Professional Documents
Culture Documents
Answer :
An active directory is a directory structure used on Micro-soft Windows based servers
and computers to store data and information about networks and domains.
2. What Is Domains In Active Directory?
Answer :
In Windows 2000, a domain defines both an administrative boundary and a security
boundary for a collection of objects that are relevant to a specific group of users on a
network. A domain is an administrative boundary because administrative privileges
do not extend to other domains. It is a security boundary because each domain has a
security policy that extends to all security accounts within the domain. Active
Directory stores information about objects in one or more domains.
Domains can be organized into parent-child relationships to form a hierarchy. A
parent domain is the domain directly superior in the hierarchy to one or more
subordinate, or child, domains. A child domain also can be the parent of one or more
child domains.
3. Mention Which Is The Default Protocol Used In Directory Services?
Answer :
The default protocol used in directory services is LDAP ( Lightweight Directory
Access Protocol).
4. What Is Mixed Mode?
Answer :
Allows domain controllers running both Windows 2000 and earlier versions of
Windows NT to co-exist in the domain. In mixed mode, the domain features from
previous versions of Windows NT Server are still enabled, while some Windows 2000
features are disabled. Windows 2000 Server domains are installed in mixed mode by
default. In mixed mode the domain may have Windows NT 4.0 backup domain
controllers present. Nested groups are not supported in mixed mode.
5. Explain The Term Forest In Ad?
Answer :
Forest is used to define an assembly of AD domains that share a single schema for
the AD. All DC’s in the forest share this schema and is replicated in a hierarchical
fashion among them.
6. What Is Native Mode?
Answer :
When all the domain controllers in a given domain are running Windows 2000 Server.
This mode allows organizations to take advantage of new Active Directory features
such as Universal groups, nested group membership, and inter-domain group
membership.
7. Explain What Is Sysvol?
Answer :
The SysVOL folder keeps the server’s copy of the domain’s public files. The contents
such as users, group policy, etc. of the sysvol folders are replicated to all domain
controllers in the domain.
8. What Is Ldap?
Answer :
LDAP is the directory service protocol that is used to query and update AD. LDAP
naming paths are used to access AD objects and include the following:
o Distinguished names
o Relative Distinguished names
9. Mention What Is Kerberos?
Answer :
Kerberos is an authentication protocol for network. It is built to offer strong
authentication for server/client applications by using secret-key cryptography.
10. Minimum Requirement For Installing Ad?
Answer :
20. Explain What Are Rodcs? And What Are The Major Benefits Of
Using Rodcs?
Answer :
Read only Domain Controller, organizations can easily deploy a domain controller in
locations where physical security cannot be guaranteed.
21. Mention What Are The Components Of Ad?
Answer :
Components of AD includes
Logical Structure: Trees, Forest, Domains and OU.
Physical Structures: Domain controller and Sites.
Answer :
Unlimited. Remember, though, that it’s the Administrator account, not any account
that’s part of the Administrators group.
Answer :
Infrastructure Master is accountable for updating information about the user and
group and global catalogue.
Answer :
25. Can You Connect Active Directory To Other 3rd -party Directory
Services? Name A Few Options?
Answer :
Yes you can Connect Active Directory to other 3rd -party Directory Services such as
dictionaries used by SAP, Domino etc with the help of MIIS (Microsoft Identity
Integration Server).
Answer :
Same as Read & Execute, but not inherited by files within a folder. However, newly
created subfolders will inherit this permission.
27. How Do I Set Up Dns For Other Dcs In The Domain That Are
Running Dns?
Answer :
For each additional DC that is running DNS, the preferred DNS setting is the parent
DNS server (first DC in the domain), and the alternate DNS setting is the actual IP
address of network interface.
Answer :
%SystemRoot%SYSVOLsysvoldomainnamePoliciesGUID
Answer :
Check for a disjointed namespace, and then run Netdiag.exe /fix. You must install
Support Tools from the Windows 2000 Server CD-ROM to run Netdiag.exe.
30. Abbreviate Gpt And Gpc?
Answer :
Answer :
If you are able to query the ISP's DNS servers from behind the proxy server or
firewall, Windows 2000 and Windows Server 2003 DNS server is able to query the
root hint servers. UDP and TCP Port 53 should be open on the proxy server or
firewall.
