MCSE
MCSE
MCSE
Ques-:1.
Ans :-
Ques-:2.
2000
2003
3
2003 Support Kerberos Version 5 Authentication Protocol
In 2003 by default Two-Way Trust Relationship are configured
In 2003 we will use Group Policy
2003 support maximum 64 Processor and 512 GB RAM
In 2003 no specific Client Site Operating System is available you can use either win 2k
Professional either Win XP Professional in the Network.
In 2003 we will use Exchange 2003 Server
In 2003 Stub Zone is available in DNS
In 2003 Resultant Setup Policy is available
In 2003 GPMC is available
In 2003 Conditional Forwarding option is available
In 2003 Effective Permission option is available
In 2003 more Administrative Command Line Tools are available
Active Directory Saved Query Option is available
Shadow Copy Option is available in Windows 2003 O/S
ASR Option is available in Windows 2003 O/S
In Windows 2003 We Can Create More Than 1 DFS Root On A Single DFS Server in The
Network.
In 2003 We Can Create Two Way Trust Relationship inside The Network.
Ques-:9.
What is Active Directory?
Ans :Active Directory is the main concept of Windows 2000/2003 Network. It stores all
of the information about the whole network such as users, printers, computers
etc.
Ques-:10. What is Tree?
Ans :A group of domain is called tree and sharing a contiguous Name space.
Ques-:11. What is Forest?
Ans :A group of tree is called forest and does not sharing a contiguous name space
but sharing a common configuration (Schema).
Ques-:12. Difference between D.C. and A.D.C.?
Ans :D.C. stands for Domain Controller and A.D.C. stands for Additional Domain
Controller. A.D.C. a back up copy of D.C. Only one different is available Between
D.C. and A.D.C. i.e. - Operation Master Role. On D.C all of the three Operation
Master Roles are available
1. RID Master
2. PDC Emulator
3. Infrastructure Operation Master Role
But on A.D.C no any operation master roles are available
Ques-:13. What is the benefit of Child Domain?
Ans :There are many benefits of Child Domain Such As
0. Security Boundary
1. Administrative Overhead Low
2. Network Traffic Low
Ques-:14. What is Group?
Ans :- Group is a collection of user account. It provides the simplified administration in the
network.
Ques-:15. What is OU?
Ans :- OU stands for Organizational Unit. On OU we define group policy in the network.
Group policy is basically assigned on active directory container i.e. Site, domain,
OU. When ever we want some users in the network do not use shut down the
system, do not use run command, do not use control panel, then we put that user
in the OU and assign the appropriate Group Policy on that OU.
Ques-:16. What is Group Policy?
Ans :-
Group policy provides the stream line access to all of the users in the network.
Group policy is basically assigned on active directory container i.e. Site, domain,
OU. When ever we want some users in the network do not use shut down the
system, do not use run command, do not use control panel, then we put that user
in the OU and assign the appropriate Group Policy on That OU.
Ques-:17. Difference between Permission, Right and Policy?
Ans :- Permission Permission are basically assigned on network resources as for example
File, Folder, Share Folder, Printer
Right Right is basically assign to users and groups.
Policy Policy are basically assigned on active directory container i.e. - Site, Domain,
OU.
Ques-:18. What is ISA Server?
Ans :- ISA stands for Internet Security Acceleration. ISA Server Provides the Internet
connectivity for all of the users in network ISA server also works as a Proxy Server
in the network. With the help of ISA Server Administrator can Filtering a Client
request For a Specific Web site in the Network.
Ques-:19. What is Default Gateway?
Ans :- Default Gateway is the IP Address of Router in the network. When ever any clients
want to go to another network that query will forward to Default Gateway.
Ques-:20. What is Site?
Ans :- A Site is a geographical area where all of the domains are available. Site manages
the Replication Traffic between Two or More Different Sites in the Network.
Ques-:21. What is Operation Master Role?
Ans :- Operation Master Role is available on Domain controller in the Network. There are
Five types of Operation Master Role
0. Schema Master
1. Domain Naming Master
2. RID Master
3. PDC Emulator
4. Infrastructure Operation Master Role
Ques-:22. Difference between Mixed Mode and Native Mode?
Ans :- There are three types of domain mode
1. Mixed Mode In this mode NT, win 2k and win 2k3 D.C are available.
2. Win 2k Native Modes In this mode Win 2k And win 2k3 D.C are available.
3. Win 2k3 Native Mode In this mode only win 2k3 D.C are available.
Ques-:23. What is SCSI?
Ans :- SCSI stands for Small Computer System Interface. In SCSI the rate of data
transmission is fast. SCSI Hard Disk SpeedR.P.M is fast In SCSI Data Transmission
Speed Is 320 MBPS in the Network. In SCSI Controller We Can connect Maximum 15
physical Devices in the System.
Ques-:24. What are A-Host Record and PTR Record?
Ans :- A record is also called host record. This record is basically created in forward lookup
Zone.
PTR record is also called pointer record. This record is basically created in reverse
lookup Zone.
Ques-:25. What is Reservation?
Ans :- Reservation Is Basically used In DHCP Server. When Ever we want This Computer Is
Always received This IP address From DHCP Server in The network, in That Case we
create a Reservation in DHCP Server Of that particular Computer in The Network.
Ques-:26. IP Address Range/Classes?
