AD
AD
3. How will you restrict user logon timing in domain?Navigate to Active Directory
Users and Computers, User Properties select logon times and restrict the user logon
timing as needed.
Organization Unit is set of active directory object within a domain. It is used to design
an organization structure, Restrict user’s visibility and to delegate control.
6. Explain different edition of windows 2003 Server?
Windows Server 2003, Standard Edition: - is aimed towards small to medium
sized businesses. Standard Edition supports file and printer sharing, offers secure
Internet connectivity, and allows centralized desktop application deployment.
Windows Server 2003, Enterprise Edition: - is aimed towards medium to large
businesses. It is a full-function server operating system that supports up to eight
processors and provides enterprise-class features and support for up to 32 GB of
memory.
Windows Server 2003, Web Edition: - is mainly for building and hosting Web
applications, Web pages, and XML Web Services.
Windows Server 2003, Datacenter Edition: - is the flagship of the Windows
Server line and designed for immense infrastructures demanding high security and
reliability.
7. What is DNS Server?
Domain Name System is used to resolve domain name to IP Address and also used
to resolve IP Address to Domain Name. It has two zones Forward and Reverse
Lookup Zone. Forward Lookup Zone resolve Domain name to IP address. Reverse
Lookup Zone is used to resolve IP address to Domain Name. Some records
associate with DNS
A Record binds Name with IP Address
PTR Record binds IP Address to Name
8. Why DNS server is required for Active Directory?
The key reason for integrating DNS with AD is that client server communication
takes place with Domain Name. Network needs IP address to reach the destination;
In order to resolve Domain Name to IP Address we need DNS Server. If DNS Server
is not configured properly the network becomes slow.
9. What is the Purpose of A and PTR Record?
A Record OR Host Record is used to bind a Name with IP Address.
PTR Record is used to bind an IP Address with Name.
10. What is the purpose of DHCP Server?
DHCP Server is used to assign IP address automatically to all the clients’ computers.
It is useful in large enterprise network, where we may not able track the IP address
and also used to avoid IP conflict.
Alternate method: Open DHCP Console select server to backup and restore DHCP
database.
Group policies are used by administrators to configure and control user environment
settings. Group Policy Objects (GPOs) are used to configure group policies which
are applied to sites, domains, and organizational units (OUs) .There is a maximum of
1000 applicable group policies.
18. What is the default time for group policy refresh interval time?
The default refresh interval for policies is 90 minutes. The default refresh interval for
domain controllers is 5 minutes. Group policy object's group policy refresh intervals
may be changed in the group policy object.
Hidden or administrative shares are share names with a dollar sign ($) appended to
their names. Administrative shares are usually created automatically for the root of
each drive letter. They do not display in the network browse list.
20. What ports are used by DHCP and the DHCP clients?
Requests are on UDP port 68, Server replies on UDP 67.
The Group Policy Object Editor and the Software Restriction Policies extension of
Group Policy Object Editor are used to restrict running certain applications on a
machine. For Windows XP computers that are not participating in a domain, you can
use the Local Security Settings snap-in to access Software Restriction Policies.
Disk Quota is a feature or service of NTFS which helps to restrict or manage the disk
usage from the normal user. It can be implemented per user user per volume
basis.By default it is disabled. Administrative privilege is required to perform the task.
In 2003server we can control only drive but in 2008server we can establish quota in
folder level.
31. Explain Backup Methodology.
The different types of backup methodologies are:
Normal Backup:-This is default backup in which all files are backed up even if
it was backed up before.
Incremental Backup:-In this type of backup only the files that haven’t been
backed up are taken care of or backed up.
Differential Backup:-This backup is similar to incremental backup because it
does not take backup of those files backed up by normal backup but different from
incremental because it will take backup of differentially backed up files at next time of
differential backup.
System Backup:-This type of backup takes backup of files namely, Boot file,
COM+Class Registry, Registry. But in server it takes backup of ADS.
ASR Backup:-This type of backup takes backup of entire boot partition
including OS and user data. This should be the last troubleshooting method to
recover an os from disaster.
32. Explain how to publish printer through AD.
Navigate to Active Directory Users and Computers, Create new printer and add the
printer i.e. the printer share name (UNC) Path. Automatically the printer will be
published in Active Directory.
File Transfer Protocol is used transfer large volume of files and huge number of files
simultaneous between different geographic locations.
34. Specify the Port Number for AD, DNS, DHCP, HTTP, HTTPS, SMTP, POP3 &
FTP
AD - 389
DNS - 53
DHCP - 67,68( 67 for Server and 68 for Client)
HTTP - 80
HTTPS - 443
SMTP - 25
POP3 - 110
FTP - 21,22
35. Explain Virtual Directory in IIS?
A virtual server can have one home directory and any number of other publishing
directories. These other publishing directories are referred to as virtual directories.
36. What is Exclusion Range in DHCP Server?
Start Of Authority (SOA) Records indicate that Name Server is authoritative server
for the domain.
38. What command is used to clear DNS cache in client PC?
Ipconfig /flushdns
Only when installing active directory and DNS in the same server (AD Integrated
Zones) we can select Secure Dynamic Updates. Then all the records will
automatically be updated in DNS. Since all the information is validated in active
directory there will not be any duplicate or unwanted records.
45. What is the difference between Dynamic Disk and Basic Disk?
Basic Disk: Basic Disk uses a partition table to manage all partitions on the disk,
and it is supported by DOS and all Windows versions. A disk with installed OS would
be default initialized to a basic one. A basic disk contains basic volumes, such as
primary partitions, extended partition, and all logical partitions are contained in
extended partition.
FAT32 - 4GB
The hosts file is a computer file used in an operating system to map hostnames to IP
addresses. The hosts file is a plain-text file and is traditionally named hosts.
The lmhosts files are a computer file used in an operating system to map NetBIOS
name. It is equivalent that of WINS.
49. Explain About Global Catalog.
global catalog contains a complete replica of all objects in Active Directory for its
Host domain, and contains a partial replica of all objects in Active Directory for every
other domain in the forest.
