, after the installation of the domain controller, you are unable to locate

    infrastructure SRV records anywhere in the zone. What is the most likely cause of

    this failure?

    Ans : The zone you created was not configured to allow dynamic updates. The

    local interface on the DNS server was not configured to allow dynamic updates.

    • 332. You are administering a network connected to the Internet. Your users

    complain that everything is slow. Preliminary research of the problem indicates

    that it takes a considerable amount of time to resolve names of resources on the

    Internet. What is the most likely reason for this?

    Ans : DNS servers are not caching replies

    ..

    Local client computers are not caching

    replies… The cache.dns file may have been corrupted on the server.

    • 333. what is NSlookup ?

    Answer : it is a tool used troubleshoot DNS related issues

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    • 334. Explain DHCP 4 packets ?

    Answer:Discover = client sends request for IP

    1000 INTERVIEW QUESTIONS 334. Explain DHCP 4 packets ? Answer:Discover = client sends request for IP

    Offer = DHCP server send and Offer with IP address

    Request = if clients accepts the IP it sends a request to DHCP

    Ack = DHCP server sends ack for the same

    • 335. What is WINS ?

    Answer : It is used to resovle NetBIOS Computer name to IP address

    • 336. What are user profile ?

    Answer: User profile is user common environment which contents settings like desktop

    my docs, temp, outlook settings, IE settings, start menu, etc.

    1000 INTERVIEW QUESTIONS 334. Explain DHCP 4 packets ? Answer:Discover = client sends request for IP
    • 337. What are the different types of profile ?

    Local Profile : Stored on local machine where the user log on. User get different

    Roaming Profile : Stored in shared folder of server. User get same profile when

    he logs on to different machine. User can modify his profile

    Mandatory profile :Stored in shared folder of server. User get same profile when

    he logs on to different machine. User cannot modify his profile.

    • 338. Difference between Roaming and Mandatory profile? Roaming Profile: User can modify his profile Mandatory Profile: User cannot modify his profile

    • 339. Difference between Roaming and Local profile

    Answer:

    Local Profile

    Roaming Profile

    stored on local machine

    stored on shared folder of server

    user get different profile for for

    user get same profile on different machine.

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS different machine stored in C:\docs and settings Stored on shared folder of a

    different machine

    stored in C:\docs and settings

    Stored on shared folder of a server

    These profile are automatically

    These profile is required to be configured as per

    created when a user logs on to

    requirement

    a machine

    • 340. How to configure a user profile as mandatory?

    Answer: To configure a profile as mandatory we need to configure a profile as

    roaming

    and then rename the ntuser.dat to ntuser.man from the shared folder

    • 341. What are home directory?

    Answer: Home directory are user personal folder for storing personal data and

    1000 INTERVIEW QUESTIONS different machine stored in C:\docs and settings Stored on shared folder of a

    Automatically mounted as network drive when a user logs on to any machine in a

    domain

    Home directory setting is configured using Active directory users and computer

    snap-in

    • 342. How to stop and start server using command line

    Answer: use NET START to start a service and NET STOP to stop the service

    Eg :

    NET STOP spooler

    NET START spooler

    • 343. How to send message to remote user, computer, etc. using command

    line?

    Answer: use NET SEND command

    Eg :

    NET SEND 10.0.0.1 "how are u"

    • 344. How to create/delete user using command line?

    Answer: use NET USER command

    Eg : NET USER tommy 123 /add - created a user tommy with password 123

    NET USER tommy /delete

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 345. How to create/delete grup using command line? Answer: use NET GROUP command
    • 345. How to create/delete grup using command line?

    Answer: use NET GROUP command (This command is used only on DC

    Eg :

    NET GROUP admins /add

    • 346. How to create/delete local group using command line?

    Answer: use NET LOCALGROUP command

    Eg : NET LOCALGROUP admins /add

    • 347. What is RPC protocol?

    Answer: RPC stands for Remote Procedure Call. It uses port number 135. RPC is an

    1000 INTERVIEW QUESTIONS 345. How to create/delete grup using command line? Answer: use NET GROUP command

    interprocess communication technique that allows client and server software to

    • 348. What is Network Monitor Agent?

    Answer: Network Monitor Agent is a packet capturing software. It is also called as

    sniffer

    • 349. What is the default share in Windows 2008 Server?

