Professional Documents
Culture Documents
svl=overview
http://www.techinterviews.com/?p=229
1. Distribution List?
2. GAL, Routing Group, Stm files, Eseutil & ininteg - what are they used for?
3. What is MIME & MAPI?
4. List the services of Exchange Server 2000?
5. How would you recover Exchange server when the log file is corrupted?
1. On a recent interview i was asked “What is the maximum storage capacity for Exchange
standard version? What would you do if it reaches maximum capacity?”
2. 1. boot process in windows nt/xp/2000/2003
2. how do you configure memory dump if c:,d:,e: & paging file is configured so and so
way?
3. backups ? which is better, why and which to use when?
4. disaster recovery plan?
5. DHCP lease process
6. DNS zones, chronicle records what are they?
7. DHCP relay agent where to place it?
8. what is active directory compared to SAM?
9. what is GC? how many required for A Tree?
10. what is forest?
11. Group policies?
12. FSMO Roles?
Can I changed password if my machince’s connectivity to DC who holds PDC emulator role has
been fails?
Exchange 2000 Server Standard Edition limits the database size to 16 gigabytes.
(what happend if i give that ip and what happend about the replication of ther dc when i
am in suspend mode) ?
1. i have been asked if there is set of 30 harddisk configured for raid 5 if two harddisk failed
what about data
i have been asked if there is set of 30 harddisk configured for raid 5 if two harddisk failed what
about data
1.How Can i Deploy the Latest Patched in Pc through G.P. wihtout having the Admin Right in
Pc.
2.How to remove the $sharing through G.P. in 1000 PCs.
3.In Raid 5,Suppose i have 5 HDD of 10-10 GB, After configuring the Raid how much space do
i have for utilise.
4.How Can i Resolve the Svr name through Nslookup.
Q) i have been asked if there is set of 30 harddisk configured for raid 5 if two harddisk
failed what about data
A) It depends how u had configured ur RAID its only Raid5 or with with spare if its only
raid 5 then in raid5 if ur 2 nos of HDD goes then ur raid is gone.
Q) How Can i Deploy the Latest Patched in Pc through G.P. wihtout having the Admin
Right in Pc.
A) Create a batch file and place all the patches in the Netlogon, and deploy the batch file
through GP to all the pcs so the same should take affect after restarting the pc.
Q) In Raid 5,Suppose i have 5 HDD of 10-10 GB, After configuring the Raid how much
space do i have for utilise.
A) -1 out of the total (eg- if u r using 5 u will get only 4 because 1 goes for parity).
1. How Can i Deploy the Latest Patched in Pc through G.P. wihtout having the Admin
Right in Pc.
A) Create a batch file and place all the patches in the Netlogon, and deploy the batch file
through GP to all the pcs so the same should take affect after restarting the pc.
you can only publish or assign msi packages or Zap files. They are the only two valid file
formats allowable when using “intellimirror”. in active directory.
what is sysprep?
what is netlogon?
1. It is hotfix, which microsoft realese whenever there is a bug or for updation of Operating
system.
(3)what is the difrences btwen 2k , 2k3 and xp?
Xp is a client operating system it cannot act as a server, 2k domain name cannot be
renamed, no shadow copying, 2k3 domain name can be renamed, shadow copying is
possible
(4)how many types DNS
I think there are about 7 types…
(1)WHAT IS T-VOLI.
Tivoli is montiroing tool
(7) WHICH PROTOCOL USED FOR SENDING MESSAGE.
SNMP
(9) WHAT IS THE FUNCTION OF DHCP?
for providing ip address dynamically
Like that some other security features added in Win2k3, main features are above
This is a mail server.. we can use this Server to send mails in Intranet as well as outside.
Is a collection of trees. Tree is nothing but collection domains which is having same
name space.
domain contains domain controllers..
forest — Tree — Domain –
Global Catalog server is a Searchable Index book. With this we can find out any object in
the Active Directory.
We can have each domain controller in domain or only first domain controller in a
domain..
