Windows Interview Question & Answers
Windows Interview Question & Answers
Windows Interview Question & Answers
15 Netstat
21 FTP
23 Telnet
25 SMTP
42 WINS
53 DNS
67 Bootp
68 DHCP
80 HTTP
88 Kerberos
101 HOSTNAME
110 POP3
119 NNTP
123 NTP (Network time protocol)
139 NetBIOS
161 SNMP
180 RIS
389 LDAP (Lightweight Directory Access Protocol)
443 HTTPS (HTTP over SSL/TLS)
520 RIP
79 FINGER
37 Time
3389 Terminal services
443 SSL (https) (http protocol over TLS/SSL)
220 IMAP3
3268 AD Global Catalog
3269 AD Global Catalog over SSL
500 Internet Key Exchange, IKE (IPSec) (UDP 500)
diskpart.exe This command is used for disk management in Windows 2003.
nltest /dsgetdc:domainname
replacing domainname with the name of the domain that you are trying to log on to. This
command verifies that a domain controller can be located. Nltest is included in Support
Tools
Properties
What are the print options do u get when you give a print in word?
What are the icons that don’t get delete option on the Desktop (up to 2000 O. S.)?
My Computer
My Network Places
Recycle Bin
Note: In Windows 2003 you can delete My computer, My network places. You can also
get back them.
Right click on Desktop Properties Click on Desktop tab click on customize
desktop select the appropriate check boxes.
Even in 2003 you cannot delete Recycle bin.
Note: You can delete any thing (even Recycle bin) from the desktop by using registry
settings in 2000/2003.
What are the properties of Recycle bin?
General
Check box for Display delete confirmation dialogue box
Check box for whether to move a deleted to Recycle bin or directly delete
Global options (applies to all drives)
Individual Partitions (for each partition there exist one partition)
After creating the root zone then create another zone with Domain Name
Right click on Forward Lookup zone New zone Active Directory Integrated
(you can choose any one) DNS Name [___]Next Finish
If you want to create an Active Directory integrated zone, the server must be Domain
Controller.
If you want to create the Primary DNS, you can create on Domain Controller or Member
server. But if create on member you could not get 4 options under the domain which are
meant for Active directory.
You can create Secondary zone on a Member Server or on a Domain Controller. There is
no difference between them.
Note: A best strategy of using DNS in corporate network is use two DNS servers. One is
on internal network and another one is between two firewalls. For more security keep the
zone as secondary in the DNS server which is between firewalls.
FAQ’s on DNS
What is the purpose of forward lookup?
It resolves the Host names (Friendly Name) to IP addresses
What is BIND?
What are the ports numbers used for Kerberos, LDAP etc in DNS?
Additional Material
What is a zone?
A database of records is called a zone.
Also called a zone of authority, a subset of the Domain Name System (DNS) namespace
that is managed by a name server.
Or
Go to Registry then search for lanmanNt then change it as serverNt
You have to follow the same procedure as same as primary DNS configuration.
But at the time selection, select Secondary zone instead of primary zone. After that it asks
the primary DNS zone address provide that address.
Then it asks for Primary DNS zone details, provide those details then click on
finish.
Now go to Primary or Active Directory integrated zone then right click on zone
name properties click on zone transfer Tab
Select anyone and give the details of secondary zone (only in case of second and third
option).
Click on apply, then OK
Note: In zone transfers tab you can find another option Notify, this is to automatically
notify secondary severs when the zone changes. Here also you can select appropriate
options.
Note: In secondary zone you cannot modify any information. Every one has read only
permission.
Whenever Primary DNS is in down click on “change” tab on general tab of properties, to
change as primary, then it acts as primary, there you can write permission also.
What is the default time setting in primary zone to refresh, Retry, Expire intervals for
secondary zone?
The default settings are
Suppose the Secondary zone is Expired then, how to solve the problem?
How to know whether the recent changes in Primary are updated to secondary zone
or not?
Compare the Serial Number on Start of Authority tab in both secondary on primary DNS
zone properties.
If both are same then recent updates are made to secondary zone.
If not (i.e., secondary is less then primary) click on “Transfer from Master”
Go to the properties of the zone click on general tab, there you can find the option called
“Change” click on it then select appropriate option.
Then click on OK
CBT nuggets
Iterative query
The query that has been sent to my DNS server from my computer.
Recursive query
The query that has been sent to other DNS servers to know the IP address of a particular
server from my DNS server.
When you install a Windows 2000 DNS server, you immediately get all of the records of
root DNS servers. So every windows 2000 DNS server installed on Internet has pre
configured with the address of root DNS servers. So every single DNS server in the
Internet can get root servers.
DNS requirements:
First and foremost has to support SRV records (SRV record identifies a particular
service in a particular computer) (in windows 2000 we use SRV records to identify
Domain controllers, identifying Global Catalogue, etc.
Second and third are not requirements but recommended.
Second is Dynamic Updates
Third one is IXFR (Incremental Zone Transfer)
Note: Most DNS servers support AXFR (i.e., Entire zone transfer)
In incremental we transfer only changes, but in AXFR we transfer whole.
How does DNS server know the root domain server addresses?
Every DNS server that has installed on Internet has pre configured with root DNS server
addresses.
Every single server can get to the root. So that only every DNS server on the Internet first
contacts root DNS servers for name resolution.
Where can you find the address of root servers in the DNS server?
Open the DNS console Right click on the domain name drag down to properties
click on Root hints. Here you can find different root server addresses.
Note: When you install DNS service in a 2000 server operating system (still you have not
configured anything on DNS server), then it starts its functionality as caching only DNS
server.
What is caching only DNS server?
What is a forwarder?
(Open DNS console Right click on Domain name Click on forwarder tab)
A forwarder is server, which has more access than the present DNS server. May be our
present DNS server is located in internal network and it cannot resolve the Internet
names. May be it is behind a firewall or may it is using a proxy server or NAT server to
get to the Internet. Then this server forwards the query to another DNS server that can
resolve the Internet names.
