YouTube Icon

Interview Questions.

Top 24 Windows Server Support Interview Questions - Jul 28, 2022

fluid

Top 24 Windows Server Support Interview Questions

Q1. What Is Recovery Console ?

Recovery console is a utility used to get better the device whilst it is not booting nicely or not at all booting. We can carry out fallowing operations from recovery console

We can replica, rename, or update running machine documents and folders

Enable or disable carrier or tool startup the following time that start laptop

Repair the record gadget boot sector or the Master Boot Record

Create and format walls on drives

Q2. How To Take Dns And Wins, Dhcp Backup ?

%Systemroot%/system32/dns

%Systemroot%/system32/WINS

%Systemroot%/system32/DHCP 

Q3. What Is The Use Of Ldap (x.500 Standard?)

LDAP is a listing get right of entry to protocol, that's used to change listing statistics from server to clients or from server to servers 

Q4. Explain The Dynamic Storage Terms?

A extent is a storage unit crafted from free area on one or greater disks. It can be formatted with a record device and assigned a power letter. Volumes on dynamic disks could have any of the following layouts: easy, spanned, mirrored, striped, or RAID-five. 

A easy extent makes use of unfastened space from a unmarried disk. It can be a unmarried location on a disk or consist of more than one, concatenated areas. A simple volume can be extended inside the equal disk or onto additional disks. If a simple quantity is extended throughout more than one disks, it becomes a spanned extent. 

A spanned quantity is produced from free disk space that is linked collectively from multiple disks. You can extend a spanned extent onto a maximum of 32 disks. A spanned volume can not be reflected and is not fault-tolerant. 

A striped extent is a volume whose statistics is interleaved across  or greater bodily disks. The information in this sort of volume is allocated alternately and frivolously to every of the physical disks. A striped quantity can't be mirrored or prolonged and isn't fault-tolerant. Striping is likewise referred to as RAID-zero. 

A reflected extent is a fault-tolerant extent whose information is duplicated on  physical disks. All of the records on one quantity is copied to any other disk to provide statistics redundancy. If one of the disks fails, the information can still be accessed from the remaining disk. A mirrored extent can't be prolonged. Mirroring is also called RAID-1. 

A RAID-5 quantity is a fault-tolerant quantity whose statistics is striped throughout an array of 3 or greater disks. Parity (a calculated value that may be used to reconstruct statistics after a failure) is likewise striped throughout the disk array. If a bodily disk fails, the part of the RAID-five quantity that was on that failed disk may be re-constructed from the final statistics and the parity. A RAID-five extent cannot be mirrored or prolonged. 

The gadget volume consists of the hardware-precise files which are had to load Windows (for example, Ntldr, Boot.Ini, and Ntdetect.Com). The machine extent may be, however does now not should be, similar to the boot volume. 

The boot extent carries the Windows running system documents that are located within the %Systemroot% and %Systemroot%System32 folders. The boot quantity may be, but does not must be, similar to the device volume. 

RAID zero – Striping

RAID 1- Mirroring (minimal 2 HDD required)

RAID five – Striping With Parity (Minimum 3 HDD required)

RAID stages 1 and 5 handiest offers redundancy.

Q5. What Are The Different Backup Strategies Are Available ?

Normal Backup

Incremental Backup

Differential Backup

Daily Backup

Copy Backup 

Q6. Can We Establish Trust Relationship Between Two Forests?

In Windows 2000 it is not possible. In Windows 2003 it's far feasible

Q7. How Many Root Replicas Can Be Created In Dfs?

31 

Q8. What Is Ttl & How To Set Ttl Time In Dns?

TTL is Time to Live putting used for the amount of time that the report should stay in cache whilst name resolution passed off.We can set TTL in SOA (start of authority file) of DNS

Q9. What Is Dfs & Its Usage ?

DFS is a dispensed document gadget used to provide common surroundings for customers to get entry to documents and folders even when they're shared in exclusive servers physically.

There are two sorts of DFS area DFS and Stand alone DFS. We can not provide redundancy for stand by myself DFS in case of failure. Domain DFS is used in a domain surroundings which can be accessed with the aid of /domain call/root1 (root 1 is DFS root name). Stand on my own DFS may be utilized in workgroup environment which can be accessed via /server call/root1 (root 1 is DFS root name). Both the cases we need to create DFS root ( Which appears like a shared folder for end users) and DFS hyperlinks ( A logical link that's pointing to the server in which the folder is physically shared)

The maximum quantity of Dfs roots according to server is 1. 