53. By default, if the name is not found in the cache or local hosts file, what is
the first step the client takes to resolve the FQDN name into an IP address?
54. You are administering a network connected to the Internet. Your users
complain that everything is slow. Preliminary research of the problem
indicates that it takes a considerable amount of time to resolve names of
resources on the Internet. What is the most likely reason for this?
DNS Issues
55. Describe how the DHCP lease is obtained.
It’s a four-step process consisting of (a) IP request, (b) IP offer, (c) IP selection and
(d) acknowledgement.
56. I can’t seem to access the Internet, don’t have any access to the corporate
network and on ipconfig my address is 169.254.*.*. What happened?
Page File Is Storage Space For The Virtual Memory, Page File Uses Hard Disk
Space As a Memory To Provide Memory Allocation...
60. What is the difference between DNS in Windows 2000 & Windows 2003
Server?
We can rename or moved the domain name without rebuilding in windows 2003
server, but in windows 2000 server, we can't do that.
%SystemRoot%System32\Group Policy
64. You change the group policies, and now the computer and user settings
are in conflict. Which one has the highest priority?
2) Mention what are the new features in Active Directory (AD) of Windows
server 2012?
Forest is used to define an assembly of AD domains that share a single schema for
the AD. All DC’s in the forest share this schema and is replicated in a hierarchical
fashion among them.
The SysVOL folder keeps the server’s copy of the domain’s public files. The
contents such as users, group policy, etc. of the sysvol folders are replicated to all
domain controllers in the domain.
6) Mention what is the difference between domain admin groups and
enterprise admins group in AD?
AD database is saved in %systemroot%/ntds. In the same folder, you can also see
other files; these are the main files controlling the AD structures they are
dit
log
res 1.log
log
chk
10) Mention what is PDC emulator and how would one know whether PDC
emulator is working or not?
PDC Emulators: There is one PDC emulator per domain, and when there is a failed
authentication attempt, it is forwarded to PDC emulator. It acts as a “tie-breaker”
and it controls the time sync across the domain.
These are the parameters through which we can know whether PDC emulator is
working or not.
Lingering objects can exists if a domain controller does not replicate for an interval of
time that is longer than the tombstone lifetime (TSL).
Schema is an active directory component describes all the attributes and objects that
the directory service uses to store data.
CDC or child DC is a sub domain controller under root domain controller which share
name space
15) Explain what is RID Master?
RID master stands for Relative Identifier for assigning unique IDs to the object
created in AD.
Components of AD includes
Infrastructure Master is accountable for updating information about the user and
group and global catalogue.
What is Domain?
Domain Controller is the server which holds the AD database, All AD changes get
replicated to other DC and vise vase
What is Forest?
Forest consists of multiple Domain trees. The Domain trees in a forest do not form a
contiguous namespace however share a common schema and global catalog (GC)
What is Schema?
Active Directory schema is the set of definitions that define the kinds of object and
the type of information about those objects that can be stored in Active Directory
Schema Master
Infrastructure Master
RID Master
PDC
Schema Master and Domain Naming Master are the forest-wide roles and only
available one on each Forest, Other roles are Domain-wide and one for each
Domain
An interesting question which role is most important out of 5 FSMO roles or if one
role fails that will impact the end-user immediately
Most armature administrators pick the Schema master role, not sure why maybe
they though Schema is very critical to run the Active Directory
The correct answer is PDC, now the next question why? Will explain role by role
what happens when an FSMO role holder fails to find the answer
Schema Master – Schema Master needed to update the Schema, we don’t update
the schema daily right, when will update the Schema? While the time of operating
system migration, installing a new Exchange version and any other application which
requires extending the schema
So if are Schema Master Server is not available, we can’t able to update the schema
and no way this will going to affect the Active Directory operation and the end-user
Schema Master needs to be online and ready to make a schema change, we can
plan and have more time to bring back the Schema Master Server
So if are Domain Naming Master Server is not available, we can’t able to create a
new Domain and application partition, it may not affect the user, user event didn’t
aware Domain Naming Master Server is down
In a Multi-Domain and Forest environment, there will be impact and we have enough
time to fix the issue before it affects the end-user
RID Master –Every DC is initially issued 500 RID’s from RID Master Server. RID’s
are used to create a new object on Active Directory, all new objects are created with
Security ID (SID) and RID is the last part of a SID. The RID uniquely identifies a
security principal relative to the local or domain security authority that issued the SID
When it gets down to 250 (50%) it requests the second pool of RID’s from the RID
master. If RID Master Server is not available the RID pools unable to be issued to
DC’s and DC’s are only able to create a new object depends on the available RID’s,
every DC has anywhere between 250 and 750 RIDs available, so no immediate
impact
PDC – PDC required for Time sync, user login, password changes, and Trust, now
you know why the PDC is important FSMO role holder to get back online, PDC role
will impact the end-user immediately and we need to recover ASAP
The PDC emulator Primary Domain Controller for backward compatibility and it’s
responsible for time synchronizing within a domain, also the password master. Any
password change is replicated to the PDC emulator ASAP. If a login request fails
due to a bad password the login request is passed to the PDC emulator to check the
password before rejecting the login request.
Tel me about Active Directory Database and list the Active Directory Database
files?
NTDS.DIT
EDB.Log
EDB.Chk
All AD changes didn’t write directly to NTDS.DIT database file, first write to EDB.Log
and from the log file to the database, EDB.Chk used to track the database update
from the log file, to know what changes are copied to the database file.
3. Define SYSVOL?
The SysVOL file keeps the server’s copy of the domain’s public files. The
fillings such as users, group policy, etc. of the SysVOL folders are simulated to all
area controllers in the domain.
4. Define the term FOREST in AD?
5. What is Kerberos?
Kerberos is a verification protocol for the network. It is built to present secure
verification for client applications by using secret-key cryptography.
Lingering objects can exist if a field controller does not duplicate for a gap of time
that is longer than the gravestone lifetime.
Infrastructure Master is answerable for updating information about the customer and
group and universal catalogue.