    Answer: The default share in Windows 2008 is

    a) Admin$

    b) All drives i.e. C$. D$ .etc

    IPC$

    Net logon (Only on DC

    Sysvol (Only on DC

    • 350. How to create a hidden share in Windows?

    Answer: In share name of a folder Specify $ after the share name i.e. data$

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 351. What are the 4 major virtualization areas?  Server  Storage What happens if primary domain controller fails? Answer.You won’t be able to access the network resources/login properly to your account. 353. What is a default gateway? What happens if I don't have one? Answer: a gateway is a routing device that knows how to pass traffic between different subnets and networks. A computer will know some routes (a route is the address of each node a packet must go through on the Internet to reach a specific destination), but not the routes to every address on the Internet. It won't even know all the routes on the nearest subnets. A gateway will not have this information either, but will at least know the addresses of other gateways itcan hand the traffic off to. Your default gateway is on the same subnet as your computer, andis the gateway your computer relies on when it doesn't know how to route traffic.The default gateway is typically very similar to your IP address , in that many of the numbers may be the same. However, the default gateway is not your IP address. To see what defaultgateway you are using, follow the steps below for your operating syste 354. You need to view at network traffic. What will you use? Name a few tools ? Answer: Monitoring network traffic too 355. How do I know the path that a packet takes to the destination? Answer :’use "tracert" command-line 356. What is the BOOTP protocol used for, where might you find it in Windows networkinfrastructure? Answer. In computing , Bootstrap Protocol , or BOOTP is a UDP network protocol used by a network client to obtain its IP address automatically. This is usually done during Student’s Sign Trainer’s Sign Ameerpet : 9866539988 Dilsukhnagar: 9866547860 " id="pdf-obj-58-4" src="pdf-obj-58-4.jpg">

    351.

    What are the 4 major virtualization areas?

    Server

    Storage

    Desktop

    Application

    352.

    Answer.You won’t be able to access the network resources/login properly to your

    account.

     

    353.

    What is a default gateway? What happens if I don't have one?

    Answer: a gateway is a routing device that knows how to pass traffic between

    different subnets and networks. A computer will know some routes (a route is the

    address of each node a packet must go through on the Internet to reach a specific

    address of each node a packet must go through on the Internet to reach a specific

    destination), but not the routes to every address on the Internet. It won't even know

    all the routes on the nearest subnets. A gateway will not have this information either,

    but will at least know the addresses of other gateways itcan hand the traffic off to.

    Your default gateway is on the same subnet as your computer, andis the gateway

    your computer relies on when it doesn't know how to route traffic.The default

    gateway is typically very similar to yourIP address, in that many of the numbers may

    be the same. However, the default gateway is not your IP address. To see what

    defaultgateway you are using, follow the steps below for your operating syste

    354.

    You need to view at network traffic. What will you use? Name a few tools ?

    Answer: Monitoring network traffic too

    355.

    How do I know the path that a packet takes to the destination?

    Answer :’use "tracert" command-line

    356.

    What is the BOOTP protocol used for, where might you find it in

    Windows networkinfrastructure?

    Answer. Incomputing, Bootstrap Protocol , or BOOTP is aUDPnetwork protocol used

    by a network client to obtain itsIP addressautomatically. This is usually done during

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS the bootstrap process when a computer is starting up. The BOOTP servers assign

    thebootstrapprocess when a computer is starting up. The BOOTP servers assign the

    IP address to each client froma pool of addresses. We can find,

    Bootstrap Protocol in DHCP Pool configuration in CSCOSwitchers and Router

    • 357. Describe the process of working with an external domain name

    If it is not possible for you to configure your internal domain as a subdomain of

    your externaldomain, use a stand-alone internal domain. This way, your internal

    and external domainnames are unrelated. For example, an organization that uses

    the domain name contoso.comfor their external namespace uses the name

    corp.internal for their internal namespace.The advantage to this approach is that

    it provides you with a unique internal domain name.The disadvantage is that this

    configuration requires you to manage two separate namespaces.Also, using a

    stand-alone internal domain that is unrelated to your external domain

    mightcreate confusion for users because the namespaces do not reflect a

    relationship betweenresources within and outside of your network. In addition,

    you might have to register twoDNS names with an Internet name authority if you

    want to make the internal domain publiclyaccessible.

    1000 INTERVIEW QUESTIONS the bootstrap process when a computer is starting up. The BOOTP servers assign
    • 358. Describe the importance of DNS to AD.