Answer :
Domain local groups assign access permissions to global domain groups for local
domain resources. Global groups provide access to resources in other trusted
domains. Universal groups grant access to resources in all trusted domains.
Answer :
This setting designates the Windows 2000 DNS server to be a root hint server and is
usually deleted. If you do not delete this setting, you may not be able to perform
external name resolution to the root hint servers on the Internet.
Answer :
It’s group policy inheritance model, where the policies are applied to Local machines,
Sites, Domains and Organizational Units
Answer :
An object's attribute is set concurrently to one value at one master, and another value
at a second master.
36. What Is Netdom?
Answer :
Answer :
Answer :
ADSI Edit is an LDAP editor for managing objects in Active Directory. This Active
Directory tool lets you view objects and attributes that are not exposed in the Active
Directory Management Console.
Answer :
Kerberos V5 is the primary security protocol for authentication within a domain. The
Kerberos V5 protocol verifies both the identity of the user and network services. This
dual verification is known as mutual authentication.
Answer :
Temporary loss of the schema operations master will be visible only if we are trying to
modify the schema or install an application that modifies the schema during
installation. A DC whose schema master role has been seized must never be brought
back online.
Answer :
Replmon is the first tool you should use when troubleshooting Active Directory
replication issues
42. How To Find Fsmo Roles?
Answer :
Answer :
Answer :
Active Directory Sites and Services allow you to specify site information. Active
Directory uses this information to determine how best to use available network
resources.
Answer :
This is the checkpoint file used to track the data not yet written to database file. This
indicates the starting point from which data is to be recovered from the log file, in
case of failure.
Answer :
This is the transaction log file (10 MB). When EDB.LOG is full, it is renamed to
EDBnnnn.log. Where nnnn is the increasing number starting from 1.
Answer :
Answer :
ntdsutil - type roles - connections - connect servername - q - type seize role - at the
fsmo maintenance prompt - type seize rid master
Answer :
ntdsutil - type roles - connections - connect servername - q - type transfer role - at the
fsmo maintenance prompt - type trasfer rid master
Answer :
The KCC generates and maintains the replication topology for replication within sites
and between sites. KCC runs every 15 minutes.
Answer :
Definitional details about objects and attributes that one CAN store in the AD.
Replicates to all DCs. Static in nature.
Answer :
Online Defragmentation method that runs as part of the garbage collection process.
The only advantage to this method is that the server does not need to be taken offline
for it to run. However, this method does not shrink the Active Directory database file
(Ntds.dit).
Answer :
Garbage Collection is a process that is designed to free space within the Active
Directory database. This process runs independently on every DC with a default
lifetime interval of 12 hours.
Answer :
This is reserved transaction log files of 20 MB (10 MB each) which provides the
transaction log files enough room to shutdown if the other spaces are being used.
Object information for a domain. Replicates to all DCs within a domain. The object
portion becomes part of GC. The attribute values only replicates within the domain.
Answer :
LDAP is the directory service protocol that is used to query and update AD. LDAP
naming paths are used to access AD objects and include the following:
o Distinguished names
o Relative Distinguished names
57. How Will You Verify Whether The Ad Installation Is Proper With
Srv Resource Records?
Answer :
Verify SRV Resource Records: After AD is installed, the DC will register SRV records
in DNS when it restarts. We can check this using DNS MMC or nslookup command.
Answer :
Answer :
The types of objects that can be created in the Active Directory, relationships
between them, and the attributes on each type of object. This table is fairly static and
much smaller than the data table.
Answer :
11. You Have Set The No Override Option At Domain Level And
Block Inheritance At Ou Level. Which Policy Will Take Effect?
Answer :
If you have set both then No override wins over the Block inheritance. So No override
will take effect.
12. What Are The Options That Are Available When You Click On
Option Button On General Tab?
Answer :
o General
o Disable computer configuration settings (The settings those are set under computer
configuration of this GPO will not take effect.)
o Disable user configuration settings (The settings those are set under User
configuration of this GPO will not take effect.)
o Links (Displays the containers which have links to this GPO)
o Security (With security option you can set level of permissions and settings to the
individual users and groups. Ex: If you want to disable this GPO to a particular user
on this container, on security tab select that user and select the deny check box for
apply the Group Policy. Then the GPO will not take effect to that user even though he
is in that container.)