2) Independently
Note: When you have installed DHCP a icon will appear in Administrative Tools
(DHCP)
DHCP
This server
[________________] BROWSE
DHCP
Servername.domain.com [IP address]
Note: Some time the window comes automatically with creating the “Add Server”. Such
cases check the IP address whether it is correct or not. If it is wrong delete it and recreate
it.
Now you have DHCP server.
Now you have to authorize the DHCP Server to provide IP addresses to the clients.
Note: If it is not authorized a red symbol (down red arrow) will appear, if u authorize it
then a green up arrow will appear.
Click on Next.
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Add
Remove
What is the default lease duration, minimum lease duration and maximum lease
duration?
By default any system will get 8 lease days to use IP address.
Note: You can increase or decrease the Lease duration, You have assign at least minimum
duration of 1 second and you can assign Maximum duration of 999 days 23 hours 59
minutes.
Note: If you haven’t log on for 50% of the duration continuously the IP address will be
released.
Click Next
Now you will get a Window asking whether you want to configure the options (DNS,
WINS, and Router etc.)
You can configure the options now itself or you can authorize after completion of this.
Select any one then click Next.
Click Finish.
Note: If u have selected “NO” in the above window you can configure above things
anytime like below
Note: You can reserve IP address for specific Clients. Or You can Exclude IP address
(without allocation) for future purpose.
Go to Client System
Right click on My Network Places drag down to properties Right click on Local
area connection drag down to properties select TCP/IP click on properties
In that select “assign IP address automatically” and select “assign DNS address
automatically”
Click on “More” delete the DNS suffix if anything is there.
Click OK
Note: The DHCP server assigns IP address to the clients. But apart from that it also
provides DNS address, default gateway, WINS address and so on, which are configured
in DHCP server.
DHCP Discover:
When ever client has to obtain an IP address from a DHCP server it will broadcast
a message called “DHCP discover” , which contains destination address 255.255.255.255
and source IP address as 0.0.0.0 and its MAC address.
DHCP offer:
The DHCP server on the network will respond to DHCP discover by sending a
DHCP offer message to the client requesting an IP address.
DHCP request:
The client after receiving offer message will send a “DHCP request” message
asking the DHCP server to confirm the IP address it has offered to it through DHCP offer
message.
DHCP Acknowledge:
DHCP server will respond to the “DHCP request” message by sending
acknowledge message through which it confirms the IP address to other machine.
Note: You can also enable DHCP in work group for dynamic allocation of IP addresses.
Configure the server operating system in work group as a DHCP then go for client in
TCP/IP properties select obtain IP address automatically. Then the client gets IP address
from the DHCP server.
Note: You need not to configure DNS or anything.
Using APIPA
On occasion, a network PC boots up and finds that the DHCP server is not available.
When this happens, the PC continues to poll for a DHCP server using different wait
periods.
The Automatic Private IP Addressing (APIPA) service allows the DHCP client to
automatically configure itself until the DHCP server is available and the client can be
configured to the network. APIPA allows the DHCP client to assign itself an IP address in
the range of 169.254.0.1 to 169.254.254.254 and a Class B subnet mask of 255.255.0.0.
The address range that is used by APIPA is a Class B address that Microsoft has set aside
for this purpose.
General Questions
What is the difference between windows 2000 server and Windows 2000 advanced
server, Data center server?
In Windows 2000 server we don’t have Clustering, Network load balancing.
Where as in Windows 2000 advanced server and in Data center server we have Clustering
and Network load balancing.
In 2000-Advanced server and Data center server we have more RAM and more
Processors.
What are the minimum and Maximum configurations for Windows family?
What are the differences between windows 2000 professional and server versions?
In professional we don’t have fault tolerance (Mirroring, RAID5) where as in all server
versions we have.
In professional we cannot load Active Directory where as in all server versions we can.
In professional and 2000 server we don’t clustering and network load balancing where as
in 2000 advanced server and in Data centre server we have Clustering and NLB.
As you move from server to advanced server, advanced server to data centre server we
get more RAM and more Processors.
Member servers running Windows 2000 Server: A member server is a server that isn't
configured as a domain controller. A member server doesn't store Directory information
and can't authenticate users. Member servers provide shared resources such as shared
folders or printers.
Client computers running Windows 2000 Professional: Client computers run a user's
desktop environment and allow the user to gain access to resources in the domain.
What roles does a Main Domain Controller (the first domain controller in the entire
forest) will have by default?
What are the roles an Additional Domain controller will have by default?
By default you cannot get any role. But if you want to assign any role you can transfer
from master.
What are the roles a Child Main Domain Controller will have by default?
By default it gets only three roles.
PDC Emulator
Relative Identifier (RID)
Infrastructure Master (IM)
What are the roles a Child additional Domain controller will have by default?
By default it won’t get any role. But if want to assign you can transfer from main child
domain controller.
What are the roles those must not be on the same Domain Controller?
Infrastructure Master and Global Catalogue
Note: If you have only one domain then you won’t get any problem even if you have both
of them in the same server.
If you have two or more domains in a forest then they shouldn’t be in the same server.
How to check the above roles to which server they have assigned?
Install support tools from CD
Programssupport toolstoolscmd prompt (Go to the command prompt in this way
only)
Note: By default the Global Catalogue service is enabled in Main Domain controller.
And by default the Global Catalogue service is disabled in additional Domain
Controllers. If you want to transfer Global Catalogue service from Main Domain
Controller to Additional Domain Controller, then you can transfer.
Note: With Windows 2000, it is possible to change the role of a server back and forth
from domain controller to member server (or stand-alone server), even after Setup is
complete.
What is a client?
A client is any device, such as personal computer, printer or any other server, which
requests services or resources from a server. The most common clients are workstations.
What is a server?
A server is a computer that provides network resources and services to workstations and
other clients.
2) By My computer Properties
On Network Identification tab, the Properties button will be disabled.
