YouTube Icon

Interview Questions.

Top 100+ Data Center Infrastructure Management (dcim) Interview Questions And Answers - May 29, 2020

fluid

Top 100+ Data Center Infrastructure Management (dcim) Interview Questions And Answers

Question 1. How To Check Ad Configured Properly?

Answer :

Check NTDS and SYSVOL shared folder at %systemroot%windows.

Question 2. How To Transfer Global Catalog To Another Domain?

Answer :

We cannot switch the worldwide catalog; we are able to simplest dispose of the global catalog from one server and enable different server as a global catalog.

Data Center Management Interview Questions
Question 3. How To Configure Global Catalog Server?

Answer :

Go to Active directory web site and services and expand until your preference server’s NTDS settings after which right click; assets and test mark the Global catalog test container.

Question 4. What Are The Fsmo Roles And It Gets Down What Will Impact?

Answer :

Domain Naming Master (Forest wide position)
Schema Master (Forest wide role)
PDC Emulator (Domain extensive role)
RID Master (Domain huge role)
Infrastructure Master (Domain wide position)
Service Oriented Architecture (SOA) Tutorial
Question five. What Is The Rid Pool?

Answer :

RID Master offers the RID (Relative Identifier) pool to Domain controller of the Domain. When an item is create in a website, a Unique SID (Security ID) is assigned to it which which include a RID (Unique ID) and a SID (Common ID for all Object), A RID pool comprise 500 RIDs.

Data Communications Interview Questions
Question 6. Write Down The Command Line To Seize All The Fsmo Roles To A Server?

Answer :

Click Start, click on Run, kind ntdsutil within the Open box, after which click on OK
Type roles, and then press ENTER.
Type connections, and then press ENTER.
Type hook up with server servername, after which press ENTER, wherein servername is the name of the area controller which you want to assign the FSMO role to.
At the server connections spark off, type q, after which press ENTER.
Type seize role, where position is the function which you need to capture. For instance,
To capture the RID grasp function, type capture schema grasp
To seize the RID master function, kind capture area naming master
To seize the RID grasp role, kind capture rid grasp
To capture the RID master role, type capture p.C
To seize the RID grasp function, type seize infrastructure master.
At the fsmo upkeep spark off, type q, and then press ENTER to gain access to the ntdsutil spark off.
Question 7. Command For Removing Active Directory?

Answer :

dcpromo /forceremoval

Data compression Interview Questions
Question 8. What Kind Of Privilege Is Required To Transfer Fsmo Roles?

Answer :

logged-on user must be a member of the Enterprise Administrators institution to transfer Schema master or Domain naming grasp roles, or a member of the Domain Administrators group of the area where the PDC emulator, RID master and the Infrastructure grasp roles are being transferred.

Question 9. Which Layer Of Osi Model Does The Router Works In?

Answer :

One layer Three (Network layer)

Service Oriented Architecture (SOA) Interview Questions
Question 10. What Are Difference Between Tcp And Udp Protocol?

Answer :

TCP is a connection orientated protocol while UDP isn't always a connection orientated protocol.

Question eleven. Do You Know About Frs?

Answer :

File Replication Services.

Example: Replication of SYSVOL folder.

Data Center Technician Interview Questions
Question 12. What Is The Use Of Dfs?

Answer :

Distributed File System, It is used for the fault tolerance as it makes the reproduction copy of every DFS root. Not handiest that the area login technique as nicely makes use of DFS to discover the closest DC to login.

Data Center Management Interview Questions
Question 13. What Are The Two Types Of Replication?

Answer :

Inter-site replication, Intra-web page replication.

Question 14. What Are The Protocols Used In Replication?

Answer :

RPC and SMTP. Predominantly RPC is used. SMTP is not used as its now not encouraged for replication of Domain Partition. 

Replication warfare is managed the usage of a method defined right here. Read the overall article numerous instances and you would be glad that you got to know something very important. 

Question 15. What Is Default Time For Replication?

Answer :

KCC (Knowledge Consistency Checker) is the set of rules and the 2 protocols used are RPC over IP and SMTP over IP. They mirror in each 15 min.