13. What Will You See In The Group Policy Snap In?
Answer :
You will see two major portions, and under those you have sub portions,
they are:
o Computer Configuration
o Software settings
o Software installations
o Windows settings
o Administrative templates
o User configuration
o Software settings
o Software installations
o Windows settings
o Administrative templates
Note: Administrative templates are for modifying the registry of windows 2000 clients.
14. What Is The Hierarchy Of Group Policy?
Answer :
o Local policy
o Site Policy
o Domain Policy
o OU Policy
o Sub OU Policy (If any are there)
15. Who Can Create Site Level Group Policy?
Answer :
Enterprise Admin
16. Who Can Create Domain Level Group Policy?
Answer :
Domain Admin
17. Who Can Create Organizational Unit Lever Group Policy?
Answer :
Domain Admin
18. Who Can Create Local Group Policy?
Answer :
Local Administrator or Domain Administrator
19. What Is The Refresh Interval For Group Policy?
Answer :
Refresh interval for Domain Controllers is 5 minutes, and the refresh interval for all
other computers in the network is 45 minutes (this one doubt).
20. Why Do We Need To Manage And Control Desktop
Environment?
Answer :
Answer :
Answer :
o Group Policy: Within GP we specify that this software application gets installed to
this particular computer or to this particular user.
o Active Directory: Group Policy will be applied somewhere in Active Directory.
o Microsoft Installer service
o Windows installer packages: The type of package that can be used by Group
Policy to deploy applications is .msi packages i.e., Microsoft Installer packages.
23. What Is The Package That Can Be Used To Deploy Software
Through Group Policy?
Answer :
Answer :
Microsoft Installer Service runs on the client machines in the Windows 2000 domain.
It installs the minimum amount of an application, as you extend functionality it installs
the remaining part of application. It is responsible for installing software in the client. It
is also responsible for modifying, upgrading, applying service packs.
Answer :
o Local Security policy: This is group policy applied to local machine
o Domain Security Policy: Group Policy applied at domain level
o Domain Controller Security Policy: Group Policy applied at domain controller
level.
26. What Are The Design Considerations For Group Policy?
Answer :
o Minimize linking: Because there may be a chance deleting the original one with
seeing who else are using this GPO. Minimizing linking for simplicity.
o Minimum number of GPO’s: Microsoft suggests that one GPO with 100 settings
will process faster than 100 GPO’s each with one setting. This is for performance.
o Delegate
o Minimize filtering: To keep simple your environment, try to minimize filtering.
If you have more number of GPO’s for a container, whatever GPO is on top will be
applied first. If you want, you can move GPO’s up and down.
If there is conflict between two GPO’s of same container, the last applied GPO will be
effective. i.e., the bottom one will be effective.
Answer :
Group Policy objects, other than the local Group Policy object, are virtual objects. The
policy setting information of a GPO is actually stored in two locations: the Group
Policy container and the Group Policy template.
The Group Policy container is an Active Directory container that stores GPO
properties, including information on version, GPO status, and a list of components
that have settings in the GPO.
The Group Policy template is a folder structure within the file system that stores
Administrative Template-based policies, security settings, script files, and information
regarding applications that are available for Group Policy Software Installation.
The Group Policy template is located in the system volume folder (Sysvol) in the
Policies subfolder for its domain.
Answer :
At the level of each organizational unit in the Active Directory hierarchy, one, many,
or no GPOs can be linked. If several GPOs are linked to an organizational unit, their
processing is in the order that is specified by the administrator, on the Linked Group
Policy Objects tab for the organizational unit in GPMC.
The GPO with the lowest link order is processed last, and therefore has the highest
precedence.
This order means that the local GPO is processed first, and GPOs that are linked to
the organizational unit of which the computer or user is a direct member are
processed last, which overwrites settings in the earlier GPOs if there are conflicts. (If
there are no conflicts, then the earlier and later settings are merely aggregated.)
Answer :
o Begin the process by logging on to a Windows Server 2008 domain controller, and
opening the Group Policy Management console. Now, navigate through the console
tree to Group Policy Management | Forest: | Domains | | Group Policy Objects.
o When you do, the details pane should display all of the group policy objects that are
associated with the domain. In Figure A there are only two group policy objects, but in
a production environment you may have many more. The Group Policy Objects
container stores all of the group policy objects for the domain.
o Now, right-click on the Group Policy Objects container, and choose the Back Up All
command from the shortcut menu. When you do, Windows will open the Back Up
Group Policy Object dialog box.
o As you can see in Figure B, this dialog box requires you to provide the path to which
you want to store the backup files. You can either store the backups in a dedicated
folder on a local drive, or you can place them in a folder on a mapped network drive.
