Professional Documents
Culture Documents
Ans :- Servers are computer that provides the services. As for Example
.1 DNS Server
.2 WINS Server
.3 DHCP Server
.4 RAS Server
.5 VPN Server
Ans :- RAS stands for Remote Access Server. It is basically use for
mobile user in the network. This Server provides the remote
access connectivity for mobile user. In this way all of the mobile
users are connected to server through telephone line. This Server
also provides the connectivity between two or more Offices in the
Network.
Ans :- VPN stands for Virtual Private Network. It is basically use for
mobile user in the network. This Server provides the remote
access connectivity for mobile user. In this way all of the mobile
users are connected to server through internet. This Server also
provides the connectivity between two or more Offices in the
Network. VPN is Cost Effective (No costly).
Ans :- IAS stands for Internet Authentication Services. IAS Server is also
known as RADIUS Server. IAS Server Provides the centralized
management of multiple RAS & VPN Servers in the Network. On
this Server Remote Access Policy and Remote Access Logging
Options are available.
Ques-:7. FAT/NTFS?
Ans :- There is major differences are available between FAT and NTFS
File System such as
FAT
Fat stands for File Allocation Table
There are two categories in Fat File System
o Fat 16
o Fat 32
In Fat Up To Folder Level Security is available
Compression Option is not available
Encryption Option is not available
Disk Quota Option is not Available
FAT Supported By All Of The Microsoft Based Operating System
NTFS
NTFS stands for New Technology File System
There are three categories in NTFS file System
o NTFS 4.0 NT O/S
o NTFS 5.0 2000 O/S
o NTFS 6.0 2003O/S
In NTFS Up-to File Level Security is available
Compression Option is available
Encryption Option is available
Disk Quota Option is Available
NTFS Supported By only Limited Microsoft Based Operating System
Ans :- There are many differences are available between Windows NT,
2000 and 2003 O/S, Such As--
NT
There is no active directory
There is no tree/forest hierarchical structure are available
There is no Site Relationship
There is no parent domain and child domain concepts are
available in the network.
NT support NTFS 4.0 File system
NT Support NTLM Version 2 Lan Authentication Protocol
In NT by default no Trust Relationship are configured
In NT we will use System Policy
In NT specific Client Site Operating System is available i.e. NT
Workstation 4.0 Edition
In NT we will use Exchange 5.5 Server
In NT We Can Create Only One Way Trust Relationship inside
The Network.
2000
There is Active Directory
Tree/Forest Hierarchal Structure are available
There is Site Relationship is available
There is parent domain and child domain concept are available
2000 support NTFS 5.0 File system
2000 Support Kerberos Version 5 Authentication Protocol
In 2000 by default Two-Way Trust Relationship are configured
In 2000 we will use Group Policy
2000 support maximum 32 Processor and 64 GB RAM
In 2000 specific Client Site Operating System is available i.e. 2000
Professional
In 2000 we will use Exchange 2000 Server
In 2000 no Stub Zone is available in DNS
In 2000 Resultant Setup Policy is not available
In 2000 GPMC is not available
In 2000 Conditional Forwarding option is not available
In 2000 Effective Permission option is not available
In 2000 Only some Administrative Command Line Tools are available
Active Directory Saved Query Option is not available
Shadow Copy Option is not available in Windows 2000 O/S
ASR Option is not available in Windows 2000 O/S
In Windows 2000 We Can Create Maximum 1 DFS Root On A Single
DFS Server in The Network.
In 2000 We Can Create Two Way Trust Relationship inside The
Network.
2003
There is Active Directory
Tree Forest Hierarchal Structure are available
There is Site Relationship is available
There is parent domain and child domain concept are available
2003 support NTFS 6.0 File system
2003 Support Kerberos Version 5 Authentication Protocol
In 2003 by default Two-Way Trust Relationship are configured
In 2003 we will use Group Policy
2003 support maximum 64 Processor and 512 GB RAM
In 2003 no specific Client Site Operating System is available you can
use either win 2k Professional either Win XP Professional in the
Network.
In 2003 we will use Exchange 2003 Server
In 2003 Stub Zone is available in DNS
In 2003 Resultant Setup Policy is available
In 2003 GPMC is available
In 2003 Conditional Forwarding option is available
In 2003 Effective Permission option is available
In 2003 more Administrative Command Line Tools are available
Active Directory Saved Query Option is available
Shadow Copy Option is available in Windows 2003 O/S
ASR Option is available in Windows 2003 O/S
In Windows 2003 We Can Create More Than 1 DFS Root On A Single
DFS Server in The Network.
In 2003 We Can Create Two Way Trust Relationship inside The
Network.
Ques-:9. What is Active Directory?
Ans :- A group of tree is called forest and does not sharing a contiguous
name space but sharing a common configuration (Schema).
Ans :- D.C. stands for Domain Controller and A.D.C. stands for
Additional Domain Controller. A.D.C. is a back up copy of D.C.