–Stub is like secondary but it contains only copy of SOA records, copy of NS records,
copy of A records for that zone. No copy of MX, SRV records etc.,
With this Stub zone DNS traffic will be low
RID Master — It assigns RID and SID to the newly created object like Users and
computers. If RID master is down (u can create security objects upto RID pools are
avialable in DCs) else u can’t create any object one its down
Infrastructure Master: This works when we are renaming any group member ship object
this role takes care.
Domain Naming Master : Adding / Changing / Deleting any Domain in a forest it takes
care
*** FTP, NNTP, SMTP, KERBEROS, DNS, DHCP, POP3 port numbers?
FTP : 20, 21
(20 is for controlling, 21 is Transmitting)
NNTP : 119
SMTP : 25
Kerberos : 88
DNS : 53
DHCP : 67, 68
Pop3 : 110
*** What is Kerberos? Which version is currently used by Windows? How does
Kerberos work?
Kerberos is the user uthentication used in Win2000 and Win2003 Active Directory
servers
Port is : 88
1. What is the new major feature introduced in Exchange 2003, which was not included in
Exchange 2000?
What are the port Numbers for pop3, imap, smtp port, smtp over ssl, pop3 over ssl, imap
over ssl ?
If you have deleted the user, after you recreated the same user. How you will give the
access of previous mail box ?
Ans : A DHCP lease is the amount of time that the DHCP server grants to the DHCP
client permission to use a particular IP address. A typical server allows its administrator
to set the lease time.
Ans: Deals with the restoration of computer system with all attendent software and
connections to full functionality under a variety of damaging or interfering external
condtions.
ANS: SMTP
Ans: Take the system state data backup. This will backup the active directory database.
Microsoft recomend only Full backup of system state database
IIS
SMTP
WWW service
NNTP
.NET Framework
ASP.NET
Then run Forestprep
The run domainprep
Scope in dhcp, where u can specify a range of IP Address which will be leased to the
dhcp clients.
Superscope is the combination of multiple scopes
1. What are the port Numbers for pop3, imap, smtp port, smtp over ssl, pop3 over ssl, imap
over ssl ?
POP3 : 110
Standard IMAP4 : 143
SMTP : 25
pop3 over ssl : 992
imap over ssl : 993
* IIS
* SMTP services
* NNTP services
* ASP.NET
* www services
* .net framework
1. What is a smarthost?
A Exchange server is having bandwidth issues, explain how you would look at fixing the
issue?
If you use the Reset button to cold boot the computer, it generally restarts the boot
process, including the POST. However, this procedure does not necessarily discontinue
power to the motherboard. If the power is not interrupted, the cold boot may fail to reset
all adapters in the computer’s adapter slots.
but in Exchange Server 2003 Enterprise, there are Specific Features which :
2) What are the six different services which are installed while we are setting up a new
Domain Controller?
5) Can we create a Recovery Disk for Domain Controller and all the softwares so that in
case there is a failure we can recover the domain or we can setup a new domain on a
different computer?
1. What is the maximum storage capacity for Exchange standard version? What would you
do if it reaches maximum capacity?”
16GB.Once the store dismounts at the 16GB limit the only way to mount it again is to use
the 17GB registry setting. And even this is a temporary solution.
if you apply Exchange 2003 SP2 to your Standard Edition server, the database size limit
is initially increased to 18GB. Whilst you can go on to change this figure to a value up to
75GB, it’s important to note that 18GB is the default setting
HKLM\System\CurrentControlSet\Services\MSExchangeIS\{server name}\Private-
{GUID
It therefore follows that for registry settings that relate to making changes on a public
store, you’ll need to work in the following registry key:
HKLM\System\CurrentControlSet\Services\MSExchangeIS\{server name}\Public-
{GUID}
1. Correction:
Q) Can I changed password if my machince’s connectivity to DC who holds PDC
emulator role has been fails?