The dialog box also contains a Description field that you can use to provide a
description of the backup that you are creating.
o You must provide the path to which you want to store your backup of the group policy
objects.
o To initiate the backup process, just click the Back Up button. When the backup
process completes, you should see a dialog box that tells you how many group policy
objects were successfully backed up. Click OK to close the dialog box, and you’re all
done.
o When it comes to restoring a backup of any Group Policy Object, you have two
options. The first option is to right-click on the Group Policy Object, and choose the
Restore From Backup command from the shortcut menu. When you do this, Windows
will remove all of the individual settings from the Group Policy Object, and then
implement the settings found in the backup.
o Your other option is to right-click on the Group Policy Object you want to restore, and
choose the Import Settings option. This option works more like a merge than a
restore.
o Any settings that presently reside within the Group Policy Object are retained unless
there is a contradictory settings within the file that is being imported.
30. You Want To Standardize The Desktop Environments
(wallpaper, My Documents, Start Menu, Printers Etc.) On The
Computers In One Department. How Would You Do That?
Answer :
Answer :
Assign Users :The software application is advertised when the user logs on. It is
installed when the user clicks on the software application icon via the start menu, or
accesses a file that has been associated with the software application.
Publish to users : The software application does not appear on the start menu or
desktop. This means the user may not know that the software is available. The
software application is made available via the Add/Remove Programs option in
control panel, or by clicking on a file that has been associated with the application.
Published applications do not reinstall themselves in the event of accidental deletion,
and it is not possible to publish to computers.
Answer :
Administrative Templates are a feature of Group Policy, a Microsoft technology for
centralised management of machines and users in an Active Directory environment.
Administrative Templates facilitate the management of registry-based policy. An ADM
file is used to describe both the user interface presented to the Group Policy
administrator and the registry keys that should be updated on the target machines.
An ADM file is a text file with a specific syntax which describes both the interface and
the registry values which will be changed if the policy is enabled or disabled.
ADM files are consumed by the Group Policy Object Editor (GPEdit). Windows XP
Service Pack 2 shipped with five ADM files (system.adm, inetres.adm,
wmplayer.adm, conf.adm and wuau.adm). These are merged into a unified
“namespace” in GPEdit and presented to the administrator under the Administrative
Templates node (for both machine and user policy).
Answer :
34. Name Some Gpo Settings In The Computer And User Parts ?
Answer :
35. A User Claims He Did Not Receive A Gpo, Yet His User And
Computer Accounts Are In The Right Ou, And Everyone Else There
Gets The Gpo. What Will You Look For?
Answer :
make sure user not be member of loopback policy as in loopback policy it doesn’t
effect user settings only computer policy will applicable. if he is member of gpo filter
grp or not.
You may also want to check the computers event logs. If you find event ID 1085 then
you may want to download the patch to fix this and reboot the computer.
Answer :
Answer :
It’s now gpupdate.
Answer :
Group Policy in Windows Server 2003 determines a users right to modify network and
dial-up TCP/IP properties. Users may be selectively restricted from modifying their IP
address and other network configuration parameters.
39. You Want To Create A New Group Policy But Do Not Wish To
Inherit.
Answer :
Make sure you check Block inheritance among the options when creating the policy.
40. How Does The Group Policy ‘no Override’ And ‘block
Inheritance’ Work ?
Answer :
Group Policies can be applied at multiple levels (Sites, domains, organizational Units)
and multiple GP’s for each level. Obviously it may be that some policy settings
conflict hence the application order of Site – Domain – Organization Unit and within
each layer you set order for all defined policies but you may want to force some
polices to never be overridden (No Override) and you may want some containers to
not inherit settings from a parent container (Block Inheritance).
No Override – This prevents child containers from overriding policies set at higher
levels
Also the highest No Override takes precedence over lower No Override’s set.
o Start the Active Directory Users and Computer snap-in (Start – Programs –
Administrative Tools – Active Directory Users and Computers)
o Right click on the container you wish to stop inheriting settings from its parent and
select
o Select the ‘Group Policy’ tab
o Check the ‘Block Policy inheritance’ option
o Click Apply then OK
o Start the Active Directory Users and Computer snap-in (Start – – Administrative Tools
– Active Directory Users and Computers)
o Right click on the container you wish to set a Group Policy to not be overridden and
select Properties
o Select the ‘Group Policy’ tab
o Click Options
o Check the ‘No Override’ option
o Click OK
o Click Apply then OK
1. What Is Dhcp?
Answer :
Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a
server to automatically assign an IP address to a computer from a defined range of
numbers (i.e., a scope) configured for a given network.