Ans :- There are two types of IP address
5
1. Class Full IP Address
2. Class Less IP Address
Class Full IP Address There are five classes
1. Class A
128 191
3. Class C
192 223
4. Class D
224 239
5. Class E
240 255
6
3. Domain Partition
Ques-:36. What is the Function of Ping Command?
Ans :- Ping provides to check the Physical/IP Connectivity between two or more devices in
the network. Ping sends an ICMP request from source computer to destination
computer and destination computer sends an ICMP reply.
Ques-:37. What are Broadcasting, Multicasting and unicasting?
Ans :- Broadcasting One to All
Multicasting One to many not all
Unicasting One to One
Ques-:38. What is Group Nesting?
Ans :- When we add two or more Groups within a Single Group, it is called Group Nesting.
Ques-:39. What is FIXMBR?
Ans :- FIXMBR Repair the Master boot Record of the Partition Boot Sector.
Ques-:40. What is FIXBOOT?
Ans :- FIXBOOT write a new Partition Boot Sector on to the system Partition.
Ques-:41. What is SID?
Ans :- SID stands for Security Identifier. Every Object has a unique ID, it is called SID.
Ques-:42. What is RADIUS Serer?
Ans :- RADIUS Stands for Remote Authentication Dial-in User Service. RADIUS Server
Provides the Centralized management of Multiple RAS & VPN Server in the Network.
On this Server Remote Access Policy and Remote Access Logging Options are
available.
Ques-:43. What is Trusting Domain?
Ans :- In Trusting Domain Resources are available.
Ques-:44. What is Trusted Domain?
Ans :- In Trusted Domain User Accounts are available.
Ques-:45. What is Microsoft Exchange Server?
Ans :- Microsoft Exchange Server is Software that provides the services such as sending &
receiving the Mail.
Ques-:46. What is Printer?
Ans :-
Printer is a Software that Governing the Print Device. There are two types of Printer
1. Local Printer
2. Network Printer.
Ques-:47. What is Chatting?
Ans :- Chatting is a Real Time Conversion between Two or More peoples in the Network.
Ques-:48. What Is Directory Services restore Mode?
Ans :- When our Active Directory Database is Not Working Properly, Then We Restart the
Domain Controller and Press f8 Key Then after Selecting the Directory Services
Restore Mode and Then after Restoring the Active directory Database from the Last
Backup.
Ques-:49. What is normal backup?
Ans :- Just like a normal backup. By default backup.
Ques-:50. What is incremental backup?
Ans :- In incremental Backup only incremental parts are backup not full backup.
Ques-:51. What is Differential backup?
Ans :- In differential backup, we take full backup after the normal backup.
Ques-:52. What is packet?
Ans :-
Ans :1.
2.
3.
4.
Ques-:58.
Ans :-
8
1. Non Transitive Trust Non Transitive Trust is a one way trust relationship in the network.
As for examplein NT network
2. Transitive Trust Transitive Trust is two way trust relationship in the network. As for
examplein 2000/2003 network.
Ques-:65. What is DACL?
Ans :- DACL stand for Discretionary Access Control List. In DACL basically permission entry
is available
of any user in the network
Ques-:66. What is SACL?
Ans :- SACL stand for System Access Control List. In SACL basically auditing entry is
available of any user in the network.
Ques-:67. What is MSI?
Ans :- This file is basically use for deploying or installation of any application in the
network.
Ques-:68. What is MST?
Ans :- This file is basically using for repairing of any application in the network.
Ques-:69. What is zap file?
Ans :- It is basically use for that application, which do not have the MSI file. We create a
text file with zap extension for deploying or installation purpose of any application
in the network.
Ques-:70. What is ace?
Ans :- Ace stand for access control entry.
Ques-:71. What is operation master role?
Ans :- Operation master role is available on domain controller in the network.
There are five types of operation master role inside the active directory
1. Schema Master Schema Master Is responsible for changes of schema, updating of
schema in the Network.
2. Domain Naming Master Domain Naming Master Is Responsible For adding or removing
a domain inside the forest.
3. RID Master RID Master provides RID no. of each D.C in the Network. Every D.C is
having a one id no, it is called RID NO. domainrid, objectS.I.D.
4. PDC Emulator It is basically use For Previous version Of Windows 2000 Clients in The
Network. PDC Emulator Work as an emulator for previous version of Windows 2000
Clients in the network.
PDC Primary Domain Controller
BDC Backup Domain Controller
5. Infrastructure Operation Master Infrastructure Operation Master Role provides
uniqueness of any object inside the forest.
Infrastructure operation master role. Updates references to objects and group
membership from other domain In the Network.
10
Ans :-
Windows Update Services Provides the automatic updating From Microsoft Windows
update Server to all of the Clients & servers in The Network
Ques-:86. What Is GPMC?
Ans :- GPMC stands For Group policy Management Console. With The Help Of this Tools We
Manage the Group policy Object Of entire Forest from single Location in The
Network. With The Help of This Too we also take The Backup and restoring Of Group
policy object.
Ques-:87. What Is Conditional Forwarding?
Ans :- Conditional Forwarding Is Basically use in DNS server. In DNS Server, We define The
Condition, If Any DNS Query Is Related to That Particular Domain, In That Case That
Query Will Directly Forward to That Domain and If That DNS Query Is Not Related to
That Particular Domain In That
Case That Query
Will Forward to ISP DNS server In the Network. With The Help of Conditional
orwarding, we can say the rate Of Data Transmission Rate Is Fast in The Network
This Is the New Features in Windows 2003 Operating System.
