You are on page 1of 41

1. Mention What Is Active Directory?

Answer :
An active directory is a directory structure used on Micro-soft Windows based servers
and computers to store data and information about networks and domains.
2. What Is Domains In Active Directory?
Answer :
In Windows 2000, a domain defines both an administrative boundary and a security
boundary for a collection of objects that are relevant to a specific group of users on a
network. A domain is an administrative boundary because administrative privileges
do not extend to other domains. It is a security boundary because each domain has a
security policy that extends to all security accounts within the domain. Active
Directory stores information about objects in one or more domains.
Domains can be organized into parent-child relationships to form a hierarchy. A
parent domain is the domain directly superior in the hierarchy to one or more
subordinate, or child, domains. A child domain also can be the parent of one or more
child domains.
3. Mention Which Is The Default Protocol Used In Directory Services?
Answer :
The default protocol used in directory services is LDAP ( Lightweight Directory
Access Protocol).
4. What Is Mixed Mode?
Answer :
Allows domain controllers running both Windows 2000 and earlier versions of
Windows NT to co-exist in the domain. In mixed mode, the domain features from
previous versions of Windows NT Server are still enabled, while some Windows 2000
features are disabled. Windows 2000 Server domains are installed in mixed mode by
default. In mixed mode the domain may have Windows NT 4.0 backup domain
controllers present. Nested groups are not supported in mixed mode.
5. Explain The Term Forest In Ad?
Answer :
Forest is used to define an assembly of AD domains that share a single schema for
the AD. All DC’s in the forest share this schema and is replicated in a hierarchical
fashion among them.
6. What Is Native Mode?
Answer :
When all the domain controllers in a given domain are running Windows 2000 Server.
This mode allows organizations to take advantage of new Active Directory features
such as Universal groups, nested group membership, and inter-domain group
membership.
7. Explain What Is Sysvol?
Answer :
The SysVOL folder keeps the server’s copy of the domain’s public files. The contents
such as users, group policy, etc. of the sysvol folders are replicated to all domain
controllers in the domain.
8. What Is Ldap?
Answer :
LDAP is the directory service protocol that is used to query and update AD. LDAP
naming paths are used to access AD objects and include the following:

o Distinguished names
o Relative Distinguished names
9. Mention What Is Kerberos?
Answer :
Kerberos is an authentication protocol for network. It is built to offer strong
authentication for server/client applications by using secret-key cryptography.
10. Minimum Requirement For Installing Ad?
Answer :

o Windows Server, Advanced Server, Datacenter Server


o Minimum Disk space of 200MB for AD and 50MB for log files
o NTFS partition
o TCP/IP Installed and Configured to use DNS
o Administrative privilege for creating a domain in existing network

11. Mention What Are Lingering Objects?


Answer :
Lingering objects can exists if a domain controller does not replicate for an interval of
time that is longer than the tombstone lifetime (TSL).
12. What Is Domain Controller?
Answer :
In an Active directory forest, the domain controller is a server that contains a writable
copy of the Active Directory Database participates in Active directory replication and
controls access to network resource.
13. Mention What Is Tombstone Lifetime?
Answer :
Tombstone lifetime in an Active Directory determines how long a deleted object is
retained in Active Directory. The deleted objects in Active Directory is stored in a
special object referred as TOMBSTONE. Usually, windows will use a 60- day
tombstone lifetime if time is not set in the forest configuration.
14. Why We Need Netlogon?
Answer :
Maintains a secure channel between this computer and the domain controller for
authenticating users and services. If this service is stopped, the computer may not
authenticate users and services, and the domain controller cannot register DNS
records."
15. Explain What Is Active Directory Schema?
Answer :
Schema is an active directory component describes all the attributes and objects that
the directory service uses to store data.
16. What Is Dns Scavenging?
Answer :
Scavenging will help you clean up old unused records in DNS.
17. Explain What Is A Child Dc?
Answer :
CDC or child DC is a sub domain controller under root domain controller which share
name space
18. What Is New In Windows Server 2008 Active Directory Domain
Services?
Answer :
AD Domain Services auditing, Fine-Grained Password Policies,Read-Only Domain
Controllers,Restartable Active Directory Domain Services
19. Explain What Is Rid Master?
Answer :
RID master stands for Relative Identifier for assigning unique IDs to the object
created in AD.

20. Explain What Are Rodcs? And What Are The Major Benefits Of
Using Rodcs?
Answer :
Read only Domain Controller, organizations can easily deploy a domain controller in
locations where physical security cannot be guaranteed.
21. Mention What Are The Components Of Ad?

Answer :

Components of AD includes
Logical Structure: Trees, Forest, Domains and OU.
Physical Structures: Domain controller and Sites.

22. What Is The Number Of Permitted Unsuccessful Log Ons On


Administrator Account?

Answer :

Unlimited. Remember, though, that it’s the Administrator account, not any account
that’s part of the Administrators group.

23. Explain What Is Infrastructure Master?

Answer :
Infrastructure Master is accountable for updating information about the user and
group and global catalogue.

24. What Hidden Shares Exist On Windows Server 2003


Installation?

Answer :

Admin$, Drive$, IPC$, NETLOGON, print$ and SYSVOL.

25. Can You Connect Active Directory To Other 3rd -party Directory
Services? Name A Few Options?

Answer :

Yes you can Connect Active Directory to other 3rd -party Directory Services such as
dictionaries used by SAP, Domino etc with the help of MIIS (Microsoft Identity
Integration Server).

26. What Is The List Folder Contents Permission On The Folder In


Ntfs?

Answer :

Same as Read & Execute, but not inherited by files within a folder. However, newly
created subfolders will inherit this permission.

27. How Do I Set Up Dns For Other Dcs In The Domain That Are
Running Dns?

Answer :

For each additional DC that is running DNS, the preferred DNS setting is the parent
DNS server (first DC in the domain), and the alternate DNS setting is the actual IP
address of network interface.

28. Where Is Gpt Stored?

Answer :

%SystemRoot%SYSVOLsysvoldomainnamePoliciesGUID

29. Tell Me What Should I Do If The Dc Points To Itself For Dns,


But The Srv Records Still Do Not Appear In The Zone?

Answer :

Check for a disjointed namespace, and then run Netdiag.exe /fix. You must install
Support Tools from the Windows 2000 Server CD-ROM to run Netdiag.exe.
30. Abbreviate Gpt And Gpc?

Answer :

GPT : Group policy template.


GPC : Group policy container.

31. Tell Me What If My Windows 2000 Or Windows Server 2003 Dns


Server Is Behind A Proxy Server Or Firewall?

Answer :

If you are able to query the ISP's DNS servers from behind the proxy server or
firewall, Windows 2000 and Windows Server 2003 DNS server is able to query the
root hint servers. UDP and TCP Port 53 should be open on the proxy server or
firewall.

32. Explain What Is The Difference Between Local, Global And


Universal Groups?

Answer :

Domain local groups assign access permissions to global domain groups for local
domain resources. Global groups provide access to resources in other trusted
domains. Universal groups grant access to resources in all trusted domains.

33. Do You Know What Is The "." Zone In My Forward Lookup


Zone?

Answer :

This setting designates the Windows 2000 DNS server to be a root hint server and is
usually deleted. If you do not delete this setting, you may not be able to perform
external name resolution to the root hint servers on the Internet.

34. Define Lsdou?

Answer :

It’s group policy inheritance model, where the policies are applied to Local machines,
Sites, Domains and Organizational Units

35. Define Attribute Value?

Answer :

An object's attribute is set concurrently to one value at one master, and another value
at a second master.
36. What Is Netdom?

Answer :

NETDOM is a command-line tool that allows management of Windows domains and


trust relationships

37. Do You Know How Kerberos V5 Works?

Answer :

The Kerberos V5 authentication mechanism issues tickets (A set of identification data


for a security principle, issued by a DC for purposes of user authentication. Two
forms of tickets in Windows 2000 are ticket-granting tickets (TGTs) and service
tickets) for accessing network services. These tickets contain encrypted data,
including an encrypted password, which confirms the user's identity to the requested
service.

38. What Is Adsiedit?

Answer :

ADSI Edit is an LDAP editor for managing objects in Active Directory. This Active
Directory tool lets you view objects and attributes that are not exposed in the Active
Directory Management Console.