2. What Is The Dhcp Process For Client Machine?
Answer :
o If a DHCP server is to operate within an Active Directory domain (and is not running
on a domain controller) it must first be authorized.
o This can be achieved either as part of the DHCP Server role installation, or
subsequently using either DHCP console or at the command prompt using the netsh
tool.
o If the DHCP server was not authorized during installation, invoke the DHCP console
(Start -> All Programs -> Administrative Tools -> DHCP),
o right click on the DHCP to be authorized and select Authorize.
o To achieve the same result from the command prompt, enter the following command:
netsh dhcp server serverID initiate auth
In the above command syntax, serverID is replaced by the IP address or full UNC
name of system on which the DHCP server is installed.
6. What Ports Are Used By Dhcp And The Dhcp Clients?
Answer :
Requests are on UDP port 68, Server replies on UDP 67 .
7. List Some Benefits Of Using Dhcp?
Answer :
DHCP provides the following benefits for administering your TCP/IP-based network:
Safe and reliable configuration.DHCP avoids configuration errors caused by the need
to manually type in values at each computer. Also, DHCP helps prevent address
conflicts caused by a previously assigned IP address being reused to configure a new
computer on the network.
Reduces configuration management.
Using DHCP servers can greatly decrease time spent to configuring and
reconfiguring computers on your network. Servers can be configured to supply a full
range of additional configuration values when assigning address leases.
These values are assigned using DHCP options. Also, the DHCP lease renewal
process helps assure that where client configurations need to be updated often (such
as users with mobile or portable computers who change locations frequently), these
changes can be made efficiently and automatically by clients communicating directly
with DHCP servers.
The following section covers issues that affect the use of the DHCP Server service
with other services or network configurations. Using DNS servers with DHCP Using
Routing and Remote Access servers with DHCP Multihomed DHCP servers.
8. Describe The Process Of Installing A Dhcp Server In An Ad
Infrastructure?
Answer :
Open Windows Components Wizard. Under Components , scroll to and click
Networking Services. Click Details . Under Subcomponents of Networking Services ,
click Dynamic Host Configuration Protocol (DHCP) and then click OK.
Click Next . If prompted, type the full path to the Windows Server 2003 distribution
files, and then click Next. Required files are copied to your hard disk.
9. How To Authorize A Dhcp Server In Active Directory Open Dhcp?
Answer :
In the console tree, click DHCP
The DHCPInform message is sent after the IPCP negotiation is concluded. The
DHCPInform message received by the remote access server is then forwarded to a
DHCP server. The remote access server forwards DHCPInform messages only if it
has been configured with the DHCP Relay Agent.
DHCP integration with DNS allows the aggregation of these tasks across devices,
enabling a company’s network services to scale in step with the growth of network
users, devices, and policies, while reducing administrative operations and costs. This
integration provides practical operational efficiencies that lower total cost of
ownership.
However, this statement is one in a list of “general design goals for DHCP”, i.e. what
the designers of the DHCP protocol set as their own goals. It is not in a list of
requirements for DHCP servers.
17. How Can I Relay Dhcp If My Router Does Not Support It?
Answer :
A server on a net(subnet) can relay DHCP or BOOTP for that net. Microsoft has
software to make Windows NT do this.
18. What Is A Client Id?
Answer :
What is termed the Client ID for the purposes of the DHCP protocol is whatever is
used by the protocol to identify the client computer. By default, DHCP
implementations typically employ the client’s MAC address for this purpose, but the
DHCP protocol allows other options. Some DHCP implementations have a setup
option to specify the client ID you want. One alternative to the MAC address is simply
a character string of your choice.
In any case, in order for DHCP to function, you must be certain that no other client is
using the client ID you choose, and you must be sure the DHCP server will accept it.
19. Is A Dhcp Client “supposed To” Be Able To Use A Bootp
Server?