3) By typing DCPROMO
If it is already a Domain Controller you will uninstallation wizard for
Active Directory.
If it is not a Domain Controller you will get installation wizard for Active
Directory.
4. You should see the share of netlog and sysvol … just type netshare at the
cmd prompt
5. You should be able o see the ntds setting in the winnt directory
6. You should see the ntds folder in regedit ..
What is a forest?
Collection of one or more domain trees that do not form a contiguous namespace. Forests
allow organizations to group divisions that operate independently but still need to
communicate with one another.
All trees in a forest share common Schema, configuration partitions and Global Catalog.
All trees in a give forest trust each other with two way transitive trust relations.
What is a Domain?
A group of computers that are part of a network and shares a common directory and
security polices. In Windows 2000 a domain is a security boundary and permissions that
are granted in one domain are not carried over to other domains
What is a partition?
Disk Partition is a way of dividing your Physical Disk so that each section functions as a
separate unit.
A partition divides a disk into sections that function as separate units and that can be
formatted for use by a file system.
How many partitions can you create maximum? (Among that how many primary
and how many Extended?)
Maximum we can create 4 partitions in basic disk. Among that we can create maximum 1
extended partition. You can create 4 primary partitions if you do not have Extended.
What is a volume?
Disk volume is a way of dividing your Physical Disk so that each section functions as a
separate unit.
1. I have a file to which the user has access, but he has no folder permission to
read it. Can he access it? It is possible for a user to navigate to a file for which
he does not have folder permission. This involves simply knowing the path of the
file object. Even if the user can’t drill down the file/folder tree using My
Computer, he can still gain access to the file using the Universal Naming
Convention (UNC). The best way to start would be to type the full path of a file
into Run… window.
What is BIOS?
A computer's basic input/output system (BIOS) is a set of software through which the
operating system (or Setup) communicates with the computer's hardware devices.
Note: When you format the operating system with NTFS then Windows NT and
Windows 2000 are only the operating systems that can read the data.
Note: The only reason to use FAT or FAT32 is for dual booting with previous versions
windows 2000 O. S.
• Talk to others
• Use video to see others and let others see you
• Share applications and documents with others
• Collaborate with others in shared applications
• Send files to others
• Draw with others in a shared Whiteboard
• Send messages to others in chat
What are the features will you get when you upgrade from Windows NT to
Windows 2000?
The features in the following list are available when member servers are upgraded in a
domain, regardless of whether domain servers have been upgraded. The features available
when domain controllers are upgraded include not only the features in the following list,
but also the features in the previous one.
* Management tools:
Microsoft Management Console Plug and
Play Device Manager Add/Remove Hardware wizard (in Control
Panel) Support for universal serial bus New Backup utility
* Application services:
Win32 Driver Model DirectX 5.0 Windows Script Host
* Security:
Encrypting file system
Note: For anything other than a situation with multiple operating systems, however, the
recommended file system is NTFS.
NTFS
----------------------------------------------------------------------
Some of the features you can use when you choose NTFS are:
* Active Directory, which you can use to view and control network resources easily.
* Domains, which are part of Active Directory, and which you can use to fine-tune
security options while keeping administration simple. Domain controllers require NTFS.
* File encryption, which greatly enhances security.
* Permissions that can be set on individual files rather than just folders.
* Sparse files. These are very large files created by applications in such a way that only
limited disk space is needed. That is, NTFS allocates disk space only to the portions of a
file that are written to.
* Remote Storage, which provides an extension to your disk space by making
removable media such as tapes more accessible.
* Recovery logging of disk activities, which helps you restore information quickly in
the event of power failure or other system problems.
* Disk quotas, which you can use to monitor and control the amount of disk space used
by individual users.
* Better scalability to large drives. The maximum drive size for NTFS is much greater
than that for FAT, and as drive size increases, performance with NTFS doesn't degrade as
it does with FAT.
Note:
It is recommended that you format the partition with NTFS rather than converting from
FAT or FAT32. Formatting a partition erases all data on the partition, but a partition that is
formatted with NTFS rather than converted from FAT or FAT32 will have less
fragmentation and better performance.
What are the options do u get when you are shut downing?
Log off
Restart
Shut down
Stand by
Hibernate
Disconnect
Standby: Turns off your monitor and hard disks, and your computer use less
power.
A state, in which your computer consumes less electric power when it is idle, but
remains available for immediate use. Typically, you’d put your computer on stand by to
save power instead of leaving it on for extended periods.
In stand by mode, information in computer memory is not saved on your hard
disk. If the computer loses power, the information in memory will be lost.
This option appears only if your computer supports this feature and you have
selected this option in Power Options. See Power Options overview in Help.
Hibernation: Turns off your monitor and hard disk, saves everything in memory on disk,
and turns off your computer. When you restart your computer, your desktop is restored
exactly as you left it.
A state in which your computer saves any Windows settings that you changed,
writes any information that is currently stored in memory to your hard disk, and turns off
your computer. Unlike shutting down, when you restart your computer, your desktop is
restored exactly as it was before hibernation.
Hibernate appears only if your computer supports this feature and you have
selected the Enable hibernate support option in Power Options. See Power Options
overview in Help.
Disconnect
A state, in which your Terminal Services session is disconnected, but remains
active on the server. When you reconnect to Terminal Services, you are returned to the
same session, and everything looks exactly as it did before you disconnected.
Disconnect appears only if you are connected to a Windows 2000 Server running
Terminal Services.
Shut down
A state in which your computer saves any Windows settings that you changed and
writes any information that is currently stored in memory to your hard disk. This prepares
your computer to be turned off.
Restart
A state in which your computer saves any Windows settings that you changed,
writes any information that is currently stored in memory to your hard disk, and then
restarts your computer.
Log off
A state in which your computer closes all your programs, disconnects your
computer from the network, and prepares your computer to be used by someone else.
