Professional Documents
Culture Documents
Q: -What is LSDOU?
It’s group policy inheritance model, where the policies are applied to Local machines, Sites, Domains and Organizational
Units.
Q: - You change the group policies, and now the computer and user settings are in conflict. Which one has the
highest priority?
The computer settings take priority.
Q: -You want to set up remote installation procedure, but do not want the user to gain access over it. What do
you do?
gponame–> User Configuration–> Windows Settings–> Remote Installation Services–> Choice Options is your friend.
Q: -What can be restricted on Windows Server 2003 that wasn’t there in previous products?
Group Policy in Windows Server 2003 determines a users right to modify network and dial-up TCP/IP properties. Users may
be selectively restricted from modifying their IP address and other network configuration parameters.
Q: - Where is secedit?
It’s now gpupdate.
Q: -You want to create a new group policy but do not wish to inherit.
Make sure you check Block inheritance among the options when creating the policy.
Q: - What’s the major difference between FAT and NTFS on a local machine?
FAT and FAT32 provide no security over locally logged-on users. Only native NTFS provides extensive permission control on
both remote and local files.
Q: - How do FAT and NTFS differ in approach to user shares?
They don’t, both have support for sharing.
Q: -Explan the List Folder Contents permission on the folder in NTFS.
Same as Read & Execute, but not inherited by files within a folder. However, newly created subfolders will inherit this
permission.
3
Q: - I have a file to which the user has access, but he has no folder permission to read it. Can he access it?
It is possible for a user to navigate to a file for which he does not have folder permission. This involves simply knowing the
path of the file object. Even if the user can’t drill down the file/folder tree using My Computer, he can still gain access to
the file using the Universal Naming Convention (UNC). The best way to start would be to type the full path of a file into
Run… window.
Q: - What’s the difference between standalone and fault-tolerant DFS (Distributed File System) installations?
The standalone server stores the Dfs directory tree structure or topology locally. Thus, if a shared folder is inaccessible or if
the Dfs root server is down, users are left with no link to the shared resources. A fault-tolerant root node stores the Dfs
topology in the Active Directory, which is replicated to other domain controllers. Thus, redundant root nodes may include
multiple connections to the same data residing in different shared folders.
Q: -We’re using the DFS fault-tolerant installation, but cannot access it from a Win98 box.
Use the UNC path, not client, only 2000 and 2003 clients can access Server 2003 fault-tolerant shares.
Q: -How does Windows 2003 Server try to prevent a middle-man attack on encrypted line?
Time stamp is attached to the initial client request, encrypted with the shared key.
Q: - What third-party certificate exchange protocols are used by Windows 2003 Server?
Windows Server 2003 uses the industry standard PKCS-10 certificate request and PKCS-7 certificate response to exchange
CA certificates with third-party certificate authorities.
Q: - If hashing is one-way function and Windows Server uses hashing for storing passwords, how is it possible
to attack the password lists, specifically the ones using NTLMv1?
A cracker would launch a dictionary attack by hashing every imaginable term used for password and then compare the
hashes.
Q: -What’s the difference between guest accounts in Server 2003 and other editions?
More restrictive in Windows Server 2003.
Q: -How many passwords by default are remembered when you check "Enforce Password History
Remembered"?
User’s last 6 passwords.
Q: - What is DHCP?
DHCP stands for "Dynamic Host Configuration Protocol".
Q: - What is an IP address?
An IP address (also called an IP number) is a number (typically written as four numbers separated by periods, i.e.
107.4.1.3 or 84.2.1.111) which uniquely identifies a computer that is making use of the Internet. It is analogous to your
telephone number in that the telephone number is used by the telephone network to direct calls to you. The IP address is
used by the Internet to direct data to your computer, e.g. the data your web browser retrieves and displays
when you surf the net. One task of DHCP is to assist in the problem of getting a functional and unique IP number into the
hands of the computers that make use of the Internet.
Q: - Who Created It? How Was It Created?
DHCP was created by the Dynamic Host Configuration Working Group of the Internet Engineering Task Force (IETF; a
volunteer organization which defines protocols for use on the Internet). As such, it's definition is recorded in an Internet
RFC and the Internet Activities Board (IAB) is asserting its status as to Internet Standardization. As of this writing (June
1998), DHCP is an Internet Draft Standard Protocol and is Elective. BOOTP is an Internet Draft Standard Protocol and is
recommended. For more information on Internet standardization, see RFC2300 (May 1998)
6
Q: - How can I prevent unauthorized laptops from using a network that uses DHCP for dynamic addressing?