A domain is a place of network resources for a collection of users. The user needs
only to log in to the domain to increase access to the resources, which may be
situated on a number of several servers in the network.
11. Explain subnet?
Active Directory Recycle bin is a characteristic of Windows Server 2008 AD. It helps
to re-establish by chance deleted Active Directory objects without using a backed-up
AD database, rebooting area controller.
The reason for replication is to share out the data stored within the index throughout
the organization for amplified availability, performance, and data defense. Systems
administrators can tune duplication to occur based on their physical network
communications and other constraints.
Allows domain controllers operation both Windows 2000 and previous versions of
Windows NT to co-exist in the area. In mixed mode, the domain features from
preceding versions of Windows NT Server are still enabled, while some Windows
2000 features are disabled. Windows 2000 Server domains are installed in mixed
mode by non-payment. In a mixed way, the field may have Windows NT 4.0 backup
domain controllers at hand.
16. Explain stale?
Stale refers to references to objects that have been stimulated so that the local copy
of the distant object's name is out of date.
17. Define SID?
Security Identifier is an exceptional variable-length identifier used to recognize a
trustee or refuge principal.
No one installs Active Directory in a bunch. There is no need for clustering a field
controller. Active Directory provides total joblessness with two or more servers.
RID master refers for Relative Identifier for conveying exceptional IDs to the object
shaped in AD.
Child DC is a sub-area controller under the root domain controller which share a
namespace.
The port no is 88
c:\windows\system32>regsvr32 schmmgmt.dll
Open mmc --> add snapin --> add Active directory schema
name it as schema.msc
Open administrative tool --> schema.msc
When all domain controllers in a given area are consecutively Windows 2000 Server,
this way permits organizations to take the lead of new Active Directory features such
as worldwide groups, inter-domain group membership and nested group
membership.
Q (1) What do you know about active directory in the system administration ?
Ans :- When we are talking about network security, one thing that matters is the
centralized control of everything that can be assured by the active directory. The
information and settings related to the development is stored in the central
database. for an example :- the database might list 100 users accounts with
details like each person’s job title, phone number and password .
Ans :- Network administrators can use group policy to control the working
environment of users and computer accounts in active directory . it provides a
central place for administrators to manage and configure operating systems,
applications and user’s settings. If we use it properly it enables you to increase
the security of user’s computers and help defend against both insider and
external threats.
Q (3) Why is it said that we should restore a dc that was backed up 9 months
Ago?
Ans :- We can face problems due to lingering objects as when we are restoring a
backup file the active directory generally requires that the backup file should not
be more than 180 days old.
Q (4) Can you tell us about the experience you have with hardware
Components ?
Ans :- System administration should be able to do installation and replacement
operations with hardware sometimes there can be a need to rebuild the hardware
component .
Ans :- A domain is a logical group of network objects like computers , users,
devices that have the same active directory database . A tree is a collection of
domains within a Microsoft active directory network in which each domain has
exactly one parent, leading to hierarchical tree structure and forest is a group of
active directory trees.
Ans :- WINS stands for windows internet name service this will allow the users to
access resources by computer name rather than IP address. It is an operating
system that uses a centralized computer that will provide specific functions
predetermined rules for the users and the computers connected to a Network .
For example if you want your computer to keep the track of the names and IP
addresses of other computers in your Network .
Ans :- System administrators face a diversity of challenges .They are the problem
solvers and coordinators. They have in-depth understanding of computer’s
software , hardware and networks and so are able to instruct employees
regarding the technical issue . Their primary task is to monitor the system. They
are able to keep track of the server performance and creative designs for
computer systems and are able to quickly arrange for replacement in case there
is any hardware failure .
Q (8) Can you give us one of the examples of the systems you have been working
with as an Administrator?
Ans :- This typically may include:- Windows and linux which supports either the
asset management or the GIS.
Q (9) What is a lingering Object ? What is the command that we use to remove
lingering objects ? Why is it important to remove the lingering objects ?
Ans :- lingering object is a deleted active directory that remains on the restored
domain controller in its local copy of the active directory. When an object is
deleted from the active directory a Tombstone (which is temporary) is created
which then has to be replicated by domain controller before it expires. i.e they
seem to occur when some changes are made to the directories after system
backups are created. When we restore a backup file the AD (ACTIVE
DIRECTORY ) generally requires that the backup should not be more than 180
days old .This may happen if after the backup was done the object was deleted
on another dc more than 180 days ago. In such case if we want to remove the
lingering object we use windows server 2003 and windows server 2008 they
have the ability to manually remove the lingering objects using the console utility
command REPADMIN.EXE .it is necessary to remove the lingering object as it
puts an extra burden on the system’s RAM and can create the problems like the
limited space availability .
Ans :- antivirus :- we use the antivirus to protect the system from the computer
viruses . When you are using your system It actively monitors for any virus threats
from different sources . if it finds any virus threats it tries to clean or quarantine
the virus and ultimately keeps your system and data safe .
Firewall :- on the flip side firewall protects your system from outside/ intruder/
hacker attacks. Sometimes hackers may take control of your system remotely and
steal your important information or the data from the system. It happens mostly in
the cases when your system is connected directly to the internet or a large
network. In that case you should install a firewall in your pc to protect yourself
from unauthorized access. It is either available in the software or in the hardware
form if you have a single pc then software firewall can do the work but when you
want to protect a large corporate you have to install hardware firewall so as to
protect their system from such attacks .
Q (11) According to you why backing up an active directory is important and how
can you backup an active Directory?
Ans :- To maintain the proper health of the AD database the backup of an active
directory is important .
Windows Server 2003:- In this you can backup the active directory by using the
NTBACKUP tool that is in –built with windows server 2003 or we can also use any
3rd party tool that will support this feature .
Windows server 2008 :- in this there is no option to backup the system state data
through the normal backup utility. Here we need to use the command line inorder
to backup the active Directory .
Step 1 – open the command prompt by clicking on start , typing “cmd” and then
hit the enter button
Step 3 – input “y” and press the enter button inorder to start the backup process
When the backup is finished you will get a message that the backup is
successfully completed if it has not completed properly you need to troubleshoot.