    When Microsoft began development on Active Directory, full compatibility with the

    domainname system (DNS) was a critical priority. Active Directory was built from

    the ground up not just to be fully compatible with DNS but to be so integrated

    with it that one cannot existwithout the other. Microsoft's direction in this case did

    not just happen by chance, but becauseof the central role that DNS plays in

    Internet name resolution and Microsoft's desire to makeits product lines embrace

    the Internet.While fully conforming to the standards established for DNS, Active

    Directory can expandupon the standard feature set of DNS and offer some new

    capabilities such as AD-IntegratedDNS, which greatly eases the administration

    required for DNS environments. In addition,Active Directory can easily adapt to

    exist in a foreign DNS environment, such as Unix BIND,as long as the BIND

    version is 8.2.x or higher.When Microsoft began development on Active Directory,

    full compatibility with the domainname system (DNS) was a critical priority. Active

    Directory was built from the ground up not just to be fully compatible with DNS

    but to be so integrated with it that one cannot existwithout the other. Microsoft's

    direction in this case did not just happen by chance, but becauseof the central

    role that DNS plays in Internet name resolution and Microsoft's desire to makeits

    product lines embrace the Internet.While fully conforming to the standards

    established for DNS, Active Directory can expandupon the standard feature set of

    DNS and offer some new capabilities such as AD-IntegratedDNS, which greatly

    eases the administration required for DNS environments. In addition,Active

    Directory can easily adapt to exist in a foreign DNS environment, such as Unix

    BIND,as long as the BIND version is 8.2.x or higher

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 359. How do I clear the DNS cache on the DNS server? To
    • 359. How do I clear the DNS cache on the DNS server?

    To clear DNS Cache do the following:

    Start2. Run3. Type "cmd" and press enter4. In the command window type

    "ipconfig /flushdns

    • 360. How does IPSec work?

    IPSec is an Internet Engineering Task Force (IETF) standard suite of protocols that

    provides data authentication, integrity, and confidentiality as data is transferred

    between communication points across IP networks. IPSec provides data security

    at the IP packet level. A packet is a data bundle that is organized for transmission

    across a network, and it includes a header and payload (the data in the packet).

    IPSec emerged as a viable network securitystandard because enterprises wanted

    to ensure that data could be securely transmitted over theInternet. IPSec protects

    1000 INTERVIEW QUESTIONS 359. How do I clear the DNS cache on the DNS server? To

    against possible security exposures by protecting data while in transit

    • 361. How do I monitor IPSec?

    The IP Security Monitor snap-in, a new feature in WindowsServer 2003, can be

    used tomonitor and troubleshoot IPSec activity. The IP Security Monitor snap-in

    provides enhancedIPSec security monitoring. As long as the IPSec policy is active,

    you can monitor how theIPSec policy is functioning within your networking

    environment through the IP SecurityMonitor.

    • 362. Active Directory Structure

    Active Directory has a hierarchical structure that consists of various components

    whichmirror the network of the organization. The components included in the

    Active Directoryhierarchical structure are listed below:

    •Sites

    •Domains

    •Domain Trees

    •Forests

    •Organizational Units (OUs)

    •Objects

    •Domain Controllers

    •Global Catalog

    •Schema

    Student’s Sign

    Trainer’s Sign

    Ameerpet : 9866539988

    Dilsukhnagar: 9866547860

    1000 INTERVIEW QUESTIONS

    1000 INTERVIEW QUESTIONS 363. What are GPO links? What special things can I do to them?
    • 363. What are GPO links? What special things can I do to them?

    Answer.To apply the settings of a GPO to the users and computers of a domain,

    site, or OU, you need to add a link to that GPO. You can add one or more GPO

    links to each domain, site,or OU by using GPMC. Keep in mind that creating and

    linking GPOs is a sensitive privilege that should be delegated only to

    administrators who are trusted and understand Group Policy

    • 364. What are the requirements for installing AD on a new server?

    Answer: An NTFS partition with enough free space, An Administrator's username and

    password

    The correct operating system version A NIC Properly configured TCP/IP (IP address,

    subnet mask and - optional - defaultgateway) A network connection (to a hub or to

    another computer via a crossover cable)

    An operational DNS server (which can be installed on the DC itself) A Domain name

    that you want to use

    1000 INTERVIEW QUESTIONS 363. What are GPO links? What special things can I do to them?
    • 365. What are sites? What are they used for?

    Answer: An Activity Directory site is a region of a network that has high

    bandwidthconnectivity.