Answer :
The RFC on such interoperability (1534) is clear: “A DHCP client MAY use a reply
from a BOOTP server if the configuration returned from the BOOTP server is
acceptable to the DHCP client.”. The word “MAY” indicates such support, however
useful, is left as an option.
During a 2- day outage, new users cannot get new leases, but no lease will expire for
any computer turned on at the time that the outage commences. Another factor is that
the longer the lease the longer time it takes for client configuration changes controlled
by DHCP to propogate.
21. What Is Dhcp Spoofing?
Answer :
Ascend Pipeline ISDN routers (which attach Ethernets to ISDN lines) incorporate a
feature that Ascend calls “DHCP spoofing” which is essentially a tiny server
implementation that hands an IP address to a connecting Windows 95 computer, with
the intention of giving it an IP number during its connection process.
Answer :
A DHCP lease is the amount of time that the DHCP server grants to the DHCP client
permission to use a particular IP address. A typical server allows its administrator to
set the lease time.
Answer :
No, it is too tied to IP. Furthermore, they don’t need it since they have always had
automated mechanisms for assigning their own network addresses.
Answer :
Only if the DHCP server is specifically written to also handle BOOTP queries.
Answer :
This would have to be done using a mechanism other than DHCP. DHCP does not
prevent other clients from using the addresses it is set to hand out nor can it
distinguish between a computer’s permanent MAC address and one set by the
computer’s user. DHCP can impose no restrictions on what IP address can use a
particular port nor control the IP address used by any client.
Answer :
PPP has its own non-DHCP way in which communications servers can hand clients
an IP address called IPCP (IP Control Protocol) but doesn’t have the same flexibility
as DHCP or BOOTP in handing out other parameters. Such a communications server
may support the use of DHCP to acquire the IP addresses it gives out.
This is sometimes called doing DHCP by proxy for the client. I know that Windows
NT’s remote access support does this. A feature of DHCP under development
(DHCPinform) is a method by which a DHCP server can supply parameters to a client
that already has an IP number. With this, a PPP client could get its IP number using
IPCP, then get the rest of its parameters using this feature of DHCP. SLIP has no
standard way in which a server can hand a client an IP address, but many
communications servers support non-standard ways of doing this that can be utilized
by scripts, etc.
One way such a communications server can get around this problem is through the
use of a set of unique pseudo-MAC addresses for the purposes of its
communications with the DHCP server. Another way (used by Shiva) is to use a
different “client ID type” for your hardware address. Client ID type 1 means you’re
using MAC addresses. However, client ID type 0 means an ASCII string.
Answer :
DHCP’s purpose is to enable individual computers on an IP network to extract their
configurations from a server (the ‘DHCP server’) or servers, in particular, servers that
have no exact information about the individual computers until they request the
information. The overall purpose of this is to reduce the work necessary to administer
a large IP network. The most significant piece of information distributed in this
manner is the IP address.
Answer :
Answer :
Answer :
We can change the default interval time for DHCP database by modifying the
Registry value BackupInterval in the following location in registry
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesDHCPServerParamete
rs
Answer :
Answer :
Answer :
SystemrootSystem32Dhcp
example:
C:windowssystem32dhcp
34. What Is Bootp?
Answer :
Answer :
Answer :
A DHCP relay agent is any host that forwards DHCP packets between clients and
servers if server is not on the same physical subnet. Relay agents are used to
forward requests and replies between clients and servers when they are not on the
same physical subnet.DHCP relay agent can be configured using the ip helper-
address command.
Answer :
Answer :
Answer :
It is Sent by Client to server indicating network address is already in use (already
assigned to another device).
Answer :
Answer :
o IP address
o Subnet mask
o Default gateway
o Domain Name Server
o WINS information
42. Who Created Dhcp? How Was It Created?
Answer :
DHCP was created by the Dynamic Host Configuration Working Group of theInternet
Engineering Task Force (IETF; a volunteer organization which definesprotocols for
use on the Internet). As such, it's definition is recorded in anInternet RFC and the
Internet Activities Board (IAB) is asserting its status as toInternet Standardization.