Ans :- Domain controller (Dc )is a windows-based computer system which is
used for storing user account data in a central database. It allows the system
administrator to allow or deny users access to system resources, such as
printers, documents , folders , network locations , etc.
Q (13) According to you what is the difference between FAT and NTFS ?
NTFS :-
There is security for both the local and the remote users.
It usually supports file names that have 255 characters .
It supports the file compression
The partition size can be upto 16 exabyte .
There is security for file and folder level.
It supports bad cluster mapping and transaction logging so it is highly
reliable
Q (14) Can you tell me what is loopback address and in what sense is it useful?
Ans :- it is an address that sends outgoing signals back to the same computer for
testing purposes. It is managed entirely within the operating system so the client
and the server process on a single system and can communicate with each other.
It is not physically connected to a network and it is useful in the sense that the
loopback provides IT professionals an interface so that they can test the IP
software without worrying about the broken or corrupted drives or the hardware.
Ans :- it is often referred to as “the registry” . In the Microsoft Windows operating
systems it is the collection of databases of configuration settings (low level
settings) It stores the important information like the location of programs ,files
etc . if you don’t understand what you are doing you should not edit the windows
registry or it will cause problems with the installed applications or the operating
system.
Ans:- we can say that it is a type of shared folder which stores group policies
information or we can say that it contains public files of the domain controllers
and the domain users can access it . it’S significant feature is that it is used to
deliver policy and login scripts to the domain members.
Ans:- VOIP is important as it makes the user adopt the modern techniques over
the traditional infrastructure. By using it the users can use the transmission
medium by delivering the voice packets which are designed for the telephone
calls.
Ans :- The name itself suggests that it is used to deploy windows operating
system (i.e – there is no need to install each operating system directly from CD or
DVD there are tools that are used for managing the server
Q (21) What can you tell us about the light – weight directory access protocol ?
Ans :- The LDAP (light-weight directory access protocol) is used to name the
object in an AD(Active Directory ) and makes it widely accessible for management
and query applications . it is most commonly used to provide a central place to
store the usernames and passwords
Ans :- PPP protocol stands for point to point protocol. This protocol helps us to
communicate between the two computers (routers ) . The two derivatives of the
point to point protocol are :- (1) point to point protocol over Ethernet (2) point to
point protocol over ATM. It is a multilayer protocol that operates on the same
communication link.
Ans :- The memory that is occupied which is no longer in use is called garbage
collection one of the major advantages of the garbage collection is that it frees the
user for dealing with memory deallocation. The higher level of programming
languages have more garbage collection. The resources other than memory are
not handled by garbage collection
Ans :- IN the OSI model it operates at the physical and data link layer and is a
high-speed data communication technology. It uses frames for the transmission of
data in the network .
Ans :- The DNS stands for the domain name system. The IP addresses are
always changing so the DNS makes the IP address into human friendly names so
that the humans can remember it much more easily and this are less likely to
change for example if you look at the standard phone book and try to search for
a persons name then you will get his/ her phone number here in this case the
DNS performs the same operation as that of a standard phone book but with the
updates on hourly or daily basis .due to the tired nature of the DNS it makes it
possible to have repeated queries that can be responded quickly .
Q (27) Can you tell the difference between the domain admin groups and
Enterprise admin group in ad (active directory )?
Ans:-
Domain admin groups:- the members of the domain admin group have complete
control of the
domain
Enterprise admin group:- the members of the enterprise admin group have
complete control of the domains in the forest.
Q (29) If you are a system administrator what will be your daily routine ?
Ans :- In this you answer should reflect that you are well aware about the
responsibilities of the system administrator or what are the tasks that are to be
performed by the system administrator
For an example :- tasks like software installation and updates , providing system
access control , creating backups , data recovery , etc.
Ans :- In this the application of the client/server is written in the form of
communication objects. By using ORB ( Object Request Broker) the client objects
communicate with server objects. This server object provides support for
concurrency and sharing .
Q (32) What is the working of Traceroute and what protocol does it use ?
Ans :- Depending on the operating system , The Tracert also called as traceroute
it allows you to use to see exactly what all the routers do you touch when you
move along the chain of connections to reach the final destination if a case
arrives in which you can’t ping your final destination in that case a tracert can be
used as it can tell you exactly where the chain of connections stopped. So that
you will be able to contact the correct people, may it be your own firewall or your
ISP or your destination’s ISP or anywhere in the middle . The traceroute uses
ICMP protocol but is also having the ability of using the first step of the TCP to
send the SYN requests for the response .
Ans :- NETBIOS :- It is referred to as the NETWORK BASic input or output
system. It is a layer 5 protocol that is non-routable. It allows the applications to
communicate with one another over LAN or we can call it a local area network .
NETBIOS normally runs over a TCP/IP which results in having a network with
both an IP address and a NETBIOS name corresponding to the host name .
There are three distinct services that are provided by the NETBIOS :-
Name service :- in this the name registration and resolution is done
Datagram distribution service :- it is generally used for connectionless
communication
Session service :- it is used for connection oriented communication.
Q (34) Can you tell us about RSVP. And how does it work ?
Ans :- DHCP refers to dynamic host configuration protocol. This protocol is used
to assign the IP address to the computers. So when we use the DHCP protocol
whenever a computer is connected to a network its IP address is changed or in
other words we can say that will have different IP addresses in some cases it can
also happen that the IP address is changed when the computer is in the network
by this we can say that a clearcut advantage of the DHCP protocol is that rather
than using the administrator for managing the IP address we use the software .
Q(36) Can you tell us the main email servers and which are their ports ?