When connected to a Windows 2000 Server running Terminal Services, Log off
closes all programs running in your Terminal Services session, disconnects your session,
and returns you to your Windows desktop.
What are the setup files that are used to install windows 2000?
If you are installing from the Operating system DOS the setup file is winnt.
If you are installing from Operating system windows 95/98, Win NT, Win 2000, the setup
file is winnt32.
What is the error message do u get when you run “winnt” instead of winnt32 on 32
bit windows operating system (like Win 95/98, Win NT, and Win 2000)?
Parameters
/s:sourcepath
Specifies the source location of the Windows 2000 files. To simultaneously copy files
from multiple servers, specify multiple /s sources. If you use multiple /s switches, the
first specified server must be available or Setup will fail.
/tempdrive:drive_letter
Directs Setup to place temporary files on the specified partition and to install
Windows 2000 on that partition.
/unattend
Upgrades your previous version of Windows 2000, Windows NT 3.51–4.0, Windows 98,
or Windows 95 in unattended Setup mode. All user settings are taken from the previous
installation, so no user intervention is required during Setup.
Using the /unattend switch to automate Setup affirms that you have read and accepted the
End User License Agreement (EULA) for Windows 2000. Before using this switch to
install Windows 2000 on behalf of an organization other than your own, you must
confirm that the end user (whether an individual, or a single entity) has received, read and
accepted the terms of the Windows 2000 EULA. OEMs may not specify this key on
machines being sold to end users.
/unattend[num]:[answer_file]
Performs a fresh installation in unattended Setup mode. The answer file provides Setup
with your custom specifications.
Num is the number of seconds between the time that Setup finishes copying the files and
when it restarts your computer. You can use num on any computer running Windows NT
or Windows 2000.
Answer_file is the name of the answer file.
/copydir:folder_name
Creates an additional folder within the folder in which the Windows 2000 files are
installed. For example, if the source folder contains a folder called Private_drivers that
has modifications just for your site, you can type /copydir:Private_drivers to have Setup
copy that folder to your installed Windows 2000 folder. So then the new folder location
would be C:\Winnt\Private_drivers. You can use /copydir to create as many additional
folders as you want.
/copysource:folder_name
Creates a temporary additional folder within the folder in which the Windows 2000 files
are installed. For example, if the source folder contains a folder called Private_drivers
that has modifications just for your site, you can type /copysource:Private_drivers to have
Setup copy that folder to your installed Windows 2000 folder and use its files during
Setup. So then the temporary folder location would be C:\Winnt\Private_drivers. Unlike
the folders /copydir creates, /copysource folders are deleted after Setup completes.
/cmd:command_line
Instructs Setup to carry out a specific command before the final phase of Setup. This
would occur after your computer has restarted twice and after Setup has collected the
necessary configuration information, but before Setup is complete.
/debug[level]:[filename]
Creates a debug log at the level specified, for example, /debug4:C:\Win2000.log. The
default log file is C:\
%Windir%\Winnt32.log, with the debug level set to 2. The log levels are as follows: 0-
severe errors, 1-errors, 2-warnings, 3-information, and 4-detailed information for
debugging. Each level includes the levels below it.
/syspart:drive_letter
Specifies that you can copy Setup startup files to a hard disk, mark the disk as active, and
then install the disk into another computer. When you start that computer, it automatically
starts with the next phase of the Setup . You must always use the /tempdrive parameter
with the /syspart parameter.
The /syspart switch for Winnt32.exe only runs from a computer that already has
Windows NT 3.51, Windows NT 4.0, or Windows 2000 installed on it. It cannot be run
from Windows 9x.
/checkupgradeonly
Checks your computer for upgrade compatibility with Windows 2000. For Windows 95
or Windows 98 upgrades, Setup creates a report named Upgrade.txt in the Windows
installation folder. For Windows NT 3.51 or 4.0 upgrades, it saves the report to the
Winnt32.log in the installation folder.
/cmdcons
Adds to the operating system selection screen a Recovery Console option for repairing a
failed installation. It is only used post-Setup.
/m:folder_name
Specifies that Setup copies replacement files from an alternate location. Instructs Setup to
look in the alternate location first and if files are present, use them instead of the files
from the default location.
/makelocalsource
Instructs Setup to copy all installation source files to your local hard disk. Use
/makelocalsource when installing from a CD to provide installation files when the CD is
not available later in the installation.
/noreboot
Instructs Setup to not restart the computer after the file copy phase of winnt32 is
completed so that you can execute another command.
How do you install the Windows 2000 deployment tools, such as the Setup Manager
Wizard and the System Preparation tool?
To install the Windows 2000 Setup Tools, display the contents of the Deploy. cab file,
which is located in the Support\Tools folder on the Windows 2000 CD-ROM. Select all
the files you want to extract, right-click a selected file, and then select Extract from the
menu. You will be prompted for a destination, the location and name of a folder, for the
extracted files.
What is Desktop?
The desktop, which is the screen that you see after you log on to Windows 2000, is one of
the most important features on your computer. The desktop can contain shortcuts to your
most frequently used programs, documents, and printers.
Suppose if your CD is auto play CD. Then what is the key that is used to stop the
auto play of the CD?
Hold the shift key for some time immediately after inserting the CD.
What is Netware?
Netware is a computer network operating system developed by Novell.
What is Network?
A network is a group of computers that can communicate with each other, share resources
such as hard disks and printers, and access remote hosts or other networks.
Drive Letters:
Each workstation can assign up to 26 letters to regular drive mappings. Drive
letters that are not used by local devices are available for network drives.
Generally the Drive letters A and B represents floppy disk drives and C represents
the local hard disk.
What do you call the right hand side portion (i.e., where the clock and other icons
exist) of task bar?
System Tray or Notification area
2) Boot from the floppy, insert the CD, and install the O.S.
3) Install over the network or install over the Hard disk. For this you have to run the files
WinNT or winnt32.