Data Architect Interview Questions
Question 16. What Is The Difference Between The Two Types Of Replication I.E. Intrasite And Intersite?

Answer :

Intersite replication is for replication with within the site and Intra-website online replication is for the replication among the web sites.

Question 17. What Is The Dns?

Answer :

Domain Naming System:

Used to resolve the host name (FQDN) call to IP Address and Vice Versa

Question 18. What Are Types Of Dns And Zones?

Answer :

Primary DNS quarter
Secondary DNS zone
Active listing incorporated sector
Stub quarter
Data Communications Interview Questions
Question 19. What Are Records Available In Dns?

Answer :

Address records, Host Records, MX Records, and CNAME facts.

Question 20. Which Type Backup Reset Archive Bits?

Answer :

The bit which has test mark on the folder whose backup has been carried out the usage of regular backup technique.

Question 21. What Are The Backup Types?

Answer :

Normal or full Backup
Differential Backup
Incremental Backup
Copy backup
Daily Backup
Question 22. What Is Disk Striping?

Answer :

Disk striping is the method of spreading statistics over multiple disks. The statistics to be saved is split into blocks and spread throughout numerous walls on diverse tough disk. Disk striping is used without or with equivalence. Disk striping helps in enhancing the performance of the disk.

Question 23. What Are The Different Raid1 And Raid 5?

Answer :

RAID-1: In RAID-1  hard disk are there and the information on one is reflected to another. So even supposing one fails different one is there with the same records for provider continuity. 

RAID-five: We can use minimum three difficult disk and most depend on RAID controller card, Data written on disk in stripes with disbursed parity set.

Question 24. Which Raid You Will Recommend And Why?

Answer :

RAID-1 for O.S - mirroring.

RAID-5 for DATA partition- Stripe set with parity.

Data compression Interview Questions
Question 25. What Are Raid Levels?

Answer :

Main RAID ranges are RAID-0, RAID-1, RAID-five and RAID-10.

Question 26. What Is The Version Kerberos Protocol?

Answer :

We are the usage of Kerberos V five.Zero.

Question 27. What Is Use Of Kerberos Protocol?

Answer :

Kerberos protocol is an authentication protocol. When we login in an Active Directory environment its the protocol that is used to authenticate us.

Service Oriented Architecture (SOA) Interview Questions
Question 28. What Are The Two Modes A Terminal Server Works In?

Answer :

User mode and application mode.

Question 29. How To Take A Backup Of Group Policy?

Answer :

We can use GPMC (Group Policy Management Console), right click on the GPO and select backup and take backup on vacation spot folder

Question 30. How To Reserve Ip Address?

Answer :

We can assign a particular IP cope with to the MAC cope with of a machine the use of IP reservation in DHCP.

Question 31. Why Do We Need Two Or More Subnets?

Answer :

To section or restriction/localize one type of traffic to at least one section or subnet of the network.

Question 32. If We Have Two Different Subnets Then How Do I Configure It In Single Dhcp Server?

Answer :

Two different scopes are created for 2 subnets.

Question 33. What Is The Use Of Relay Agent?

Answer :

A router drops the DHCP packet as its a printed packet. When we enable the relay agent option on the router it then we could the DHCP Broadcast packets bypass thru. Hence the relay agent allows in sending it over to the destined subnet.

Data Center Technician Interview Questions
Question 34. What Is The Group Policy?

Answer :

It is manner to provide the applicable predefined surroundings to all users in an Active Directory surroundings and it's far centrally achievable.

Question 35. Where Dns File Stored And Database Of Dna?

Answer :

%SYSTEMROOTp.CWindows System32 DNS.

Question 36. Explain About Srv, Mx And Cname Records?

Answer :

SRV records factor a purchaser to the servers which might be hosting a carrier. For instance Active Directory Service.
MX report factors to the patron to servers web hosting mail provider. MX stands for Mail Exchanger.
CNAME document is a alias document for a name that already exists. Suppose there had been  servers and each of them consolidated into one, if so one call turns into vain. But any application depending on unused call has to work, if so we create an alias report which is the unused name pointing to the call in use. Hence the software keeps functioning. 
Data Architect Interview Questions




CFG