39. What Is Kerberos V5 Authentication Process?

Answer :

Kerberos V5 is the primary security protocol for authentication within a domain. The
Kerberos V5 protocol verifies both the identity of the user and network services. This
dual verification is known as mutual authentication.

40. Define The Schema Master Failure?

Answer :

Temporary loss of the schema operations master will be visible only if we are trying to
modify the schema or install an application that modifies the schema during
installation. A DC whose schema master role has been seized must never be brought
back online.

41. What Is Replmon?

Answer :

Replmon is the first tool you should use when troubleshooting Active Directory
replication issues
42. How To Find Fsmo Roles?

Answer :

Netdom query fsmo OR Replmon.exe

43. Describe The Infrastructure Fsmo Role?

Answer :

When an object in one domain is referenced by another object in another domain, it


represents the reference by the GUID, the SID (for references to security principals),
and the DN of the object being referenced. The infrastructure FSMO role holder is the
DC responsible for updating an object's SID and distinguished name in a cross-
domain object reference.

44. What Are The Advantages Of Active Directory Sites?

Answer :

Active Directory Sites and Services allow you to specify site information. Active
Directory uses this information to determine how best to use available network
resources.

45. Define Edb.chk?

Answer :

This is the checkpoint file used to track the data not yet written to database file. This
indicates the starting point from which data is to be recovered from the log file, in
case of failure.

46. Define Edb.log?

Answer :

This is the transaction log file (10 MB). When EDB.LOG is full, it is renamed to
EDBnnnn.log. Where nnnn is the increasing number starting from 1.

47. How To View All The Gcs In The Forest?

Answer :

repadmin.exe /options * and use IS_GC for current domain options.


nltest /dsgetdc:corp /GC

48. How To Seize Fsmo Roles?

Answer :
ntdsutil - type roles - connections - connect servername - q - type seize role - at the
fsmo maintenance prompt - type seize rid master

49. How To Transfer Fsmo Roles?

Answer :

ntdsutil - type roles - connections - connect servername - q - type transfer role - at the
fsmo maintenance prompt - type trasfer rid master

50. What Is The Kcc (knowledge Consistency Checker)?

Answer :

The KCC generates and maintains the replication topology for replication within sites
and between sites. KCC runs every 15 minutes.

51. What Is Schema Information In Active Directory?

Answer :

Definitional details about objects and attributes that one CAN store in the AD.
Replicates to all DCs. Static in nature.

52. What Is Online Defragmentation In Active Directory?

Answer :

Online Defragmentation method that runs as part of the garbage collection process.
The only advantage to this method is that the server does not need to be taken offline
for it to run. However, this method does not shrink the Active Directory database file
(Ntds.dit).

53. What Is Ads Database Garbage Collection Process?

Answer :

Garbage Collection is a process that is designed to free space within the Active
Directory database. This process runs independently on every DC with a default
lifetime interval of 12 hours.

54. Define Res1.log And Res2.log?

Answer :

This is reserved transaction log files of 20 MB (10 MB each) which provides the
transaction log files enough room to shutdown if the other spaces are being used.

55. What Is Domain Information In Active Directory?


Answer :

Object information for a domain. Replicates to all DCs within a domain. The object
portion becomes part of GC. The attribute values only replicates within the domain.

56. What Is Lightweight Directory Access Protocol?

Answer :

LDAP is the directory service protocol that is used to query and update AD. LDAP
naming paths are used to access AD objects and include the following:

o Distinguished names
o Relative Distinguished names
57. How Will You Verify Whether The Ad Installation Is Proper With
Srv Resource Records?

Answer :

Verify SRV Resource Records: After AD is installed, the DC will register SRV records
in DNS when it restarts. We can check this using DNS MMC or nslookup command.

58. What Is Ntds.dit?

Answer :

This is the AD database and stores all AD objects. Default location is


SystemRoot%ntdsNTDS.DIT.
Active Directory's database engine is the Extensible Storage Engine which is based
on the Jet database and can grow up to 16 TB.

59. What Is Ntds.dit Schema Table?

Answer :

The types of objects that can be created in the Active Directory, relationships
between them, and the attributes on each type of object. This table is fairly static and
much smaller than the data table.

60. Mention What Is The Difference Between Domain Admin


Groups And Enterprise Admins Group In Ad?

Answer :

Enterprise Admin Group :


Members of this group have complete control of all domains in the forest By default,
this group belongs to the administrators group on all domain controllers in the forest
As such this group has full control of the forest, add users with caution
Domain Admin Group :
Members of this group have complete control of the domain By default, this group is a
member of the administrators group on all domain controllers, workstations and
member servers at the time they are linked to the domain As such the group has full
control in the domain, add users with caution
1. Why Should We Use Group Policy?
Answer :

o For deploying software


o We can apply security
o For controlling Users environment, settings, per computer settings
o To manage desktop environment (To standardize environment)
o To modify the registry
2. What Is Group Policy Object?
Answer :
We call the actual unit that we are creating, deleting, managing, working with is called
Group Policy object.
Group Policy objects have two components:

o Group Policy container


o Group Policy template
3. What Is Group Policy Container?
Answer :
It is the container in the Active Directory where the Group Policy can be applied. (i.e.,
either Organizational unit or Domain or Site)
4. What Is Group Policy Template?
Answer :
When you create a group policy container automatically a template will be created in
the hard drive, in sysvol folder of the Domain Controller that is called Group Policy
template.
5. Where Is Group Policy Template Stored?
Answer :
Group Policy template stored in sysvol folder.
6. How To Create A Group Policy?
Answer :
Start –>Programs –>Administrative tools ->Active Directory Users and computers -
>Right click on the container on which you want to apply Group Policy->Select
properties-> Click on Group Policy tab->Click on New
7. What Are The Steps Do We Have When We Are Creating Group
Policy?
Answer :
There are two steps, one is creating Group policy and linking to the container.
Generally we create the group policy at container only so when you click on New it
creates and links the GPO to that container at a time. Suppose if you want to link a
group policy object to a container which is already created click on Add select the
group policy.
8. What Are The Buttons Available On Group Policy Tab In Properties
Of A Container?
Answer :
o New (Creates new GPO)
o Add (links a GPO to this container which has created already)
o Edit (Edits the existing GPO)
o Delete Deletes the GPO
o Options (here you get the following check boxes): (i) No override – Prevent other
GPO from overriding policy set in this one; and(ii) Disabled – This GPO is not
applicable to this container
o Properties

Note: When you are deleting a GPO it asks two things:

o Remove the link from this list


o Remove the link and delete the GPO permanently
9. What Is No Override Option In Gpo?
Answer :
Generally the policies set at one level will be overridden in other level, so if don’t want
to override this policy under the sub levels of this one you can set this.
Ex: If you set No override at Domain level then that GPO will be applied through out
the Domain, even though you have the same policy differently at OU level.
10. What Is Block Inheritance Of Gpo And Where It Is?
Answer :
The Block inheritance GPO option blocks the group policies inheriting from the top
level, and takes effect of this present GPO.
Right click on the container –> click on Group Policy –ègo to properties >on the
bottom of the General tab you will find Block inheritance check box
Ex: If you select Block inheritance at OU level then no policy from the Domain level,
or Site level or local policy will not applied to this OU.

11. You Have Set The No Override Option At Domain Level And
Block Inheritance At Ou Level. Which Policy Will Take Effect?
Answer :
If you have set both then No override wins over the Block inheritance. So No override
will take effect.
12. What Are The Options That Are Available When You Click On
Option Button On General Tab?
Answer :

o General
o Disable computer configuration settings (The settings those are set under computer
configuration of this GPO will not take effect.)
o Disable user configuration settings (The settings those are set under User
configuration of this GPO will not take effect.)
o Links (Displays the containers which have links to this GPO)
o Security (With security option you can set level of permissions and settings to the
individual users and groups. Ex: If you want to disable this GPO to a particular user
on this container, on security tab select that user and select the deny check box for
apply the Group Policy. Then the GPO will not take effect to that user even though he
is in that container.)
13. What Will You See In The Group Policy Snap In?
Answer :
You will see two major portions, and under those you have sub portions,
they are:

o Computer Configuration
o Software settings
o Software installations
o Windows settings
o Administrative templates
o User configuration
o Software settings
o Software installations
o Windows settings
o Administrative templates

Note: Administrative templates are for modifying the registry of windows 2000 clients.
14. What Is The Hierarchy Of Group Policy?
Answer :

o Local policy
o Site Policy
o Domain Policy
o OU Policy
o Sub OU Policy (If any are there)
15. Who Can Create Site Level Group Policy?
Answer :
Enterprise Admin
16. Who Can Create Domain Level Group Policy?
Answer :
Domain Admin
17. Who Can Create Organizational Unit Lever Group Policy?
Answer :
Domain Admin
18. Who Can Create Local Group Policy?
Answer :
Local Administrator or Domain Administrator
19. What Is The Refresh Interval For Group Policy?
Answer :
Refresh interval for Domain Controllers is 5 minutes, and the refresh interval for all
other computers in the network is 45 minutes (this one doubt).
20. Why Do We Need To Manage And Control Desktop
Environment?
Answer :

o To decrease support time


o Eliminate potential for problems
o One standard environment to support
o Eliminate distractions
o To increase productivity
21. What Is Group Policy Loop Back Process? How To Set It?