The most numbers of Dfs root replicas are three@

The maximum variety of Dfs roots in line with area is unlimited. 

The maximum number of Dfs hyperlinks or shared folders in a Dfs root is 1,000

Q10. Brief All The Fsmo Roles?

Windows 2000/2003 Multi-Master Model

A multi-grasp enabled database, along with the Active Directory, affords the flexibility of allowing adjustments to occur at any DC in the agency, but it also introduces the possibility of conflicts that may potentially lead to issues once the information is replicated to the rest of the agency. One manner Windows 2000/2003 deals with conflicting updates is by having a warfare decision algorithm cope with discrepancies in values by means of resolving to the DC to which adjustments were written remaining (this is, "the last author wins"), whilst discarding the modifications in all other DCs. Although this decision method can be appropriate in a few cases, there are instances whilst conflicts are simply too hard to solve the usage of the "closing creator wins" technique. In such instances, it's miles best to prevent the conflict from taking place in preference to to attempt to solve it after the reality. 

For sure varieties of adjustments, Windows 2000/2003 includes methods to prevent conflicting Active Directory updates from occurring. 

Windows 2000/2003 Single-Master Model

To save you conflicting updates in Windows 2000/2003, the Active Directory plays updates to sure items in a single-master fashion. 

In a single-grasp version, handiest one DC inside the entire directory is permitted to method updates. This is just like the role given to a primary area controller (PDC) in in advance versions of Windows (which include Microsoft Windows NT four.Zero), wherein the PDC is liable for processing all updates in a given area. 

In a woodland, there are 5 FSMO roles which might be assigned to one or greater area controllers.

The 5 FSMO roles are: 

Schema Master: 

The schema master domain controller controls all updates and adjustments to the schema. Once the Schema replace is entire, it is replicated from the schema grasp to all different DCs within the listing. To replace the schema of a wooded area, you ought to have get admission to to the schema master. There can be most effective one schema grasp in the complete woodland. 

Domain naming grasp: 

The area naming grasp domain controller controls the addition or elimination of domain names within the wooded area. This DC is the only one which could upload or cast off a site from the listing. It can also add or cast off pass references to domains in external directories. There can be only one area naming grasp inside the entire wooded area. 

Infrastructure Master: 

When an item in one domain is referenced by means of every other item in another area, it represents the reference by using the GUID, the SID (for references to security principals), and the DN of the item being referenced. The infrastructure FSMO function holder is the DC answerable for updating an object's SID and outstanding name in a cross-domain item reference. At any person time, there may be handiest one area controller appearing as the infrastructure master in each area. 

Note: The Infrastructure Master (IM) function have to be held through a domain controller that isn't a Global Catalog server (GC). If the Infrastructure Master runs on a Global Catalog server it's going to prevent updating object data as it does not comprise any references to items that it does no longer maintain. This is due to the fact a Global Catalog server holds a partial duplicate of every object inside the wooded area. As a result, move-domain object references in that area will not be updated and a warning to that impact might be logged on that DC's occasion log. If all the domain controllers in a site additionally host the worldwide catalog, all of the domain controllers have the present day statistics, and it is not essential which area controller holds the infrastructure master position. 

Relative ID (RID) Master: 

The RID master is accountable for processing RID pool requests from all domain controllers in a specific area. When a DC creates a security main item including a person or institution, it attaches a unique Security ID (SID) to the item. This SID consists of a website SID (the equal for all SIDs created in a site), and a relative ID (RID) that is precise for every security main SID created in a website. Each DC in a website is allocated a pool of RIDs that it is allowed to assign to the safety principals it creates. When a DC's allotted RID pool falls under a threshold, that DC issues a request for extra RIDs to the domain's RID grasp. The domain RID master responds to the request through retrieving RIDs from the area's unallocated RID pool and assigns them to the pool of the requesting DC. At someone time, there can be simplest one area controller appearing as the RID master inside the domain. 

PDC Emulator: 

The PDC emulator is necessary to synchronize time in an organization. Windows 2000/2003 consists of the W32Time (Windows Time) time service that is required with the aid of the Kerberos authentication protocol. All Windows 2000/2003-based totally computer systems within an corporation use a not unusual time. The motive of the time service is to make sure that the Windows Time service makes use of a hierarchical courting that controls authority and does no longer allow loops to ensure appropriate common time usage. 