Only one different is available Between D.C. and A.D.C. i.e. -
Operation Master Role. On D.C all of the three Operation Master
Roles are available
1. RID Master
2. PDC Emulator
3. Infrastructure Operation Master Role
But on A.D.C no any operation master roles are available
Ans :- Group policy provides the stream line access to all of the users in
the network. Group policy is basically assigned on active directory
container i.e. Site, domain, OU. When ever we want some users
in the network do not use shut down the system, do not use run
command, do not use control panel, then we put that user in the
OU and assign the appropriate Group Policy on That OU.
Ans :- ISA stands for Internet Security Acceleration. ISA Server Provides
the Internet connectivity for all of the users in network ISA server
also works as a Proxy Server in the network. With the help of ISA
Server Administrator can Filtering a Client request For a Specific
Web site in the Network.
1. Mixed Mode In this mode NT, win 2k and win 2k3 D.C are
available.
2. Win 2k Native Modes In this mode Win 2k And win 2k3 D.C are
available.
3. Win 2k3 Native Mode In this mode only win 2k3 D.C are
available.
Ans :- SCSI stands for Small Computer System Interface. In SCSI the
rate of data transmission is fast. SCSI Hard Disk SpeedR.P.M is
fast In SCSI Data Transmission Speed Is 320 MBPS in the
Network. In SCSI Controller We Can connect Maximum 15
physical Devices in the System.
Ans :- A record is also called host record. This record is basically created
in forward lookup Zone.
Ans :- B Router stands for Bridge Router. We can say this is a layer three
bridge that provides the communication between two or more
different network ID.
SMTP stands for Simple Mail Transfer Protocol. It is basically use for
sending a mail as well as receiving a mail in the network.
1. Schema Partition
2. Configuration Partition
3. Domain Partition
Ans :- FIXMBR Repair the Master boot Record of the Partition Boot
Sector.
Ans :- SID stands for Security Identifier. Every Object has a unique ID, it
is called SID.
Ans :- In incremental Backup only incremental parts are backup not full
backup.
Ans :-
1. RIP v.1 Broadcast Small Network Use
2. RIP v.2 Multicast
3. IGMP Multicast
4. OSPF Multicast For Larger Network
Ans :- VPN require IP connectivity between the client and the server.
VPN does not require a dial up connection Between the Client and
server in The Network.
Ans :- In Remote Access Policy there are three options are available
Ans :- The sending and receiving of data through a secure way in the
network, it is called tunneling form.
Ans :- SACL stand for System Access Control List. In SACL basically
auditing entry is available of any user in the network.
Ans :- This file is basically using for repairing of any application in the
network.
Ans :- It is basically use for that application, which do not have the MSI
file. We create a text file with zap extension for deploying or
installation purpose of any application in the network.
Ans :-
1. NTLDR
2. NTDETECT.COM
3. BOOT.INI
4. NTBOOTDD.SYS
5. NTOSKRNL.EXE
1. Fault Tolerance
2. Load Balancing
Ans :- In this process the one lacks version no high of each object in
active directory database and this parts is overrides on other D.C
in the network. We will use This Method in Following Options
Such As--- Some Deletions, Some rename
Ans :- Schema basically reads The Attributes and defines The Classes.
Such As User class, Printer Class, Computer Class.
Ans :- RSOP stands for Resultant Set of Policy. It is basically use for,
when ever we Want, What ever the effective policy Is apply On a
particular User and particular computer in The Network
Ans :- In Group policy Modeling, We Can find out what Ever the
effective policy Is Apply On a particular User and particular
computer in The Network
Ans :- In Group policy resulting, we can find Out What ever the effective
policy Is Apply On a particular User and particular computer in
The Network
Ans :- SUS stands for software Update server. This server provides the
Automatic Updating from Microsoft Update Server to All of The
Clients and servers in the network
Ans :- GPMC stands For Group policy Management Console. With The
Help Of this Tools We Manage the Group policy Object Of entire
Forest from single Location in The Network. With The Help of
This Too we also take The Backup and restoring Of Group policy
object.
Ans :-
1. MSDOS.SYS
1. IO.SYS
2. COMMAND.COM
Ans :- System Policy are Used in NT environment But Group policy Are
Used in Windows 2000 And Windows 2003 Environment.
Ans :- There are many benefits for creating a Site inside the Network
Such as:
0. Manage Replication Traffic inside the Network
1. For Group policy Purpose
2. Administrative Burden will be Low
3. Network Traffic will be Low
4. Network Performance will be Good
5. Logon Traffic
6. Reduce The No. Of request For Global Catalog Server
1. LAN:-LAN stands for Local Area Network. In a fixed area all of the
computers are connected to each other, it is called LAN. In LAN we
do not use any third party Service Provider Network such as
Telephone Line, Internet and Satellite.
2. WAN:-WAN stands for Wide Area Network. Across the world all of
the computers are connected to each other, it is called WAN. In WAN
we use Third Party Service Provider Network such as Telephone Line,
Internet and Satellite.