This would have to be done using a mechanism other than DHCP. DHCP does not prevent other clients from using the
addresses it is set to hand out nor can it distinguish between a computer's permanent MAC address and one set by the
computer's user. DHCP can impose no restrictions on what IP address can use a particular port nor control the IP address
used by any client.
DHCP is based on BOOTP and maintains some backward compatibility. The main difference is that BOOTP was designed for
manual pre-configuration of the host information in a server database, while DHCP allows for dynamic allocation of
network addresses and configurations to newly attached hosts. Additionally, DHCP allows for recovery and reallocation of
network addresses through a leasing mechanism.
RARP is a protocol used by Sun and other vendors that allows a computer to find out its own IP number, which is one of
the protocol parameters typically passed to the client system by DHCP or BOOTP. RARP doesn't support other parameters
and using it, a server can only serve a single LAN. DHCP and BOOTP are designed so they can be routed.
Q: - What is an IP address?
An IP address (also called an IP number) is a number (typically written as four numbers separated by periods, i.e.
107.4.1.3 or 84.2.1.111) which uniquely identifies a computer that is making use of the Internet. It is analogous to your
telephone number in that the telephone number is used by the telephone network to direct calls to you. The IP address is
used by the Internet to direct data to your computer, e.g. the data your web browser retrieves and displays
when you surf the net. One task of DHCP is to assist in the problem of getting a functional and unique IP number into the
hands of the computers that make use of the Internet.
Only if the DHCP client were specifically written to make use of the answer from a BOOTP server. It would presumably
treat a BOOTP reply as an unending lease on the IP address.
In particular, the TCP/IP stack included with Windows 95 does not have this capability.
but no lease will expire for any computer turned on at the time that the outage commences. Another factor is that the
longer the lease the longer time it takes for client configuration changes controlled by DHCP to propogate.
Q: - How can I prevent unauthorized laptops from using a network that uses DHCP for dynamic addressing?
This would have to be done using a mechanism other than DHCP. DHCP does not prevent other clients from using the
addresses it is set to hand out nor can it distinguish between a computer's permanent MAC address and one set by the
computer's user. DHCP can impose no restrictions on what IP address can use a particular port nor control the IP address
used by any client.
Q: - What is multicasting?
Multicasting allows a single message to be sent to a group of recipients. Emailing, teleconferencing, are examples of
multicasting. It uses the network infrastructure and standards to send message.
Q: - What is Telnet ?
Telnet is the main Internet protocol for creating a connection to a remote server.
11
Centralizes control of network resources By centralizing control of resources such as servers, shared files, and printers,
only authorized users can access resources in Active Directory.
Centralizes and decentralizes resource management Administrators have Centralized Administration with the ability to
delegate administration of subsets of the network to a limited number of individuals giving them greater granularity in
resource management.
Store objects securely in a logical structure Active Directory stores all of the resources as objects in a secure, hierarchical
logical Structure.
Optimizes network traffic The physical structure of Active Directory enables you to use network bandwidth more
efficiently. For example, it ensures that, when users log on to the network, the authentication authority that is nearest to
the user, authenticates them reducing the amount of network traffic.
A forest is a grouping of one or more trees. As noted above with our example of tailspintoys.com and nwtraders.com, each
of those is a tree within our forest even though their naming conventions are not related. It does not matter if each Tree is
made up with a single, or multiple domains. Forests allow organizations to group together divisions that do not use the
same naming scheme, and may need to operate independently, but still need to communicate with the entire organization
via transitive trusts, and share the same schema and configuration container.
The first domain in the forest is called the forest root domain. The name of that domain refers to the forest, such as
nwtraders.msft. By default, the information in Active Directory is shared only within the forest. This way, the forest is a
security boundary for the information that is contained in the instance of Active Directory
Q: - How many types of replication in Active Directory?
Active Directory Intrasite Replication
Intrasite replication in Active Directory takes place between domain controllers within the same site. This makes intrasite
replication an uncomplicated process. When changes are made to the replica of Active Directory on one particular domain
controller, the domain controller contacts the remainder of the domain controllers within the site. The domain controller
checks the information it contains against information hosted by the other domain controllers. To perform this analysis, the
domain controller utilizes logical sequence numbers. Intrasite replication utilizes the Remote Procedure Call (RPC) protocol
to convey replication data over fast, reliable network connections. With intrasite replication, replication data is not
compressed.