Ques-:88. What Is Effective Permission?
Ans :- Effective Permission display that is what ever the effective permission is available
of any User in Any particular resources in the Network.
Ques-:89. What Is the Booting file Of 98 Operating system?
Ans :-
1.
1.
2.
MSDOS.SYS
IO.SYS
COMMAND.COM
Ques-:90. What Is ASR?
Ans :- ASR stands for automatic system recovery. ASR provides the complete backup of
any Computers in The Network.
Ques-:91. What Is the Difference Between system policy And Group policies?
Ans :- System Policy are Used in NT environment But Group policy Are Used in Windows
2000 And Windows 2003 Environment.
Ques-:92. What is Connection Oriented protocol?
Ans :- Before the Data is Sending from Source Computer to destination Computer in the
Network first of All connection is establish between source to destination Computer.
It Is Called connection Oriented Protocol. As For ExampleTCP.
Ques-:93. What Is IDE?
Ans :- IDE Stands For Integrated device electronics. In IDE We Can Connect Maximum 4
physical devices in The System. In IDE the Rate of Data transmission is slow. In IDE
Maximum Speed is 80 MBPS in the Network.
Ques-:94. Why we Create a Site?
Ans :- There are many benefits for creating a Site inside the Network Such as:
0. Manage Replication Traffic inside the Network
1. For Group policy Purpose
2. Administrative Burden will be Low
3. Network Traffic will be Low
4. Network Performance will be Good
5. Logon Traffic
6. Reduce The No. Of request For Global Catalog Server
11
1.
2.
3.
4.
12
Cable:-Cable is a medium that creates a Network and carry the signals between computers in
the Network. There are two types of cable:
2. Twisted Pair Cable:-Twisted Pair Cable is also called 10Base T. There are four pair in this
cable White - Green, White - Blue, White - Brown, White - Orange. There are two types
of Twisted Pair Cable:
A. UTP:-UTP stands for Unshielded Twister Pair. There are no mass shielded on
the wire.
B. STP:-STP stands for Shielded Twisted Pair. There are a mass shielded on wires.
3. Coaxial Cable:-Coaxial Cable just like as a normal TV cable. In coaxial cable one is
copper wire that is located in the central location of the cable then after a plastic
coating then after shielded with mass and then after upper coating (Black Coating).
There are two types of coaxial cable.
A. Thin Net Coaxial Cable:-Thin Net Coaxial Cable is also called as 10Base 2. 10
stand for 10 MBPS and 2 stands for up to 200 meters.
B. Thick Net Coaxial Cable:-Thick Net Coaxial Cable is also called as 10Base 5.
10 stand for 10MBPS and 5 stands for up to 500 meters.
4. Fiber Optic Cable:-In Fiber Optic Cable the data are sending in digital form not in analog
form. The rate of data transmission is fast by using this cable.
There are two types of device in the network
1. DTE Device--- D.T.E Stands for Data Terminal Equipment. As for exampleP.C,
ROUTER
2. DCE Device---D.C.E Stands For Data Communication Equipment. As for Example
HUB, SWITCH, MODEM
Straight Cable:-When we connect Two Different Devices, Such as DTE to DCE Device in that
cases we will use straight cable as for example Computer to Hub, Computer to Switch.
Cross Cable:-When we connect two similar devices, Such as DTE to DTE, DCE to DCE in that
case we will use cross cable as for example Computer to Computer, Hub to Hub.
Topology:-Topology is the way of connecting the computers. Topology requires two or more
computers. There are five types of Topology.
1. Bus-Topology:-In this Topology all of the computers are connected to a single Wire Such
As--coaxial cable. In Bus-Topology if the cable is break from any where then the all
network is down. In Bus-Topology the network speed is divided among the computers.
In this topology we use BNC connector. BNC stand For Barrel Net Connector.
2. Star Topology:-In this Topology all of the computers are connected to a central device
such as Hub, or Switch. In star Topology if one computer Will failed in that case my
network will be still working properly. In this topology we normally use UTP cable and
RJ-45 connecter. RJ stands for registered jack.
3. Ring Topology:-In this Topology all of the computers are connected to own next
computer and the last computer is connected to first computer. In this topology if one
computer will fails then my whole network are down. (Cable Used-? Speed - ?).
4. Mesh Topology:-In this Topology all of the computers are connected to each other
computer in the network by a separate cable and Separate NIC card. It is also called
complete Topology.
5. Hybrid Topology:-When we will connect two or more same Topology To a single different
Topology, it is called Hybrid Topology. There are two types of Hybrid Topology:
A. Star wired Bus
B. Star wired Ring
Technology:-The rate of data transmission depends on your Network Technologies. There are
many types of Network Technologies Are Available in the World--1. Ethernet:-Ethernet is a popular LAN Technology that uses CSMA/CD.
2. ATM:-ATM stands for Asynchronous Transfer Mode. ATM is a packet switching network
that sends fixed length packets over LAN or WAN. The packet size is 53 bytes in which
48 bites data and 5 bytes for address.
3. Frame Relay:-Frame Relay is a packet switching networks that sends variable length
packets over LAN or WAN.