4. Fiber Optic Cable:-In Fiber Optic Cable the data are sending in
digital form not in analog form. The rate of data transmission is fast
by using this cable.
Network ID:-The first part of the IP Address that defines the network is
called Network ID.
Host ID:-The second or last part of The IP Address that defines the Host
number is called Host ID.
1. Static Nat
2. Dynamic Nat
3. Overloading NatPAT(Port address Translation)
Packet Switching:-In Packet Switching all of the data are sending from
source computer to destination computer through may be a different way.
Circuit Switching:-In Circuit Switching all of the data are sending from
source computer to destination computer through a single way.
Disk Quota:-When we want some users in the network do not use more disk
space of the Hard Disk then we put a appropriate Disk Quota entry on those
users.
Port:-A Port is recognized by the service as for example FTP uses Port 21.
6. Data Link Layer:-Data Link Layer provides the Source Mac address
And destination Mac address in the Network. All of the Wan
Technology Is a Layer 2 technology. Switch and Bridge Is a Layer
2device in The Network.
TCP:-
1. TCP Stands for Transmission Control protocol
2. TCP is a Connection Oriented protocol
3. It Is a unicasting protocol
4. The Rate of Data transmission Is Slow in TCP
5. In TCP The Guarantee Of Data Delivery
6. In TCP Acknowledgement is must.
UDP:-
1. UDP Stands for User Datagram protocol.
2. It Is a Connection Less protocol
3. It Is a Broadcasting protocol
4. The Rate Of Data transmission is Fast
5. In UDP No Guarantee of Data Delivery
6. In UDP No Acknowledgement
DOD model:-
DOD Model Stands For department of defense model. This Model is also
known As TCP/IP Model. There are four Layers in DOD Model---
1. Application Layer3 layer of OSI Model
2. Transport layertransport layer of OSI Model
3. Internet layerNetwork layer Of OSI Model
4. Network Interface Layer Or physical LayerData link & Physical
Layer of OSI Model.
File System:-A logical division of the Hard Disk is called File System such
as sector or Tracks.
User Profile:-A user profile contents the information about a specific users
log on setting Such As Desktop Setting. There are three types of user profile.
USB:-USB stands for Universal Serial Bus. It is basically use for physically
connecting many devices At a Same Time that supports the USB such as
printer, mouse, scanner, web camera etc. It is compatible with near about
127 devices at the same time.
DLL:-DLL stands for Dynamic Link Library. It is the important files of any
application, which helps to run any application.
CAL:-CAL stands for Client Access License. Any client computer who
accesses the server in a network must require a license. There are two types
of license Per Server and Per Seat. We convert Per Server to Per Seat at one
time but we cannot convert from Per Seat to Per Server.
Adminpack.msi:-For Installing/Uninstalling of Administrative tools we use
Adminpack.msi.
Safe Mode:-In this mode load only basic devices and drivers that are require
to start the computer. not loading the following drivers such as VGA card,
soundcard, network card etc. Only load the Basic driver Such as keyboard,
mouse, and storage device.
VGA MODE:-Load the basic VGA driver. This mode is useful if a video
driver is preventing windows operating system from starting properly, basic
resolution 480 x 640 pixels setting are applies.
Zone:-Zone is the database in the DNS where all computers A Record (Host
Record) and PTR Record (Pointer Record) are Available in the network.
Virtual Memory:-Virtual Memory is some space in the Hard Disk that is
used whenever RAM is full in computer.
1. Normal Scope:-
2. Multicast Scope:-
3. Super Scope:-
1. Server Level:-
2. Scope Level:-
3. Class Level:-
1. Push Partner:-
2. Pull Partner:-
A. Log on Locally
B. Change the System Time
C. Shut Down the System
D. Access the Computer from Network
Power User:-A user that Are having the special authority to maintain the
user accounts such as add a user account, delete a user account, modify a
user account, change the password of a user etc. is called Power User.
Backup Operator:-A user that is having the power of Backup and Restore
the file of a computer it is called Backup Operator.
Wireless Communication:-In Wireless Communication we have not need
to attach a device to the computer by the help of wire. Wireless
Communication device works on the basis of receive and transmit the analog
or digital signals in The Network. There are two types of Wireless
Communication:
1. Infrared Transmission:-In Infrared Transmission an infrared light
beam is used to carry the data between transmit and receiving device.
There must be a clear line between transmit and receiving device for
communication. TV and Remote is the example of Infrared
Transmission.
Spool Folder:-Spool Folder shows the entire documents that are waiting for
print in print queue.
Printer Pooling:-By the Printer Pooling we can connect one Printer Driver
with two or more print device for load balancing Purpose In The Network..
In printer Polling We Can say
One Master and More than one servant are Available in the Network. In
printer pooling it is necessary that print device is same manufacturer and
same model no.
ERD:-ERD stands for Emergency Repair Disk. ERD having a backup copy
of system state data such as registry, system files, partition boot sector,
startup environment etc. It is most important tool to recover your system
registry.