SlideShare a Scribd company logo
Q: What are LingeringObjects?
A: A lingeringobjectisa deletedADobjectthatstill remainsonthe restoreddomaincontrollerinits
local copy of Active Directory.Theycanoccur whenchangesare made to directoriesaftersystem
backupsare created.
Whenrestoringa backupfile,Active Directorygenerallyrequiresthatthe backupfile be nomore than
180 daysold.Thiscan happenif,afterthe backup wasmade,the objectwasdeletedonanotherDC
more than 180 daysago.
Q: How can we remove Lingering Objects?
A: WindowsServer2003 and 2008 have the abilitytomanuallyremove lingeringobjectsusingthe
console utilitycommandREPADMIN.EXE.
4) What are Group Policies?
Ans: Group policiesare usedbyadministratorstoconfigure andcontrol userenvironmentsettings.
Group PolicyObjects(GPOs) are usedtoconfigure grouppolicieswhichare appliedtosites,domains,
and organizational units(OUs).Settingsthatdothe followingmaybe appliedwithgrouppolicy:Manage
userenvironments - Wallpaperandothersettings.Manage scripts - Logon/logoffandstartup/shutdown
scripts.Manage security - Eventlogsettings,accountpolicies,andmore.Manage software deployment -
Applicationsmaybe automaticallyinstalledwhenthe clientcomputerstarts.Redirectfolders - Folders
on a local computermay be redirectedtoa networkshare.
ComputerSecurityDo’sandDon’ts
Do’s:
1) Shut downyourcomputers andlaptopswhenyouare not usingmore than 3 hoursand whenyou
are leavingoffice.
2) Lock your computerswhennotinuse.
3) Dailycheckyour ComputerandLaptopsfor Antivirusupdationforcurrentdate.
4) Daly checkyourBackup status.
5) Create strongpasswordsthat are at leasteightcharacterslong,andincludingatleasta numerical
value anda symbol,suchas #, to foil password-crackingsoftware.Avoidcommonwords,andnever
disclose apasswordonline.
6) Change your passwordeveryninetydays.
7) Performregularbackupsof importantdata.
8) Create a passwordforyourfilesinorderto protectfile sharingactivities.
9) Physicallysecure yourlaptop.
10) Delete anymessage thatreferstogroupsor organizationsthatyouare not a part of.
11) Neverclickona linkfroman untrustedsource.
12) Be certainthat whenyouleave the cybercafé computeryouhave deletedeverythingyousavedto
the desktop.make sure youpermanentlydelete all personal filesfromthe cybercafé computer.
13) Make sure that you logout of everysite you've loggedinto.Thiscan include webbrowsers,instant
messagingclientsandftpsites.
14) Many browserswill offertostore yourusername and passwordwhenyoulogin,be sure not to
allowit.
15) Close windowscontainingpop-upadsorunexpectedwarningsbyclickingonthe “X”buttoninthe
uppermostright handcorner of that window,notbyclickingwithinthe window.
DON’TS
1) Pluginyour personal deviseslike Smartphones,USBdevises,MP3Playerstocomputersand
laptops.
2) Neverwrite downyourpassword.EspeciallyonaPost-Itnote stuckto yourcomputer!
3) Nevergive outyourpasswordto anyone,whetheryouknow themornot.
4) Neverselectthe "RememberMyPassword"option.Manyapplicationsdonotstore them
securely.
5) Neverpurchase anythingpromotedinaspammessage.Evenif the offerisn’tascam, you are
onlyhelpingtofinance andencourage spam.
6) Please refrain fromopeningane-mail attachment,evenfromsomeone youknow well,unless
youwere expectingit.
7) Avoidcreatingcommonpasswordssuchas yourname,social security,UNI,etcetera.
8) Do notleave yourlaptopunattended,evenforafew minutes.
9) Neverreplytoe-mail(s) requestingfinancial orpersonal information.
10) Avoidopeninge-mail(s) ore-mail attachmentsfromanunknownsender.
11) Under nocircumstancesshouldyouinstall oruse piratedcopiesof software.
12) Do not install P2Pfile sharingprogramswhichcanillegallydownloadcopyrightedmaterial.
13) Neversetyoure-mail programto"auto-open"attachments.
14) Do not leave sensitiveinformationlyingaroundthe office,Don’tleaveprintoutscontaining
confidentialinformationonyourdesk,locktheminyourdrawer,it’sveryeasyfor a visitortosee
confidentialdocuments.
421. What is AccessControl List(ACL)?
Answer
ACL isa listof all the useraccounts and groupsthat have beengrantedordeniedaccess toa file ora
folder.Whenauserattemptsto gainaccess to a resource,the ACLmust containan accesscontrol entry
for the useraccount or a group to whichthe userbelongs.
422. What are effectivepermissionsforaresource?
Answer
Effective permissionsforaresource are the sum of the NTFSpermissionsthatyouassignto the
individualuseraccountandgroupsto whichthe userbelongs.
423. Do file permissionsoverridefolderpermissions?
Answer
Yes,NTFS file permissionstake priorityoverNTFSfolderpermissions.
424. If youdo not have the permissiontoaccessthe folderbuthave the permissiononthe file,then
howwill youaccessthe file?