As of this writing (June 1998), DHCP is an Internet Draft Standard Protocol and is
Elective. BOOTP is an Internet Draft StandardProtocol and is recommended. For
more information on Internet standardization,see RFC2300 (May 1998)
43. How Is It Different Than Bootp Or Rarp?
Answer :
RARP is a protocol used by Sun and other vendors that allows a computer to findout
its own IP number, which is one of the protocol parameters typically passedto the
client system by DHCP or BOOTP. RARP doesn't support other parametersand using
it, a server can only serve a single LAN. DHCP and BOOTP aredesigned so they can
be routed
Answer :
No, it is too tied to IP. Furthermore, they don't need it since they have alwayshad
automated mechanisms for assigning their own network addresses.
Answer :
For the situations where there is more than one LAN, each with its own
subnet number, there are two ways. First of all, you can set up a seperate server
oneach subnet. Secondly, a feature of some routers known as "BOOTP forwarding"to
forward DHCP or BOOTP requests to a server on another subnet and toforward the
replies back to the client.
The part of such a router (or server actingas a router) that does this is called a
"BOOTP forwarding agent". Typically youhave to enable it on the interface to the
subnet to be served and have toconfigure it with the IP address of the DHCP or
BOOTP server. On a Cisco router,the address is known as the "UDP Helper
Address".
Answer :
Only if the DHCP client were specifically written to make use of the answer froma
BOOTP server. It would presumably treat a BOOTP reply as an unending leaseon the
IP address.In particular, the TCP/IP stack included with Windows 95
47. How Can I Prevent Unauthorized Laptops From Using A
Network That Usesdhcp For Dynamic Addressing?
Answer :
This would have to be done using a mechanism other than DHCP. DHCP does
notprevent other clients from using the addresses it is set to hand out nor can
itdistinguish between a computer's permanent MAC address and one set by
thecomputer's user. DHCP can impose no restrictions on what IP address can use
aparticular port nor control the IP address used by any client.
Answer :
Answer :
In Internet RFCs.
50. Can A Dhcp Client Or Server Make A Dns Server Update The
Client's Dnsentry To Match The Client's Dynamically Assigned
Address?
Answer :
RFCs 2136 and 2137 indicate a way in which DNS entries can be
updateddynamically. Using this requires a DNS server that supports this feature and
aDHCP server that makes use of it. The RFCs are very recent (as of 5/97)
andimplementations are few. In the mean time, there are DNS and DHCP serversthat
accomplish this through proprietary means.
1. Which Are The Important Configuration Files For Dns Server ?
Answer :BIND uses /etc/named.conf as its main configuration file, the /etc/rndc.conf
file as the configuration file for name server control utility rndc, and the /var/named/
directory for zone files and the like.
2. What Is Bind ?
Answer :BIND stands for Berkeley Internet Name Domain which is the most
commonly used Domain Name System (DNS) server on the Internet.
3. On Which Version Of Bind U Have Worked ?
Answer :
BIND9
4. What Is The Role Of Dns ?
Answer :A DNS server, or name server, is used to resolve an IP address to a
hostname or vice versa.
5. On Which Port Dns Server Works ?
Answer :DNS servers use port 53 by default. Incoming and outgoing packets should
be allowed onport 53. Also allow connections on port 921 if you configure a
lightweight resolver server.The DNS control utility, rndc, connects to the DNS server
with TCP port 953 by default. Ifyou are running rndc on the name server, connections
on this TCP port from localhostshould be allowed. If you are running rndc on
additional systems, allow connections toport 953 (or whatever port you have chosen
to configure) from these additional systems.
6. What Is Round Robin Dns?
Answer :Round robin DNS is usually used for balancing the load of geographically
distributed Web servers. For example, a company has one domain name and three
identical home pages residing on three servers with three different IP addresses.
When one user accesses the home page it will be sent to the first IP address. The
second user who accesses the home page will be sent to the next IP address, and
the third user will be sent to the third IP address. In each case, once the IP address is
given out, it goes to the end of the list. The fourth user, therefore, will be sent to the
first IP address, and so forth.
7. What Is Name Server?
Answer :A name server keeps information for the translation of domain names to IP
addresses and IP addresses to domain names. The name server is a program that
performs the translation at the request of a resolver or another name server.
8. What Is Primary Name Server Or Primary Master Server?
Answer :Primary name server/primary master is the main data source for the zone. It
is the authoritative server for the zone. This server acquires data about its zone from
databases saved on a local disk. The primary server must be published as an
authoritative name server for the domain in the SOA resource record, while the
primary master server does not need to be published.
