YouTube Icon

Interview Questions.

Top 100+ Windows Server Support Interview Questions And Answers - May 25, 2020

fluid

Top 100+ Windows Server Support Interview Questions And Answers

Question 1. What Is The Difference Between Authorized Dhcp And Non Authorized Dhcp?

Answer :

To avoid issues in the network causing through mis-configured DHCP servers, server in home windows 2000 have to be validate by way of AD earlier than beginning carrier to customers. If an authorized DHCP reveals any DHCP server inside the community it stop serving the clients.

Question 2. Difference Between Inter-web site And Intra-site Replication. Protocols Using For Replication?

Answer :

Intra-site replication may be performed among the area controllers inside the identical website. Inter-web site replication can be executed among two special web sites over WAN hyperlinks

BHS (Bridge Head Servers) is liable for starting up replication among the websites. Inter-website replication can be achieved B/w BHS in one web site and BHS in every other web page.

We can use RPC over IP or SMTP as a replication protocols wherein as Domain partition isn't feasible to duplicate the usage of SMTP

Network Technical Support Interview Questions
Question three. Brief Explanation Of Raid Levels ?

Answer :

Microsoft Windows XP, Windows 2000 and Windows Server 2003 offer two styles of disk storage: primary and dynamic

Basic Disk Storage:

Basic garage makes use of ordinary partition tables supported via MS-DOS, Microsoft Windows ninety five, Microsoft Windows 98, Microsoft Windows Millennium Edition (Me), Microsoft Windows NT, Microsoft Windows 2000, Windows Server 2003 and Windows XP. A disk initialized for fundamental garage is referred to as a basic disk. A fundamental disk carries primary volumes, inclusive of primary walls, prolonged walls, and logical drives. Additionally, basic volumes include multidisk volumes which can be created by using using Windows NT four.0 or in advance, such as extent units, stripe sets, replicate sets, and stripe sets with parity. Windows XP does not help these multidisk simple volumes. Any extent units, stripe units, reflect sets, or stripe units with parity need to be backed up and deleted or converted to dynamic disks prior to installing Windows XP Professional. 

Dynamic Disk Storage:

Dynamic garage is supported in Windows XP Professional, Windows 2000 and Windows Server 2003. A disk initialized for dynamic storage is called a dynamic disk. A dynamic disk contains dynamic volumes, which includes easy volumes, spanned volumes, striped volumes, mirrored volumes, and RAID-5 volumes. With dynamic storage, you can perform disk and quantity control without the need to restart Windows. 

Note: Dynamic disks aren't supported on transportable computer systems or on Windows XP Home Edition-primarily based computers. 

You can't create mirrored volumes or RAID-five volumes on Windows XP Home Edition, Windows XP Professional, or Windows XP 64-Bit Edition-primarily based computer systems. However, you may use a Windows XP Professional-primarily based computer to create a mirrored or RAID-five quantity on far off computer systems which can be walking Windows 2000 Server, Windows 2000 Advanced Server, or Windows 2000 Datacenter Server, or the Standard, Enterprise and Data Center variations of Windows Server 2003.

Storage types are break free the record machine kind. A primary or dynamic disk can comprise any combination of FAT16, FAT32, or NTFS walls or volumes. 

A disk machine can contain any mixture of garage sorts. However, all volumes at the same disk ought to use the same garage type. 

Question four. How To Convert A Basic Disk To A Dynamic Disk?

Answer :

Use the Disk Management snap-in in Windows XP/2000/2003 to transform a simple disk to a dynamic disk.

To do that, follow these steps: 

Log on as Administrator or as a member of the Administrators institution. 
Click Start, and then click on Control Panel. 
Click Performance and Maintenance, click on Administrative Tools, after which double-click Computer Management. You can also right-click My Computer and pick out Manage if you have My Computer displayed on your computing device. 
In the left pane, click Disk Management. 
In the lower-proper pane, right-click on the simple disk which you need to transform, and then click on Convert to Dynamic Disk. You must proper-click the grey area that incorporates the disk identify at the left facet of the Details pane. 
Select the check container this is subsequent to the disk that you need to transform (if it isn't always already decided on), after which click OK. 
Click Details if you want to view the listing of volumes within the disk. Click Convert. 
Click Yes while you are precipitated to convert the disk, after which click on OK. 
Warning: After you convert a primary disk to a dynamic disk, nearby get right of entry to to the dynamic disk is restrained to Windows XP Professional, Windows 2000 and Windows Server 2003. Additionally, after you convert a fundamental disk to a dynamic disk, the dynamic volumes cannot be changed lower back to walls. You ought to first delete all dynamic volumes on the disk and then convert the dynamic disk lower back to a simple disk. If you want to hold your statistics, you ought to first again up the information or pass it to every other volume.