4. FDDI:-FDDI stands for Fiber Distributed Data Interface. The rate of data transmission is
fast in this Technology. There are two types of Ring in this Technology. First is Primary
13
Ring and second is Secondary Ring. Normally the data is sending from source computer
to destination computer through the Primary Ring if Primary Ring Will Be fails then the
data Will Be sending through the Secondary Ring.
Hub:-Hub is a central device in the network that is used in star topology. Hub does the
broadcasting. The rate of data transmission is slow in the network by using Hub.
Switch:-Switch is a central device in the network that is used in star topology. Switch does the
conditional broadcasting. The rate of data transmission is fast in the network by using Switch.
Router:-Router is a device that provides the connectivity between two or more different
network id.
Gateway:-Gateway is a device that provides the connectivity between two or more different
network id. Gateway works on different network architecture.
Repeater:-Repeater receives the signals and retransmits it to original strength in the network.
IP Address:-IP Address is a unique identifier in the network from one computer to anther
computers. IP Address Is A Combination Of Network Id + Host Id.
MAC Address:-Each network adaptor are having a unique address, it is called Physical Address
or MAC Address. MAC stands for media access control.
Subnets:-Network segments that connected to a router are called Subnets.
Subnet Mask:-The Subnet Mask is a screen that differentiates from Network ID to Host ID in a
IP Address.
Network ID:-The first part of the IP Address that defines the network is called Network ID.
Host ID:-The second or last part of The IP Address that defines the Host number is called Host
ID.
Sub Netting:-A Big Network Is further divided Into Smaller-smaller Network that is called sub
netting. In sub netting we increase the Network ID and decrease the Host ID by making some
changes in subnet mask.
Super Netting:-Combining of Smaller-Smaller Network into big Network That Is Called Super
netting. In Super netting we increase the Host ID and Decrease the Network ID by making
some changes in subnet mask.
Proxy Server:-Proxy Server is a firewall component that enables us to connect multiple
computers in a network to the Internet by using a single Public IP Address. By Proxy Server we
can filter the client request for a specific Web Site.
NAT:-The NAT is a device or service that translates Private IP Address to Public IP Address in
the Network NAT Provides the internet connectivity for all Of the Internal User in the Network
through Single Public IP address And Single Line. There are three Types of NAT
1. Static Nat
2. Dynamic Nat
3. Overloading NatPAT(Port address Translation)
Firewall:-A Firewall is the combination of hardware and software that prevents unauthorized
access to an internal network from outside.
Microsoft Proxy Server:-Microsoft Proxy Server provides both features Such As Proxy Server
and a Firewall.
Protocol:-Protocol is the set of rules and regulations that provides the communication Between
Two or More devices in the Network.
Packet Switching:-In Packet Switching all of the data are sending from source computer to
destination computer through may be a different way.
Circuit Switching:-In Circuit Switching all of the data are sending from source computer to
destination computer through a single way.
Disk Quota:-When we want some users in the network do not use more disk space of the Hard
Disk then we put a appropriate Disk Quota entry on those users.
Compression:-By compression we add free of space in our Hard Disk.
Terminator:-Terminator absorbed the electric signal and stops the reflection.
Socket:-A Socket is a combination of IP Address and TCP/UDP Port.
Port:-A Port is recognized by the service as for example FTP uses Port 21.
OSI:-OSI stands for Open System Interconnection model. It is a standard model in the world.
When ever One Computer Wants to communicate with another Computer, A Major Task Is
Performed inside the Computer and that major Task are divided into Seven Parts and That
Seven Parts Is Called seven Layers.
14
1. Application Layer: - Application Layer Identify the which types Of Application Are Using
By The Client In The Network. As For exampleHTTP, FTP, SMTP, Telnet
2. Presentation Layer: - The format Of Data depends on the presentation Layer. There Are
Two Major Function Of Presentation Layer
A. Converting High Level Coding to Low Level Coding
B. Converting Low level Coding to high Level Coding
Generally there are Two Types Are Coding In this Layer
1. ASCII-American Standard Code For Information Interchange code
2. EBCDICExtended Binary Coded For decimal interchange Code
Some additional Functions are presentation Layers is
1. Compression
2. Decompression
3. Encryption
4. Decryption
3. Session Layer: - Session Layer Provides the which types Of Session Are Establish
between Sources to Destination Computer in the Network. There Are three Types Of
Data Transmission in the Network
A. Simplex Transmission:-Simplex Transmission is only one way transmission as for
example RADIO, T.V
B. Half-Duplex:-Half-Duplex is an only one way transmission at a time. As for example
hub, walky talky
C. Full-Duplex:-Full-Duplex is a two way transmission at a same time. As for example
switch, telephone, and wireless
Session Layer Provide Some Additional Function in the Network, That Is
0. Pause the Session
1. Terminate The Session
2. Restart The session
4. Transport Layer:-Transport Layer provides The End to End Connectivity in The Network.
Transport Layer is responsible to carry the data from source to destination computer In
the Network. Transport Layer provides The Two types Of Connectivity in The network
Reliable Connectivity
Unreliable connectivity
Generally There Are Two types Of Protocol in Transport Layer
1. TCP-Transmission Control Protocol
2. UDPUser Datagram Protocol
TCP provides the reliable connectivity in the Network. & UDP Provides the Unreliable
connectivity in the network.