Active Directory Intersite Replication
Intersite replication takes place between sites. Intersite replication can utilize either RPC over IP or SMTP to convey
replication data. This type of replication has to be manually configured. Intersite replication occurs between two domain
controllers that are called bridgeheads or bridgehead servers. The role of a bridgehead server (BS) is assigned to at least
one domain controller in a site. A BS in one site deals with replicating changes with other BSs in different sites. You can
configure multiple bridgehead servers in a site. It is only these BSs that replicate data with domain controllers in different
domains by performing intersite replication with its BS partners. With intersite replication, packets are compressed to save
bandwidth. This places additional CPU load on domain controllers assigned the BS role. BSs should therefore be machines
that have enough speed and processors to perform replication. Intersite replication takes place over site links by a polling
method which is every 180 minutes by default.
FSMO stands for Flexible Single Master Operations and is pronounced “fiz-mo.” FSMOs are tasks performed by specific
domain controllers within a domain or forest. Unlike normal Active Directory (AD) operations, which are performed by all
domain controllers in a domain, only one domain controller performs the special FSMO tasks. The FSMO tasks, or roles, are
• The schema master is responsible for handling all changes to the AD schema. Only one
domain controller in a forest acts as the schema master. If a trust relationship is
established between two domain trees (thereby establishing a forest), two schema masters
will exist in the forest (one from both domains). One of them will automatically stop
acting as schema master.
• The domain-naming master is responsible for ensuring the uniqueness of domain names
throughout a forest and for adding domains to or removing them from the forest. Only
one domain controller in a forest acts as the domain-naming master.
• The relative ID (RID) master is responsible for issuing RIDs within a domain. Only one
domain controller in a domain acts as the RID master.
• The infrastructure master is responsible for updating group-to-user references whenever
the members of a group are renamed or changed. Only one domain controller in a domain
acts as the infrastructure master. The infrastructure master checks a Global Catalog (GC)
server to see when changes have been made.
• The primary domain controller (PDC) emulator is responsible for updating any Windows
NT backup domain controllers (BDCs) in your domain. The PDC emulator also processes
password changes from non-Windows 2000 (Win2K) client computers, just as an NT
PDC would do. Only one computer in a domain acts as the PDC emulator.
Q: - What is "LDIF" ?
The LDAP Interchange Format (LDIF) is a standard text file format for storing LDAP configuration information and directory
contents. LDIF files are often used to import new data into your directory or make changes to existing data.
Q: - What is the name of main configuration file name for LDAP server ?
15
slapd.conf
Q: - What is LDAP ?
LDAP stands for Lightweight Directory Access Protocol. In plain and simple terms, its a database whereby it has all the
details of all of organizations, individuals, and other resources such as files and devices in a network, whether on the
Internet or on corporate intranetand whether or not you know the domain name, IP address, or geographic whereabouts.
An LDAP directory can be distributed among many servers on a network, then replicated and synchronized regularly. An
LDAP server is also known as a Directory System Agent (DSA). Its a not a relational database. Outlook and other email
programs uses LDAP to search for a recipient in an organization.
Q: - what is SLAPD?
SLAPD stands for Stand-Alone LDAP.Clients connect to the server over the LDAP protocol, usually using a network-based
connection (though SLAPD provides a UNIX socket listener).
Q: - Define Schemas?
Schemas provide definitions of the different object classes and attribute types that OpenLDAP should support. Using these,
OpenLDAP can determine what entries it is allowed to store, whether any given entry is valid, and how entries should
optimally be stored.
Q: - What is HDB?
HDB is the new generation storage mechanism for OpenLDAP. Like its predecessor, the BDB backend, HDB uses the Oracle
BerkeleyDB database for storage, but HDB stores entries hierarchically, a perfect fit for LDAP's tree structure. The old BDB
backend is still supported, and you can use it by specifying bdb instead of hdb in the database directive.
Q: - Tell me the name of logical operators which are used in ldap filters.
AND (&), OR (|), and NOT (!)
Q: - What is Virtualization ?
Virtualization (or virtualisation), in computing, is the creation of a virtual (rather than actual) version of something, such as
a hardware platform, operating system, a storage device or network resources.
Full virtualization: Almost complete simulation of the actual hardware to allow software, which typically consists of a
guest operating system, to run unmodified Partial virtualization: Some but not all of the target environment is simulated.
Some guest programs, therefore, may need modifications to run in this virtual environment.