Answer :

Start –>programs –>Administrative tools –>Active Directory users and computers –


>Right click on the container –>click on Group policy tab –>Click on edit –>click on
Computer settings –>click on Administrative templates –>system –>Group policy –
>click on User group policy loop back processing mode –> click OK –> Select enable

22. What Are The Players That Are Involved In Deploying


Software?

Answer :

o Group Policy: Within GP we specify that this software application gets installed to
this particular computer or to this particular user.
o Active Directory: Group Policy will be applied somewhere in Active Directory.
o Microsoft Installer service
o Windows installer packages: The type of package that can be used by Group
Policy to deploy applications is .msi packages i.e., Microsoft Installer packages.
23. What Is The Package That Can Be Used To Deploy Software
Through Group Policy?

Answer :

Windows installer packages (.msi files)

24. What Is Microsoft Installer Service?

Answer :

Microsoft Installer Service runs on the client machines in the Windows 2000 domain.
It installs the minimum amount of an application, as you extend functionality it installs
the remaining part of application. It is responsible for installing software in the client. It
is also responsible for modifying, upgrading, applying service packs.

25. What Is Local Security Policy, Domain Security Policy, And


Domain Controller Security Policy In The Admi nistrative Tools?

Answer :
o Local Security policy: This is group policy applied to local machine
o Domain Security Policy: Group Policy applied at domain level
o Domain Controller Security Policy: Group Policy applied at domain controller
level.
26. What Are The Design Considerations For Group Policy?

Answer :

The following should be considered for designing group policies:

o Minimize linking: Because there may be a chance deleting the original one with
seeing who else are using this GPO. Minimizing linking for simplicity.
o Minimum number of GPO’s: Microsoft suggests that one GPO with 100 settings
will process faster than 100 GPO’s each with one setting. This is for performance.
o Delegate
o Minimize filtering: To keep simple your environment, try to minimize filtering.

If you have more number of GPO’s for a container, whatever GPO is on top will be
applied first. If you want, you can move GPO’s up and down.

If there is conflict between two GPO’s of same container, the last applied GPO will be
effective. i.e., the bottom one will be effective.

27. What Is Group Policy In Active Directory ? What Are Group


Policy Objects (gpos)?

Answer :

Group Policy objects, other than the local Group Policy object, are virtual objects. The
policy setting information of a GPO is actually stored in two locations: the Group
Policy container and the Group Policy template.

The Group Policy container is an Active Directory container that stores GPO
properties, including information on version, GPO status, and a list of components
that have settings in the GPO.

The Group Policy template is a folder structure within the file system that stores
Administrative Template-based policies, security settings, script files, and information
regarding applications that are available for Group Policy Software Installation.

The Group Policy template is located in the system volume folder (Sysvol) in the
Policies subfolder for its domain.

28. What Is The Order In Which Gpos Are Applied ?

Answer :

Group Policy settings are processed in the following order:


o Local Group Policy object : •Each computer has exactly one Group Policy object
that is stored locally. This processes for both computer and user Group Policy
processing.
o Site : •Any GPOs that have been linked to the site that the computer belongs to are
processed next. Processing is in the order that is specified by the administrator, on
the Linked Group Policy Objects tab for the site in Group Policy Management
Console (GPMC). The GPO with the lowest link order is processed last, and therefore
has the highest precedence.
o Domain: •Processing of multiple domain-linked GPOs is in the order specified by
the administrator, on the Linked Group Policy Objects tab for the domain in GPMC.
The GPO with the lowest link order is processed last, and therefore has the highest
precedence.
o Organizational units : •GPOs that are linked to the organizational unit that is
highest in the Active Directory hierarchy are processed first, then POs that are linked
to its child organizational unit, and so on. Finally, the GPOs that are linked to the
organizational unit that contains the user or computer are processed.

At the level of each organizational unit in the Active Directory hierarchy, one, many,
or no GPOs can be linked. If several GPOs are linked to an organizational unit, their
processing is in the order that is specified by the administrator, on the Linked Group
Policy Objects tab for the organizational unit in GPMC.

The GPO with the lowest link order is processed last, and therefore has the highest
precedence.

This order means that the local GPO is processed first, and GPOs that are linked to
the organizational unit of which the computer or user is a direct member are
processed last, which overwrites settings in the earlier GPOs if there are conflicts. (If
there are no conflicts, then the earlier and later settings are merely aggregated.)

29. How To Backup/restore Group Policy Objects ?

Answer :

o Begin the process by logging on to a Windows Server 2008 domain controller, and
opening the Group Policy Management console. Now, navigate through the console
tree to Group Policy Management | Forest: | Domains | | Group Policy Objects.
o When you do, the details pane should display all of the group policy objects that are
associated with the domain. In Figure A there are only two group policy objects, but in
a production environment you may have many more. The Group Policy Objects
container stores all of the group policy objects for the domain.
o Now, right-click on the Group Policy Objects container, and choose the Back Up All
command from the shortcut menu. When you do, Windows will open the Back Up
Group Policy Object dialog box.
o As you can see in Figure B, this dialog box requires you to provide the path to which
you want to store the backup files. You can either store the backups in a dedicated
folder on a local drive, or you can place them in a folder on a mapped network drive.
The dialog box also contains a Description field that you can use to provide a
description of the backup that you are creating.
o You must provide the path to which you want to store your backup of the group policy
objects.
o To initiate the backup process, just click the Back Up button. When the backup
process completes, you should see a dialog box that tells you how many group policy
objects were successfully backed up. Click OK to close the dialog box, and you’re all
done.
o When it comes to restoring a backup of any Group Policy Object, you have two
options. The first option is to right-click on the Group Policy Object, and choose the
Restore From Backup command from the shortcut menu. When you do this, Windows
will remove all of the individual settings from the Group Policy Object, and then
implement the settings found in the backup.
o Your other option is to right-click on the Group Policy Object you want to restore, and
choose the Import Settings option. This option works more like a merge than a
restore.
o Any settings that presently reside within the Group Policy Object are retained unless
there is a contradictory settings within the file that is being imported.
30. You Want To Standardize The Desktop Environments
(wallpaper, My Documents, Start Menu, Printers Etc.) On The
Computers In One Department. How Would You Do That?

Answer :

o Go to Start->programs->Administrative tools->Active Directory Users and Computers


o Right Click on Domain->click on preoperties
o On New windows Click on Group Policy
o Select Default Policy->click on Edit
o on group Policy console
o go to User Configuration->Administrative Template->Start menu and Taskbar.
o Select each property you want to modify and do the same.
31. What Is The Difference Between Software Publishing And
Assigning?

Answer :

Assign Users :The software application is advertised when the user logs on. It is
installed when the user clicks on the software application icon via the start menu, or
accesses a file that has been associated with the software application.

Assign Computers :The software application is advertised and installed when it is


safe to do so, such as when the computer is next restarted.

Publish to users : The software application does not appear on the start menu or
desktop. This means the user may not know that the software is available. The
software application is made available via the Add/Remove Programs option in
control panel, or by clicking on a file that has been associated with the application.
Published applications do not reinstall themselves in the event of accidental deletion,
and it is not possible to publish to computers.

32. What Are Administrative Templates?

Answer :
Administrative Templates are a feature of Group Policy, a Microsoft technology for
centralised management of machines and users in an Active Directory environment.
Administrative Templates facilitate the management of registry-based policy. An ADM
file is used to describe both the user interface presented to the Group Policy
administrator and the registry keys that should be updated on the target machines.

