My Interview Q
My Interview Q
2. WHAT IS SERVER
Ans- A server is a computer program that provides a service to another
computer programs (and its user). In a data center, the physical computer that
a server program runs in is also frequently referred to as a server. That
machine may be a dedicated server or it may be used for other purposes as
well.
3. WHAT IS ADDS
Ans- Active Directory Domain Services (AD DS) is a server role in Active
Directory that allows admins to manage and store information about
resources from a network, as well as application data, in a distributed
database. AD DS can also help admins manage a network's elements
(computers and end users) and reorder them into a custom hierarchy.
4. WHAT IS DC
ans- A domaincontroller (DC) is a server that responds to security authentication
requests within a Windows Server domain. It is a server on a Microsoft Windows
or Windows NT network that is responsible for allowing host access to
Windowsdomain resources.
ans- A network administrator's main responsibilities include installing, configuring and supporting an
organization's local area network (LAN), wide area network (WAN), Internet systems or a segment of a
network system.2 On-the-job duties such as overseeing network switches, a virtual private network
(VPN) and routing are also typical duties.
As noted, rather than a network of computers, a system administrator is responsible for the
computer system itself, including software and hardware installation and upkeep, data recovery and
backup, setup, and training on user accounts and maintenance of basic security best practices.
6. PROFILES
ans- The system creates a user profile the first time that a user logs on to a computer. At
subsequent logons, the system loads the user's profile, and then other system components
configure the user's environment according to the information in the profile.
Local User Profiles. A local user profile is created the first time that a user logs on to a computer. The
profile is stored on the computer's local hard disk. Changes made to the local user profile are specific
to the user and to the computer on which the changes are made.
Roaming User Profiles. A roaming user profile is a copy of the local profile that is copied to, and stored
on, a server share. This profile is downloaded to any computer that a user logs onto on a network.
Changes made to a roaming user profile are synchronized with the server copy of the profile when
the user logs off. The advantage of roaming user profiles is that users do not need to create a profile
on each computer they use on a network.
Mandatory User Profiles. A mandatory user profile is a type of profile that administrators can use to
specify settings for users. Only system administrators can make changes to mandatory user profiles.
Changes made by users to desktop settings are lost when the user logs off.
7. GP MANAGEMENT
Ans- Group Policies are computer or user settings that can be defined to control or secure the Windows
server and client infrastructure.
8. MIGRATION OF WINDOWS OS
ans- In information technology (IT), migration is the process of moving from the
use of one operating environment to another operating environment that is, in
most cases, thought to be a better one. Migration can involve upgrading to
new hardware, new software or both.
11.WHAT HARDWARE AND SOFTWARE FOR 25 CLINET MACHINE (HDD PROCESSOR RAM ETC )
12.PREVIOUSLY WHICH SERVER YOU WORKED ON (HP) / IBM WHICH MODEL AND WHAT
CONFIGUREATION.
Standalone switches with enhanced LAN services for small and medium-sized businesses and branch office networks
Layer 2 switching with intelligent Layer 2-4 services
Up to 48 10/100 ports or 10/100/1000 ports
Fast Ethernet PoE configurations with 15.4W of PoE up to 24 ports
Flexibility of LAN Base or LAN Lite models
AC power supply failure protection with external power supply
A L3 switch also does switching exactly like a L2 switch. The L3 means that it has an identity from the L3
layer. Practically this means that a L3 switch is capable of having IP addresses and doing routing. For
intra-VLAN communication, it uses the MAC address table. For extra-VLAN communication, it uses the IP
routing table
VPN is a technology used to setup a private network over the internet to share the
resources of a corporate intranet with remote users and other office locations of
the company. People can also use VPN to access their home network.
15. WHAT IS RAID WHY WE USE ( HOW YOU STILL MAKE THE SERVER RUN IF ONE HDD FAILS ETC)
RAID is a technology that is used to increase the performance and/or reliability of data storage. The abbreviation stands
for Redundant Array of Inexpensive Disks. A RAID system consists of two or more drives working in parallel. These disks can be
hard discs, but there is a trend to also use the technology for SSD (solid state drives). There are different RAID levels, each
optimized for a specific situation. These are not standardized by an industry group or standardization committee. This explains why
companies sometimes come up with their own unique numbers and implementations. This article covers the following RAID levels:
RAID 0 – striping
RAID 1 – mirroring
RAID 5 – striping with parity
RAID 6 – striping with double parity
RAID 10 – combining mirroring and striping
The software to perform the RAID-functionality and control the drives can either be located on a separate controller card (a hardware
RAID controller) or it can simply be a driver. Some versions of Windows, such as Windows Server 2012 as well as Mac OS X, include
software RAID functionality. Hardware RAID controllers cost more than pure software, but they also offer better performance, especially
with RAID 5 and 6.