Networking Tutorial
Question five. Explain The Dynamic Storage Terms?

Answer :

A extent is a storage unit made from loose space on one or greater disks. It can be formatted with a document device and assigned a force letter. Volumes on dynamic disks may have any of the subsequent layouts: easy, spanned, reflected, striped, or RAID-five. 
A easy quantity makes use of free area from a unmarried disk. It can be a single vicinity on a disk or consist of multiple, concatenated areas. A simple extent may be prolonged in the identical disk or onto extra disks. If a easy extent is extended throughout more than one disks, it will become a spanned quantity. 
A spanned quantity is constituted of loose disk area this is related together from multiple disks. You can increase a spanned quantity onto a maximum of 32 disks. A spanned extent cannot be reflected and isn't always fault-tolerant. 
A striped extent is a volume whose information is interleaved across  or more physical disks. The statistics in this form of extent is allotted alternately and frivolously to each of the bodily disks. A striped volume can not be reflected or extended and isn't always fault-tolerant. Striping is also known as RAID-0. 
A mirrored extent is a fault-tolerant extent whose records is duplicated on two bodily disks. All of the facts on one extent is copied to some other disk to offer statistics redundancy. If one of the disks fails, the statistics can nevertheless be accessed from the last disk. A reflected extent can not be extended. Mirroring is also referred to as RAID-1. 
A RAID-5 volume is a fault-tolerant quantity whose records is striped across an array of three or more disks. Parity (a calculated value that can be used to reconstruct information after a failure) is also striped across the disk array. If a bodily disk fails, the portion of the RAID-5 extent that become on that failed disk may be re-constructed from the closing statistics and the parity. A RAID-five volume can't be reflected or prolonged. 
The device quantity consists of the hardware-precise files which can be needed to load Windows (for example, Ntldr, Boot.Ini, and Ntdetect.Com). The gadget quantity can be, but does not should be, the same as the boot quantity. 
The boot extent consists of the Windows running system documents that are located within the %Systemroot% and %Systemroot%System32 folders. The boot volume may be, however does not have to be, the same as the gadget quantity. 
RAID 0 – Striping
RAID 1- Mirroring (minimal 2 HDD required)
RAID five – Striping With Parity (Minimum three HDD required)
RAID stages 1 and 5 handiest offers redundancy.
Computer Technical Support Interview Questions
Question 6. What Are The Different Backup Strategies Are Available ?

Answer :

Normal Backup
Incremental Backup
Differential Backup
Daily Backup
Copy Backup 
Question 7. What Is A Global Catalog?

Answer :

Global catalog is a position, which keeps Indexes about objects. It carries complete facts of the objects in its personal area and partial data of the objects in other domains. Universal Group club data may be stored in international catalog servers and reflect to all GC’s within the woodland.

Networking Interview Questions
Question eight. What Is Active Directory And What Is The Use Of It ?

Answer :

Active listing is a listing service, which maintains the relation ship between resources and enabling them to work collectively. Because of AD hierarchal shape windows 2000 is extra scalable, dependable. Active directory is derived from X.500 requirements wherein data is stored is hierarchal tree like shape. Active directory relies upon on two Internet standards one is DNS and other is LDAP. Information in Active directory can be queried with the aid of the usage of LDAP protocol 

Question 9. What Is The Physical And Logical Structure Of Ad?

Answer :

Active listing physical structure is a hierarchal structure which fallows Forests—Trees—Domains—Child Domains—Grand Child—and so on

Active listing is logically divided into 3 walls 

Configuration partition
Schema Partition
Domain partition
Application Partition (handiest in home windows 2003 now not available in home windows 2000)
 Out of those Configuration, Schema partitions can be replicated between the domain controllers in the inside the complete wooded area. Where as Domain partition may be replicated between the area controllers within the same area.

Active Directory Interview Questions
Question 10. What Is The Process Of User Authentication (kerberos V5) In Windows 2000?

Answer :

After giving logon credentials an encryption key might be generated that is used to encrypt the time stamp of the patron system. User name and encrypted timestamp facts will be furnished to area controller for authentication. Then Domain controller based at the password facts stored in AD for that person it decrypts the encrypted time stamp information. If produces time stamp matches to its time stamp. It will offer logon session key and Ticket granting price ticket to purchaser in an encryption layout. Again consumer decrypts and if produced time stamp information is matching then it's going to use logon consultation key to logon to the domain. Ticket granting price tag could be used to generate provider granting price ticket while accessing network sources.