An ADM file is a text file with a specific syntax which describes both the interface and
the registry values which will be changed if the policy is enabled or disabled.

ADM files are consumed by the Group Policy Object Editor (GPEdit). Windows XP
Service Pack 2 shipped with five ADM files (system.adm, inetres.adm,
wmplayer.adm, conf.adm and wuau.adm). These are merged into a unified
“namespace” in GPEdit and presented to the administrator under the Administrative
Templates node (for both machine and user policy).

33. Can I Deploy Non-msi Software With Gpo?

Answer :

create the file in.zap extension.

34. Name Some Gpo Settings In The Computer And User Parts ?

Answer :

Group Policy Object (GPO) computer=Computer Configuration, User=User


ConfigurationName some GPO settings in the computer and user parts.

35. A User Claims He Did Not Receive A Gpo, Yet His User And
Computer Accounts Are In The Right Ou, And Everyone Else There
Gets The Gpo. What Will You Look For?

Answer :

make sure user not be member of loopback policy as in loopback policy it doesn’t
effect user settings only computer policy will applicable. if he is member of gpo filter
grp or not.

You may also want to check the computers event logs. If you find event ID 1085 then
you may want to download the patch to fix this and reboot the computer.

36. How Frequently Is The Client Policy Refreshed ?

Answer :

90 minutes give or take.

37. Where Is Secedit ?

Answer :
It’s now gpupdate.

38. What Can Be Restricted On Windows Server 2003 That Wasn’t


There In Previous Products ?

Answer :

Group Policy in Windows Server 2003 determines a users right to modify network and
dial-up TCP/IP properties. Users may be selectively restricted from modifying their IP
address and other network configuration parameters.

39. You Want To Create A New Group Policy But Do Not Wish To
Inherit.

Answer :

Make sure you check Block inheritance among the options when creating the policy.

40. How Does The Group Policy ‘no Override’ And ‘block
Inheritance’ Work ?

Answer :

Group Policies can be applied at multiple levels (Sites, domains, organizational Units)
and multiple GP’s for each level. Obviously it may be that some policy settings
conflict hence the application order of Site – Domain – Organization Unit and within
each layer you set order for all defined policies but you may want to force some
polices to never be overridden (No Override) and you may want some containers to
not inherit settings from a parent container (Block Inheritance).

A good definition of each is as follows:

No Override – This prevents child containers from overriding policies set at higher
levels

Block Inheritance – Stops containers inheriting policies from parent containers

No Override takes precedence over Block Inheritance so if a child container has


Block Inheritance set but on the parent a group policy has No Override set then it will
get applied.

Also the highest No Override takes precedence over lower No Override’s set.

To block inheritance perform the following:

o Start the Active Directory Users and Computer snap-in (Start – Programs –
Administrative Tools – Active Directory Users and Computers)
o Right click on the container you wish to stop inheriting settings from its parent and
select
o Select the ‘Group Policy’ tab
o Check the ‘Block Policy inheritance’ option
o Click Apply then OK

To set a policy to never be overridden perform the following:

o Start the Active Directory Users and Computer snap-in (Start – – Administrative Tools
– Active Directory Users and Computers)
o Right click on the container you wish to set a Group Policy to not be overridden and
select Properties
o Select the ‘Group Policy’ tab
o Click Options
o Check the ‘No Override’ option
o Click OK
o Click Apply then OK
1. What Is Dhcp?
Answer :
Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a
server to automatically assign an IP address to a computer from a defined range of
numbers (i.e., a scope) configured for a given network.
2. What Is The Dhcp Process For Client Machine?
Answer :

o A user turns on a computer with a DHCP client.


o The client computer sends a broadcast request (called a DISCOVER or
DHCPDISCOVER), looking for a DHCP server to answer.
o The router directs the DISCOVER packet to the correct DHCP server.
o The server receives the DISCOVER packet. Based on availability and usage policies
set on the server, the server determines an appropriate address (if any) to give to the
client. The server then temporarily reserves that address for the client and sends
back to the client an OFFER (or DHCPOFFER) packet, with that address information.
The server also configures the client’s DNS servers, WINS servers, NTP servers, and
sometimes other services as well.
o The client sends a REQUEST (or DHCPREQUEST) packet, letting the server know
that it intends to use the address.
o The server sends an ACK (or DHCPACK) packet, confirming that the client has a
been given a lease on the address for a server-specified period of time.
3. What Is Dhcp Scope?
Answer :
DHCP scopes are used to define ranges of addresses from which a DHCP server can
assign IP addresses to clients.
4. Types Of Scopes In Windows Dhcp?
Answer :
Normal Scope – Allows A, B and C Class IP address ranges to be specified
including subnet masks, exclusions and reservations. Each normal scope defined
must exist within its own subnet.
Multicast Scope – Used to assign IP address ranges for Class D networks.
Multicast scopes do not have subnet masks, reservation or other TCP/IP options.
Multicast scope address ranges require that a Time To Live (TTL) value be specified
(essentially the number of routers a packet can pass through on the way to its
destination).
Superscope – Essentially a collection of scopes grouped together such that they
can be enabled and disabled as a single entity.
5. What Is Authorizing Dhcp Servers In Active Directory?
Answer :

o If a DHCP server is to operate within an Active Directory domain (and is not running
on a domain controller) it must first be authorized.
o This can be achieved either as part of the DHCP Server role installation, or
subsequently using either DHCP console or at the command prompt using the netsh
tool.
o If the DHCP server was not authorized during installation, invoke the DHCP console
(Start -> All Programs -> Administrative Tools -> DHCP),
o right click on the DHCP to be authorized and select Authorize.
o To achieve the same result from the command prompt, enter the following command:
netsh dhcp server serverID initiate auth

In the above command syntax, serverID is replaced by the IP address or full UNC
name of system on which the DHCP server is installed.
6. What Ports Are Used By Dhcp And The Dhcp Clients?
Answer :
Requests are on UDP port 68, Server replies on UDP 67 .
7. List Some Benefits Of Using Dhcp?
Answer :
DHCP provides the following benefits for administering your TCP/IP-based network:

Safe and reliable configuration.DHCP avoids configuration errors caused by the need
to manually type in values at each computer. Also, DHCP helps prevent address
conflicts caused by a previously assigned IP address being reused to configure a new
computer on the network.
Reduces configuration management.

Using DHCP servers can greatly decrease time spent to configuring and
reconfiguring computers on your network. Servers can be configured to supply a full
range of additional configuration values when assigning address leases.

These values are assigned using DHCP options. Also, the DHCP lease renewal
process helps assure that where client configurations need to be updated often (such
as users with mobile or portable computers who change locations frequently), these
changes can be made efficiently and automatically by clients communicating directly
with DHCP servers.

The following section covers issues that affect the use of the DHCP Server service
with other services or network configurations. Using DNS servers with DHCP Using
Routing and Remote Access servers with DHCP Multihomed DHCP servers.
8. Describe The Process Of Installing A Dhcp Server In An Ad
Infrastructure?
Answer :
Open Windows Components Wizard. Under Components , scroll to and click
Networking Services. Click Details . Under Subcomponents of Networking Services ,
click Dynamic Host Configuration Protocol (DHCP) and then click OK.
Click Next . If prompted, type the full path to the Windows Server 2003 distribution
files, and then click Next. Required files are copied to your hard disk.
9. How To Authorize A Dhcp Server In Active Directory Open Dhcp?
Answer :
In the console tree, click DHCP

o On the Action menu, click Manage authorized servers.


o The Manage Authorized Servers dialog box appears. Click Authorize.
o When prompted, type the name or IP address of the DHCP server to be authorized,
and then click OK.
10. What Is Dhcpinform?
Answer :
DHCPInform is a DHCP message used by DHCP clients to obtain DHCP options.
While PPP remote access clients do not use DHCP to obtain IP addresses for the
remote access connection, Windows 2000 and Windows 98 remote access clients
use the DHCPInform message to obtain DNS server IP addresses, WINS server IP
addresses, and a DNS domain name.

The DHCPInform message is sent after the IPCP negotiation is concluded. The
DHCPInform message received by the remote access server is then forwarded to a
DHCP server. The remote access server forwards DHCPInform messages only if it
has been configured with the DHCP Relay Agent.

