Here are the basic steps to install an operating system from a server to multiple client systems:1. Prepare the server:- Install the OS (e.g. Windows, Linux) on the server. Configure it fully.- Install imaging/deployment software like Microsoft Deployment Toolkit (MDT), Clonezilla, etc. 2. Prepare the client systems:- Make sure the clients meet minimum hardware requirements.- Install PXE/network boot card or enable PXE/network boot in BIOS if needed.3. Create the reference image: - Capture/create an image of the configured server OS using imaging software.4. Deploy the image
Similar to Here are the basic steps to install an operating system from a server to multiple client systems:1. Prepare the server:- Install the OS (e.g. Windows, Linux) on the server. Configure it fully.- Install imaging/deployment software like Microsoft Deployment Toolkit (MDT), Clonezilla, etc. 2. Prepare the client systems:- Make sure the clients meet minimum hardware requirements.- Install PXE/network boot card or enable PXE/network boot in BIOS if needed.3. Create the reference image: - Capture/create an image of the configured server OS using imaging software.4. Deploy the image
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)David Sweigert
Similar to Here are the basic steps to install an operating system from a server to multiple client systems:1. Prepare the server:- Install the OS (e.g. Windows, Linux) on the server. Configure it fully.- Install imaging/deployment software like Microsoft Deployment Toolkit (MDT), Clonezilla, etc. 2. Prepare the client systems:- Make sure the clients meet minimum hardware requirements.- Install PXE/network boot card or enable PXE/network boot in BIOS if needed.3. Create the reference image: - Capture/create an image of the configured server OS using imaging software.4. Deploy the image (20)
Here are the basic steps to install an operating system from a server to multiple client systems:1. Prepare the server:- Install the OS (e.g. Windows, Linux) on the server. Configure it fully.- Install imaging/deployment software like Microsoft Deployment Toolkit (MDT), Clonezilla, etc. 2. Prepare the client systems:- Make sure the clients meet minimum hardware requirements.- Install PXE/network boot card or enable PXE/network boot in BIOS if needed.3. Create the reference image: - Capture/create an image of the configured server OS using imaging software.4. Deploy the image
1. 1) What is Active Directory?
A central component of the Windows platform, Active Directory directory service provides the means to manage the
identities and relationships that make up network environments. For example we can create, manage and administrator
users, computers and printers in the network from active directory.
2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS? What are A records and
mx records?
DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer
understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign
names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP
address (number) and it executes our request.
Forward lookup: Converting names to IP address is called forward lookup.
Reverse lookup: Resolving IP address to names is called reverse lookup.
'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of
which DNS can find out the IP address of a name.
'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is
also found in DNS.
3) What id DHCP? Why it is used? What are scopes and super scopes?
DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network
environment. This makes the IP management very easy.
Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use
to communicate with the other PCs in the network.
Superscope: When we combine two or more scopes together its called super scope.
4) What are the types of LAN cables used? What is a cross cable?
Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can
support 1Gbps of speed.
Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.
5) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the
LAN cable?
The way the paired wires are connected to the connector (RJ45) is different
in cross cable and normal LAN cable.
The theoretical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal.
6) What would you use to connect two computers without using switches?
Cross cable.
7) What is IPCONFIG command? Why it is used?
2. IPCONFIG command is used to display the IP information assigned to a computer. From the output we can find out the IP
address, DNS IP address, gateway IP address assigned to that computer.
8) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available?
When DHCP server is not available the Windows client computer assigns an automatic IP address to itself so that it can
communicate with the network computers. This ip address is called APIPA. ITs in the range of 169.254.X.X.
APIPA stands for Automatic private IP addressing. Its in the range of 169.254.X.X.
9) What is a DOMAIN? What is the difference between a domain and a workgroup?
Domain is created when we install Active Directory. It's a security boundary which is used to manage computers inside the
boundary. Domain can be used to centrally administrator computers and we can govern them using common policies called
group policies.
We can't do the same with workgroup.
10) Do you know how to configure outlook 2000 and outlook 2003 for a user?
Please visit the link below to find out how to configure outlook 2000 and outlook 2003. IT: Help Desk: Quick Guide:
Configuring Outlook 2003 for Exchange Server
11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express?
PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached
exchanged mode. Outlook express used odb file.
12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it?
BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a
blue screen with a code. Best way to resolve it is to boot the computer is "Last known good configuration".
If this doesn't work than boot the computer in safe mode. If it boots up than the problems with one of the devices or drivers.
13) What is RIS? What is Imaging/ghosting?
RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install
the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does
the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or
imaging/ghosting because installing OS every time using a CD can be a very time consuming task. So to save that time we
can go for RIS/Ghosting/imaging.
14) What is VPN and how to configure it?
VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the resources like mail
and files in the LAN. VPN can be configured using the steps mentioned in the KB: How to configure a VPN connection to
your corporate network in Windows XP Professional
15) Your computer slowly drops out of network. A reboot of the computer
fixes the problem. What to do to resolve this issue?
Update the network card driver.
16) Your system is infected with Virus? How to recover the data?
3. Install another system. Install the OS with the lates patches, Antivirus with latest updates. Connect the infected HDD as
secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system.
17) How to join a system to the domain? What type of user can add a system to the domain?