5. Network Layer:-Network Layer Provides the Source IP address and destination IP
address in the Network. There are Two Major Function of network Layer
1. Provides the Logical addressingIP Addressing.
2. Provides the Routing
Router Is a Layer 3 device in the network
6. Data Link Layer:-Data Link Layer provides the Source Mac address And destination Mac
address in the Network. All of the Wan Technology Is a Layer 2 technology. Switch and
Bridge Is a Layer 2device in The Network.
7. Physical Layer:-Physical Layer Is Responsible For Put The Data on the Cable. Hub,
Repeater, Cable, NIC these are Layer -1 Device in The Network.
TCP:1. TCP Stands for Transmission Control protocol
2. TCP is a Connection Oriented protocol
3. It Is a unicasting protocol
4. The Rate of Data transmission Is Slow in TCP
5. In TCP The Guarantee Of Data Delivery
6. In TCP Acknowledgement is must.
UDP:1. UDP Stands for User Datagram protocol.
2. It Is a Connection Less protocol
15
3. It Is a Broadcasting protocol
4. The Rate Of Data transmission is Fast
5. In UDP No Guarantee of Data Delivery
6. In UDP No Acknowledgement
Data transmission Types:-There are three types of data transmission in the network-1. Simplex Transmission:-Simplex Transmission is only one way transmission as for
example RADIO, T.V
2. Half-Duplex:-Half-Duplex is a one way transmission at a time. as for examplehub,
walky-talky
3. Full-Duplex:-Full-Duplex is a two way transmission at a same time. as for example
switch, telephone, wireless
ARP:-ARP stands for Address Resolution Protocol. It is basically use for resolving IP Address to
MAC Address in the network.
DOD model:DOD Model Stands For department of defense model. This Model is also known As TCP/IP
Model. There are four Layers in DOD Model--1. Application Layer3 layer of OSI Model
2. Transport layertransport layer of OSI Model
3. Internet layerNetwork layer Of OSI Model
4. Network Interface Layer Or physical LayerData link & Physical Layer of OSI Model.
1.Application Layer:-There are many types of protocols in Application Layer:
A. HTTP:-HTTP stands for Hyper Text Transfer Protocol. It is basically use for
caring the web page. HTTP uses Port 80.
B. FTP:-FTP stands for File Transfer Protocol. It is basically use for transferring the
file. FTP uses Port 21.
2. Transport Layer:-There are two types of protocol in this layer:
A. TCP:- TCP stands for Transmission Control Protocol. It is a connection oriented
protocol. The rate of data transmission is slow in this protocol. By this protocol
the acknowledgement is must.
B. UDP:- UDP stands for User Datagram Protocol. It is a connection less protocol.
The rate of data transmission is fast by this protocol. The acknowledgement is
not required.
3. Internet Layer:-There are normally four protocols on this layer:
A. IP:-IP stands for Internet Protocol. It is responsible for assigning the IP
Address.
B. ICMP:-ICMP stands for Internet Control Manage Protocol. On the unsuccessful
delivery it shows the error massage to resend the data.
C. IGMP:-IGMP stands for Internet Group Management Protocol. It is responsible
for control Multicasting and Broadcasting.
D. ARP:-ARP stands for Address Resolution Protocol. It is basically used for
resolving IP Address to MAC Address in the network.
Dual Booting:-A Dual Boot configuration allows us to choose between two or more operating
system each time when we start the computer. In Dual Booting one operating system is
belongs to NOS family and another operating system must be belongs to simple O/S family
and the system partition must be formatted with either Fat or Fat 32.
File System:-A logical division of the Hard Disk is called File System such as sector or Tracks.
Partition:-A logical division of Hard Disk is called Partition.
User Profile:-A user profile contents the information about a specific users log on setting
Such As Desktop Setting. There are three types of user profile.
1. Local User Profile:-A local user profile is automatically created on each computer to
which the user log on.
2. Roaming User Profile:-The same profile can be used from anywhere in the network from
which the user log on. In This Profile User Can Change His Own profile and that profile
Will Be saved In Central Location.
3. Mandatory User Profile:-A permanent profile will be used of any user in the network
from which the user log on. In this profile user can change his own profile but that
profile will not be saved in central location. That change is only for temporary purpose.
16
Offline:-By offline user evenly access to a network share folder when he disconnected from
the network. There Are Three Types Of offline setting
1. Manually Caching For documentby Default
2. automatic caching for document
3. automatic caching for program
Recovery Console:-When my systems registry is damage and my operating system is not
starting properly in that case we will use Recovery Console. In Recovery Console we use some
command line tools such as enable, disable, fixmbr, fixboot etc.
Active Directory:-Active Directory is the main concept of Windows 2000 & Windows 2003
Network. It stores the complete information about the whole network such as users, printers,
computers etc. Active Directory provides The Centralized Management in the Network.
Objects:-Everything in Active Directory is called Object such as users, Printers, computers etc.
Attributes:-Every object has some qualities that are called Attributes. On the basis of these
attributes we identify the object such as user, printer, computer etc.
Terminal Services:-By Terminal Services we can manage our server from anywhere in the
network. There are two modes in Terminal Services:
1. Remote Administration Mode:-In this mode at a same time By Default maximum two
administrators can connect remotely to the server and manage it.
2. Application Server Mode:-By this mode user allow to run remotely one or more
applications on the Server.