RAID-systems can be used with a number of interfaces, including SCSI, IDE, SATA or FC (fiber channel.) There are systems that use
SATA disks internally, but that have a FireWire or SCSI-interface for the host system.
Sometimes disks in a storage system are defined as JBOD, which stands for ‘Just a Bunch Of Disks’. This means that those disks do
not use a specific RAID level and acts as stand-alone disks. This is often done for drives that contain swap files or spooling data.
Advantages
RAID 0 offers great performance, both in read and write operations. There is no overhead caused by parity controls.
All storage capacity is used, there is no overhead.
The technology is easy to implement.
Disadvantages
RAID 0 is not fault-tolerant. If one drive fails, all data in the RAID 0 array are lost. It should not be used for mission-critical
systems.
Ideal use
RAID 0 is ideal for non-critical storage of data that have to be read/written at a high speed, such as on an image retouching or video
editing station.
If you want to use RAID 0 purely to combine the storage capacity of twee drives in a single volume, consider mounting one drive in the
folder path of the other drive. This is supported in Linux, OS X as well as Windows and has the advantage that a single drive failure has
no impact on the data of the second disk or SSD drive.
Advantages
RAID 1 offers excellent read speed and a write-speed that is comparable to that of a single drive.
In case a drive fails, data do not have to be rebuild, they just have to be copied to the replacement drive.
RAID 1 is a very simple technology.
Disadvantages
The main disadvantage is that the effective storage capacity is only half of the total drive capacity because all data get written
twice.
Software RAID 1 solutions do not always allow a hot swap of a failed drive. That means the failed drive can only be replaced
after powering down the computer it is attached to. For servers that are used simultaneously by many people, this may not be
acceptable. Such systems typically use hardware controllers that do support hot swapping.
Ideal use
RAID-1 is ideal for mission critical storage, for instance for accounting systems. It is also suitable for small servers in which only two
data drives will be used.
RAID level 5
RAID 5 is the most common secure RAID level. It requires at least 3 drives but can work with up to 16. Data blocks are striped across
the drives and on one drive a parity checksum of all the block data is written. The parity data are not written to a fixed drive, they are
spread across all drives, as the drawing below shows. Using the parity data, the computer can recalculate the data of one of the other
data blocks, should those data no longer be available. That means a RAID 5 array can withstand a single drive failure without losing
data or access to data. Although RAID 5 can be achieved in software, a hardware controller is recommended. Often extra cache
memory is used on these controllers to improve the write performance.
Advantages
Read data transactions are very fast while write data transactions are somewhat slower (due to the parity that has to be
calculated).
If a drive fails, you still have access to all data, even while the failed drive is being replaced and the storage controller rebuilds
the data on the new drive.
Disadvantages
Ideal use
RAID 5 is a good all-round system that combines efficient storage with excellent security and decent performance. It is ideal for file and
application servers that have a limited number of data drives.
Advantages
Disadvantages
Write data transactions are slower than RAID 5 due to the additional parity data that have to be calculated. In one report I read
the write performance was 20% lower.
Drive failures have an effect on throughput, although this is still acceptable.
This is complex technology. Rebuilding an array in which one drive failed can take a long time.
Ideal use
RAID 6 is a good all-round system that combines efficient storage with excellent security and decent performance. It is preferable over
RAID 5 in file and application servers that use many large drives for data storage.
Advantages
If something goes wrong with one of the disks in a RAID 10 configuration, the rebuild time is very fast since all that is needed
is copying all the data from the surviving mirror to a new drive. This can take as little as 30 minutes for drives of 1 TB.
Disadvantages
Half of the storage capacity goes to mirroring, so compared to large RAID 5 or RAID 6 arrays, this is an expensive way to
have redundancy.
16. WHAT IS ROUTER? WHICH ROUTER SERIES YOU WORKED ON? TYPES OF ROUTERS
A router[a] is a networking device that forwards data packets between computer networks. Routers perform the
traffic directing functions on the Internet. A data packet is typically forwarded from one router to another router
through the networks that constitute an internetwork until it reaches its destination node.[2]
A router[a] is a networking device that forwards data packets between computer networks. Routers perform the
traffic directing functions on the Internet. A data packet is typically forwarded from one router to another router
through the networks that constitute an internetwork until it reaches its destination node.[2]
Types of Backup
There are quite a number of backup types and terms used when it comes to backups of your
digital content. This is a compilation of the most common types of backup with a brief
explanation of their meaning, common examples, advantages and disadvantages of each
backup type.