Ans :- There are two types in the email servers :- the incoming mail server and
the outgoing mail server
1. The incoming mail server :- this type of mail server is usually associated
with the email address account to download the emails you should have
the correct settings configuration in your email client program . in this
server there cannot be more than one incoming server
2. The outgoing mail server :- when we are talking about the outgoing mail
server the protocol that is used to send emails are SMTP which are
known as simple mail transfer protocol . the main email portal includes :-
(POP3 – PORT 110 , IMAP – port 143, STMP – port 25 , HTTP – port 80
, secure SMTP – PORT 465 , Secure IMAP – port 585 , IMAP4 over SSL
– port 993 , secure POP3 – port 995 )
Ans :- Both the hub and the switch are roughly the same. They both have a larger
number of potential connections and are used for the same basic purpose to
create a network. The only difference that differentiates them is the way they
handle the connections in case of hub they broadcast all the data to every port
and hence can make serious security and reliability concerns as well as there will
occur a number of collisions on that network . on the flip side when we talk about
switches the connections are created dynamically so the requesting portal only
receives the information that is designed for it. We can consider a hub where all
are talking at the same time but this can be inconvenient as it can transmit or
release information to the people whom you don’t want to have access to that
information on the other side when we talk about switches they are creating the
connections between the ports as in need .
Q(38) What do you know about HTTPS and what port does it use ?
Ans :- The HTTPS uses the SSL certificates so as to confirm that the server you
are connecting is the one that it says . the HTTPS traffic goes over the TCP port
443.
Ans :- TCP/IP is not a protocol but is a member of the IP protocol suite. The TCP
refers to Transmission Control Protocol and is a massively used protocol (for ex:-
HTTP , FTP & SSH ) one of the benefits of TCP is that it establishes the
connection on both the ends before any data starts to flow. It is also used to sync
up the data flow as if a case arrives when the packets arrive out of order, so the
receiving system should be able to figure out how the puzzle of packets are
supposed to look like .
Ans :- we can call the UDP the twin of the TCP . The UDP stands for User
Datagram Protocol . The UDP doesn’t care if somebody is listening on the other
end or not and is called the connectionless protocol. Whereas when we talk about
the TCP it makes everybody stay on the same page . the transmission speed on
an UDP is faster than the transmission speed of TCP. So if we want to
distinguish between both the TCP & UDP . The TCP always needs a confirmation
from the other side that the message is received or not. On the other side the
UDP is like a television broadcast in which the transmitter doesn’t care or know
about the person on the other end.
Ans :- Powershell :- it was introduced in the year 2006. We can open power shell
by typing powershell. it operates on both the batch commands and the powershell
commands. It allows the user to navigate easily between the functions by
providing the ability to create aliases for cmdlets or scripts. The output that comes
is in the form of an object and can be passed from one cmdlet to other cmdlets . it
can also execute a sequence of cmdlets that are put together in a script. It is built
on a net framework so it has access to the programming libraries and can be
used to run all types of programs . it supports the linux based system and can
connect with the Microsoft cloud products and integrates directly with WMI. It also
has an ISE .
Q (44) Can you tell what is the difference between a RDP and a KVM ?
Ans :- The RDP stands for Remote desktop protocol as the name itself suggests
about the nature of this protocol it is one of the primary method by which we can
access the windows system remotely for troubleshooting purpose and Is a
software driven method whereas when we talk about the KVM it refers to
keyboard video and mouse it allows fast- switching between different systems but
by using the same keyboard monitor and mouse. It is a hardware driven method
or system in which a junction box is placed between the user and the systems the
KVM does not require any kind of active network connection so it is very useful to
use the same kind of setup on multiple networks without doing the cross talk .
Q (45) What do you know about FTP and SSH ? What protocol do they use ?
Ans :- FTP – The FTP is referred to as the file transfer protocol. It is primarily
designed for transferring large files which also has the capability of resuming the
download in the case the download is interrupted. There are two different
techniques following which we can access the FTP server; they are the
Anonymous access and the standard login. There is only one difference between
the techniques which is that the anonymous doesn’t require an active user login
whereas the standard login requires an active user login. The FTP uses ports 20
and 21 of TCP.
SSH :- The SSH stands for secure shell and is very well known by the linux users
the secure shell is used to create a secure tunnel between devices (for example :-
systems, switches, thermostats , etc ) .it also has the ability to tunnel the other
programs through it . so in case the programs having the unsecured connections
can be used in the secured state if we configure it correctly. The SSH uses port
22 of TCP
ANS :- ARP :- it refers to the address resolution protocol that allows the DNS to
be linked for MAC addresses; the mapping of the human-friendly URLs to IP
addresses are allowed by standard DNS . while the address resolution protocol
allows the mapping of IP addresses to mac addresses. In this manner it makes
the system go from a regular domain name to an actual piece of hardware.
EFS :- it refers to the encrypted file system . the encrypted files that are tied to
the specific user becomes difficult when to try to decrypt a file without the
assistance of the user there can also be a case when the user forgets his or her
password or loses their password in such case it becomes almost impossible to
decrypt the file as the process of decryption is tied to the user’s login and
password .it can only occur on NTFS formatted partitions. For a larger purpose
the better alternative is a Bitlocker .
Ans :- IDs stands for intrusion detection system that has two basic variations :-
Ans:- It is one of the application protocols that allow the connection on any port
and is a very small and versatile utility. It allows the admin to connect to the
remote devices. in case telnet transfers data in the form of text. on a remote host,
telnet provides access to a command-line interface because of some of the
security concerns when we are using the telnet over an open network source
such as the internet it is significantly in the favour of SSH. It has a negotiable
protocol architecture because of which many extensions were adopted. Most of
the implementation of telnet has no authentication which can ensure that the
communication Is carried out between the two desired hosts. it does not encrypt
any data that has been sent over the connection. generally, it is used to establish
a connection to TCP (transmission control protocol ) port 23. where the server
application of the telnet is listening.
I can use Active Directory to manage my network in the Windows domain via a
centralized system of administration. Its authentication process for logging in and
access control for resources enable me to manage my network safely.”
2. How would you react to a coworker’s criticism about your use of Active
Directory?
3. What are the key changes in the 2012 version of Active Directory?
The change in the fine-grain password format is another key change that allows me
to set multiple policies for password creation in a single domain, which was not
possible in the earlier version. This makes it easier to implement fine-grain password
policies and could make securing the network easier.
The improved wizard in the domain controller promoter is another change that
simplifies the installation process as I can now see all the steps and get detailed
results. The new capability of using the history viewer in the Windows power shell to
see the power shell commands lets me keep track of my actions in the Active
Directory Administrative Center.