Paravirtualization: A hardware environment is not simulated; however, the guest programs are executed in their own
isolated domains, as if they are running on a separate system. Guest programs need to be specifically modified to run in
this environment.
1. VMWare infrastructure consists of the lowest layer which acts as a ESX server host.
2. VMWare infrastructure also use the virtual centre server that keep tracks of all the VM related images and manage it from
one point.
3. VMWare infrastructure (VI) client: this allows the client to interact with user's applications that are running on VMWare.
4. Web browser is used to access the virtual machines.
5. License server is used to create a server that provides licensing to the applications
6. Database servers are used to maintain a database.
Q: - What is QEMU?
QEMU is a generic and open source machine emulator and virtualizer. When used as a machine emulator, QEMU can run
OS and programs made for one machine (e.g. an ARM board) on a different machine (e.g. your own PC). By using dynamic
translation, Qemu achieves very good performance.
A linked clone is a copy of a virtual machine that shares virtual disks with the parent virtual machine in an ongoing
manner. This conserves disk space, and allows multiple virtual machines to use the same software installation.
Brute forcing is a mechanism which is used by an attacker to break the encryption of data by applying a set of various key.
Cryptanalyst has a set of number of keys and apply them one by one to the encryption algorithm until he get the right key.
Example: http://www.abc.com/online/Displaymsg.asp?msgID=87951
In this example a cryptanalyst may apply bruteforcing to the value of msgID and read the user’s data.
In this the browser requesting for Displaymsg.asp page and sending msgID 87951 to the web server.
Q: - if We have to generate a hash function then what characteristics are needed in a secure hash function?
A secure hash function should have the following characteristics:
A hub is a small, simple, low-priced device that joins multiple computers together. A switch is a small hardware device that
joins multiple computers together within one local area network (LAN) and they operate at layer 2 of the OSI model.
Routers are the physical devices that join multiple wired or wireless networks together and they operate at layer 3 of OSI
model.
Q: - What was the strangest situation that you had to deal with regarding managing a network?
The candidate will answer to this question mentioning an experience in which he/she had difficulties being understood by
the other workers in the company and his/her suggestions were not followed as they were explained, leading to a network
fail or other severe problems.
Q: - Please tell us some job specific tasks that you have performed in your previous organization?
The profession specific tasks that I have performed include installing the original, new version software, keeping record of
all the changes to the network environment, managing local area network and providing backup. I had also supervised all
the activities on the network and developed management information solutions by using business objects.
Q: - How can you explain the meaning of a Remote Procedure Call or RPC?
A Remote Procedure Call makes the complexity of the network hidden. It actually invokes a remote server function and
closes itself until the results come back. This process is a synchronous one.
Q: - Do you difficult for a network administrator to stay so much in front of the computer?
When a person decides to become a network administrator he/she must be aware that physical effort will not take part of
the job and even if it is , in rare occasions, it is minimal. The work of a network administrator resumes to doing different
tasks on the computer and giving phone calls for support. In rare occasions he may act as a system administrator but this
is due to urgency.
Q: - What is the difference between these three: encryption, encoding and hashing?
Encryption is used for keeping data intact and safe and is not so easy to reverse because it requires a certain key.
Encoding is used to protect data as it passed through the network and after reaching the destination the data returns to
the initial state because it is easy reversible process; being easy reversible makes it not so good for data protection.
Hashing is a protection method that is not reversible and the data comes under the form of a string named the hash value.
Q: - What is a Router?
A router is a device or sometimes a software in a computer which decides the next network point to which a packet should
be forwarded to reach its destination on Internet. It is usually included as part of the network switch and is located at a
gateway, including each point-of-presence on the Internet. The router is connected to at least two networks and
determines which way to send each information packet based on its understanding of the state of the networks it is
connected to.
In this technology, all the devices are arranged in a circle. A token moves around the circular network. A device waits for
the token before it sends its frame. Once it receives token, it initiates transmission of its frame.
A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub
contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN
can see all packets.
Q: - What is a Switch ?
In networks, a device that filters and forwards packets between LAN segments. Switches operate at the data link layer
(layer 2) and sometimes the network layer (layer 3) of the OSI Reference Model and therefore support any packet
protocol. LANs that use switches to join segments are called switched LANs or, in the case of Ethernet networks, switched
Ethernet LANs.
A smart switch is able to configure virtual LANs, ports and set up trunking. Smart switches are ideally used in fast LANs,
which are those that support gigabit data transfer. Enterprise managed switches are also called fully managed switches.
They have a wide range of management features, including a web interface, SNMP agent and command-line interface.