Full Backup
Full backup is a method of backup where all the files and folders selected for the backup will
be backed up. When subsequent backups are run, the entire list of files and will be backed
up again. The advantage of this backup is restores are fast and easy as the complete list of
files are stored each time. The disadvantage is that each backup run is time consuming as
the entire list of files is copied again. Also, full backups take up a lot more storage space
when compared to incremental or differential backups. Read more…
Incremental backup
Incremental backup is a backup of all changes made since the last backup. With
incremental backups, one full backup is done first and subsequent backup runs are just the
changes made since the last backup. The result is a much faster backup then a full backup
for each backup run. Storage space used is much less than a full backup and less then with
differential backups. Restores are slower than with a full backup and a differential
backup. Read more…
Differential backup
Differential backup is a backup of all changes made since the last full backup. With
differential backups, one full backup is done first and subsequent backup runs are the
changes made since the last full backup. The result is a much faster backup then a full
backup for each backup run. Storage space used is much less than a full backup but more
then with Incremental backups. Restores are slower than with a full backup but usually faster
then with Incremental backups. Read more...
Mirror Backup
Mirror backups are as the name suggests a mirror of the source being backed up. With
mirror backups, when a file in the source is deleted, that file is eventually also deleted in the
mirror backup. Because of this, mirror backups should be used with caution as a file that is
deleted by accident or through a virus may also cause the mirror backups to be deleted as
well. Read more…
Full PC Backup or Full Computer Backup
In this backup, it is not the individual files that are backed up but entire images of the hard
drives of the computer that is backed up. With the full PC backup, you can restore the
computer hard drives to its exact state when the backup was done. With the Full PC backup,
not only can the work documents, picture, videos and audio files be restored but the
operating system, hard ware drivers, system files, registry, programs, emails etc can also be
restored. Read more…
Local Backup
Local backups are any kind of backup where the storage medium is kept close at hand or in
the same building as the source. It could be a backup done on a second internal hard drive,
an attached external hard drive, CD/ DVD –ROM or Network Attached Storage (NAS). Local
backups protect digital content from hard drive failures and virus attacks. They also provide
protection from accidental mistakes or deletes. Since the backups are always close at hand
they are fast and convenient to restore. Read more…
Offsite Backup
When the backup storage media is kept at a different geographic location from the source,
this is known as an offsite backup. The backup may be done locally at first but once the
storage medium is brought to another location, it becomes an offsite backup. Examples of
offsite backup include taking the backup media or hard drive home, to another office
building or to a bank safe deposit box.
Beside the same protection offered by local backups, offsite backups provide additional
protection from theft, fire, floods and other natural disasters. Putting the backup media in
the next room as the source would not be considered an offsite backup as the backup does
not offer protection from theft, fire, floods and other natural disasters. Read more…
Online Backup
These are backups that are ongoing or done continuously or frequently to a storage medium
that is always connected to the source being backed up. Typically the storage medium is
located offsite and connected to the backup source by a network or Internet connection. It
does not involve human intervention to plug in drives and storage media for backups to run.
Many commercial data centres now offer this as a subscription service to consumers. The
storage data centres are located away from the source being backed up and the data is sent
from the source to the storage data centre securely over the Internet. Read more…
Remote Backup
Remote backups are a form of offsite backup with a difference being that you can access,
restore or administer the backups while located at your source location or other location. You
do not need to be physically present at the backup storage facility to access the backups.
For example, putting your backup hard drive at your bank safe deposit box would not be
considered a remote backup. You cannot administer it without making a trip to the bank.
Online backups are usually considered remote backups as well. Read more…
Cloud Backup
This term is often used interchangeably with Online Backup and Remote Backup. It is where
data is backed up to a service or storage facility connected over the Internet. With the
proper login credentials, that backup can then be accessed or restored from any other
computer with Internet Access. Read more…
FTP Backup
This is a kind of backup where the backup is done via FTP (File Transfer Protocol) over the
Internet to an FTP Server. Typically the FTP Server is located in a commercial data centre
away from the source data being backed up. When the FTP server is located at a different
location, this is another form of offsite backup. Read more…
HOW TO GET ADMIN PASSWORD (WHICH APPLICATION TOOL WE YOU TO GET THE
PASSWORD IS IT FROM MICROSOFT OR FROM THRD PARTY
For Windows 10 user, there are a built-in administrator account. You can try to boot
Windows 10 with the built-in administrator default account. With the admin rights, you
would be able to run command prompt, computer management, control panel again to
reset Windows 10 local admin password without disk or USB. Just follow the under
steps.
Step 1: Click Power > Restart on locked Windows 10 login screen and hold
on Shift key at the same time.
Step 2: In the coming interface, follow the path Troubleshoot > Advanced options >
Startup Settings. Click Restart and press F4/F5/F6 to Enable Safe Mode, then you
will be able to enter Windows 10 safe mode with default administrator.
