You are on page 1of 3

1.

Basic checking of IP, DNS, and available NIC


ipconfig /all
2. Hierarchy of DNS Resolution
Hosts file -> C:\Windows\System32\drivers\etc\hosts
WNS -> can be found in IPv4 advanced setting under network & sharing center
DNS Server
3. What is DNS load balancing?
Mapping of an FQDN to multiple IP addresses
4. Types of DNS record
A – FQDN to IPv4 address
AAAA – FQDN to IPv6 address
CNAME – FQDN to FQDN
MX – for mail exchange records
PTR – opposite of A record; maps IPv4 address to an FQDN
5. How to check routes in a routing table via CMD?
route print
6. How to add route? 2 ways.
1. Via CMD – route add 172.16.121.0 mask 255.255.255.0 10.231.3.1 metric 1 if 1
2. Through IPv4 advanced setting under network & sharing center
i. Why is it important to add an interface when adding a static route? For it to
know which NIC it will go, especially if you have a lot of NICs
7. If you have 2 NIC, there’s 2 ways to determine which NIC should be used for default traffic?
1. Via CMD – route add 0.0.0.0 mask 0.0.0.0 192.168.1.1
2. Re-order NICs in Control Panel
8. What is ping?
Ping is used to troubleshoot connectivity and reachability, and also used for name
resolution
9. Telnet
Telnet is a protocol used to remotely connect to another server
10. Traceroute (explain each hops)
Tracert has
11. How to check open ports?
Netstat -a
12. How to check service running on that port?
Netstat -b
13. Basic Ports
a. RDP – 3389
b. RPC – 135
c. SMB – 139, 445
d. DNS – 53
e. SSH – 22
f. Telnet – 23
g. FTP – 20, 21
h. SMTP – 25
i. DHCP – 67, 68
j. SNMP – 161, 162
k. LDAP - 389
14. How to check logs? Differentiate each category in Event Viewer
You can check the logs via the Event Viewer
a. Application – logs concerning to a software or an application
b. Security – logs concerning to a user’s login
c. System – anything related to the OS
15. How to monitor servers from outside? Differentiate the 2.
1. SNMP – is non-proprietary, less resources & open source
2. WMI – is used for Windows only
16. How to start/stop/restart a service?
Services.msc
17. How to open local policy?
Gpedit
18. Differentiate Computer Configuration and User Configuration
Computer configuration – policies were applied to the local computer; it applies once
the machine has turned on
User Configuration – the policies were applied to users; it applies once the user has
logged in
19. What if you have a local policy and a group policy, which will be applied?
It will apply the more specific policy. Local policy first, then group policy.
20. How to install features?
Go to server manager > select server > add roles and features wizard
21. How do you do NIC Teaming?
Go to server manager > local server properties > click on NIC teaming
22. How to trace IP conflict in server?

23. How to add remote user?


This PC > Properties > Remote Setting > Allow Sharing > Select User
24. How to know the name of the machine?
hostname
25. How do you check logged in users? 2 ways.
1. Task Manager
2. Query user
26. How do you check which domain is the user connected?
Set user
27. How do you check which domain your server is connected to?
This PC > Properties > Domain
28. How do you turn on or turn off firewall settings?

29. How to set boot options, startup configurations?


msconfig
30. How to partition disk, extend, or shrink?
Administrative tools > Computer Management > Disk Management
31. You logged in, and you had a temporary profile. How are you going to fix it?
Look for the user’s folder under C:\Users and delete it;
Go to registry editor, Computer\HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
NT\Current Version\Profile List\<User’s Folder>
32. How will your setup sites in IIS?

33. How do you generate CSR?


Login to your server, go to IIS Manager > Server Certificates > click on create CSR, fill in
appropriate details such as Common Name, Organization, OU, City, State, Country then
select 2048-bit length for RSA SChannel Cryptographic Provider
a. Where’s the key?
The key is in the server where you generated the CSR. This needs to exported
from the server
34. What is a RAID?
RAID is a virtualization technology that is used to organize multiple disk in various
arrangements to achieve a specific goal, say for redundancy, speed, and capacity
35. Differentiate Software Raid and Hardware Raid.
Software Raid – the memory architecture is being managed by the OS
Hardware Raid – there is a dedicated controller or processor inside the disk that
manages the memory
36. Enumerate and differentiate the types of Raid.
RAID 0 (Striping) – if 1 disk fails, all data will be lost
RAID 1 (Mirroring) – same speed, you don’t have to worry if 1 disk fails because it can
still be recovered
RAID 5 (Striping with Single Parity) – just like raid 0 but much better because it has
redundancy; 1/3 of disk capacity is allocated to parity; if single disk fails, you can still
recover the data
RAID 6 (Striping with Dual Parity) – just like raid 5 but can handle up to 2 disk failures
RAID 1+0 (Hybrid) – It’s a combination of Striping & Mirroring; it can perform fast and
has redundancy and fault tolerance but this is expensive
37. Hot Standby vs Cold Standby
Hot Standby – simultaneously running together with another identical primary system; if
the system fails, hot standby will take over the primary
Cold Standby – this still needs to be turned on once to install and configure the system
and data and is turned off until needed

You might also like