0% found this document useful (0 votes)
480 views8 pages

Interview Questions: 01 Differences Between PST & OST? PST OST

The document provides information on various technical topics including: 1. The differences between PST and OST files, which store emails locally or sync with an Exchange server. 2. The differences between Windows operating systems like NT, 2000, XP Home and Professional editions. 3. Backup types like full, differential, and incremental and how they handle changed files. 4. Technical specifications and protocols like TCP, IP, SMTP, and DNS and how they function in networking. 5. How to configure Outlook and recover corrupted PST files.

Uploaded by

Shaik Thaj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
480 views8 pages

Interview Questions: 01 Differences Between PST & OST? PST OST

The document provides information on various technical topics including: 1. The differences between PST and OST files, which store emails locally or sync with an Exchange server. 2. The differences between Windows operating systems like NT, 2000, XP Home and Professional editions. 3. Backup types like full, differential, and incremental and how they handle changed files. 4. Technical specifications and protocols like TCP, IP, SMTP, and DNS and how they function in networking. 5. How to configure Outlook and recover corrupted PST files.

Uploaded by

Shaik Thaj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 8

INTERVIEW QUESTIONS

01* Differences between PST & OST?

PST OST

* PST is a personal folders we create PST OST created when the outlook is
offline(network cable disconnected or in
outlook some problem)then the mails gone
in offline the send mails are automatically
saved to sent items & when outlook are
online will be automatically sent to
destination point.
For moving mails from mailbox to local
Computer

* PST Files is Simply a Storage Location on OST Files Starts as a mirror image of your
Your HDD or Server than the Exchange Server. Folders on your Exchange Server and works
In conjunction with Exchange Server
During Synchronization

02* Differences between Windows NT & Windows 2000?

Win NT Win 2000

* Directory service active directory service


* FAT 16 & NTFS 4.0 FAT 16, FAT 32 & NTFS 2.0
* Compression Compression, Encryption & Disk Quota
* System Policy Group Policy
* Local & global group Local, Global & Universal Group.
* No IP Sec Ip Sec Built-in.
* 40000 user limit 100000 user limit
* NTLM authentication NTLM & Kerberos Authentication.
* Basic Disk Basic & Dynamic disk

03* Differences between Windows XP Professional & Windows Home Edition?

Win XP Home Win XP Professional

* No remote desktop Remote desktop


* NO Offline Folders
* 1 processor 2 processor
* Workgroup member workgroup & Domain Member
* No Encryption
* No GPO GPO
* NO Roaming Profile
04* Types of Backup. Differences between Differential & Incremental Backup?

*Full Backup: - In this backup we are talking all the files & folders on the system

*Differential Backup: - it’s a cumulative backup of changed made since the last full backup it backup
the only modified file but does not update the achieve attribute.

*Incremental Backup: - it takes the modified file since the last backup users need to update the
achieve attribute while backup only modified files.

05* Differences between SATA & PATA?

SATA PATA

* It is a 5 pin connector *It is a 40 pin connector


* At a one time, in one sata cable, we can connect *At a one time, in one pata cable, we can
only 1 device connects 2 devices
* HDD speed is 3200rpm to 5200rpm *HDD is till 15200rpm
* The data moves in parallely *the data moves in serially.

06* How Many Partition Can Create In 1 Hard Disk?

In 1 HDD, 23 partitions can create: - 26 alphabets, A & B for floppy drive, D goes for CD Drive
26-3 = 23 Partitions

07* If System Hang In Middle Of Processing. How It Can Be Resolve?

08* If Monitor Goes Off & PC Is Running. What Problem Can Happen?

09* What IS DNS?

DNS: - (Domain Naming System)


It resolves the IP in to host name. It allows the network to determine IP Address from names & Vice-
Versa. PORT NO: - 53

10* What IS SMTP?

SMTP :- (Simple Mail Transfer Protocol)


SMTP comes under transport layer. It provides the foundation services for e-mail transfer across the
internet. SMTP makes sure that e-mail message are delivered from the sender server to the addressee
server it is used to sent text based information(E-mail) PORT NO:- 25

11* What IS TCP?

