YouTube Icon

Interview Questions.

Top 29 System Administration Interview Questions - Jul 24, 2022

fluid

Top 29 System Administration Interview Questions

Q1. What Is The Windows Registry?

The Windows Registry, generally referred to as "the registry," is a collection of databases of configuration settings in Microsoft Windows working structures.

Q2. When Do We Use Wds?

Windows Deployment Services is a server role used to install Windows working structures remotely. WDS is mainly used for community-based OS installations to set up new computers.

Q3. Where Is The Ad Database Stored?

The AD database is saved in C:WindowsNTDSNTDS.DIT.

Q4. Differentiate Between Firewall/antivirus?

Antivirus: The prime activity of an anivirus is protect your gadget from laptop viruses. Your computer may be standalone or part of community or linked to Internet you need an antivirus software. It actively monitors whilst you are using your system for any virus hazard from specific resources. If it found one it attempts to smooth or quarantine the virus in the long run maintaining your device and facts secure.

Firewall: Firewall is in different hand a software which protects your system from outsider/intruder/hacker assaults. These attacks might not be virus kind. In some instances hackers can take control of your machine remotely and steal your data or critical records from machine. If your machine is immediately related to internet or a large community than you can installation a software firewall to your PC to guard your self from unauthorized get entry to. Firewall is available both in software program or in hardware shape. For a unmarried PC you could need a software firewall at the same time as a massive corporate implements hardware firewall to defend all in their systems from such assaults.

Q5. What Is Loop Back?

Loopback deal with is 127.Zero.Zero.1, An deal with that sends outgoing signals returned to the identical computer for trying out. 

Q6. What Are Gpos (institution Policy Objects)?

A Group Policy Object (GPO) is a group of settings that manage the operating environment of person bills and laptop accounts. GPOs define registry-based totally rules, security alternatives, software set up and protection alternatives, script options, and folder redirection alternatives.

There are  varieties of Group Policy objects:

Local Group Policy items are saved on individual computer systems.

Nonlocal Group Policy objects, which are stored on a website controller, are available most effective in an Active Directory surroundings.

Q7. What Is Wins Server?

Windows Internet Name Service (WINS) servers dynamically map IP addresses to computer names (NetBIOS names). This allows users to get entry to resources through computer call as opposed to via IP address. If you need this laptop to maintain tune of the names and IP addresses of other computers to your network, configure this pc as a WINS server.

If you do now not use WINS in the sort of community, you cannot hook up with a far flung community aid via using its NetBIOS call.

Q8. How Can We Remove Lingering Objects?

Windows Server 2003 and 2008 have the potential to manually cast off lingering gadgets the use of the console software command REPADMIN.EXE.

Q9. What Role Do Characteristics Such As Assertiveness And Problem Solving Play In The Career Of A System Administrator?

Analytical thinking and hassle fixing is critical to have the ability to research software or hardware malfunction. They also are important with a view to improve or improve systems so that they healthy company desires. Assertiveness also plays a role because directors ought to make decisions. They decide on answers, security features, and things like gadget improvements.

Q10. What Is Active Directory?

Active Directory affords a centralised manipulate for network management and security. Server computers configured with Active Directory are referred to as domain controllers. Active Directory shops all data and settings for a deployment in a critical database, and permits directors to assign regulations and deploy and update software program.

Q11. How Do You Backup Ad?

Backing up Active Directory is vital to maintain the right fitness of the AD database.

Windows Server 2003: You can backup Active Directory through the usage of the NTBACKUP device that comes built-in with Windows Server 2003 or use any 3rd-birthday party tool that supports this option.

Windows Server 2008: In Server 2008, there isn’t an option to backup the System State records via the normal backup software. We need to apply the command line to backup Active Directory.

@Open up your command activate via clicking Start, typing “cmd” after which hit Enter.

@In your command spark off, type “wbadmin start systemstatebackup -backuptarget:e:” and press Enter.

@Input “y” and press Enter to begin the backup system.

When the backup method has finished you ought to get a message that the backup finished successfully. If it did now not complete well you may need to troubleshoot.

Q12. Give An Example Of Systems You Have Been Working With As An Administrator?

These generally are: Windows and Linux, which aid either Asset Management or GIS. Typical responsibilities include engineering, assist and maintenance, and studies for the motive of innovation and upgrading.

Q13. What Are The Personal Characteristics Of A System Administrator?

System directors are specialists at handling hardware and software program. They are short with each their hands and their head. They can paintings alone, however they understand when and a way to talk with others, whether to document troubles, study information had to repair issues, or teach personnel regarding technical troubles.

Q14. What Is The Sysvol Folder?

The SYSVOL folder shops the server replica of the domain’s public documents that ought to be shared for commonplace get entry to and replication at some stage in a website.

All AD databases are saved in a SYSVOL folder and it’s most effective created in an NTFS partition. The Active Directory Database is saved in the %SYSTEM ROOTpercentNDTS folder.

Q15. What Are Lingering Objects?

A lingering item is a deleted AD item that also stays on the restored domain controller in its neighborhood copy of Active Directory. They can occur when adjustments are made to directories after machine backups are created.