Note: WinNT is used when you r installing from the operating system other than
Windows NT or 2000. (I.e., DOS, windows 95/98 or any other)
Winnt32 is used if you are installing from O.S. Windows NT or Windows 2000.
What is NETBIOS?
NETBIOS stands for Network Basic Input Output System. It is a naming interface, it is
interface by which client can connect to access the lower level of the TCP/IP model to be
able to communicate and access those resources.
We share resources with the NETBIOS interface in windows NT. This means that
we are using NetBIOS name to connect the client to the server.
What is the location of lmhost file (LAN Manager Host file) in windows 2000?
Winnt/system32/drivers/etc/lmhost.sam
Note: Extension represents that it is a sample file. You can create lmhost file with out that
extension.
What are Windows 2000 WINS enhancements when compare to the previous
versions?
• Better Management interface
• Better clients
• Replication can maintain persistent connections.
• Supports automatic partner discovery
• Integrates with DNS and DHCP
• Supports burst mode handling
Note: In windows 2000 if you want to update objects immediately we use secedit
/refreshpolicy refresh_machine and another one. In windows 2003 the alternate
command for this is gpupdate, type this command at run prompt then it updates
automatically.
How can you see the post screen when the system started?
When the system starts press the Break key. Then it post screen is stopped there only, to
continue press Enter.
When a user logs on the start up options will be loaded. How to stop them? (The
notification area icons)
When a user types user name and password, and presses enter immediately hold down
Shift key. Then the above things will not be loaded.
What are the features of Active directory?
See the “benefits of Active directory” document in this folder.
Note: Class A, Class B, Class C are used to assign IP addresses. Class D is used for
Multicasting. Class E is reserved for the future (Experimental).
Local policy
Site Policy
Domain Policy
OU Policy
Sub OU Policy (If any are there)
Schema Partition
The schema partition contains all object types and their attributes that can be
created in Active Directory. This data is common to all domain controllers in the domain
tree or forest, and is replicated by Active Directory to all the domain controllers in the
forest.
2) Start Run Type netdom query fsmo The computer names that have been
listed there are Domain Controller.
3) Search for NTDS and Sysvol folder in system directory, if they are there then it is a
Domain Controller.
6) In 2000 you cannot change the name of the Domain Controller so Right click on My
computer Properties Network Identification There Change button is grayed
out.
Sub Netting
Class C sub netting
IP address 198.100.98.0
Decimal mask 255.255.255.224
Convert 224 into binary 11100000(2)
Maximum no. of combinations = 2n (Where n is number of masked bits)
Note: Masked bit = 1, UN masked bit= 0.
Maximum number of subnets 2n-2
Maximum number of hosts/subnet 2m-2 (Where m is number of unmasked bits)
Available combinations
0 000 (This is not used for assigning IP address)
1 001
2 010
3 011
4 100
5 101
6 110
7 111 (This is not used for assigning IP address)
Octant contains 8 bits, presently we have 3 bits (Remaining 5 bits are zeros)
00100000 = 32
01000000 = 64
01100000 = 96
10000000 = 128
10100000 = 160
11000000 = 192
↓
↓
↓
↓
↓
↓
↓
↓
↓
↓
↓
↓
↓
↓
↓
↓
Another Example:
200.150.80.0
255.255.255.192
192(10) 11000000(2)
240(10) 11110000(2)
↓
↓
11100000 = 224
11110000 = 240 (This is not used for assigning IP address)
↓
↓
255.255.224.0
IP addressing for modified subnets:
255.255.16.0 Subnet
IP address 140.80.16.1
Subnet mask 255.255.16.0
↓
↓
IP address 140.80.16.254
Subnet mask 255.255.16.0
And
IP address 140.80.17.1
Subnet mask 255.255.16.0
↓
↓
IP address 140.80.17.254
Subnet mask 255.255.16.0
And
IP address 140.80.18.1
Subnet mask 255.255.16.0
↓
↓
IP address 140.80.18.254
Subnet mask 255.255.16.0
And
IP address 140.80.19.1
Subnet mask 255.255.16.0
↓
↓
IP address 140.80.19.254
Subnet mask 255.255.16.0
And
IP address 140.80.20.1
Subnet mask 255.255.16.0
↓
↓
IP address 140.80.20.254
Subnet mask 255.255.16.0
255.255.32.0 Subnet
IP address 140.80.32.1
Subnet mask 255.255.32.0
↓
↓
IP address 140.80.32.254
Subnet mask 255.255.32.0
And
IP address 140.80.33.1
Subnet mask 255.255.32.0
↓
↓
IP address 140.80.33.254
Subnet mask 255.255.32.0
And
IP address 140.80.34.1
Subnet mask 255.255.32.0
↓
↓
IP address 140.80.34.254
Subnet mask 255.255.32.0
And
IP address 140.80.35.1
Subnet mask 255.255.32.0
↓
↓
IP address 140.80.35.254
Subnet mask 255.255.32.0
PING:
Verifies that TCP/IP is configured and another host is available.
FINGER:
Retrieves system information from a remote computer that supports TCP/IP
finger services
HOSTNAME:
It displays the host name.
NSLOOKUP:
Examines Entries in the DNS database, which pertains to a particular host or
domain
NETSTAT:
Displays protocol statistics and the current state of TCP/IP concepts.
NBTSTAT:
Checks the state of current NetBIOS over TCP/IP connections, updates LMhost’s
cache or determines your registered name or scope ID.
Route:
Views or modifies the local routing table.
TRACERT
Verifies the route from the local host to remote host
ARP
Displays a cache of local resolved IP address to MAC address
Hostname.Domain.com
• Third-level domain: north wind (stands for North wind Traders Ltd., a fictitious
Microsoft subsidiary)
• Second-level domain: Microsoft (Microsoft Corporation)
The root domain has a null label and is not expressed in the FQDN
What is a host?
Any device on a TCP/IP network that has an IP address. Example includes severs, clients,
network interface print devices, routers.