Leased Line:-Leased Line is a point to point connection. When we connect 24 hours a day to
the Internet then we have a best option to choose the Lease Line because it is cost
effective(no Costly)
ISDN Line:-ISDN Line is not a point to point connection. ISDN networks extend from the local
telephone exchange to the remote user in the network. By ISDN Line the rate of data
transmission is fast. The data are sending in digital form not in analog form. In ISDN scenario
both side (client side and server side) ISDN Modem is necessary.
USB:-USB stands for Universal Serial Bus. It is basically use for physically connecting many
devices At a Same Time that supports the USB such as printer, mouse, scanner, web camera
etc. It is compatible with near about 127 devices at the same time.
Security Template:-Security Template is a readymade designed by Microsoft for implementing
a security configuration in the network. There are four types of Security Template Basic (By
Default), Compatible (Low-Level Security), Secure and High.
Service Pack:-Service Pack updates the DLL files and adds some additional features in
operating system.
DLL:-DLL stands for Dynamic Link Library. It is the important files of any application, which
helps to run any application.
CRC:-CRC stands for Cyclic Redundancy Check. CRC is a number provided by a mathematically
calculation on the packet at its source.
Driver:-Driver is software which helps to perform the Hardware properly.
Multilink:-Multilink connection uses multiple modems to create a single connection to the
Internet or other computers in the network.
CSMA/CD:-CSMA/CD stands for Carrier Sense Multiple Access/Collision Detect. At a same time
when two computers are sending data to each other in a single way then collision happens. In
that case CSMA/CD stops the collision and retransmits the data after sometime in the
network.
CAL:-CAL stands for Client Access License. Any client computer who accesses the server in a
network must require a license. There are two types of license Per Server and Per Seat. We
convert Per Server to Per Seat at one time but we cannot convert from Per Seat to Per Server.
Adminpack.msi:-For Installing/Uninstalling of Administrative tools we use Adminpack.msi.
Safe Mode:-In this mode load only basic devices and drivers that are require to start the
computer. not loading the following drivers such as VGA card, soundcard, network card etc.
Only load the Basic driver Such as keyboard, mouse, and storage device.
VGA MODE:-Load the basic VGA driver. This mode is useful if a video driver is preventing
windows operating system from starting properly, basic resolution 480 x 640 pixels setting are
applies.
17
DNS SERVER:-DNS stands for domain name system. It is a basically use for name resolution
purpose of Windows 2000/2003 clients in the network on working purpose. There are two
types of zones:
1. Forward Lookup Zone:-It is basically used for resolving Host name to IP Address in the
network.
2. Reverse Lookup Zone:-It is basically used for resolving IP Address to Host name in the
network.
Related Domain: - Related to Domain There are three types of zone:
1. Active Directory Integrated Zone:-Active Directory Integrated Zone is integrated with
Active Directory. For creating this zone Active Directory and DNS is necessary on a
particular computer in the network.
2. Standard Primary Zone:-Standard Primary Zone is not integrated with Active Directory.
For creating this zone only DNS is necessary not Active Directory is required.
3. Standard Secondary Zone:-Standard Secondary Zone is clone copy of master DNS
Server such as Active Directory Integrated Zone or Standard Primary Zone.
Zone:-Zone is the database in the DNS where all computers A Record (Host Record) and PTR
Record (Pointer Record) are Available in the network.
Virtual Memory:-Virtual Memory is some space in the Hard Disk that is used whenever RAM is
full in computer.
Unattended Installation:-In this process we create an answer file. By this process we can run
the automatically installation of Windows 2000/2003 Operating System.
DFS:-DFS stands for Distributed File System. It is a central location of any user in the network
and that is linked with all of the share folder in the network. By DFS user will be only access
the DFS server and further access any share folder in the network.
Hardware Profile:-For battery saving purpose or electricity saving purpose we can use the
Hardware Profile. It is basically use for mobile user in the network. There are two main
important parts in the Hardware Profile for examination point of view first is Dock and second
Undock station. Dock stationinside the office, undock stationoutside the office.
Internet:-The worldwide collection of all Networks and Gateways that is uses TCP/IP protocol is
called Internet. It is a example of WAN/it is also known as WAN. Internet uses the high speed
data communication lines between the major nodes and the host computer. Internet is a
public Net and everybody can access it without user name and password.
Intranet:-A private network within an organization that is uses for distribute the information
within the organization is called Intranet. It is a example of LAN/it is also known as LAN. In
Intranet only the organization people can access and use the Intranet.
Extranet:-A private network that is working within a organization and outside the organization
but not for public/everybody is called Extranet. In Extranet the company employees,
distributors, suppliers, customer etc. can access the network.
DHCP:-DHCP stands for Dynamic Host Configuration Protocol. DHCP Server provides the
automatically TCP/IP configuration of all of the clients in the network.
APIPA:-APIPA stands for Automatic Private IP Addressing. When I configure a computer in
TCP/IP setting to obtain IP Address automatically and my DHCP Server is not available or not
responding to DHCP client in that case the computer receive a IP Address from APIPA in the
range of 169.254.0.0.APIPA RANGE169.254.0.1 to 169.254.255.254
DHCP Scope: - A DHCP scope is a range of IP Addresses in the DHCP Server Who leases the IP
address to DHCP Client in the network. There are three types of Scopes:
1. Normal Scope:2. Multicast Scope:3. Super Scope:DHCP Relay Agent:-Suppose I have two subnets that is Subnet A and Subnet B and both
subnets are connected to a Router. I have a DHCP Server in Subnet A. I configure two scopes
in DHCP Server i.e. Scope A for Subnet A and Scope B for Subnet B. I want to configure that
all the computers in Subnet B receive the IP Addresses from DHCP Server That Is Located in
Subnet A. But my Router is not RFC 1542 (Request for Comment) compatible in that case I will
install a DHCP relay Agent in Subnet B.