11. Describe The Integration Between Dhcp And Dns?


Answer :
Traditionally, DNS and DHCP servers have been configured and managed one at a
time. Similarly, changing authorization rights for a particular user on a group of
devices has meant visiting each one and making configuration changes.

DHCP integration with DNS allows the aggregation of these tasks across devices,
enabling a company’s network services to scale in step with the growth of network
users, devices, and policies, while reducing administrative operations and costs. This
integration provides practical operational efficiencies that lower total cost of
ownership.

Creating a DHCP network automatically creates an associated DNS zone, for


example, reducing the number of tasks required of network administrators. And
integration of DNS and DHCP in the same database instance provides unmatched
consistency between service and management views of IP address-centric network
services data.
12. What Protocol And Port Does Dhcp Use?
Answer :
DHCP, like BOOTP runs over UDP, utilizing ports 67 and 68.
13. Can A Dhcp Server Back Up Another Dhcp Server?
Answer :
You can have two or more servers handing out leases for different addresses. If each
has a dynamic pool accessible to the same clients, then even if one server is down,
one of those clients can lease an address from the other server. However, without
communication between the two servers to share their information on current leases,
when one server is down, any client with a lease from it will not be able to renew their
lease with the other server.
Such communication is the purpose of the “server to server protocol”. It is possible
that some server vendors have addressed this issue with their own proprietary
server-to-server communication.
14. What Is A Mac Address?
Answer :
A MAC address (also called an Ethernet address or an IEEE MAC address) is a
number (typically written as twelve hexadecimal digits, 0 through 9 and A through F,
or as six hexadecimal numbers separated by periods or colons, i.e. 0080002012ef,
0:80:0:2:20:ef) which uniquely identifes a computer that has an Ethernet interface.

Unlike the IP number, it includes no indication of where your computer is located. In


DHCP’s typical use, the server uses a requesting computer’s MAC address to
uniquely identify it.
15. Can Dhcp Support Statically Defined Addresses?
Answer :
Yes. At least there is nothing in the protocol to preclude this and one expects it to be
a feature of any DHCP server. This is really a server matter and the client should
work either way. The RFC refers to this as manual allocation.
16. Is A Dhcp Server “supposed To” Be Able To Support A Bootp
Client?
Answer :
The RFC on such interoperability (1534) is clear: “In summary, a DHCP server:
MAY support BOOTP clients,” (section 2). The word “MAY” indicates such support,
however useful, is left as an option. A source of confusion on this point is the
following statement in section 1.5 of RFC 1541: “DHCP must provide service to
existing BOOTP clients.”

However, this statement is one in a list of “general design goals for DHCP”, i.e. what
the designers of the DHCP protocol set as their own goals. It is not in a list of
requirements for DHCP servers.
17. How Can I Relay Dhcp If My Router Does Not Support It?
Answer :
A server on a net(subnet) can relay DHCP or BOOTP for that net. Microsoft has
software to make Windows NT do this.
18. What Is A Client Id?
Answer :
What is termed the Client ID for the purposes of the DHCP protocol is whatever is
used by the protocol to identify the client computer. By default, DHCP
implementations typically employ the client’s MAC address for this purpose, but the
DHCP protocol allows other options. Some DHCP implementations have a setup
option to specify the client ID you want. One alternative to the MAC address is simply
a character string of your choice.

In any case, in order for DHCP to function, you must be certain that no other client is
using the client ID you choose, and you must be sure the DHCP server will accept it.
19. Is A Dhcp Client “supposed To” Be Able To Use A Bootp
Server?
Answer :
The RFC on such interoperability (1534) is clear: “A DHCP client MAY use a reply
from a BOOTP server if the configuration returned from the BOOTP server is
acceptable to the DHCP client.”. The word “MAY” indicates such support, however
useful, is left as an option.

20. How Long Should A Lease Be?


Answer :
A very relevant factor is that the client starts trying to renew the lease when it is
halfway through: thus, for example, with a 4 day lease, the client which has lost
access to its DHCP server has 2 days from when it first tries to renew the lease until
the lease expires and the client must stop using the network.

During a 2- day outage, new users cannot get new leases, but no lease will expire for
any computer turned on at the time that the outage commences. Another factor is that
the longer the lease the longer time it takes for client configuration changes controlled
by DHCP to propogate.
21. What Is Dhcp Spoofing?

Answer :

Ascend Pipeline ISDN routers (which attach Ethernets to ISDN lines) incorporate a
feature that Ascend calls “DHCP spoofing” which is essentially a tiny server
implementation that hands an IP address to a connecting Windows 95 computer, with
the intention of giving it an IP number during its connection process.

22. What Is A Dhcp Lease?

Answer :

A DHCP lease is the amount of time that the DHCP server grants to the DHCP client
permission to use a particular IP address. A typical server allows its administrator to
set the lease time.

23. Can Dhcp Work With Apple Talk Or Ipx?

Answer :

No, it is too tied to IP. Furthermore, they don’t need it since they have always had
automated mechanisms for assigning their own network addresses.

24. Can A Bootp Client Boot From A Dhcp Server?

Answer :
Only if the DHCP server is specifically written to also handle BOOTP queries.

25. How Can I Prevent Unauthorized Laptops From Using A


Network That Uses Dhcp For Dynamic Addressing?

Answer :

This would have to be done using a mechanism other than DHCP. DHCP does not
prevent other clients from using the addresses it is set to hand out nor can it
distinguish between a computer’s permanent MAC address and one set by the
computer’s user. DHCP can impose no restrictions on what IP address can use a
particular port nor control the IP address used by any client.

26. Can Dhcp Support Remote Access?

Answer :

PPP has its own non-DHCP way in which communications servers can hand clients
an IP address called IPCP (IP Control Protocol) but doesn’t have the same flexibility
as DHCP or BOOTP in handing out other parameters. Such a communications server
may support the use of DHCP to acquire the IP addresses it gives out.

This is sometimes called doing DHCP by proxy for the client. I know that Windows
NT’s remote access support does this. A feature of DHCP under development
(DHCPinform) is a method by which a DHCP server can supply parameters to a client
that already has an IP number. With this, a PPP client could get its IP number using
IPCP, then get the rest of its parameters using this feature of DHCP. SLIP has no
standard way in which a server can hand a client an IP address, but many
communications servers support non-standard ways of doing this that can be utilized
by scripts, etc.

Thus, like communications servers supporting PPP, such communications servers


could also support the use of DHCP to acquire the IP addressees to give out. The
DHCP protocol is capable of allocating an IP address to a device without an IEEE-
style MAC address, such as a computer attached through SLIP or PPP, but to do so,
it makes use of a feature which may or may not be supported by the DHCP server:
the ability of the server to use something other than the MAC address to identify the
client. Communications servers that acquire IP numbers for their clients via DHCP
run into the same roadblock in that they have just one MAC address, but need to
acquire more than one IP address.

One way such a communications server can get around this problem is through the
use of a set of unique pseudo-MAC addresses for the purposes of its
communications with the DHCP server. Another way (used by Shiva) is to use a
different “client ID type” for your hardware address. Client ID type 1 means you’re
using MAC addresses. However, client ID type 0 means an ASCII string.

27. What Is Dhcp’s Purpose?

Answer :
DHCP’s purpose is to enable individual computers on an IP network to extract their
configurations from a server (the ‘DHCP server’) or servers, in particular, servers that
have no exact information about the individual computers until they request the
information. The overall purpose of this is to reduce the work necessary to administer
a large IP network. The most significant piece of information distributed in this
manner is the IP address.

28. What Is Dora In Dhcp?

Answer :

o DORA – Discover, Offer , Request , Acknowledgement.


o DORA means DHCP server Lease process short-form.
29. What Are The Switches Are Used With Ipconfig?

Answer :

IPCONFIG/ all, Release/ Renew/ FLUSHDNS

30. Where We Can Change The Default Dhcp Database Interval


Time?

Answer :

We can change the default interval time for DHCP database by modifying the
Registry value BackupInterval in the following location in registry

HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesDHCPServerParamete
rs

31. Dhcp Automatic Backup Default Interval Time?

Answer :

The interval time was 60 minutes.