Additional features include the ability to restore, backup, modify and display configurations. They have more features than
traditional managed and unmanaged switches and are generally more expensive. They are found in large enterprises,
which are comprised of a large number of connections and nodes.
Q: - What is the order to install Exchange Server 2007 Roles in a exchange Server 2003 organization?
1. Client Access Server Role
2. Hub Transport Server Role
3. Mailbox Server Role
4. Unified Messaging Server role
Q: - What are the Active directory requirements to install Exchange Server 2007?
1. Domain functional level at least windows server 2000 native or higher
2. Schema Master must be run on windows 2003 server with sp1
3. At least one Domain Controller, in each domain with windows server 2003 sp1
4. At least one global catalog server in Active Directory Site which hosts exchange Server 2007
5. 4:1 ratio of Exchange processor to global catalog server processors
Transition is the scenario in which you upgrade an existing Exchange organization to Microsoft Exchange Server 2007. To
perform the transition, you must move data from the existing Exchange servers to new Exchange 2007 servers. For
example, when upgrading from an Exchange Server 2003 or Exchange 2000 Server organization to an Exchange 2007
organization, you perform a transition. When transitioning to Exchange 2007, you cannot perform an in-place server
upgrade on an existing Exchange server. Instead, you must install a new Exchange 2007 server into the existing
organization, and then move data to the new Exchange 2007 server.
Q: - Is it possible to do in place upgrade from Exchange Server 2003 to Exchange Server 2007?
No in-place upgrade on existing Exchange server organization. Install new Exchange Server 2007 server into existing
organization, and move data to new server.
Q: -What are the considerations for Exchange Server 2007 to co exists with Exchange server 2000 and
Exchange Server 2003?
* Exchange Organization in Exchange Native Mode· Exchange Server 2007 routing group (DWBGZMFD01QNBJR) is
created only for coexisting with earlier versions of Exchange.
* Routing Group Connector is required between Exchange Server 2003 and Exchange Server 2007 (created during setup).
* Exchange Server 2003 computers cannot interoperate with the Unified Messaging server role. Exchange 2003 mailboxes
cannot be Unified Messaging–enabled.
* Exchange 2003 Front-ends cannot talk to Exchange Server 2007 Mailbox Server Roles.
* No in-place upgrade on existing Exchange server. Install new Exchange Server 2007 server into existing organization,
and move data to new server
29
Q: - Will Front End server talk to Exchange Server 2007 Mailbox server in an Exchange organization having
both exchange 2003 and exchange Server 2007?
Exchange Server 2003 Front-end server cannot talk to Exchange Server 2007 Mailbox Server Roles
Q: - What is the status of routing group connector in co existed of Exchange Server 2003 and 2007?
Exchange Organization in Exchange Native Mode· Exchange Server 2007 routing group (DWBGZMFD01QNBJR) is created
only for coexisting with earlier versions of Exchange.
Routing Group Connector is required between Exchange Server 2003 and Exchange Server 2007 (created during setup).
Q: - What to do if exchange Server 5.5 in your organization in order to upgrade to Exchange Server 2007?
You cannot upgrade an existing Microsoft Exchange Server version 5.5 organization to Exchange Server 2007. You must
first migrate from the Exchange Server 5.5 organization to an Exchange Server 2003 or an Exchange 2000 Server
organization. Then you can transition the Exchange 2003 or Exchange 2000 organization to Exchange 2007.
Q: - What are the Planning considerations for Client Access Server Role?
The Client Access server role supports the Outlook Web Access, Outlook Anywhere, and Exchange ActiveSync client
applications, in addition to the POP3 and IMAP4 protocols. The Client Access server role also hosts several key services,
such as the Auto discover service and Exchange Web Services.
30
In order to have better client access functionality we have to perform a Planning consideration on Exchange Active Sync.
Outlook web Access, outlook anywhere, POP3 and IMAP4 protocols and also securing client access
Q: - What are the Planning Considerations for Edge Transport Server Role?
Exchange Server 2007 Edge Transport server role is designed to provide improved antivirus and anti-spam protection for
the Exchange organization. Computers that have the Edge Transport server role also apply policies to messages in
transport between organizations. The Edge Transport server role is deployed in an organization’s perimeter network.
* Edge Transport Should not be included in Active Directory
* Should be installed in a Standalone Server
* Edge Transport Should not be Part of the domain
* ADAM Should be Installed
* Pre requisites .Net framework , Windows Management Shell, MMC