18
Scope Option:-Scope Option provides the additional TCP/IP configuration of any DHCP client in
the network such as the IP Address of DNS Server, WINS Server, Router etc. There are four
types of scope option:
1. Server Level:2. Scope Level:3. Class Level:4. Reserved Client Level:Remote Access Connectivity:-There are two types of Remote Access Connectivity in The
Network.
1. Dial-up Remote Access:-For Dial-up Remote Access at least telephone line and modem
are necessary on both side Client side and Server side. A RAS Server is must be
configured at Server side. In this process Remote Access Client dial the telephone
number of RAS Server and then after giving user name and password. After verifying
user name and password the Remote Access Client connect to the RAS Server and
further connect to the Internal Network.
2. VPN:-VPN Stands for Virtual Private Network. In this process Remote Access Client
connect to the VPN Server via Internet. By this process the communication is very
secure and the data are sending and receiving in tunneling form.
DNS:-There are two types of DNS Query:
1. Iterative Query:-When a client Query to the DNS Server and if my DNS Server is having
the best result then it will give the best result to client in the network otherwise it will
send a message not found, it is called Iterative Query.
2. Recursive Query:-When a client Query to the DNS Server and if my DNS Server is
having the best result then it will give the best result to client computer otherwise it
forward the client Query on own behalf to the Root DNS Server and it will give the
complete result to the client Computer in the network, it is called Recursive Query.
CA:-CA stands for Certification Authority. CA provides the secure communication between two
or more computers in the network. There are four types of CA:
1. Enterprise Root CA:2. Enterprise Subordinate CA:3. Stand Alone Root CA:4. Stand Alone Subordinate CA:Enterprise Root CA and Enterprise Subordinate CA required the Active Directory but Stand
Alone Root CA and Stand Alone Subordinate CA do not require Active Directory.
IP Sec Policy:-IP Sec Policy provides the secure communication between two or more
computers in the network. There are three types of IP Sec Policy in the network:
1. Client Respond Only:2. Secure Server Required Security:3. Secure Server Request Security:ICS:-ICS stands for Internet Connection Sharing. It is basically used in workgroup to share the
Internet connection.
NS Lookup:-NS Lookup check that my DNS Server is working properly or not in the network.
Scavenging:-Scavenging is use to clear the stale records in the DNS Server.
WINS:-WINS stands for Windows Internet Naming System. It is basically use for Name
Resolution purpose for previous version of Windows 2000 Clients in the network. It is resolving
NetBIOS Name to IP address in The Network There is three types of Replication partner in the
WINS Server:
1. Push Partner:2. Pull Partner:3. Push-Pull Partner:-(By Default)
There are four Types Of nodes in WINS Server:
B Node (Broadcasting)
P Node (Search Server)
M Node (B + P)
H Node (P + B)
19
RIS:-RIS Stands for Remote Installation Service. In this process the computers are connected
to a server running Remote Installation Service and then after RIS Server install the Windows
2000 Professional on those computers. In this process the client computers uses the PXE Card.
Home Folder:-Home Folder is a central location of any user in the network where he can save
file and folder. Home Folder shows as a drive in the computer when a user login the network
from anywhere.
Tracert:- Tracert display Complete Routes Information from source computer to destination
computer in the network.
Telnet:-Telnet provides the remotely logon the computer and working on that computer.
Global Catalog Server: - A Global Catalog Server is a forest root domain that creates a
relationship between two computers within the Single Forest
By default first root domain controller is the global catalog server in the network. It stores the
information about universal group in the network. Global Catalog Server Maintain The Read
Only Copy To All Of The Domain Inside The Forest.
User Right:-User Rights authorized a user to who logon to the network or computer to perform
certain action on the system. There are some common User Rights:
A. Log on Locally
B. Change the System Time
C. Shut Down the System
D. Access the Computer from Network
Power User:-A user that Are having the special authority to maintain the user accounts such
as add a user account, delete a user account, modify a user account, change the password of
a user etc. is called Power User.
Backup Operator:-A user that is having the power of Backup and Restore the file of a
computer it is called Backup Operator.
Wireless Communication:-In Wireless Communication we have not need to attach a device to
the computer by the help of wire. Wireless Communication device works on the basis of
receive and transmit the analog or digital signals in The Network. There are two types of
Wireless Communication:
1. Infrared Transmission:-In Infrared Transmission an infrared light beam is used to carry
the data between transmit and receiving device. There must be a clear line between
transmit and receiving device for communication. TV and Remote is the example of
Infrared Transmission.
2. Narrowband Radio Transmission:-In Narrowband Radio Transmission user tunes both the
transmitter and the receiver to a certain frequency. Narrowband Radio Transmission
does not require a clear line between both devices. Radio and FM is the example of
Narrowband Radio Transmission.