TCP :- (Transmission control Protocol)


It’s a reliable connection oriented protocol used to control the management of application level series
between computers it comes under transport layer.

12* What IS IP? How IS The Classes?

IP :- (Internet protocol)
IP is a 32 bits nos. normally expressed 4 octets “a dotted decimal number’’. It comes under network
layer protocol that contains addressing information and some control information that enables packets
to be routed it can be used to communicate across any set of interconnected networks and equally well
suited for LAN & WAN connections.
IP Classes:-
0-126:- Class A N.N.H.H. Network: - 2*8 Host: - 2*24(Few large Organization)
127:- Loop Back
128-191:- Class B N.N.H.H. Network: - 2*16 Host: - 2*16(Medium Large Organization)
192-223:- Class C N.N.N.H Network: - 2*24 Host: - 2*8 (Relatively Small Organization)

13* What IS Active Directory?

Active directory is a centralized ID management resource. A directory is an information storage


location that uses a systematic scheme to organize the information the active directory is a powerful
tool that allows multiple sites, domains & even the internet to fully integrate together it lists the
information is completely searchable & provides a standard folder interface to users so they can find
what they need on the network from an administrator point of view the active directory provides you
with a simple, hierararohical design that you can administer from single location.

14* What IS Command For Installing Active Directory?

Command for installing Active Directory RUN: - DCPROMO


Command for running Active Directory RUN- DSA.MSC

15* What Is Use of Active Directory?

Active Directory is a directory in which we can cerate users & Groups & Add different rights &
permission for particular is the active directory purpose is to organize information about real objects
such as user, printers, applications & so fourth users can use the resources they need. Through the
active directory, users do not have to keep the track of which servers hold which resources or where a
particular printer resides.

16* How to Configured Outlook?

Outlook is that from which we send & receive mails & saved address book.
Outlook Configuration
START- CONTROL PANEL- MAIL- NEW MAIL ACCOUNT- SERVER IP OR SERVER NAME-
NAME OF THE USER- CHECK NAME(Means it will search user name in exchange server) then
automatically takes particular user name- after it will ask for user name & password – FINISH.-
outlook configured. After that send test mail to any user.

17* If PST Has Been Corrupted. Then How It Can Be Recover?

If PST has been corrupted, it can be recovered from PST recovery software or If PST has been saved
in server or the better way is that recover PST from LTO backup tape restore it previous backup.

18* Differences between HUB & SWITCH?

SWITCH HUB
* works at layer 2 works at layer 1
* uses MAC address for packet forwarding uses broadcast for packet forwarding
* does not required CSMA/CD requires CSMA/CD
* Faster than HUB slower than switch
* Full duplex half duplex
* High throughput low throughput.
19* What IS Straight & Cross Crimping?

STRAIGHT CROSS

HUB-PC SWITCH-PC PC-PC

1 Orange White Green White


2 Orange Green
3 Green White Orange White
4 Blue Blue
5 Blue White Blue White
6 Green Orange
7 Brown White Brown White
8 Brown Brown

20* What Is Dual Core Processor? Which Technology Is Use In Dual Core Processor?

Dual core processor is only a processor which is installed in PC but it functions like a 2 processor that
why is known a Dual Core processor when we see processor performances in task manager when then
it shows 2 processor running .In that hyper threading technology is used for multi-casting when we
several applications & files at a time then it do multi-casting in all files which are running because of
these the applications will run fast & it saves very fast.

21*what is the Extension of MS-Outlook & Outlook Express?

MS-outlook Extension - *.PST


Outlook Express Extension – *.DBX

22*what is the location of MS-Outlook & Outlook Express files?

Outlook Express

C:\Documents and Settings\bpocomnet\Local Settings\Application Data\Identities\{BA1A0B50-


035B-4D1C-B7E0-B4037636DD52}\Microsoft\Outlook Express

C:\documents & settings\user name\local settings\application data\identities\Microsoft\outlook


express

MS-outlook
C :\documents & settings\user name\local settings\application data\microsoft\outlook\file.PST

23*How to backup of Outlook in case of formatting Hard disk Drive?