The enhanced design of the Active Directory Administrative Center is another useful
change in the new version. I find the improved design in components such as the
exchange management console more user-friendly when compared to the previous
version.”
In Active Directory, schema is the component that defines all the object classes that
can be created in a forest. It contains the rules for the objects that can be stored in
Active Directory’s database, the attributes that can be given to objects and can be
used as a reference for the objects and attributes used by the technology to store
information. In other words, schema is a blueprint for the type and format of
information that can be stored in the database.
The Active Directory domain controller runs the Active Directory database, and it is a
server. It uses the information in the database to authenticate and authorize users.
Database changes are replicated across the network via Active Directory’s data
replication service, so all domain controllers in a domain play a role in data
replication and have a complete copy of the Active Directory information for their
domain.”
The Lightweight Directory Access Protocol (LDAP) and Kerberos are two major
protocols that support Active Directory services. Your answer should demonstrate
that you have the technical knowledge needed to use these protocols well. You can
provide a technical definition for each protocol.
Kerberos is a key component in Active Directory, as it is the default protocol used for
the authentication of all network users. To implement Kerberos by default in a
domain or a forest, you need Active Directory Domain Services installed.
It boosts the security of the authentication process with cryptography that uses
secret keys. Kerberos V5 uses session tickets that can be renewed and encrypted
data. It represents an improvement over the challenge/response or NTLM process of
authentication, which preceded Kerberos, for unlike NTLM, Kerberos does not
assume that all servers are genuine.”
6. What is a PDC Emulator, and how can you find out if it is working?
To find out if a PDC Emulator is working, I would check if time is synced across the
domain, if user accounts are being locked properly, if updates are being obtained for
the Backup Domain Controllers (BDCs) of the Windows network. I would also check
if computers with older, pre-2000 Windows can change their passwords as all these
functions require a working PDC Emulator. If these functions are not being provided,
the PDC Emulator is unlikely to be working.”
This method is suitable when using an Active Directory setting with a single domain
controller where the backup was taken before the data was deleted, but this restore
method is not suitable to update a domain controller in a domain with multiple
domain controllers. In this scenario, after the restoration process is over, the domain
controller that was restored will be updated to match its replication partners and the
restored data will be erased.
Enterprise Admin: In Enterprise Admin groups, members have full rights over all of
the domains in the forest. This group is also a member of the Administrators group
but on all domain controllers in the forest. You need to add users with caution as
they get access to the forest completely. They can force shutdown from a remote
system, profile system performance, take ownership of files and much more.
Domain Admin groups: In Domain Admin groups, members have complete control
of the domain. On all domain controllers, domain workstations, domain member
servers, they are members of the Administrators group. An administrator account is
also a member of this group. One can adjust the memory quotas for a process,
manage security log, restore files and directories and can do much more.
Their purpose is actually to enable the administrators to create new areas in the
Active Directory so that data can be stored on DCs that they choose instead of
allowing it on every DC in a domain. It is used when the user needs to determine
which objects must exist within the Active Directory and what are the kinds of
attributes that each can have.
It is a set of one or more of the domain trees and they do not form a contiguous
namespace. The trees in the forest share a common schema, configuration, and the
global catalog. They also exchange trust. The value of the tombstone lifetime
attribute which is present in the Directory Service object in the configuration directory
partition defines the tombstone lifetime value. The default value depends on the
server’s operating system of the first DC in the forest.
It contains in itself the formal definitions of all the object class which can be easily
made in the Active Directory Forest. The details of every attribute that can possibly
exist in the Active Directory Forest are also included in it. It describes the rules of the
types of objects that can be included in the Active Directory.
A domain controller is actually the main or the centerpiece of the Windows Active
Directory.
11) Where Active Directory database held and how would you create a backup
of the database?
A Namespace is basically a set of signs that are used to identify and refer to objects
of various kinds and ensures that all of a given set of objects have unique names so
that they can be easily identified. They are also used to organize code into logical
groups and to prevent name collisions.
They have a possibility of scaling to extremely larger networks. When you add more
objects to the overall namespace, finding of the unique names for them is done
within the sub-namespace to which they accordingly belong. It is to be known that all
the DNA namespaces are particularly hierarchical.
Domain
Tree
Forest
Organizational Unit
Site
In Windows NT network Primary Domain Controller (PDC) is a server that is used for
maintaining a read-write directory of user security and account Information.
> gpupdate
Generic Containers are the containers where for each container class, there are
two Java-style iterator data types: one that provides read-only access and one that
provides write-only access.
The data is actually stored in a hierarchical fashion active directory. Active Directory
uses a structured data store as the basis for a logical, hierarchical organization of
directory information.
The RDN prefix used to construct the RDN for the new object that is inserted into the
store. The different methods that it includes are:
Equals(Object)
GetHashCode()
GetType()
IsDefaultAttribute()
Match(Object)
MemberwiseClone()
ToString()
OUs contain user objects therefore you can put a user in an OU to control who has
administrative authority over that user. Whereas groups have a list of user objects
therefore you can put a user in a group to control that user's access to resources.
33) Which file can you view to identify SRV records associated with a domain
controller?
We hope your knowledge is enhanced by reading these questions. Stay tuned with
us if you want to learn more interview questions on various topics.
Windows 10 Tutorial
5. Question 5. Explain The Term Forest In Ad?
Answer :
Forest is used to define an assembly of AD domains that share a single schema
for the AD. All DC’s in the forest share this schema and is replicated in a
hierarchical fashion among them.
In an Active Directory forest, the domain controller is a server that contains a writable
copy of the Active Directory database, participates in Active Directory replication,
and controls access to network resources.
Global catalog server
A global catalog server is a domain controller that stores information about all
objects in the forest. Like all domain controllers, a global catalog server stores full,
writable replicas of the schema and configuration directory partitions and a full,
writable replica of the domain directory partition for the domain that it is hosting. In
addition, a global catalog server stores a partial, read-only replica of every other
domain in the forest. Partial replicas are stored on Global Catalog servers so that
searches of the entire directory can be achieved without requiring referrals from one
domain controller to another.