32. What Is Dhcp Database File Extension?

Answer :

DHCP database file extension is .mdb

33. Dhcp Database Storage Default Location?

Answer :

SystemrootSystem32Dhcp
example:
C:windowssystem32dhcp
34. What Is Bootp?

Answer :

BOOTP (bootstrap protocol) is a host configuration protocol. It is developed before


DHCP.

35. What Is Dhcpnak Message?

Answer :

If the Server is unable to satisfy the DHCPREQUEST message (The requested


network address has been allocated) the Server Should sent DHCPNAK message to
client. It can also be Sent if client's notion of network address is incorrect (Client has
moved to new subnet) or client's lease expired.

36. What Is The Purpose Of Relay Agent?

Answer :

A DHCP relay agent is any host that forwards DHCP packets between clients and
servers if server is not on the same physical subnet. Relay agents are used to
forward requests and replies between clients and servers when they are not on the
same physical subnet.DHCP relay agent can be configured using the ip helper-
address command.

37. What Is The Reason For Getting Apipa Address?

Answer :

With APIPA, DHCP clients can automatically self-configure an IP address and


subnetmask when a DHCP server is not available. When DHCP client boots up, it first
looks for a DHCP server in order to obtain an IP address and subnet mask.A client
uses the self-configured IP address until a DHCP server becomes available. The
APIPA service also checks regularly for the presence of a DHCP server. If it detects
a DHCP server on the network, APIPA stops and the DHCP server replaces the
APIPA networking addresses with dynamically assigned addresses.

38. What Is The Range Of Apipa Address?

Answer :

The IP address range is 169.254.0.1 through 169.254.255.254. The client also


configures itself with a default Class B subnet mask of 255.255.0.0.

39. What Is Dhcp Decline Message?

Answer :
It is Sent by Client to server indicating network address is already in use (already
assigned to another device).

40. How Dhcp Works?

Answer :

DHCP works on DORA Process (DISCOVER - OFFER - REQUEST -


ACKNOWLEDGEMENT).

o When a Client needs an IP configuration, it tries to locate a DHCP server by sending


a broadcast called a DHCP DISCOVER. This message will have a Destination IP of
255.255.255.255 and Destination MAC of ff:ff:ff:ff:ff:ff.[Source IP - 0.0.0.0 ,
Destination IP - 255.255.255.255, Source Mac - Mac address of Host, Destination
Mac -FF:FF:FF:FF:FF:FF]
o On Receiving DHCP Discover, Server sends a DHCP OFFER message to the client.
The DHCPOFFER is a proposed configuration that may include IP address, DNS
server address, and lease time. This message will be unicast and have the
destination mac address of DHCP client's mac address. The source mac address will
be that of the DHCP server.[S.Mac - Mac address of Server , D.Mac - Mac address of
Host]
o If the Client finds the Offer agreeable, it sends DHCP REQUEST Message requesting
those particular IP parameters. This message will be a Broadcast message. [Source
Mac - Mac address of Host, Destination Mac - FF:FF:FF:FF:FF:FF]
o The Server on receiving the DHCP REQUEST makes the configuration official by
sending a unicast DHCP ACK acknowledgment.
o [Source Mac - Mac address of Server, Destination Mac - Mac address of Host]
41. What Information A Dhcp Server Can Provide To A Host?

Answer :

DHCP server can provide following information -

o IP address
o Subnet mask
o Default gateway
o Domain Name Server
o WINS information
42. Who Created Dhcp? How Was It Created?

Answer :

DHCP was created by the Dynamic Host Configuration Working Group of theInternet
Engineering Task Force (IETF; a volunteer organization which definesprotocols for
use on the Internet). As such, it's definition is recorded in anInternet RFC and the
Internet Activities Board (IAB) is asserting its status as toInternet Standardization.

As of this writing (June 1998), DHCP is an Internet Draft Standard Protocol and is
Elective. BOOTP is an Internet Draft StandardProtocol and is recommended. For
more information on Internet standardization,see RFC2300 (May 1998)
43. How Is It Different Than Bootp Or Rarp?

Answer :

DHCP is based on BOOTP and maintains some backward compatibility. The


maindifference is that BOOTP was designed for manual pre-configuration of the
hostinformation in a server database, while DHCP allows for dynamic allocation of
network addresses and configurations to newly attached hosts. Additionally,DHCP
allows for recovery and reallocation of network addresses through aleasing
mechanism.

RARP is a protocol used by Sun and other vendors that allows a computer to findout
its own IP number, which is one of the protocol parameters typically passedto the
client system by DHCP or BOOTP. RARP doesn't support other parametersand using
it, a server can only serve a single LAN. DHCP and BOOTP aredesigned so they can
be routed

44. Can Dhcp Work With Appletalk Or Ipx?

Answer :

No, it is too tied to IP. Furthermore, they don't need it since they have alwayshad
automated mechanisms for assigning their own network addresses.

45. How Does Dhcp And Bootp Handle Multiple Subnets?

Answer :

For the situations where there is more than one LAN, each with its own
subnet number, there are two ways. First of all, you can set up a seperate server
oneach subnet. Secondly, a feature of some routers known as "BOOTP forwarding"to
forward DHCP or BOOTP requests to a server on another subnet and toforward the
replies back to the client.

The part of such a router (or server actingas a router) that does this is called a
"BOOTP forwarding agent". Typically youhave to enable it on the interface to the
subnet to be served and have toconfigure it with the IP address of the DHCP or
BOOTP server. On a Cisco router,the address is known as the "UDP Helper
Address".

46. Can A Dhcp Client Boot From A Bootp Server?

Answer :

Only if the DHCP client were specifically written to make use of the answer froma
BOOTP server. It would presumably treat a BOOTP reply as an unending leaseon the
IP address.In particular, the TCP/IP stack included with Windows 95
47. How Can I Prevent Unauthorized Laptops From Using A
Network That Usesdhcp For Dynamic Addressing?

Answer :

This would have to be done using a mechanism other than DHCP. DHCP does
notprevent other clients from using the addresses it is set to hand out nor can
itdistinguish between a computer's permanent MAC address and one set by
thecomputer's user. DHCP can impose no restrictions on what IP address can use
aparticular port nor control the IP address used by any client.

48. When Will The Server To Server Protocol Be Defined?

Answer :

The DHC WG of the IETF is actively investigating the issues in inter-


servercommunication. The protocol should be defined "soon"

49. Where Is Dhcp Defined?

Answer :

In Internet RFCs.

50. Can A Dhcp Client Or Server Make A Dns Server Update The
Client's Dnsentry To Match The Client's Dynamically Assigned
Address?

Answer :

RFCs 2136 and 2137 indicate a way in which DNS entries can be
updateddynamically. Using this requires a DNS server that supports this feature and
aDHCP server that makes use of it. The RFCs are very recent (as of 5/97)
andimplementations are few. In the mean time, there are DNS and DHCP serversthat
accomplish this through proprietary means.
1. Which Are The Important Configuration Files For Dns Server ?
Answer :BIND uses /etc/named.conf as its main configuration file, the /etc/rndc.conf
file as the configuration file for name server control utility rndc, and the /var/named/
directory for zone files and the like.
2. What Is Bind ?
Answer :BIND stands for Berkeley Internet Name Domain which is the most
commonly used Domain Name System (DNS) server on the Internet.
3. On Which Version Of Bind U Have Worked ?
Answer :
BIND9
4. What Is The Role Of Dns ?
Answer :A DNS server, or name server, is used to resolve an IP address to a
hostname or vice versa.
5. On Which Port Dns Server Works ?
Answer :DNS servers use port 53 by default. Incoming and outgoing packets should
be allowed onport 53. Also allow connections on port 921 if you configure a
lightweight resolver server.The DNS control utility, rndc, connects to the DNS server
with TCP port 953 by default. Ifyou are running rndc on the name server, connections
on this TCP port from localhostshould be allowed. If you are running rndc on
additional systems, allow connections toport 953 (or whatever port you have chosen
to configure) from these additional systems.
6. What Is Round Robin Dns?
Answer :Round robin DNS is usually used for balancing the load of geographically
distributed Web servers. For example, a company has one domain name and three
identical home pages residing on three servers with three different IP addresses.
When one user accesses the home page it will be sent to the first IP address. The
second user who accesses the home page will be sent to the next IP address, and
the third user will be sent to the third IP address. In each case, once the IP address is
given out, it goes to the end of the list. The fourth user, therefore, will be sent to the
first IP address, and so forth.
7. What Is Name Server?
Answer :A name server keeps information for the translation of domain names to IP
addresses and IP addresses to domain names. The name server is a program that
performs the translation at the request of a resolver or another name server.
8. What Is Primary Name Server Or Primary Master Server?
Answer :Primary name server/primary master is the main data source for the zone. It
is the authoritative server for the zone. This server acquires data about its zone from
databases saved on a local disk. The primary server must be published as an
authoritative name server for the domain in the SOA resource record, while the
primary master server does not need to be published.
9. What Is Secondary Name Server/slave Name Server?
Answer :Secondary name server/slave name server acquires data about the zone
by copying the data from the primary name server (respectively from the master
server) at regular time intervals. It makes no sense to edit these databases on the
secondary name servers, although they are saved on the local server disk because
they will be rewritten during further copying.
10. What Is Root Name Server?
Answer :Root name server is an authoritative name server for the root domain (for
the dot). Each root name server is a primary server, which differentiates it from other
name servers.