A) YES YOU CAN. However, the change will only take place on the DC you are
currently connected to. legacy clients, such as NT4, require the PDC emulator. But 2000
and up only require access to a writeable DC, which by default, all DCs are writeable.
The PDC emulator is responsible for replicating any changes made on other domain
controllers to the other DCs in the domain. As such, if the PDC emulator is offline, then a
change on one DC will not take be “seen” on another DC. So the client may have logon
issues if it attempts to use another DC
backup refers to making copies of data so that these additional copies may be used to
restore the original after a data loss event. These additional copies are typically called
“backups.”
Types of Backup
Full backup is the starting point for all other types of backup and contains all the data in
the folders and files that are selected to be backed up. Because full backup stores all files
and folders, frequent full backups result in faster and simpler restore operations.
Remember that when you choose other backup types, restore jobs may take longer.
Differential backup contains all files that have changed since the last FULL backup. The
advantage of a differential backup is that it shortens restore time compared to a full
backup or an incremental backup. However, if you perform the differential backup too
many times, the size of the differential backup might grow to be larger than the baseline
full backup.
Incremental backup stores all files that have changed since the last FULL,
DIFFERENTIAL OR INCREMENTAL backup. The advantage of an incremental backup
is that it takes the least time to complete. However, during a restore operation, each
incremental backup must be processed, which could result in a lengthy restore job.
Mirror backup is identical to a full backup, with the exception that the files are not
compressed in zip files and they can not be protected with a password. A mirror backup
is most frequently used to create an exact copy of the backup data. It has the benefit that
the backup files can also be readily accessed using tools like Windows Explorer
RID Master — It assigns RID and SID to the newly created object like Users and
computers. If RID master is down (u can create security objects upto RID pools are
avialable in DCs) else u can’t create any object one its down
PDC emulator : It works as a PDC to any NT Bdcs in your environment, It works as
Time Server (to maintain same time in your network).It works to change the passwords,
lockout etc.,
Infrastructure Master: This works when we are renaming any group member ship object
this role takes care.
Domain Naming Master : Adding / Changing / Deleting any Domain in a forest it takes
care
Schema Master : It maintains structure of the Active Directory in a forest.
MAPI Messaging Application Programming Interface It’s the programming interface for
email
Disaster recovery is the process, policies and procedures of restoring operations critical to
the resumption of business, including regaining access to data (records, hardware,
software, etc.), communications (incoming, outgoing, toll-free, fax, etc.), workspace, and
other business processes after a natural or human-induced disaster
A DHCP scope is a valid range of IP addresses which are available for assignments or
lease to client computers on a particular subnet. In a DHCP server, you configure a scope
to determine the address pool of IPs which the server can provide to DHCP clients.
FTP : 21,20
NNTP : 119
SMTP : 25
Kerberos : 88
DNS : 53
DHCP : 67, 68
Pop3 : 110
1. Distribution List?
Distribution list is a term sometimes used for a function of email clients where lists of
email addresses are used to email everyone on the list at once. This can be referred to as
an electronic mailshot. It differs from a mailing list, electronic mailing list or the email
option found in an Internet forum as it is usually for one way traffic and not for
coordinating a discussion. In effect, only members of a distribution list can send mails to
the list.
1. what is hotfix ?
A hotfix is code (sometimes called a patch) that fixes a bug in a product.
DORA
D (Discover) : DHCP Client sends a broadcast packets to identify the dhcp server, this
packet will contain the source MAC.
O (Offer) : Once the packet is received by the DHCP server, the server will send the
packet containing Source IP and Source MAC.
R (Request) : Client will now contact the DHCP server directly and request for the IP
address.
A (Acknowledge) : DHCP server will send an ack packet which contains the IP address.
Q: in exchange 2k3server standard edition and enterprise edition how many user can be
created
A: in exchange 2k3 server standard edition 200 to 250 user can be created
in exchange 2k3 server enterprise edition
more than 700 user can be created
1. : what are the minimum hardware requirment for installation of exchange 2k3 server
1. what are the minimum software requirment for installation of exchange 2k3 server