PPTP:-PPTP stands for Point to Point Tunneling Protocol. It is used in RAS connectivity. PPTP
enable the secure transfer of encapsulate data between a PPTP Client and a PPTP Server
across the Internet. PPTP uses MPPE (Microsoft Point-to-Point Encryption) to encrypt the data.
L2TP:-L2TP stands for Layer Two Tunneling Protocol. It is used in RAS and more secure then
PPTP. L2TP enables the secure transfer of encapsulate data between L2TP Client and L2TP
Server across the Internet. L2TP uses IP Sec (Internet Protocol Security) for Encrypt the data.
Three Way Hand Shake:-TCP is a reliable Protocol. When two computers communicate that
using TCP, firstly establish a connection before the exchange of data, it is called session. Two
computers establish a session by a process that is called Three Way Hand Shake. There are
three steps in Three Way Hand Shake process:
A. The source computer initiates the connection by transmitting the session
information.
B. The destination computer responds with its session information.
C. The source computer receives the information and sends an
acknowledgement.
20
Host Name:-A Host Name is a user friendly name that is given by us to a computer to identify
him. The Host Name is a 15 byte or up to 255 character length name.
NetBIOS Name:-A NetBIOS Name is a 15+1 byte name in that 15 byte is host name that is
given by us and 1 byte is generated by computer automatically.1 Byte Depends on That
Computer Are Providing Which Kinds Of services In the Network.
Web Server:-A server computer that provides the services related to web site/Internet is called
Web Server.
Class-full IP Address:-All the IP Addresses are divided into five classes class A, B, C, D and E.
All the classes having a default subnet mask according to its class. So the IP Address that is
given with its default subnet mask is called Class-full IP Address.
Class-less IP Address:-All the IP Addresses are divided into Five Classes class A, B, C, D and E.
All the classes having its default subnet mask. When we change the default subnet mask of
an IP Address by the help of sub netting and super netting, it is called Class-less IP Address.
Driver Signing:-Sometimes when we install a new driver/software on the computer then its
installation process is overwrite some system files and damage or creating some problem with
our operating system. To stop this thing windows 2000 have a feature i.e. Driver Signing.
Driver Signing check the driver/software is signed by Microsoft or not. There are three Options
in Driver Signing:
1. Ignore:-In Ignore Windows do not check the signed or unsigned driver and install the
driver normally.
2. Warn:-In Warn Windows check the driver is signed or unsigned and give a warning
massage during installation for unsigned driver.
3. Block:-In Block Windows never install the unsigned driver.
Permission Inheritance:-All the permissions is assigned to a folder is automatic apply on its
subfolder or files, it is called Permission Inheritance.
Take Ownership:-If the administrator has no rights or permissions on an object then the
administrator can be the owner of that object by the using the power i.e. Take ownership and
forcibly get the permission on that object.
Recovery Agent:-Recovery Agent has the power of Decrypt the file of any user.
Decryption:-Change an Encrypted file to a simple file is called Decryption.
Or
Remove the Encryption from a file or Folder is called Decryption.
Hidden Share:-When we share a object with the $ sign, it is called Hidden Share. Hidden Share
object is not shown as like normal share objects.
Print Device:-Print Device is a hardware that is physically prints a document.
Spool Folder:-Spool Folder shows the entire documents that are waiting for print in print
queue.
Default Printer:-Which printer I want to give priority to print document that is known as
Default Printer.
Printer Pooling:-By the Printer Pooling we can connect one Printer Driver with two or more
print device for load balancing Purpose In The Network.. In printer Polling We Can say
One Master and More than one servant are Available in the Network. In printer pooling it is
necessary that print device is same manufacturer and same model no.
Printer Priority:-By Printer Priority we can connect two or more printers with one print device
and set the priority of each printer that whose document is print firstly In the Network. In
printer priority We Can say one servant and more than one master are Available in the
Network. In that case which work will be first? We Can configure the priority on the printer,
such asmanger99, user1
Internet Printing:-By the Internet printing we can print a document remotely in the Network. In
Internet Printing we can print the document on the print device that is located in other city.
Scope of Group:-There are three types of Group scopes In the Network:1. Domain Local Group:-In Domain Local Group user Belongs to Any Domain and Access
resources My Domain.
2. Global Group:-In Global Group User Belongs To My Domain and Access Resources Any
Domain.
21
3. Universal Group;-In Universal Group user User Belongs to Any Domain and Access
Resources Any Domain.
There are two types of Groups:
1. Security Group:-Security Group is basically used for give the permission to the user on
a Particular resource of the network. Security Group is having all the features of
Distribution Group.
2. Distribution Group:-Distribution Group is basically created for sending E-Mails in The
Network. On Distribution Group we can not assign the permission For Any Objects in
The network. Distribution Group Can Not Work As A Security Group.
Disaster:-An event that becomes a cause to unable to start Windows properly such as
corruption of boot sector, deleting or missing system file etc. is called disaster.
Disaster Recovery:-When a computer disaster occurs after that the process of restoring the
computer to its original state that is prior of disaster is called Disaster Recovery.
ERD:-ERD stands for Emergency Repair Disk. ERD having a backup copy of system state data
such as registry, system files, partition boot sector, startup environment etc. It is most
important tool to recover your system registry.
Disk Duplication:-When we need to install Windows 2000/2003 on a large number of
computers. We have create a disk image of Windows 2000/2003 installation and then copy
the image to the multiple computers that process is called Disk Duplication.