In case of formatting HDD, the main part is to take the backup of mails means outlook we are taking
backup of mails which are saved in PST (means in local computer or server) PST saved in the profile
of the user means proper destination C :/> documents & settings\user name\windows\microsft\outlook
in that in some folder or if the user save in her own destinations in C drive or D drive So, we have to
take the backup of PST.

24*what is the location of outlook data & address book?

Address Book:-
C :/> documents & settings\user name\local settings\application data\Microsoft\address book.

25* What Is Cache Memory?


Cache memory is advanced technology it does not seems P1, P2. Cache memory is a when we process
any applications & we are saving that it goes directly to save in the processor because of these the PC
is working fast & it does not take much more time to save any files. The main purpose of cache
memory It makes the PC fast.

26* What IS DHCP?

DHCP (Dynamic Host Configuration Protocol)


It is a method of assigning & controlling the IP address of computers on a given network. It is a sever
based device that automatically assign IP address When a computer boots bit does need assigned IP
manually.

27* what is the POP3?

POP3 (Post Office Protocol)


It mainly comes under upper layer i.e. Application Layer. It mostly used in downloading e-mail
messages from the mail server to the client computer and is used mainly when e-mail is retrieved
mainly at one particular computer.

28* what is the IMAP?

IMAP (Interactive mail access protocol)


It mainly comes under Application layer, unlike the P0P3 protocol the IMAP protocol is used when e-
mail is to remain on the mail server until expressly deleted, allowing a user gain access to their e-mail
from any workstation on the network.

29* what is the different between POP3 and IMAP?

* POP 3

POP3 works by reviewing the inbox on the mail server, and downloading the new messages to your
computer.
You only check e-mail from one computer.
You want to remove your e-mail from the mail server.
Set to remove mail from server after 30 days.
Don't check more frequently than every 15 minutes.
75 MB is the maximum for POP3 users. POP’ing large mail boxes consume excessive server
resources.

* IMAP

IMAP downloads the headers of the new messages on the server, then retrieves the message you want
to read when you click on it.
You check e-mail from multiple locations.
You use Web mail.
Do NOT check all folders for new messages! This slows your e-mail substantially.
Use "mail/" (without the quotes) as your IMAP folder directory.
You can set your client to download the mail and to remove the mail from the server, like a POP3
client.

30* what is the difference between domain & workgroup network?

Domain Workgroup

* Centralized network model decentralized network


* Domain is controlled by DC No centralized control
* Centralized Login Local Login
* Centralized User Database Local user database
* Easy & Centralized Management NA
* Good for Large Network good For Small Network.
31* what is the FTP?

FTP (File Transfer Protocol)


It comes under Application Layer FTP port numbers is 21. This Protocol used to transfer files to and
from a server running the FTP client software. it is used download & upload files.

32* what is Group Policy?

Group Policy Collection


Group Policy is an infrastructure that allows you to implement specific configurations for users and
computers. Group Policy settings are contained in Group Policy objects (GPOs), which are linked to
the following Active Directory service containers: sites, domains, or organizational units (OUs). The
settings within GPOs are then evaluated by the affected targets, using the hierarchical nature of Active
Directory. Consequently, Group Policy is one of the top reasons to deploy Active Directory because it
allows you to manage user and computer objects.

Group Policy is one of a group of management technologies, collectively known as IntelliMirror


management technologies, which provide users with consistent access to their applications,
application settings, roaming user profiles, and user data, from any managed computer—even when
they are disconnected from the network. IntelliMirror is implemented through a set of Microsoft
Windows features, including Active Directory, Group Policy, Software Installation, Windows
Installer, Folder Redirection, Offline Folders, and Roaming User Profiles.

33* Types of Layers?

Application layer = user interface and application


Presentation layer = Data conversion and transformation
Session layer = keep data of diff. application separately
Transport layer = end to end connectivity using port numbers.
Network layer = logical addressing like IP address.
Data link layer = Physical addressing like MAC address.
Physical layer = Physical transmission of data using 0's and 1's.

34* Difference between Virus & Warms?

VIRUS WARMS

If virus attacks any of the files, when you warms attacks to the files, it does not require
Open that particular file at that time it will attacks to open affected file it is directly replicated.

35* What Is VLAN?