9. What Is Secondary Name Server/slave Name Server?
Answer :Secondary name server/slave name server acquires data about the zone
by copying the data from the primary name server (respectively from the master
server) at regular time intervals. It makes no sense to edit these databases on the
secondary name servers, although they are saved on the local server disk because
they will be rewritten during further copying.
10. What Is Root Name Server?
Answer :Root name server is an authoritative name server for the root domain (for
the dot). Each root name server is a primary server, which differentiates it from other
name servers.
Answer :
The named-checkconf utility checks the syntax of the named.conf configuration file.
Answer :
The named-checkzone utility checks the syntax and consistency of the zone file.
o You will be able to defragment only the local disk drive volumes.
o You will not be able to defragment more than one disk drive volume at a time.
o You will not be able to defragment one disk drive volume when scanning another.
o You will not be able to make a schedule defragmentation. In case you need to make
a schedule disk defragmentation then use ‘Defrag.exe’ command line tool. This is
able to process only one MMC snap-in at a time.
o Other products that are discussed in this article are of third-party and those are
independent companies and it is not connected with Microsoft. Microsoft will not be
responsible about the reliability or performance and there is no warranty made by
Microsoft about the usage of those products.
7. What To Do If There Are Problems After The Installation Of New
Software?
Answer :
Right after the installation of any driver, utility or some other software programs you
will be facing lots of issues and those problems may be caused by some reasons as
below:
o Generally, while any of the programs has stopped responding then ‘Task Manager’
can be opened in order to close the program. Press ‘Ctrl+Alt+Del’ on your computer’s
keyboard to open the ‘Task Manager’ and select the program which has stopped
responding. After that click on ‘End Task’, and then the program will be ended.
Sometimes another window opens with the option ‘End Now’, if it shows up then you
should click on ‘End Now’.
o You will not be able to recover the unsaved work while running this process and
unfortunately, there isn’t any option either.
o If you are continuously having this problem of stop responding then it is
recommended to run the troubleshooting program and that may be very helpful.
9. In Order To Inspect Your Computer’s Internet Connection That Has
Windows Xp, You Start A Command. What Happens Next?
Answer :
DNS cache can be the causative factor of the temporary DNS problems which is
maintained by Windows XP for performance reasons. In case you are having problem
in reaching even a single site then you should use the ‘ipconfig’ command in order to
delete the DNS cache by the ‘flushdns’ switch.
10. What To Do If There Is An Unreadable Language On The Logon
Screen That Will Probably Not Accept Your Username And
Password? Is There Any Bypass Or Just A Removing Technique?
Answer :
If you are having the above problem, then follow the steps below:
o Start the system and press ‘F8’ key at the time of Windows starting up. After this
select ‘Safe Mode’ in the command prompt and just enter. Select ‘Administrator’ if you
do not set any password then the default password may be blank. Then you will be
entering into the doc command simply as follow:
o Type there ‘net user net user xxx 123456 /add’ (xxx will be the locked account’s name
and the numbers 123456 will be the new password for the new account). After all this
you will see the command finished successfully.
Please note that the above tips will be helpful if the Administration’s password is not
set.
But if the password has already been set then you should follow the steps
below:
o First of all burning process must be done to a USB flash drive in order of removing
the forgotten or lost password of your Windows operating system.
o Prepare to boot your computer using a USB flash drive.
o Then recover the forgotten or lost password of your Windows using the USB flash
drive that you burned initially.
o For the detail, it is possible to search for the ‘Windows Password Recovery Enhance’
.
o HKLM/Software/Microsoft/Windows/Current Version/Uninstall/
o Or there are some programs which are designed to uninstall the programs such ‘Total
Uninstall’ is a good uninstaller.
o Or you could run a maintenance utility for example CCLEANER.
18. What Are The Ways To Fix The Blue Screen Errors Of Your
Computer’s Windows?
Answer :
Prior to fixing the blue screen errors or screen of death (BSoD) errors of your
Windows operating system, it is necessary to recognize the error clearly. You will
come across several blue screen errors.
Note: In case you are facing the blue screen display and after that the computer
reboots immediately without letting you read the text on the blue screen then follow
the steps below. In case you are not getting the chance to perform the step by step
action in Windows then you should boot your computer in the ‘Safe Mode’.
o Right-click on the ‘My Computer’ icon and then select the ‘Properties’ option from the
list.
o Click on the ‘Advanced Tab’ on the system properties window.
o Now click on the ‘Setting Button that is under the Startup and Recovery.