Note: The ports 0-1023 are called well known ports and all other ports are called
Dynamic or private ports (i.e., 1024-65535)
Note: When you are formatting the disk, if you set the block size as default, windows
2000/XP/2003 divides the partition into 4 KB blocks. When you are creating a file or
folder it allocates space to that file or folder in multiples of 4 KB. When you create a
new file first time it allocates 4 KB, after 4 KB is filled up it allocates another 4 KB size,
it goes on like this until the disk space is completed.
Note: With windows 2000 advanced server and data centre server we can NLB cluster 2
to 32 servers. It supports clustering up to 2 nodes.
Note: With disk quotas we can track the usage of disk space for each user. We can limit
each user to use certain amount of space.
What is latency?
The required time for all updates to be completed throughout all domain
controllers on the network domain or forest.
What is convergence?
The state at which all domain controllers have the same replica contents of the
Active Directory database.
What are the file names that we cannot create in Windows operating system?
The file names that cannot be created in Windows operating system are
Con
Prn
Lpt1, Lpt2, Lpt3, Lpt4, ….., Lpt9
Com1, com2 com3, com4, com5,….., com9
Nul
Aux
Note: The file name clock$ cannot be created in DOS 6.22 or earlier versions of DOS.
What is QoS?
QoS stands for Quality of Service. With QoS we can reserve bandwidth to certain
applications.
What is NAT?
NAT stands for Network Address Translation. It is a device between the Internet
(i.e., public network) and our private network. On one NIC card it has valid Internet
address; on the other NIC it has our private (internal) network address.
NAT is a device that translates one valid public IP address to more tuple internal
private address.
We load Windows 2000 RRAS (Routing and Remote Access service) service into
this Windows 2000 server and we turn in to a router. Now we add NAT protocol, so now
onwards our internal clients sends their traffic through this router to the internet, when it
passing through this NAT server it stripes off the internal network IP address and assigns
a valid public IP address. So goes out and communicates with that valid public IP
address, comes back in the NAT server stripes off the public IP address and replaces
private IP address, sends the traffic back to that particular client.
For client perspective they don’t know any thing except they are surfing internet.
We load RRAS in to windows 2000 server; we turn this server as router. Now we add
NAT protocol, so that now on our clients can send traffic to internet through this router ,
as it passes through the NAT server this server stripes off the internal IP address and
replaces with a valid public IP address. Then it goes to the internet surf the internet when
it comes back through the NAT server, now NAT server stripes off the valid public IP
address and replaces it with its internal IP address sends the traffic to that particular
client.
How to go to the NAT options?
Start Programs Administrative tools RRAS IP routing NAT
Note: Windows 2000 NAT can acts as a DHCP server. So it is possible to give IP address
with our NAT server. When you are doing this make sure that you don’t have DHCP
server in your network.
If you have less clients (5 or 6) then there is no harm assigning IP address through
NAT, but if your network is big then best is to use DHCP.
Note: NAT server contains at least two NIC, because one for internal IP address and
another one for external (Public IP).
What is proxy?
NAT server helps the client to access Internet, where as proxy server does every
thing for client. When a request comes from the client the proxy server surfs the internet
and caches the results to its local disk, sends that result to the client.
With proxy we have performance improvement, because results are cached to the
local hard disk.
With proxy we have security, because only one system in the internal network
communicating with the Internet.
Rather than allowing clients to access internet by changing IP address, the proxy
server does all the surfing for clients and caches to its local disk and gives to the clients.
Note: The portion between two firewalls is called screened subnet, in corporate network
we call it as DMZ (De Militarized zone)
Note: Tracrt command traces the root (path) for which we are connecting.
Pathping is combination of tracert and ping. It displays path and some other
information.
Note: with RIP version 1 we cannot do CIDR /VLSM. To transfer the route table to the
all routers RIP version 1 uses broad cast. With RIP version 2 we can do CIDR. To transfer
the route table to all routers RIP version 2 uses multicast. Also with version 2 we have
password authentication to transfer router table.
What is VPN?
VPN stands for Virtual Private Network. By using public media we are
establishing a private secure connection. To communicate through VPN we use PPTP
(Point to Point Tunneling Protocol) or L2TP (Layer2 Tunneling Protocol).
Most cases we use L2TP because this is more secure. The only one case that we
use PPTP is only when we are trying to use VPN through a NAT server, another reason to
use is if don’t have windows clients that have capability to establish L2TP VPN
connection.
RADIUS
Note: One of thing you have to do is Register Internet Authentication service in Active
Directory.
Administrative tools Internet Authentication service Right click at the root
select Register service in Active Directory
Now our IAS can access Active Directory so that it can authenticate users by using
Active Directory our Active Directory database.
Note: Put your RAS server close to the clients. Put your RADIUS server close to the
Active Directory database.
Note: If you install DCPROMO in member server then it will become Domain
Controller, if you uninstall DCPROMO in Domain Controller then it will become
Member server, if you are uninstalling DCPROMO on last domain controller then it will
become standalone server.
Note: Always file size is less than or equal to file size on disk except when file
compressed. If file is compressed file size greater than file size on disk.
The data replicated between domain controllers is called data and also called
naming context. Once a domain controller has been established only changes are
replicated.
The replication path that Active Directory data travels through an enterprise is
called the replication topology.
The change will be replicated to all domain controllers in the site with in 15
minutes since there can only be three hops.
Note: Each domain controller keeps a list of other known domain controllers and the last
USN received from each controller.
What is propagation dampening?
This is used to prevent unnecessary replication by preventing updates from being
sent to the servers that are sent already. To prevent this domain controller uses up-to-
vector numbers.
In windows 2000 SYSVOL share is used to authenticate users. The sysvol share
includes group policies information which is replicated to all local domain controllers.
File replication service (FRS) is used to replicate sysvol share. The “Active Directory
users and computers” tool is used to change the file replication service schedule.
The DNS IP address and computer name is stored in Active Directory for Active
Directory integrated DNS zones and replicated to all local domain controllers. DNS
information is not replicated to domain controllers outside the domain.
