ipconfig /all 2. Hierarchy of DNS Resolution Hosts file -> C:\Windows\System32\drivers\etc\hosts WNS -> can be found in IPv4 advanced setting under network & sharing center DNS Server 3. What is DNS load balancing? Mapping of an FQDN to multiple IP addresses 4. Types of DNS record A – FQDN to IPv4 address AAAA – FQDN to IPv6 address CNAME – FQDN to FQDN MX – for mail exchange records PTR – opposite of A record; maps IPv4 address to an FQDN 5. How to check routes in a routing table via CMD? route print 6. How to add route? 2 ways. 1. Via CMD – route add 172.16.121.0 mask 255.255.255.0 10.231.3.1 metric 1 if 1 2. Through IPv4 advanced setting under network & sharing center i. Why is it important to add an interface when adding a static route? For it to know which NIC it will go, especially if you have a lot of NICs 7. If you have 2 NIC, there’s 2 ways to determine which NIC should be used for default traffic? 1. Via CMD – route add 0.0.0.0 mask 0.0.0.0 192.168.1.1 2. Re-order NICs in Control Panel 8. What is ping? Ping is used to troubleshoot connectivity and reachability, and also used for name resolution 9. Telnet Telnet is a protocol used to remotely connect to another server 10. Traceroute (explain each hops) Tracert has 11. How to check open ports? Netstat -a 12. How to check service running on that port? Netstat -b 13. Basic Ports a. RDP – 3389 b. RPC – 135 c. SMB – 139, 445 d. DNS – 53 e. SSH – 22 f. Telnet – 23 g. FTP – 20, 21 h. SMTP – 25 i. DHCP – 67, 68 j. SNMP – 161, 162 k. LDAP - 389 14. How to check logs? Differentiate each category in Event Viewer You can check the logs via the Event Viewer a. Application – logs concerning to a software or an application b. Security – logs concerning to a user’s login c. System – anything related to the OS 15. How to monitor servers from outside? Differentiate the 2. 1. SNMP – is non-proprietary, less resources & open source 2. WMI – is used for Windows only 16. How to start/stop/restart a service? Services.msc 17. How to open local policy? Gpedit 18. Differentiate Computer Configuration and User Configuration Computer configuration – policies were applied to the local computer; it applies once the machine has turned on User Configuration – the policies were applied to users; it applies once the user has logged in 19. What if you have a local policy and a group policy, which will be applied? It will apply the more specific policy. Local policy first, then group policy. 20. How to install features? Go to server manager > select server > add roles and features wizard 21. How do you do NIC Teaming? Go to server manager > local server properties > click on NIC teaming 22. How to trace IP conflict in server?
23. How to add remote user?
This PC > Properties > Remote Setting > Allow Sharing > Select User 24. How to know the name of the machine? hostname 25. How do you check logged in users? 2 ways. 1. Task Manager 2. Query user 26. How do you check which domain is the user connected? Set user 27. How do you check which domain your server is connected to? This PC > Properties > Domain 28. How do you turn on or turn off firewall settings?
29. How to set boot options, startup configurations?
msconfig 30. How to partition disk, extend, or shrink? Administrative tools > Computer Management > Disk Management 31. You logged in, and you had a temporary profile. How are you going to fix it? Look for the user’s folder under C:\Users and delete it; Go to registry editor, Computer\HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\Current Version\Profile List\<User’s Folder> 32. How will your setup sites in IIS?
33. How do you generate CSR?
Login to your server, go to IIS Manager > Server Certificates > click on create CSR, fill in appropriate details such as Common Name, Organization, OU, City, State, Country then select 2048-bit length for RSA SChannel Cryptographic Provider a. Where’s the key? The key is in the server where you generated the CSR. This needs to exported from the server 34. What is a RAID? RAID is a virtualization technology that is used to organize multiple disk in various arrangements to achieve a specific goal, say for redundancy, speed, and capacity 35. Differentiate Software Raid and Hardware Raid. Software Raid – the memory architecture is being managed by the OS Hardware Raid – there is a dedicated controller or processor inside the disk that manages the memory 36. Enumerate and differentiate the types of Raid. RAID 0 (Striping) – if 1 disk fails, all data will be lost RAID 1 (Mirroring) – same speed, you don’t have to worry if 1 disk fails because it can still be recovered RAID 5 (Striping with Single Parity) – just like raid 0 but much better because it has redundancy; 1/3 of disk capacity is allocated to parity; if single disk fails, you can still recover the data RAID 6 (Striping with Dual Parity) – just like raid 5 but can handle up to 2 disk failures RAID 1+0 (Hybrid) – It’s a combination of Striping & Mirroring; it can perform fast and has redundancy and fault tolerance but this is expensive 37. Hot Standby vs Cold Standby Hot Standby – simultaneously running together with another identical primary system; if the system fails, hot standby will take over the primary Cold Standby – this still needs to be turned on once to install and configure the system and data and is turned off until needed