Question 11. What Are The Port Numbers For Kerberos, Ldap And Global Catalog?

Answer :

Kerberos – 88, LDAP – 389, Global Catalog – 3268 

Hardware and Networking Interview Questions
Question 12. What Is The Use Of Ldap (x.500 Standard?)

Answer :

LDAP is a listing get entry to protocol, which is used to change directory facts from server to customers or from server to servers 

Network Technical Support Interview Questions
Question 13. What Are The Problems That Are Generally Come Across Dhcp?

Answer :

Scope is full with IP addresses no IP’s available for brand new machines
If scope options aren't configured properly eg default gateway 
Incorrect creation of scopes and so on 
Question 14. What Is The Role Responsible For Time Synchronization?

Answer :

PDC Emulator is liable for time synchronization. Time synchronization is crucial because Kerberos authentication depends on time stamp statistics

Question 15. What Is Ttl & How To Set Ttl Time In Dns?

Answer :

TTL is Time to Live placing used for the amount of time that the document ought to continue to be in cache while call decision passed off.We can set TTL in SOA (start of authority document) of DNS

Desktop Support Interview Questions
Question 16. How To Take Dns And Wins, Dhcp Backup ?

Answer :

%Systemroot%/system32/dns
%Systemroot%/system32/WINS
%Systemroot%/system32/DHCP 
Question 17. What Is Recovery Console ?

Answer :

Recovery console is a application used to get better the device when it isn't booting nicely or on no account booting. We can carry out fallowing operations from recuperation console
We can replica, rename, or update running machine documents and folders
Enable or disable provider or tool startup the following time that begin computer
Repair the file gadget boot quarter or the Master Boot Record
Create and format partitions on drives
Technical Support Interview Questions
Question 18. What Is Dfs & Its Usage ?

Answer :

DFS is a allotted file gadget used to offer common environment for customers to get entry to files and folders even if they are shared in one-of-a-kind servers bodily.

There are  types of DFS area DFS and Stand on my own DFS. We can't offer redundancy for stand on my own DFS in case of failure. Domain DFS is utilized in a site surroundings which may be accessed with the aid of /domain name/root1 (root 1 is DFS root name). Stand alone DFS can be utilized in workgroup surroundings which can be accessed thru /server name/root1 (root 1 is DFS root call). Both the cases we want to create DFS root ( Which appears like a shared folder for cease users) and DFS links ( A logical link that's pointing to the server in which the folder is physically shared)

The maximum variety of Dfs roots in line with server is 1. 
The maximum numbers of Dfs root replicas are 31.
The most number of Dfs roots according to domain is limitless. 
The most quantity of Dfs hyperlinks or shared folders in a Dfs root is 1,000
Computer Technical Support Interview Questions
Question 19. What Is Ris And What Are Its Requirements ?

Answer :

RIS is a far flung installation carrier, that's used to put in operation machine remotely.

Question 20. Explain The Client Requirements?

Answer :

PXE DHCP-based totally boot ROM model 1.00 or later NIC, or a community adapter this is supported via the RIS boot disk.
Should meet minimum running system necessities
Software Requirements
Below network services ought to be lively on RIS server or any server within the community
Domain Name System (DNS Service)
Dynamic Host Configuration Protocol (DHCP)
Active directory “Directory” provider 
VMware ESXi Interview Questions
Question 21. How Many Root Replicas Can Be Created In Dfs?

Answer :

31 

Question 22. Can We Establish Trust Relationship Between Two Forests?

Answer :

In Windows 2000 it isn't feasible. In Windows 2003 it's far feasible

Question 23. What Is Fsmo Roles ?

Answer :

Flexible single master operation (FSMO) roles are :

Domain Naming Master
Schema Master
PDC Emulator
Infrastructure Master
RID Master 
Windows Vmware Interview Questions
Question 24. Brief All The Fsmo Roles?

Answer :

Windows 2000/2003 Multi-Master Model

A multi-grasp enabled database, along with the Active Directory, presents the power of permitting changes to occur at any DC within the business enterprise, but it also introduces the opportunity of conflicts which can doubtlessly lead to problems as soon as the facts is replicated to the relaxation of the enterprise. One way Windows 2000/2003 deals with conflicting updates is with the aid of having a battle decision algorithm handle discrepancies in values by resolving to the DC to which adjustments have been written closing (that is, "the last creator wins"), whilst discarding the changes in all other DCs. Although this resolution method can be ideal in some instances, there are times while conflicts are just too tough to solve the usage of the "ultimate writer wins" approach. In such cases, it's far fine to prevent the warfare from happening in place of to try and clear up it after the reality. 

For positive forms of adjustments, Windows 2000/2003 carries methods to prevent conflicting Active Directory updates from going on. 