Please visit the article below and read "Adding the Workstation to the
Domain" http://www.microsoft.com/technet/pro...003/technol /directory/
18) What is the difference between a switch and a hub?
Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.
19) What is a router? Why we use it?
Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across
but it uses the routing protocols to do so.
20) What are manageable and non manageable switches?
Switches which can be administered are called manageable switches. For example we can create VLAN for on such switch.
On no manageable switches we can't do so.
Q. What are the main differences between the following operating systems?
A. Unfortunately, most companies have not been able to standardize the operating systems used by users. It’s always critical that you
know more than just the current version because there will always be a user who has a problem with an older version. By asking this
question, the hiring manager is actually testing your knowledge of different operating systems that you may need to support. The
following provides a concise summary of some of the major differences.
Windows 2000 and XP
Overall, XP is a minor update with Windows 2000 designed to get Windows 2000 technology into the hands of consumers. The
major changes include the following:
Device driver rollback
Remote control (single-user terminal services)
New Start menu, control panel, and user interface elements
Fast user switching
Encrypted file system support for redirected folders
Better support for roaming wireless networking
Enhanced policies
Credential Manager
Personal firewall
Q. What are typical virus sources and how do you prevent virus attacks?
A. This is virus protection 101 just to ensure that you understand the basics of protecting against viruses. Possible virus sources
include e-mail attachments, Internet downloads, and infected floppy disks. To prevent virus infections:
Use anti-virus software.
Perform regular updates to the virus software definition files and scan engines. Verify updates have succeeded.
Perform regularly scheduled virus checks.
Configure software to check all files, not just program files.
Educate users on virus attacks, their consequences, and how to prevent them.
Know where all software came from.
Do regular backups.
4. Develop reporting mechanisms to inform server administrators of observed desktop infections and how these could impact
the server environment (such as deletions or corruption of files on public shares, hidden payload files that might have been
uploaded to servers, and so on).
What is difference between win XP and wn 7 technically
Disk shrinking and extending is available in windows 7
Start up and shutdown will be fast
user defined theme
a program called psr is available
Answered by: SHAMIM HAIDER on: Apr 28th, 2012
Many differences in win xp and win7..
1) ip6 version not include in winxp
2) net meeting not include in win7.
3) driver automatic install.
4) both OS installation different types.
5) win7display look better than winxp
Connectivity troubleshooting
A user in a corporate network contacts service desk saying he/she has lost network connectivity: how will you troubleshoot the
issue? What are the steps to followed?
Answered by: shajan on: May 2nd, 2012
If the user getting limited connectivity(APIPA ip address)..We need to check with the
ipconfig /release and ipconfig /renew commands
Answered by: Javed Khan on: Apr 16th, 2012
Check LAN Cable
check ip address
check firewall setting
than ping ip , gateway and dns
How to install os from server to all system?
7 answers
We can RIS service in Windows Server 2003SP1 and WDS Services Windows serve 2003SP2 and also WDS in Windows server 2008.
but we have .inf file of all systems of a network those boot from network.
so we can easily install from Server.
Ntldr error meaning
When I boot my computer I have seen on my screen " verifying dmi pool data" and then after second line is shown "ntldr is
missing..." what is this problem and who can I solve it.
If NTLDR is missing then we can copy from Cd (i386) to Systems 32.
1st we can boot from CD and choose the option of repair windows then we can use command of Copy D:i386NTLDR
C:windowsSystems32.
For Example our CDDVD drive is D:.
Ntldr file corrupt or missing you have to copy ntldr from windows xp i386 Folder
How to install operating system in usb pen drive?
First create usb bootable to pen drive, then select first boot device (usb device) from bios
Step 1. Format the USB Flash Disk Run CMD (elevated) and type: 1. diskpart 2. list disk (*now find your USB disk number, youll find
it by its size) 3. select disk 1 (*if your USB is disk 1)...
5. What is difference between msi and exe file ?
There is no relationship between an MSI file and an .EXE file. An .exe file, like a .com file is produced when source code is complied
and creates a Windows executable program. An .MSI file is a file...
Answered by: Jisthi Khan on: Feb 21st, 2012
MSI file is only for installation purpose. EXE file can be anything that executes on windows.
******Microsoft outlook pst file size limit********
What is the pst size limit in outlook97, 2000, 2003, 2007 and 2010?
In Outlook 2002 and earlier, the .pst files are in the American National Standards Institute (ANSI) format, and the overall size has a
limit of 2 GB. In Outlook 2003 and after, the .pst files are in ...
MS outlook in 2003 and 2007 is 2GB, in 2010 is 50GB
******Blue screen death***************
What is a blue screen of death ? How do you trouble shoot the computer in such situation ?
1) First check blue screen error number, is it Application Or Hardware
2) Generally this problem comes when problem in RAM so First check computer start with another RAM
First Step is Remove the RAM and Clean with a rubber on the copper part of the RAM and insert back again and have a check. If
the problem is still there then check the hardware parts of the Computer.
*******How a virus program destabilize ms windows XP************
What is the mechanism of combating those malicious program? Evaluate each technique
Follow these steps
1)Run ->Cmd
2)Type netsh
3)Firewall
4)Now type in "set opmode enable" to start firewall and "set opmode disable" to stop fire wall.
By corrupting, or deleting data