This action might not be possible to undo. Are you sure you want to continue?
Q. Machine A wants to send some IP data to machine B, but doesn't know the MAC address of B. What is placed in the field for destination MAC address? A. FF-FF-FF-FF-FF-FF (Broadcast) Q. What kind of information can you usually get from a MAC address? A. The first half of the MAC will contain the OUI or “Organizationally Unique Identifier” which typically will allow you to identify the vendor of the network card. The vendor may be able to figure out what card it is as well, assuming they keep that data. Q. What does the acronym MAC stand for? A. Media Access Control Q. How many bytes does it take to represent a MAC address? A. 6 Q. How many bytes does it take to represent an IP address? A. 4 Q. Suppose I have a class C subnet, how many bits are turned on in the subnet mask to properly represent my class C subnet? A. Probably 24, class C is a terminology that is typically used to describe the type of network prescribed by IANA, this could be further chopped down (and usually was). The classing of networks has been replaced by a classless system in 1993 due to a problem of a class C being prescribed initially, and then when this proved too small, in which a class B was used – which was typically far too big. Q. What is the difference between a network address and a broadcast address? A. The host-side of the network is all zeros on the network address and all ones on the broadcast. Q. How many default gateways can a system have? A. There can only be one. Q. Suppose I want another gateway, how do I get one registered on the system? A. The command is route add <network> mask <netmask> <gateway> with a -p for persistent. Q. What does the acronym DNS stand for? A. Domain Naming System. Q. Suppose I want to find the mail server for google.com. What type of record am I looking for and how do I tell nslookup to scan for that type of record. A. set type=mx Q. Suppose I want to do a reverse lookup, what domain would I look in? A. in-addr.arpa for PTR type records. Ipv6 this changes to ip6.arpa.
What does a caching only name server do? A. Port for ping? A. Port for ntp? A. I am a windows 2003 machine and I want to send an http get request to google. Q. This server contains the root hints and is therefore able to resolve addresses on the internet via recursive queries. 137-139. 445 Q. the TTL of said query is typically stored and used as an indicator of how long to keep that request in the cache of the name server before a new recursive query must be issued. Port for netbios? A. 389 / 636 for ldaps Q. Nobody knows. 21 Q. Port for https? A. Once a name is resolved. None. Four to six depending on the version of windows you have. . How many hives are there in the registry? A. 123 Story Questions Q.Q. 80 Q. 25 Q. Port for ftp? A. Port for smtp? A. Port for http? A. Why do we call them hives? A. Lets say I open up the command prompt and type ping google.com. I heard a rumor that one of the developers of windows NT hated bees. can you tell me what I'd need to do in order to pull this off? Q. 443 Q.com. can you describe using as many layers of the OSI model as possible what happens to those packets along the way? General Questions Q. Q. Port for ldap? A. ping is icmp not tcp/ip Q.
Is it possible to get the CD key that the operating system was installed with? A. PDC. Q. Q. Win2k has reached end of life as of July 2010. Is it possible to share files over RDP? A. yes. Q. like a gparted boot disk. A. tell me how to do that.Q. Q. Yes. task manager on the users tab. Q. Q. under advanced options there is an option for “share local disks”. Infrastructure . Probably too many to list. User ID's and usually poorly encrypted passwords. terminal services mmc snap in. WinDbg. Not possible to do while the system is online. 4GB max file size with fat32. Infrastructure Master. I want to find out what security settings are configured on my current machine via policy. Is it possible to change the CD key of windows once this has been provided to the system? A. What are the major differences between fat32 and ntfs? A. for example. Q. AD Related Q. What command could I use to generate a report of all the current settings? A. microsoft provides this capability with a product key update tool. A. RID Master. but a bootable disk and diskpart can do the job. Several 3rd party applications also work. Let's say we had to expand the C: drive. Q. rsop. which are they? A. Yes. Tell me of some ways of determining who is logged into the system. RID. Domain Naming Master. Q.exe Dumpchk. 3 of the FSMO roles are domain level.exe Q. 'net sessions' …. could also use the 'local security policy” editor.exe/kd. With 3rd party tools. my favorite (and only) is PAL. Schema Master. NTFS has far more configuration for security available. 16TB vs 32GB. Name the FSMO roles. PDC Emulator. What tools could you use to analyze a blue screen memory dump? A. qwinsta. Q. Is windows 2000 supported by microsoft? A. also more robust error handling generally speaking. What tools could you use to read a performance report? A. What type of data might you expect to find in the SAM? A. A.
Q. Q. Stored in the %logonserver% variable Q. Q. When a server elects itself to hand the inter-site communication. This status can be viewed with replmon. Is a global catalog required in order for logins to be processed? A. . What does the acronym KCC stand for. Sort of. SYSVOL Q. Every 15 minutes. How would you determine what domain controller processed the login for a user? A. attempting those first. but member servers will not be available for login. 180 minutes. A partial copy of all objects in every domain in the forest. How often does the KCC run? A. How does a member server locate a domain controller to process a logon? A. The member server will poll DNS to find all domain controllers via their service records (SRV) for the local site. local logins to a domain controller for an administrator will still work. 5 minutes. What is the default interval for replication between servers? A.Q. and what is it? A. Bridgehead. what type of server is that called? A. Q. What network share are group policies distributed from? A. typically elected by the KCC. (3 hours) Q. Q. What is the global catalog? A. Knowledge consistency checker. This can be overridden with a registry hack. in which the primary purpose is to create replication links between systems and initiate replication. Q. What is the default interval for replication over an inter-site link? A.