If you have enabled the built-in administrator account. You can follow the under steps
to change your local admin acount password.
Step 1: Press Win + R to open Run box. Type compmgnt.msc and press Enter.
Step 2: In Computer Management, unfolder Local Users and Groups and
select Users. ( For emaple, here we choose the user clara and use the under steps to
change its password. )
Step 3: Right click the user you want to change password and select Set Password.
then a message would pop up, if you think it is OK, click Proceed to go on Windows 10
password change. If not, just click Cancel.
Step 4: Type new password in New password text box and Confirm passwordtext box.
Then click OK to confirm Windows 10 user password change.
Last, but the easiest way is to download a third party software to recover Windows 10
password. Here we take iSunshare Windows 10 Password Geniusas an example.
16.
18.What certfiations on microsoft you have done? when you did ? what versions? What exam
codes ?
2012 – 2016 MCSE CERTIFICATION
THIS YEARS I UPGRADE 2012 TO 2016 MCSE CERTIFICATION
2016 MCSE EXAM UPGRADE CODE IS – 70-743
AND 2012 EXAMS CODE – 70-410, 411, 412, 413, 414
What certifications in cisco you have? when you did ? which versions? What exam codes? Is it
valid?
ANS-
Interconnecting Cisco Networking Devices: Accelerated (CCNAX)
ANS- YES
ANS - 1 YEAR
ANS- YES
Serving as the first point of contact for customers seeking technical assistance over the
phone or email
Performing remote troubleshooting through diagnostic techniques and pertinent
questions
Determining the best solution based on the issue and details provided by customers
26.This is a Help Desk Support Job what do you know about this job?
27.On which Servers, its config, Switches, Routers, Firrewall, Network Size in company you
worked on?
28.What you did during the job your roles & responsibilities.
31.Can you take me through the Hirarichy of this company, Hirarichy in terms of only the IT
Department? OR Hirarichy in terms of the man power? in terms of your IT Dept how many
staff were there in your IT Dept?
34.Say clearly what is the Hirarichy in XXXXX who was heading the IT Dept in XXXXX?
35.If all other 48 IT staff in XXXX coming under you what is there desigination?
38.Which are the companies you provided sevices while working in XXXX Solutions?
40.What do you stand in this IT team? Who is heading the IT Dept? What is the Hirarechy? How
many staff members where reproting to you?
42.I will more keen to uderstand what exactly where your routines ?
43.What kind of configuration was there in the Routers you worked with? And what kind of
support given by using this Router in you company like any VPN Services or ?
44.You said the 2600 router used in XXXX company for connecting to branches how there are
connected form one to other branch like how physically they are connect using what?
45.What about this HYPER V you have mentioned here in XXXX experience? What is the use
purpose of HYPER V in XXXX company?
46.What is exchange server you have mentioned exchange server in XXXX experince? What is
the use purpose of exchange server in XXXX what services you have given?
47.What is this ADC and DC you have mention? What is the difference between DC & ADC?
49.How you identify any failure of DC / ADC if the communication is going on or not between
them. If I have configured my ADC in LONDON and here in india is the DC in case if the
communication / replication is not there how you can identify? How to monitor?
50.In VIT Solution why did you write like Oversee the IT Budget what it mean? What kind of
Budget?
51.What kind of server installations you have done? What is your last installation version?
52.In XXXX Agences experience you mentioned that (Managed day to day administration
functions utilizing AD) what is that? What kind of policies you where utilize for control? What
administrations functions you where utilizing of AD day to day?
53.If it is we are using one of sever 2008 we need to upgrade it to 2012 R2 or to 2016 it is
possible? With out any data lose? We have installed MS SQL and we have previouse one year
data in SQL so I need to upgrade this server 2008 to Server 2012 R2 of 2016 with out data
loss is it possible?
57.What type of infrastructure will incurage you to wakeup an employment or keep you
motivated?
58.Where do you want to see yourslef down the line after 5 years?
59.Could you tell me a little bit about your experience? I want to know your daily roles and
responsibilites in IT? What kind of issues you were resolving technically?
60.Can you manage Active Directory, DHCP, DNS server roles etc.?
61.What was you last drawn salary in india ie. In your last job? Is it per monthly?
62.I wanted to understand from you what is your experience lever on server side and network?
What exactly you have been doing?
63.Tell me one thing since 2002 you have been working and in your cv you have mentioned as
you have above 5 years of experience why?
64.Tell me what are the types of server backups you are aware of? Which backups are currently /
recently used?
65.Tell me if you have a network printer on which you don’t have the access to the network
printer how you are going to troubleshoot?
___________________________________________________________________________________________
___________________________________________________________________________________________
__________________________________