Partial information of other domains. Partial information nothing but classes and
attributes (first name and last name and phones and addresses) attribute level
security improvement in 2003….
OU:
Domain:
Forest
A Windows forest is a group of one or more trusted Windows trees. The trees do not
need to have contiguous DNS names. A forest shares a schema and global catalog
servers. A single tree can also be called a forest.
Tree:
A Windows tree is a group of one or more trusted Windows domains with contiguous
DNS domains. “Trusted” means that an authenticated account from one domain isn’t
rejected by another domain. “Contiguous DNS domains” means that they all have
the same root DNS name.
Site:
Sites are manually defined groupings of subnets. Objects in a site share the same
global catalog servers, and can have a common set of group policies applied to
them.
Schema:
The schema defines what attributes, objects, classes, and rules are available in the
Active Directory.
Group Policy
A GPO is a collection of Group Policy settings, stored at the domain level as a virtual
object consisting of a Group Policy container (GPC) and a Group Policy template
(GPT).
Password history will store
Computer Configuration\Windows Settings\Security Settings\Account
Policies\Password Policy
USE:
When Microsoft Exchange Server is deployed in an organization, Exchange Server
uses Active Directory as a data store and it extends the Windows 2000 Active
Directory schema to enable it to store objects specific to Exchange Server. The
ldapDisplayName of the attribute schema ms-Exch-Assistant-Name, ms-Exch-
LabeledURI, and ms-Exch-House-Identifier defined by Exchange Server conflicts
with the iNetOrgPerson schema that Active Directory uses in Windows Server 2003.
When Windows Server 2003 Service Pack 1 is installed, Adprep.exe will be able to
detect the presence of the schema conflict and block the upgrade of the schema until
the issue has been resolved.
GUID:
When a new domain user or group account is created, Active Directory stores the
account's SID in the Object-SID (objectSID) property of a User or Group object. It
also assigns the new object a globally unique identifier (GUID), which is a 128-bit
value that is unique not only in the enterprise but also across the world. GUIDs are
assigned to every object created by Active Directory, not just User and Group
objects. Each object's GUID is stored in its Object-GUID (objectGUID) property.
Active Directory uses GUIDs internally to identify objects.
SID:
A security identifier (SID) is a data structure in binary format that contains a variable
number of values. When a DC creates a security principal object such as a user or
group, it attaches a unique Security ID (SID) to the object. This SID consists of a
domain SID (the same for all SIDs created in a domain), and a relative ID (RID) that
is unique for each security Principal SID created in a domain.
Lingering objects
When a domain controller is disconnected for a period that is longer than the TSL,
one or more objects that are deleted from Active Directory on all other domain
controllers may remain on the disconnected domain controller. Such objects are
called lingering objects. Because the domain controller is offline during the time that
the tombstone is alive, the domain controller never receives replication of the
tombstone
Sysvol
Sysvol is a shared directory that stores the server copy of the domain’s public files,
which are replicated among all domain controllers in the domain. The Sysvol
contains the data in a GPO: the GPT, which includes Administrative Template-based
Group Policy settings, security settings, script files, and information regarding
applications that are available for software installation. It is replicated using the File
Replication Service (FRS).
Win logon
LDAP://SomeServer.Myco.Com/CN=jamessmith,CN=Sys,CN=Product,CN
=Division,DC=myco,DC=domain-controller
USN
Each object has an Update Sequence Number (USN), and if the object is modified,
the USN is incremented. This number is different on each domain controller. USN
provides the key to multimaster replication.
A list of security protections that applies to an object. (An object can be a file,
process, event, or anything else having a security descriptor.)
ACE contains a set of access rights and a security identifier (SID) that identifies a
trustee for whom the rights are allowed, denied, or audited.
In Windows 2000 & 2003, every domain controller can receive changes, and the
changes are replicated to all other domain controllers. The day-to-day operations
that are associated with managing users, groups, and computers are typically
multimaster operations.
There is a set of Flexible Single Master Operations (FSMO) which can only be done
on a single controller. An administrator determines which operations must be done
on the master controller. These operations are all set up on the master controller by
default and can be transferred later. FSMO operations types include:
Schema Master: The schema master domain controller controls all updates and
modifications to the schema. There can be only one schema master in the whole
forest.
Domain naming master: The domain naming master domain controller controls the
addition or removal of domains in the forest and responsibility of ensuring that
domain names are unique in the forest. There can be only one domain naming
master in the whole forest.
Infrastructure Master:
The infrastructure is responsible for updating references from objects in its domain to
objects in other domains. At any one time, there can be only one domain controller
acting as the infrastructure master in each domain.
This works when we are renaming any group member ship object this role takes
care.
Note: The Infrastructure Master (IM) role should be held by a domain controller that
is not a Global Catalog server (GC). If the Infrastructure Master runs on a Global
Catalog server it will stop updating object information because it does not contain
any references to objects that it does not hold. This is because a Global Catalog
server holds a partial replica of every object in the forest. As a result, cross-domain
object references in that domain will not be updated and a warning to that effect will
be logged on that DC's event log. If all the domain controllers in a domain also host
the global catalog, all the domain controllers have the current data, and it is not
important which domain controller holds the infrastructure master role.
Relative ID (RID) Master:
It assigns RID and SID to the newly created object like Users and computers. If RID
master is down (u can create security objects up to RID pools are available in DCs)
else u can’t create any object one itSDs down
When a DC creates a security principal object such as a user or group, it attaches a
unique Security ID (SID) to the object. This SID consists of a domain SID (the same
for all SIDs created in a domain), and a relative ID (RID) that is unique for each
security principal SID created in a domain.
PDC Emulator - When Active Directory is in mixed mode, the computer Active
Directory is on acts as a Windows NT PDC. The first server that becomes a
Windows 2000 domain controller takes the role of PDC emulator by default.
Functions performed by the PDC emulator:
User account changes and password changes.
SAM directory replication requests.
Domain master browser requests
Authentication requests.