The PDC emulator of a domain is authoritative for the area. The PDC emulator at the basis of the woodland turns into authoritative for the organization, and should be configured to gather the time from an outside source. All PDC FSMO function holders observe the hierarchy of domain names in the choice in their in-certain time accomplice. 

In a Windows 2000/2003 area, the PDC emulator position holder retains the subsequent features: 

Password changes achieved through other DCs within the domain are replicated preferentially to the PDC emulator. 

Authentication screw ups that arise at a given DC in a domain because of an incorrect password are forwarded to the PDC emulator earlier than a bad password failure message is reported to the consumer. 

Account lockout is processed at the PDC emulator. 

Editing or creation of Group Policy Objects (GPO) is usually completed from the GPO copy observed within the PDC Emulator's SYSVOL proportion, until configured now not to accomplish that by means of the administrator. 

The PDC emulator performs all of the capability that a Microsoft Windows NT four.Zero Server-primarily based PDC or in advance PDC plays for Windows NT 4.Zero-based totally or earlier customers. 

This a part of the PDC emulator role turns into pointless when all workstations, member servers, and domain controllers which are going for walks Windows NT four.Zero or in advance are all upgraded to Windows 2000/two hundred@The PDC emulator nonetheless plays the alternative capabilities as described in a Windows 2000/2003 environment. 

At any one time, there may be best one domain controller acting as the PDC emulator grasp in every domain inside the woodland.

Q11. What Are The Problems That Are Generally Come Across Dhcp?

Scope is full with IP addresses no IP’s available for brand spanking new machines

If scope options are not configured well eg default gateway 

Incorrect advent of scopes and so on 

Q12. What Is Active Directory And What Is The Use Of It ?

Active directory is a listing service, which maintains the relation ship among sources and allowing them to work together. Because of AD hierarchal shape windows 2000 is greater scalable, reliable. Active directory is derived from X.500 standards wherein facts is stored is hierarchal tree like structure. Active directory depends on  Internet standards one is DNS and different is LDAP. Information in Active listing may be queried through the use of LDAP protocol 

Q13. What Is Ris And What Are Its Requirements ?

RIS is a faraway set up carrier, which is used to put in operation device remotely.

Q14. How To Convert A Basic Disk To A Dynamic Disk?

Use the Disk Management snap-in in Windows XP/2000/2003 to convert a simple disk to a dynamic disk.

To try this, comply with these steps: 

Log on as Administrator or as a member of the Administrators group. 

Click Start, after which click Control Panel. 

Click Performance and Maintenance, click Administrative Tools, and then double-click on Computer Management. You also can right-click My Computer and pick Manage if you have My Computer displayed in your desktop. 

In the left pane, click Disk Management. 

In the lower-proper pane, right-click on the basic disk that you want to transform, and then click on Convert to Dynamic Disk. You need to proper-click the grey area that incorporates the disk title on the left aspect of the Details pane. 

Select the check container this is next to the disk which you need to convert (if it isn't already decided on), and then click OK. 

Click Details in case you need to view the list of volumes inside the disk. Click Convert. 

Click Yes whilst you are prompted to convert the disk, and then click on OK. 

Warning: After you exchange a fundamental disk to a dynamic disk, local get admission to to the dynamic disk is restricted to Windows XP Professional, Windows 2000 and Windows Server two hundred@Additionally, after you convert a primary disk to a dynamic disk, the dynamic volumes cannot be changed returned to partitions. You have to first delete all dynamic volumes on the disk after which convert the dynamic disk returned to a basic disk. If you want to hold your facts, you have to first back up the records or circulate it to every other quantity.

Q15. What Is A Global Catalog?

Global catalog is a position, which maintains Indexes about objects. It incorporates full information of the objects in its very own domain and partial records of the gadgets in other domains. Universal Group club statistics can be saved in global catalog servers and mirror to all GC’s inside the wooded area.

Q16. Brief Explanation Of Raid Levels ?

Microsoft Windows XP, Windows 2000 and Windows Server 2003 provide  kinds of disk garage: simple and dynamic

Basic Disk Storage:

Basic garage uses ordinary partition tables supported with the aid of MS-DOS, Microsoft Windows 95, Microsoft Windows 98, Microsoft Windows Millennium Edition (Me), Microsoft Windows NT, Microsoft Windows 2000, Windows Server 2003 and Windows XP. A disk initialized for basic storage is known as a basic disk. A fundamental disk consists of simple volumes, consisting of primary walls, prolonged walls, and logical drives. Additionally, primary volumes consist of multidisk volumes that are created through the usage of Windows NT 4.Zero or earlier, consisting of extent units, stripe units, mirror units, and stripe sets with parity. Windows XP does no longer guide those multidisk primary volumes. Any extent sets, stripe sets, replicate sets, or stripe units with parity have to be subsidized up and deleted or transformed to dynamic disks before you install Windows XP Professional. 