VLAN is a collection of nodes that are grouped together in a single broadcast domain that is based on
something other than physical location some reasons To Have Using VLAN:-
* Security: - separating systems that have sensitive data from the rest of the network decreases the
chances that other people cannot access your information.
* Projects/Special Attentions: - Managing a project or working with a specialized application can be
simplified by the use of VLAN that brings all required nodes together.
* Performance/Bandwidth: - careful monitoring of network use allows the network admin to create
VLAN that reduce nos. of router hops & increase apparent bandwidth for network users.
* Departments/Specific Job types:-companies may want VLAN set up for a department that are
heavy network users or a VLAN across a department that is dedicated tp specify users.you can create
VLAN (Name, Domain & Port Assignments).Communication between VLAN requires the use of a
router for multiple VLAN on multiple switches, you must to be able to communicate via a single link
between the switches, you must use a process called TRUNKING. It is the technology that allows
information from multiple VLAN TRUNKING PROTOCOL (VTP) is the protocol that switches use
to communicate among themselves VLAN configuration.

36* what is Proxy Server?

A Function that is often combined with a firewall is a proxy server. It is used to access web pages by
the other computers when another computer requests a web page, it is retrieved by proxy server &
then sent to the requesting computer it can also make your internet access work more effectively.

37* Why To Add A PC In Domain?

•To take advantage of one-time per session domain authentication


•Controls computer and network security through Group Policy Objects (GPOs), then the computer
must be joined.
•if Outlook is used regularly to access Exchange accounts, or if users regularly map drives or print to
networked printers), then the computer should be joined.

38* Minimum & Maximum RAM Required for Installing of Win 2K3?

Minimum RAM – 256RAM


Maximum RAM – Depend Up To Slots It May 8GB & 16GB

39* Five Roles of Active directory?

Scalable — The Active Directory is highly scalable, which means it can function in small
networking environments or global corporations. The Active Directory supports multiple stores,
which are wide groupings of objects, and can hold more than one million objects per store.

Extensible — The Active Directory is "extensible," which means it can be customized to meet the
needs of an organization.

Secure — The Active Directory is integrated with Windows 2000 security, allowing
administrators to control access to objects.

Seamless — The Active Directory is seamlessly integrated with the local network and the
intranet/Internet.

Open Standards — The Active Directory is based on open communication standards, which allow
integration and communication with other directory services, such as Novell's NDS.

Backwards Compatible — Although Windows 2000 operating systems make the most use of the
Active Directory, the Active Directory is backwards compatible for earlier versions of Windows
operating systems. This feature allows implementation of the Active Directory to be taken one
step at

40* IN 1 Domain Controller How Many ADC Can Be Installed?

Uncountable

41* If Domain Controller failed which File Can Backup?


System State

42* Which 2 Folder Automatically Is Shared When DC Installed?

Sysvol, Netlog, Admin$, IPC$

43* What Is Forward & Reverse Look Up Zone?

Forward Lookup - it is used to resolve FQDN to IP


Reverse lookup - it is used to resolve IP to FQDN

44* How Many Edition in Win 2K3?

1- Standard Edition
2- Enterprise Edition
3- Web Edition
4- Data Centre Edition.

45* What Is Global Catalog?

The purpose of LDAP is to allow network users to search and find the objects in the Active Directory
they want to use. For this to happen, the Active Directory domain controllers maintain a "global
catalog."

The global catalog allows users and applications to find objects in the Active Directory by searching
for a particular attribute(s). The global catalog holds a partial "replica" of the objects and their most
common attributes. When a user performs a search operation to find a user (or other object), the
global catalog is checked to find matches for that request. The global catalog looks for that attribute
and returns matches to the user. Data in the global catalog is built and maintained through replication
among domain Controller.

46* what is RAID?

RAID (Redundant Array of Inexpensive Disk)

RAID is a fault tolerant method of storing data meaning that a failure can occur & the system will still
function 3 Advantages Of RAID:- Redundancy, Increased Performance, Lower Costs. These is a form
of a data backup in the storage array in case of any failure if one of the drives in the array failed, it
could either be swapped out for a new drive without turning off the system or the redundant drive
could be used.

You might also like