When restoring a backup report, Active Directory commonly requires that the backup record be no more than 180 days vintage. This can take place if, after the backup was made, the item turned into deleted on some other DC extra than one hundred eighty days ago.

Q16. Differentiate Between Ntfs & Fat?

NTFS is the present day report device used by Windows. It offers functions like security permissions (to limit different users' get right of entry to to folders), quotas (so one consumer can't fill up the disk), shadowing (backing up) and lots of different capabilities that assist Windows.

FAT32 is the older Microsoft filesystem, typically utilized by the Windows 9X line and Window will be installed on a FAT32 parition up to XP. In comparision, FAT32 offers none of what changed into noted above, and also has a most FILE (not folder) length of 4GB, that is kind of small nowadays, specifically with regard to HD video.

Q17. What Is Voip?

VOIP :Short for Voice Over Internet Protocol, a category of hardware and software that allows humans to use the Internet because the transmission medium for smartphone calls via sending voice data in packets using IP in preference to with the aid of traditional circuit transmissions.

Q18. What Is Ldap?

A GLDAP (Light-Weight Directory Access Protocol) determines how an object in an Active Directory must be named. LDAP is the industry trendy directory access protocol, making Active Directory broadly on hand to management and query packages. Active Directory helps LDAPv2 and LDAPv3.

Q19. Why Should You Not Restore A Dc That Was Backed Up 6 Months Ago?

When restoring a backup record, Active Directory commonly calls for that the backup file be no extra than 180 days antique. If you try and restore a backup that is expired, you may face problems because of lingering items.

Q20. What Is Domain Controller?

A domain controller (DC) or community area controller is a Windows-primarily based computer gadget this is used for storing consumer account information in a important database. It is the centrepiece of the Windows Active Directory provider that authenticates users, shops user account records and enforces protection policy for a Windows domain.

A area controller allows gadget administrators to grant or deny customers get admission to to system resources, which includes printers, documents, folders, network locations, and so on., via a unmarried username and password.

Q21. What Is Apipa?

Stands for Automatic Private IP Addressing

APIPA is a DHCP fail over mechanism for neighborhood networks. With APIPA, DHCP customers can attain IP addresses whilst DHCP servers are non-useful. 

APIPA exists in all cutting-edge versions of Windows except Windows NT. When a DHCP server fails, APIPA allocates IP addresses within the personal range 169.254.0.1 to 169.254.255.254.

Q22. What Is A Domain?

A domain is described as a logical group of community objects (computers, customers, devices) that percentage the equal Active Directory database. A tree can have multiple domain names.

Q23. What Do Forests, Trees, And Domains Mean?

Forests, bushes, and domain names are the logical divisions in an Active Directory community.

A area is described as a logical institution of network gadgets (computer systems, customers, devices) that percentage the equal active directory database.

A tree is a group of 1 or more domains and domain timber in a contiguous namespace related in a transitive accept as true with hierarchy.

At the pinnacle of the shape is the wooded area. A woodland is a group of trees that share a common international catalog, directory schema, logical structure, and directory configuration. The wooded area represents the safety boundary within which customers, computer systems, organizations, and other objects are available.

Q24. What Is Garbage Collection?

Garbage collection is the net defragmentation of the Active Directory which happens each 12 hours.

Q25. What Is Proxy Server?

A proxy server is a computer that acts as a gateway between a local network (e.G., all of the computer systems at one corporation or in a single constructing) and a bigger-scale community together with the Internet. Proxy servers offer elevated overall performance and security. In some instances, they monitor personnel' use of outdoor assets.

Q26. What Is Group Policy?

Group Policy allows you to enforce particular configurations for users and computer systems. Group Policy settings are contained in Group Policy objects (GPOs), that are related to the subsequent Active Directory provider boxes: web sites, domains, or organizational units (OUs).

Q27. What Are Main Email Servers And Which Are Their Ports?

Email servers can be of two types:

Incoming Mail Server (POP3, IMAP, HTTP): The incoming mail server is the server related to an email address account. There cannot be multiple incoming mail server for an e-mail account. In order to download your emails, you should have an appropriate settings configured on your electronic mail purchaser application.

Outgoing Mail Server (SMTP): Most outgoing mail servers use SMTP (Simple Mail Transfer Protocol) for sending emails. The outgoing mail server can belong to your ISP or to the server wherein you setup your electronic mail account.

The fundamental e mail ports are:

POP3 – port a hundred and ten

IMAP – port 143

SMTP – port 25

HTTP – port eighty

Secure SMTP (SSMTP) – port 465

Secure IMAP (IMAP4-SSL) – port 585

IMAP4 over SSL (IMAPS) – port 993

Secure POP3 (SSL-POP) – port 995

Q28. Why Do We Use Dhcp?

Dynamic Host Configuration Protocol assigns dynamic IP addresses to community devices letting them have a distinctive IP cope with every time they're linked to the network.

Q29. What Experience Do You Have With Hardware Components?

Installation and substitute are a number of the most regularly done operations with hardware. Sometimes a device administrator may want to rebuild a hardware issue.




CFG