11. What Is Stealth Name Server?


Answer :Stealth name server is a secret server. This type of name server is not
published anywhere. It is only known to the servers that have its IP address statically
listed in their configuration. It is an authoritative server. It acquires the data for the
zone with the help of a zone transfer. It can be the main server for the zone. Stealth
servers can be used as a local backup if the local servers are unavailable.
12. What Do You Mean By "resource Records"?
Answer :Information on domain names and their IP addresses, as well as all the
other information distributed via DNS is stored in the memory of name servers as
Resource Records (RR).
13. Explain "ttl"?
Answer :Time to live. A 32-bit number indicating the time the particular RR can be
kept valid in a server cache. When this time expires, the record has to be considered
invalid. The value 0 keeps nonauthoritative servers from saving the RR to their cache
memory.
14. Tell Me 5 Types Of Dns Records?
Answer :A, NS, CNAME, SOA, PTR, MX.
15. Explain "soa Record"?
Answer :
The Start of Authority (SOA) record determines the name server that is an
authoritative source of information for the particular domain. There is always only one
SOA record in the file, and it is placed at the beginning of the file of authoritative
resource records.
16. What Is "a Record"?
Answer :A (Address) records assign IP addresses to domain names of computers.
The IP address cannot have a dot at the end.
17. Explain "cname Record"?
Answer :Synonyms to domain names can be created using CNAME records. This is
often referred to as 'creating aliases for computer names'.
18. What Are "hinfo And Txt Records"?
Answer :HINFO and TXT records are for information only. An HINFO record has two
items in its data part. The first item is information about hardware, and the second
one is information about software. A TXT record contains a general data string in its
data part.Example :test.com IN SOA ......mail IN A 192.1.1.2IN HINFO My_Server
UNIXIN TXT my server.
19. What Are "mx Records"?
Answer :MX records specify the mailing server of the domain. An MX record shows
to which computer a mail of a particular domain should be sent. The MX record also
includes a priority number, which can be used to determine several computers where
the mail for the domain can be sent. The first attempt is to deliver the mail to the
computer with the highest priority (lowest value). If this attempt fails, the mail goes to
the next computer (with a higher priority value), and so on.test.com IN SOA ......mail
test.com IN SOA ......mail IN A 192.1.1.2 IN HINFO AlphaServer UNIX IN TXT my
server IN MX 30 mail2.nextstep4it.com IN MX 20 mail3.nextstep4it.com IN MX 10
mail2.nextstep4it.com

20. Explain "ptr Records"?


Answer :A Pointer Record (PTR) is used to translate an IP address into a domain
name.
21. What Is Dynamic Dns?

Answer :Dynamic DNS a method of keeping a domain name linked to a


changing IP address as not all computers use static IP addresses. Typically,
when a user connects to the Internet, the user's ISP assigns an unused IP
address from a pool of IP addresses, and this address is used only for the
duration of that specific connection. This method of dynamically assigning
addresses extends the usable pool of available IP addresses. A dynamic
DNS service provider uses a special program that runs on the user's
computer, contacting the DNS service each time the IP address provided by
the ISP changes and subsequently updating the DNS database to reflect the
change in IP address.

22. What Is The Role Of "named-checkconf Utility"?

Answer :

The named-checkconf utility checks the syntax of the named.conf configuration file.

Syntax: named-checkconf [-t directory] [filename]

23. What Is The Role Of "named-checkzone Utility"?

Answer :

The named-checkzone utility checks the syntax and consistency of the zone file.

Syntax: named-checkzone [-dgv] [-c class] zone [filename]


1. What To Do With The Issues That May Pop Up At The Time Of Usb
Device Installation?
Answer :
You might face the problem of USB device installation in Windows, because of
several devices, such as scanners, printers, modems, wireless adapters etc. there
must be device driver software installed in the computer otherwise you will not be
able to use it. You should always install the driver software before connecting the
device with the computer but if you have accidently connected the USB device .
follow these steps to get rid of problems:

o Right-click on ‘my computer’ icon


o Go to ‘properties’ and then you’ll see ‘Device Manager’, click on it.
o Search the device which you have accidently connected to your computer, such as a
wireless adapter, it will be under the ‘Network Adapters’.
o Right-click on the name of that device and perform the uninstalling process to remove
the device.
o Now disconnect the device from the computer and install the driver software that will
be provided with the device as a CD.
2. In What Way You Can Increase The Game Performance In Your
Windows Operating System?
Answer :
If you are thinking that your computer or Windows is responsible for the poor quality
of game then you might be wrong. Your computer has fixed hardware configuration
and if the minimum requirements for the particular game is not met then game quality
will be surely poor and in some cases you will not be able to open or install it. If you
are trying to play recent games then you will face problems in case your computer is
older than 2 years, because the recent games are designed according to the new
hardware configuration of the computer. You will need sometimes to decrease the
game graphics so that it can fit the hardware capacity of the computer.
3. What Can You Do If Your Windows Stops Responding?
Answer :
You should try to know the exact moment when your computer just stops responding,
such as: if it happens often while your computer is at hard work (like at the time of
playing games) then you should check the issues related to heat. The intake fan of
your computer might have failed, or perhaps the vent might have been blocked. Also
ensure that the heat sink of CPU is making good contact with the processor’s top part
and you must also ensure that the fan of the CPU is clean. In case the problem
happens randomly then scan your computer because there might be a virus behind
all these problems. You should also check the driver software if they are up to date or
not. If again the problem is still there then check the hardware, RAM of your computer
or power supply might have problem.
4. How Can You Raise The General Performance Of Your Windows
Operating System?
Answer :
In case your computer’s general performance is slow then maybe the basic
maintenance can resolve this issue easily. First of all you should uninstall all the
unnecessary programs which you don’t use any longer. Start the defragment process
to all your disk drives regularly. Some programs like ‘helper’ are mainly used to
launch the application quickly. Those are associated with this program and this
‘helper’ program runs in the background when you start the Windows. But if you don’t
use those programs which are associated with the ‘helper’ program then it is
necessary to uninstall it because it can ‘help’ in slowing down your computer. If you
use only few and necessary programs then your computer will be with good
performance, therefore, you should remove all the unused programs.
5. Sometimes, The Web Browser Stops Responding Or Becomes Slow
And Will Show You The Message That The Web Browser Was
Crashed. What Can Be The Risks?
Answer :
Browser crash, slowness, and pop-up advertisements are the most common troubles
faced while surfing the internet. There should be always a good performing anti-virus
program in your computer if you face any of those troubles. Malware or virus infection
can be the cause of those problems. It is extremely important to remove any malware
as soon as possible. Those malwares are sometimes programmed to monitor the
keystrokes and while browsing the internet your computer’s internal data or
information can be stolen by the hackers. You will experience slow browsing while
malware attacks your computer.
6. What Are The Ways To Defragment The Drives Of Your Computer In
The Windows Xp?
Answer :
You can defragment the disk drives by some methods below:

o Defragmentation by the use of Local Disk’s properties.


o Open ‘My Computer’ from the start menu or from the desktop.
o 3) Right-click on the disk drive to which you want to run the defragmentation and
click the properties of that drive.Then a new page will open, click on the ‘Tools’. You
will see defragment option on that page.
o Click on the ‘Defragment Now’. And the process can be run.
o Defragmentation by the use of Computer Management MMC
o Open the ‘Run’ program and type ‘compmgmt.msc’ and hit enter, then computer
management will be there.
o Click on the ‘Disk Defragmenter’.
o Click on the volume to which you want run the defragmentation process, after
selecting click the ‘Defragment’.
o Defragmentation by the use of Defragmenter MMC
o Start the ‘Disk Defragmenter MMC’ (Dfrg.msc).
o Select the drive to which you want to run the defragmentation and then click on
‘Defragment’.