Clustering: This is supported by only Windows 2000 advanced server and datacenter
server. Cluster makes several computers appear as one to applications and clients. It
supports clustering up to 2 nodes. You can cluster 2 to 32 servers. The “cluster service”
must be installed to implement clustering.
Note: If you want you can change the port number, but generally we don’t change the
port number. If you have changed the port number, then when typing URL you have to
type the port number followed by the URL.
Ex: www.google.com:83
If you haven’t typed any thing by default it takes the port number as 80.
What is NetBIOS?
NetBIOS stands for Network Basic Input Output System. It is naming interface by which
client can access network resources. It manages data transfer between nodes on a
network.
What is NETBIOS?
NETBIOS stands for Network Basic Input Output System. It is a naming interface, it is
interface by which client can connect to access the lower level of the TCP/IP model to be
able to communicate and access those resources.
We share resources with the NETBIOS interface in Windows NT. This means that
we are using NetBIOS name to connect the client to the server.
Note: Computer names are not the only names that are registered as a NetBIOS names, a
domain name can be registered as NetBIOS name, any service on the network can be
registered as the NetBIOS names, for example messenger service.
Note: Communication in the network happen IP address to IP address, ultimately MAC
address to MAC address.
Note: A UNIX does not have ability to register into WINS database. But if a UNIX
server is there in network and you need to resolve it, then for this you need to configure
manually the entry of that UNIX server in the WINS server.
What is the location of lmhost file (LAN Manager Host file) in windows 2000?
Winnt/system32/drivers/etc/lmhost.sam
Note: Extension represents that it is a sample file. You can create lmhost file with out that
extension.
What are Windows 2000 WINS enhancements when compare to the previous
versions?
• Better Management interface
• Better clients
• Replication can maintain persistent connections.
• Supports automatic partner discovery
• Integrates with DNS and DHCP
• Supports burst mode handling
Note: Windows 2000 doesn’t use WINS for its naming structure. Windows 2000 uses
DNS for its naming structure. The only time that you need WINS in Windows 2000
environment is when you want resolve NETBIOS based resources such as NT file server.
In native Windows 2000 environment there is no need to use WINS.
How to configure the WINS servers to replicate database with other WINS servers
on the network?
Open WINS MMC Right click on Replication partners Select New replication
partner Give the IP address of the other WINS server click OK
Note: By default WINS makes its replications partners as push/pull replication partners.
First create a shared folder and put installation files on that shared folder.
What is the program that is used to create .msi files when .msi files are not
available?
Wininstall
What is the different between deploying applications per computer or per user
basis?
If you deploy applications per computer that applications will be deployed to that
computer when the computer has started. If you deploy applications per user basis then
applications will be deployed when a users logs on.
For computers you can only assign packages.
For users you can assign or publish packages.
Note: With assign we install a package in 3 ways where as with publish we can install in
2 ways.
Note: Depending on the situation, Windows 2000 can be licensed in a per-seat or per-
server mode. Per-server can be changed to Per-Seat once. Per-seat is a permanent choice.
When licensing Windows 2000 Server, Client Access Licenses (CALs) must also be
purchased for the number of clients that will be accessing the server, regardless of the
desktop operating system that is installed on the clients.
Note: For Disk Management in Windows 2003 you can use command line tool
diskpart.exe (New feature in Windows 2003). For more details type diskpart.exe at
command prompt and then type “?”.
Note: By default search doesn’t displays hidden files. But if you want to search hidden
files also you can search by modifying the following key in registry.
Mycomputer\HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CUR
RENTVERSION\EXPLORER\
Here you can search hidden attribute. Click on this and change value from 0 to 1.
Read Users can see the names of files and subfolders in a folder and view folder
attributes, ownership, and permissions. Users can open and view files, but they cannot
change files or add new files.
List Folder Contents Users can see the names of files and subfolders in the folder.
However, users cannot open files to view their contents.
Read & Execute Users have the same rights as those assigned through the Read
permission, as well as the ability to traverse folders. Traverse folders rights allow a user
to reach files and folders located in subdirectories, even if the user does not have
permission to access portions of the directory path.
How do determine the Operating system type that you are working on?
Right click on My computer Select properties on general tab you can see operating
system type and version.
ADSI edit:
When you open ADSI edit you can see 3 database partitions, i.e., domain partition,
configuration partition, and schema partition. Under this you can see CN, and
Distinguished names of different objects.
Note: By using cluster Administrator you can configure, control, manage and monitor
clusters.
Note: Clustering is only supported with Windows Server 2003, Enterprise Edition and
Windows Server 2003, Datacenter Edition, Windows 2000 Advanced server and Data
center server.
What is failover?
Cluster service monitors the services on all nodes. If a node fails, Cluster service
restarts or moves the services on the failed node to a functional node. This process is
called failover. The ability to use multiple servers at all times reduces system costs while
increasing reliability, because you do not have to dedicate servers for disaster recovery.
When the failed node is restored, the resources may be returned to the original node. This
process is called failback Failover and failback in a cluster can be performed manually by
the people who maintain the cluster or can occur automatically when there is an
unplanned hardware or application failure.
Active/active clustering describes clustering when both members of the cluster are
online and able to accept user service requests. This is different from active/passive
clustering where only one member of a cluster provides service to users at a time.
Active/passive is the preferred recommended cluster configuration.
In an active/passive cluster, the cluster includes at least one passive node and one
or more active nodes. A node is active if it runs an instance of an Exchange virtual server
(EVS). A node is passive if it does not run an instance of EVS (Exchange Virtual Server)
or any other application. A passive node is ready to take over the tasks of an active node
whenever a failover occurs on any active node. Whether a node is active or passive may
change over the lifetime of a node. After a failover, the passive node which now runs the
failed-over EVS is an active node and the original node became a passive node. In an
active/passive cluster, the active node is actively handling requests while the passive node
is standing by waiting for another node to fail.