Windows 2000/2003 Single-Master Model

To prevent conflicting updates in Windows 2000/2003, the Active Directory performs updates to sure gadgets in a single-master style. 

In a single-grasp version, handiest one DC in the entire listing is authorized to system updates. This is just like the position given to a number one area controller (PDC) in in advance variations of Windows (along with Microsoft Windows NT four.Zero), in which the PDC is responsible for processing all updates in a given area. 

In a woodland, there are five FSMO roles that are assigned to at least one or greater domain controllers.

The 5 FSMO roles are: 

Schema Master: 

The schema grasp area controller controls all updates and changes to the schema. Once the Schema update is entire, it's miles replicated from the schema grasp to all other DCs inside the listing. To replace the schema of a wooded area, you should have get right of entry to to the schema grasp. There may be best one schema grasp in the complete forest. 

Domain naming grasp: 

The area naming master area controller controls the addition or elimination of domain names inside the woodland. This DC is the best one that could add or cast off a site from the directory. It can also add or put off pass references to domains in outside directories. There may be most effective one area naming master inside the whole woodland. 

Infrastructure Master: 

When an item in a single area is referenced by using any other item in every other area, it represents the reference by using the GUID, the SID (for references to protection principals), and the DN of the object being referenced. The infrastructure FSMO function holder is the DC answerable for updating an item's SID and prominent name in a pass-area object reference. At any person time, there can be handiest one area controller appearing because the infrastructure grasp in every domain. 

Note: The Infrastructure Master (IM) position must be held with the aid of a website controller that isn't a Global Catalog server (GC). If the Infrastructure Master runs on a Global Catalog server it's going to forestall updating object records because it does now not include any references to items that it does not maintain. This is due to the fact a Global Catalog server holds a partial replica of every item in the woodland. As a end result, cross-domain item references in that area will now not be up to date and a warning to that impact can be logged on that DC's event log. If all of the area controllers in a site also host the global catalog, all of the domain controllers have the contemporary information, and it isn't essential which domain controller holds the infrastructure master role. 

Relative ID (RID) Master: 

The RID master is liable for processing RID pool requests from all domain controllers in a particular area. When a DC creates a safety essential object together with a consumer or group, it attaches a unique Security ID (SID) to the item. This SID consists of a website SID (the identical for all SIDs created in a website), and a relative ID (RID) this is particular for every security important SID created in a site. Each DC in a website is allocated a pool of RIDs that it's miles allowed to assign to the security principals it creates. When a DC's allotted RID pool falls under a threshold, that DC issues a request for added RIDs to the domain's RID grasp. The domain RID master responds to the request by way of retrieving RIDs from the domain's unallocated RID pool and assigns them to the pool of the soliciting for DC. At any person time, there can be best one area controller acting as the RID master within the area. 

PDC Emulator: 

The PDC emulator is vital to synchronize time in an corporation. Windows 2000/2003 includes the W32Time (Windows Time) time provider that is required by means of the Kerberos authentication protocol. All Windows 2000/2003-based computer systems inside an employer use a common time. The cause of the time provider is to make certain that the Windows Time provider makes use of a hierarchical courting that controls authority and does now not allow loops to make sure appropriate common time utilization. 
The PDC emulator of a website is authoritative for the area. The PDC emulator at the basis of the forest turns into authoritative for the company, and must be configured to accumulate the time from an external supply. All PDC FSMO function holders follow the hierarchy of domains in the choice in their in-bound time companion. 
In a Windows 2000/2003 area, the PDC emulator role holder retains the subsequent functions: 
Password changes achieved by way of other DCs inside the area are replicated preferentially to the PDC emulator. 
Authentication disasters that occur at a given DC in a website due to an wrong password are forwarded to the PDC emulator earlier than a bad password failure message is reported to the user. 
Account lockout is processed on the PDC emulator. 
Editing or advent of Group Policy Objects (GPO) is usually performed from the GPO replica observed inside the PDC Emulator's SYSVOL proportion, until configured now not to do so with the aid of the administrator. 
The PDC emulator performs all of the functionality that a Microsoft Windows NT four.Zero Server-based totally PDC or in advance PDC plays for Windows NT four.0-based totally or in advance customers. 
This part of the PDC emulator function will become pointless whilst all workstations, member servers, and area controllers which can be going for walks Windows NT four.0 or in advance are all upgraded to Windows 2000/2003. The PDC emulator still performs the other functions as described in a Windows 2000/2003 environment. 
At any person time, there may be simplest one area controller performing because the PDC emulator grasp in every domain within the woodland.
Networking Interview Questions




CFG