Disk Defragmenter MMC version included in the Windows XP comes with


some limitations:

o You will be able to defragment only the local disk drive volumes.
o You will not be able to defragment more than one disk drive volume at a time.
o You will not be able to defragment one disk drive volume when scanning another.
o You will not be able to make a schedule defragmentation. In case you need to make
a schedule disk defragmentation then use ‘Defrag.exe’ command line tool. This is
able to process only one MMC snap-in at a time.
o Other products that are discussed in this article are of third-party and those are
independent companies and it is not connected with Microsoft. Microsoft will not be
responsible about the reliability or performance and there is no warranty made by
Microsoft about the usage of those products.
7. What To Do If There Are Problems After The Installation Of New
Software?
Answer :
Right after the installation of any driver, utility or some other software programs you
will be facing lots of issues and those problems may be caused by some reasons as
below:

o Confliction with the other programs installed in your computer.


o Issues with the program.
o Improper or incomplete installation of the program.

Below are some solutions of these problems:

o Reinstalling or removing the program


o If you are having problems in operating the computer or some other programs after
the installation of any new software then uninstall the software and note if the
problem is still there. After this, start the installation process again and install the
program. Sometimes Windows says to restart before using the new software installed
and if you’re still opening the new program then you may face the problem, therefore,
you should restart the computer before using that software.
o You should check for the update version of the program that you are going to install in
your computer. If you are going to install the driver software for printer or scanner or
any hardware device then it is necessary to install the updated version of the driver
software for the good and quick performance.
8. Your Computer’s Programs Stop Responding, What Can Be The
Reasons?
Answer :
Your computer’s operating system, driver software or some other programs may stop
responding while using them or they can make other programs to stop running and
there may be several reasons, like: lack of proper system resources, confliction
between two software or hardware resources, bug in the driver software.
If you are having the not responding problem then following solution will be
helpful:

o Generally, while any of the programs has stopped responding then ‘Task Manager’
can be opened in order to close the program. Press ‘Ctrl+Alt+Del’ on your computer’s
keyboard to open the ‘Task Manager’ and select the program which has stopped
responding. After that click on ‘End Task’, and then the program will be ended.
Sometimes another window opens with the option ‘End Now’, if it shows up then you
should click on ‘End Now’.
o You will not be able to recover the unsaved work while running this process and
unfortunately, there isn’t any option either.
o If you are continuously having this problem of stop responding then it is
recommended to run the troubleshooting program and that may be very helpful.
9. In Order To Inspect Your Computer’s Internet Connection That Has
Windows Xp, You Start A Command. What Happens Next?
Answer :
DNS cache can be the causative factor of the temporary DNS problems which is
maintained by Windows XP for performance reasons. In case you are having problem
in reaching even a single site then you should use the ‘ipconfig’ command in order to
delete the DNS cache by the ‘flushdns’ switch.
10. What To Do If There Is An Unreadable Language On The Logon
Screen That Will Probably Not Accept Your Username And
Password? Is There Any Bypass Or Just A Removing Technique?
Answer :
If you are having the above problem, then follow the steps below:

o Start the system and press ‘F8’ key at the time of Windows starting up. After this
select ‘Safe Mode’ in the command prompt and just enter. Select ‘Administrator’ if you
do not set any password then the default password may be blank. Then you will be
entering into the doc command simply as follow:
o Type there ‘net user net user xxx 123456 /add’ (xxx will be the locked account’s name
and the numbers 123456 will be the new password for the new account). After all this
you will see the command finished successfully.

Please note that the above tips will be helpful if the Administration’s password is not
set.
But if the password has already been set then you should follow the steps
below:

o First of all burning process must be done to a USB flash drive in order of removing
the forgotten or lost password of your Windows operating system.
o Prepare to boot your computer using a USB flash drive.
o Then recover the forgotten or lost password of your Windows using the USB flash
drive that you burned initially.
o For the detail, it is possible to search for the ‘Windows Password Recovery Enhance’
.

11. What Could Be The Cause Of Disappearance Of The Quick


Launch Buttons That Seemed To Be Previously In The Taskbar?
Answer :

o For the solution to this problem follow the guidelines:


o Right-click on the ‘Start’ button and then select the ‘Properties’.
o Click on the ‘Taskbar’ tab that is on the top of the window.
o If the ‘Show Quick Launch’ box is ticked then unmark it and click on ‘Apply’.
o Now mark the box and click ‘Apply’ again.
o After that quick launch will be there when the computer is rebooted and it will not
disappear.
12. How Can You Fix The Problem If There Is A Message Saying
“the Windows Logon Ui Encountered A Problem And Needed To
Close.” And If The System Restoring Won’t Work?
Answer :
It is not normally an error message of the legitimate Microsoft Windows. It might be
more likely the infection of spywares or viruses that attack the system. When you are
having this problem then you should try booting your computer in the ‘Windows Safe
Mode’ (press ‘F8’ while starting the Windows). It is also recommended to scan your
computer’s Windows for the malwares and viruses in order to remove those infectious
programs. Anti-Malware can be helpful in this situation.
13. What To Do If You Accidently Deleted The Utilities/accessories
From The Add/remove Window Of Your Operating System?
Answer :
If you have deleted any program then you will need to do the system restoration that
will restore the programs to the state like it was before. Click on the ‘Start’ and then
go to the ‘Help and Support Center’, there you will see an option of ‘System Restore’.
Now you will be able to perform the system restoration in order to recover the
removed program.
14. Is It Good Or Not If You Leave The Swap File 1 Size In Windows
Xp Home And Vista Home Premium?
Answer :
It is good to let the Windows manage all the files by itself. This is the best idea.
15. How Can You Know That Your Windows Xp Is A 32-bit Or It Is A
64-bit?
Answer :
In order to know this, do a right-click on the ‘My Computer’ icon and select the
‘Properties’ option from the list. After that, go to the ‘General’ tab and you will see the
details of your computer’s operating system. If your computer has a 64-bit of
Windows XP then there will be written but if there is not anything about the 64-bit then
it is 32-bit edition.
16. What To Do If Your Computer’s Windows Xp Professional
Edition Cannot Find The Modem And You Are Also Unable T o
Locate Or Find The Par Ports Or Serial Port?
Answer :
It is kind of a weird thing that Windows XP is not auto-detecting the serial and parallel
ports. You should check the bios for making sure that they are actually at the enabled
state and already have resources assigned. In the case of a modem you are going to
need driver software for it, therefore, look for the driver software and specify one for
it. Device manager is the place from where you can access and find out the driver’s
enabled or disabled state or any missing things.
17. You Are Having The Problem Of Not Being Able To Uninstall A
Program Because The Uninstall Log Is Not There, What Can Be
Done In This Situation If The Operating System Of Your Computer
Is Windows Xp?
Answer :
There are several solutions for this problem. You can remove or delete the registry
keys associated with it and this is the most and best direct approach.

o HKLM/Software/Microsoft/Windows/Current Version/Uninstall/
o Or there are some programs which are designed to uninstall the programs such ‘Total
Uninstall’ is a good uninstaller.
o Or you could run a maintenance utility for example CCLEANER.
18. What Are The Ways To Fix The Blue Screen Errors Of Your
Computer’s Windows?
Answer :
Prior to fixing the blue screen errors or screen of death (BSoD) errors of your
Windows operating system, it is necessary to recognize the error clearly. You will
come across several blue screen errors.
Note: In case you are facing the blue screen display and after that the computer
reboots immediately without letting you read the text on the blue screen then follow
the steps below. In case you are not getting the chance to perform the step by step
action in Windows then you should boot your computer in the ‘Safe Mode’.

o Right-click on the ‘My Computer’ icon and then select the ‘Properties’ option from the
list.
o Click on the ‘Advanced Tab’ on the system properties window.
o Now click on the ‘Setting Button that is under the Startup and Recovery.

You might also like