GPO
Time synchronization
New Active Directory features in Windows Server 2003
• Multiple selection of user objects.
• Drag-and-drop functionality.
• Efficient search capabilities. Search functionality is object-oriented and
provides an efficient search that minimizes
• Saved queries. Save commonly used search parameters for reuse in Active
Directory Users and Computers
• Active Directory command-line tools.
• InetOrgPerson class. The inetOrgPerson class has been added to the base
schema as a security principal and can be used in the same manner as the user
class. The userPassword attribute can also be used to set the account
password.
• Ability to add additional domain controllers using backup media. Reduce
the time it takes to add an additional domain controller in an existing domain by
using backup media.
• Universal group membership caching. Prevent the need to locate a global
catalog across a WAN when logging on by storing universal group membership
information on an authenticating domain controller.
• Secure LDAP traffic. Active Directory administrative tools sign and encrypt all
LDAP traffic by default. Signing LDAP traffic guarantees that the packaged data
comes from a known source and that it has not been tampered with.
• Active Directory quotas. Quotas can be specified in Active Directory to control
the number of objects a user, group, or computer can own in a given directory
partition. Domain Administrators and Enterprise
To raise the domain functional level, you go to the properties of your domain in
Active Directory Domains and Trusts. To raise the forest functional level you go to
the properties of Active Directory Domains and Trusts at the root. Of course, if your
domains are not at the correct level, you won’t be able to raise the forest functional
level.
Directory partition
Schema partition
It contains all class and attributes definitions for the forest. There is one schema
directory partition per forest.
Configuration partition
It contains replication configuration information (and other information) for the forest.
There is one configuration directory partition per forest.
Domain partition
It contains all objects that are stored by one domain. There is one domain directory
partition for each domain in the forest.
o Computer
o Group
RPC:
Active Directory uses RPC over IP to transfer both intersite and intrasite replication
between domain controllers. To keep data secure while in transit, RPC over IP
replication uses both the Kerberos authentication protocol and data encryption.
SMTP:
If you have a site that has no physical connection to the rest of your network, but that
can be reached using the Simple Mail Transfer Protocol (SMTP), that site has mail-
based connectivity only. SMTP replication is used only for replication between sites.
You also cannot use SMTP replication to replicate between domain controllers in the
same domain—only inter-domain replication is supported over SMTP (that is, SMTP
can be used only for inter-site, inter-domain replication). SMTP replication can be
used only for schema, configuration, and global catalog partial replica replication.
SMTP replication observes the automatically generated replication schedule.
Changing of ntds.dit file from one Drive to another
1 Boot the domain controller in Directory Services Restore mode and log on with the
. Directory Services Restore mode administrator account and password (this is the
password you assigned during the Dcpromo process).
2 At a command prompt, type ntdsutil.exe. You receive the following prompt:
.
ntdsutil:
3 Type files to receive the following prompt:
.
file maintenance:
4 Type info. Note the path of the database and log files.
.
5 To move the database, type move db to %s (where %s is the target folder).
.
6 To move the log files, type move logs to %s (where %s is the target folder).
.
7 Type quit twice to return to the command prompt.
.
8 Reboot the computer normally.
.
DNS
DNS (Domain Name system)
Domain Name System (DNS) is a database system that translates a computer's
fully qualified domain name into an IP address.
DNS Zones
Primary Zones - It Holds Read and Write copies of all resource records (A, NS,
_SRV).
Secondary Zones- which hold read only copies of the Primary Zones.
Stub Zones
Conceptually, stub zones are like secondary zones in that they have a read only
copy of a primary zone. Stub zones are more efficient and create less replication
traffic.
Stub Zones only have 3 records, the SOA for the primary zone, NS record and a
Host (A) record. The idea is that if a client queries a record in the Stub Zone, your
DNS server can refer that query to the correct Name Server because it knows its
Host (A) record.
Queries
SOA (start of authority) record each zone has one SOA record that identifies
which DNS server is authoritative for domains and sub domains in the zone.
NS (name server) record An NS record contains the FQDN and IP address of a
DNS server authoritative for the zone. Each primary and secondary name server
authoritative in the domain should have an NS record.
Once DNS and replication are setup, it is generally a bad idea to change a servers
IP address (at least according to Microsoft). Just be sure that is what you really
want to do before starting the process. It is a bit kin to changing the Internal IPX
number of A Novell server, but it can be done.
5. Go to one of the other DCs and verify that its DNS is now pointing to the new
IP address of the server. If not, change the records manually and give it 15
minutes to replicate the DNS changes out.
6. Run REPLMON and make sure that replication is working now. You may
have to wait a little while for things to straighten out. Give it an hour or two if
necessary.
If a server shows that it isn’t replicating with one of its partners, there are
several issues to address:
A. Check to see that the servers can ping each other.
B. Make sure that both servers’ DNS entries for each other point to the proper IP
addresses
C. If server A says it replicated fine, but server B says it couldn’t contact Server
A, check the DNS setup on Server B. Chances are it has a record for Server A
pointing to the wrong place.
Trust Relationship
One way trust - When one domain allows access to users on another
domain, but the other domain does not allow access to users on the first
domain.
Two way trust - When two domains allow access to users on the other
domain.
Trusting domain - The domain that allows access to users on another
domain.
Trusted domain - The domain that is trusted, whose users have access to
the trusting domain.
Transitive trust - A trust which can extend beyond two domains to other
trusted domains in the tree.
Intransitive trust - A one way trust that does not extend beyond two
domains.
Explicit trust - A trust that an administrator creates. It is not transitive and
is one way only.
Cross-link trust - An explicit trust between domains in different trees or in
the same tree when a descendent/ancestor (child/parent) relationship does
not exist between the two domains.
Forest trust - When two forests have a functional level of Windows 2003,
you can use a forest trust to join the forests at the root.
Shortcut trust - When domains that authenticate users are logically distant
from one another, the process of logging on to the network can take a long
time. You can manually add a shortcut trust between two domains in the
same forest to speed authentication. Shortcut trusts are transitive and can
either be one way or two way.