• Kerberos allows UNIX clients and servers to have Active Directory accounts and obtain
authentication from a domain controller.
Scripts
Scripts are used to run commands automatically when a user logging on. Generally in
small organizations scripts are used to map drives automatically.
How to create a Script?
Open note pad.
Write the script.
Save it as *.bat file in net logon folder.
Then go to the user properties for whom you want to run that particular script Click on
profile type the file name in the logon script box. (Just type the file name, no need to
give path of the file) Click OK.
Example of a script for mapping drives.
Open a note pad file. Type the following information (with in the lines) as it is.
Net use p: \\liveserver\common
Net use x: \\liveserver\pdata
Note: Suppose you have some roles on a domain controller. With out transferring the
roles to other domain controller you have demoted the domain controller to a member
server by the command dcpromo. Then what will happen?
When you demote a domain controller which has roles by the command dcpromo, during
the demotion the roles will be transferred to the nearest domain controller.
Log in Enterprise Admin Start Programs Support tools Tools ADSI Edit
Expand Configuration container Expand CN= Configuration Expand CN =
Services Expand CN =Windows NT Right Click CN=Directory Service click
on properties Click Garbagecollperiod click Set Click OK
How to change the Priority for DNS SRV Records in the Registry?
To prevent Clients from sending all requests to a single domain controller, the domain
controllers are assigned a priority value. Client always send requests to the domain
controller that has the lowest priority value. If more than one domain controller has the
same value, The clients randomly choose from the group of domain controllers with the
same value. If no domain controllers with the lowest priority value are available, then the
clients send requests to the domain controller with the next highest priority. A domain
Controller’s priority value is stored in registry. When the domain controller starts, the Net
Logon service registers domain controller, the priority value is registered with the rest of
its DNS information. When a client uses DNS to discover a domain controller, the
priority for a given domain controller is returned to the client with the rest of the DNS
information. The client uses the priority values to help determine to which domain
controller to send requests.
The value is stored in the LdapSrvPriority registry entry. The default value is 0 and it
can be range from 0 through 65535.
Note: A lower value entered for LdapSrvPriority indicates a higher priority. A domain
controller with an LdapSrvPriority setting of 100 has a lower priority than a domain
controller with a setting of 10. Therefore, client attempts to use the domain controller
with the setting of 100 first.
To change priority for DNS SRV records in the registry
Log on as Domain Admin Start Run Regedit HKLM\SYSTEM|
CurrentControlSet\Services\Netlogon\Parameters Click Edit Click New Click
DWORD value For the New value name, type LdapSrvPriority Click Enter
Double click the value name that just you typed to open the Edit DWORD Value
dialogue box Enter a value from 0 through 65535. The default value is 0 Choose
Decimal as the Base option Click OK Close the Registry editor.
How to change the Weight for DNS Records in the Registry?
To increase client requests sent to other domain controllers relative to a particular domain
controller, adjust the weight of the particular domain controller to a lower value than the
others. All domain controllers starts with a default weight setting of 100 and can be
configured for any value from 0 through 65535, with a data type of decimal. When you
adjust the weight, consider it as a ratio of the weight of this domain controller to the
weight of the other domain controllers. Because the default for the other domain
controller is 100, the number you enter for weight is divided by 100 to establish the ratio.
For example, if you specify a weight of 60, the ratio to the other domain controller is
60/100. The reduces to 3/5, so you can expect clients to be referred to other domain
controller 5 times for every 3 times they get referred to the domain controller you are
adjusting.
To change weight for DNS SRV records in the registry
Log on As domain Admin Start Run regedit
HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters Click edit
Click New Click DWORD Value For the new value name, type LdapSrvWeight
Click Enter Double click on the value name you just typed to open the Edit
DWORD Value dialogue box Enter a Value from 0 through 65535, the default value
is 100. Choose Decimal as the Base option Click OK Close Registry editor.
Replication metadata identifies the history of attributes that have been replicated for a
specified object. Use this procedure to identify time, dates, and Update Sequence
Numbers (USNs) of attribute replications, as well as the domain controller on which
replication originated.
To view replication metadata of an object
Log in as Domain Admin Open command prompt and type the following command
press enter.
Repadmin /showmeta distinguishedName serverName
/u:DomainName\Username /pw:*
Where:
Distinguisedname is the LDAP distinguished name of an object that exists on
ServerName.
Domain Name is the domain of ServerName
Username is the name of an administrative account in that domain.
Note: If you are logged on as an administrator in the domain of the destination domain
controller, omit the /u: and /pw: switches.
How to verify the Existence of the Operations Master?
Or
How do you verify whether Operations Masters working properly or not?
This test verifies that the operations masters are located and that they are online and
responding.
Dcdiag /s:domaincontroller /test:knowsofroleholders
Dcdiag /s:domaincontroller /test:fsmocheck
What is the switch that is used to restart in Directory service Restore mode in
boot.ini file?
Use the following switch along with the path.
/safeboot:dsrepair (I hope this switch is available in Windows 2003 only)
Note: Once if you raise the domain or forest functional level you cannot revert back.
Advantages of different functional levels:
When ever you are in Windows 2000 mixed mode the advantage is you can use
Windows NT, 2000, 2003 domain controllers. The limitations are
you cannot create universal groups
You cannot nest groups
You cannot convert groups (i.e., conversion between security groups and
distribution groups)
some additional dial in features will be disabled
you cannot rename the domain controller.
SID history disabled.
What is the command that is used to display and modify security permissions of a
folder?
The command is xcacls.exe.
What is teaming?
Teaming is the concept of combing two or more LAN cards for more speed. For n
number of LAN cards there will be only one IP address. By teaming you can increase
speed. For example if you are teaming 5 LAN cards of 100 MBPS now your network
speed is 500 MBPS.
Note: You can assign one IP address to n number of LAN cards and at the same you can
assign n number of IP addresses to LAN card.