Dynamic Disk Storage:

Dynamic garage is supported in Windows XP Professional, Windows 2000 and Windows Server two hundred@A disk initialized for dynamic storage is called a dynamic disk. A dynamic disk incorporates dynamic volumes, such as easy volumes, spanned volumes, striped volumes, reflected volumes, and RAID-5 volumes. With dynamic storage, you can carry out disk and quantity management with out the need to restart Windows. 

Note: Dynamic disks are not supported on transportable computer systems or on Windows XP Home Edition-primarily based computers. 

You can not create reflected volumes or RAID-five volumes on Windows XP Home Edition, Windows XP Professional, or Windows XP sixty four-Bit Edition-primarily based computers. However, you can use a Windows XP Professional-based laptop to create a mirrored or RAID-5 extent on remote computer systems which might be going for walks Windows 2000 Server, Windows 2000 Advanced Server, or Windows 2000 Datacenter Server, or the Standard, Enterprise and Data Center variations of Windows Server 2003.

Storage types are break away the record gadget type. A primary or dynamic disk can include any combination of FAT16, FAT32, or NTFS partitions or volumes. 

A disk machine can include any mixture of garage sorts. However, all volumes at the same disk ought to use the equal storage type. 

Q17. What Is Fsmo Roles ?

Flexible unmarried master operation (FSMO) roles are :

Domain Naming Master

Schema Master

PDC Emulator

Infrastructure Master

RID Master 

Q18. What Is The Process Of User Authentication (kerberos V5) In Windows 2000?

After giving logon credentials an encryption key will be generated that's used to encrypt the time stamp of the patron system. User call and encrypted timestamp information may be provided to domain controller for authentication. Then Domain controller based at the password facts stored in AD for that person it decrypts the encrypted time stamp statistics. If produces time stamp matches to its time stamp. It will provide logon consultation key and Ticket granting price tag to consumer in an encryption format. Again purchaser decrypts and if produced time stamp statistics is matching then it will use logon consultation key to logon to the area. Ticket granting price tag will be used to generate carrier granting price ticket whilst having access to network sources.

Q19. Difference Between Inter-site And Intra-website Replication. Protocols Using For Replication?

Intra-site replication may be achieved between the domain controllers inside the same web page. Inter-site replication may be done among  extraordinary sites over WAN links

BHS (Bridge Head Servers) is accountable for beginning replication between the sites. Inter-website online replication may be carried out B/w BHS in a single website online and BHS in any other web site.

We can use RPC over IP or SMTP as a replication protocols wherein as Domain partition isn't possible to replicate the use of SMTP

Q20. What Is The Role Responsible For Time Synchronization?

PDC Emulator is accountable for time synchronization. Time synchronization is critical because Kerberos authentication relies upon on time stamp facts

Q21. What Is The Difference Between Authorized Dhcp And Non Authorized Dhcp?

To avoid issues inside the network inflicting through mis-configured DHCP servers, server in home windows 2000 have to be validate by way of AD before starting service to customers. If an authorized DHCP finds any DHCP server in the network it forestall serving the customers.

Q22. What Is The Physical And Logical Structure Of Ad?

Active directory physical shape is a hierarchal shape which fallows Forests—Trees—Domains—Child Domains—Grand Child—and so on

Active directory is logically divided into three walls 

Configuration partition

Schema Partition

Domain partition

Application Partition (only in home windows 2003 no longer available in home windows 2000)

 Out of those Configuration, Schema walls can be replicated between the domain controllers in the in the whole woodland. Where as Domain partition may be replicated between the domain controllers in the equal domain.

Q23. What Are The Port Numbers For Kerberos, Ldap And Global Catalog?

Kerberos – 88, LDAP – 389, Global Catalog – 3268 

Q24. Explain The Client Requirements?

PXE DHCP-based boot ROM model 1.00 or later NIC, or a network adapter that is supported by using the RIS boot disk.

Should meet minimal working gadget necessities

Software Requirements

Below community services must be active on RIS server or any server within the network

Domain Name System (DNS Service)

Dynamic Host Configuration Protocol (DHCP)

Active listing “Directory” provider




CFG