Answer
You needtoknowthe full pathof the file toaccessit whenyoudo nothave a folderlevel permission.
425. Doesthe Denypermissionoverride all permissions?
Answer
Yes,the Denypermissionoverridesall the otherpermissions.
426. ExplainNTFSpermissionsinheritance?
Answer
NTFSpermissionsinheritance impliesthatthe permissionsassignedtoa parent folderare inheritedand
propagatedtothe subfoldersandfilescontainedinthe parentfolder.
427. How can you preventpermissioninheritance?
Answer
You can preventpermissioninheritance bysettinganoptionof preventinginheritance atparentfolder
level.
428. Where do permissionsassignedtoCREATOROWNER groupapply?
Answer
The permissionsassignedtothe CREATOROWNERgroup applyonlytothe filesandthe subfoldersinthe
foldertowhichpermissionsare assignedandnottothe folderitself.
429. List the basicguidelinestofollow whileassigningNTFSpermissions?
Answer
Followingare the basicguidelines:
Grant usersonlythe level of accesstheyrequire.
Assigngroupmembershipbasedonaccessto resources.
Denypermissionsonlywhenitisessential.
430. If an employeeleavesanorganization,whatshouldbe done totransferthe ownershipof his/her
filesandfolderstoanotheremployee?
Answer
You shouldperformthe followingstepsforthis:
Log in as administrator,
Assignownershippermissions toanotheremployee,
Notifythe employee thathe/shehasbeengivenspecial permissionstotake ownershipof filesand
foldersof the ex-employee.
431. Which special permissionenablesyoutobrowse throughafolder,if youdonot have permissionto
access it?
Answer
If you do nothave permissiontoaccessa folder,thenthe Traverse Folderpermissionenablesyouto
browse throughthe folder.
432. Name the groups youmustbe a memberof to share a folder?
Answer
You mustbe a memberof the Administrator,ServerOperator,orPowerUsersgroupto share a folder.
433. What are the differentwaysinwhichausercan connectto a sharedfolder?
Answer
A usercan connectto a sharedfolderbyusingthe followingtools:
Map NetworkDrive Wizard,
AddNetworkPlace Wizard,
The Run command,
My NetworkPlaces.
434. Where doesthe Administratorsgroupshare the folder?
Answer
The Administratorgroupsharesthe folderresidingonanycomputerinthe domain.
435. Where doesthe ServerOperatorgroupshare the folder?
Answer
The ServerOperatorgroupsharesthe folderondomaincontrollers.
436. Where doesthe PowerUsersgroup share the folder?
Answer
The PowerUsers groupsharesthe folderonthe computerwhere the groupis located.
437. List the stepsto share the host drive withvirtual machines?
Answer
Performthe followingstepstoshare the hostdrive withvirtual machines:
ClickWindowsVirtual PCfromthe Startmenuand Openthe Virtual Machinesfolder.
Right-clickthe name of the virtual machine fromthe Virtual Machinesfolder.
Clickthe Settingsoption.The WindowsVirtual PCSettingswindowappears.
ClickIntegrationFeaturesInthe leftpane of the WindowsVirtual PCSettingswindow andthenclick
Drivesonthe rightpane of the window.
Reviewthe listof drives andclickthe checkbox of any drive thatyou wantto share.
Clickthe OK button.
438. What is the functionof Access-basedEnumeration?
Answer
Access-basedEnumerationpermitsthe userstoview onlythose filesandfoldersonafile serverto
whichthey have permissiontoaccess.
439. What is a printserver?
Answer
Printserverisa computeron whichthe printersassociatedwithlocal andnetworkprintdevicesresides.
sectorof the hard disk.The program begins the bootprocessbylookingupthe partitiontable to
determine which partitiontouse forbooting
13) What isBit Locker
.
BitLockerisan encryptionfeature availablein Ultimate andEnterpriseversionsof Windows7andVista,
To encryptan entire drive,simplyright-clickonthe drive and selectTurnonBitLockerfromthe context
menu.
14) Difference b/wsata and IDE.
IDE and SATA are differenttypesof interfacestoconnectstoragedevices(like harddrives) toa
computer'ssystembus.SATA standsforSerial AdvancedTechnologyAttachment (orSerial ATA) andIDE
isalsocalledParallel ATA orPATA.SATA isthe newerstandardand SATAdrivesare fasterthanPATA
(IDE) drives.FormanyyearsATA providedthemostcommonandthe leastexpensiveinterface for
thisapplication.Butbythe beginning of 2007, SATA had largelyreplacedIDEinall new systems.
15)Main Difference BetweenWindowsserver2008 and 2012
1) NewServerManager:Create,Manage ServerGroups
2) Hyper-V Replication :The Hyper-V Replicafeatureallowsyou toreplicate avirtual machine fromone
locationtoanotherwithHyper-Vandanetworkconnection
—
and withoutanysharedstorage required.Thisisabigdeal in the Microsoft worldfordisasterrecovery,
highavailabilityandmore.VMware doesthis,too,butthe vendorchargesnew licenseesextraforthe
capability.
3) ExpandedPowerShellCapabilities
4)IIS8.0 and IIS7 in 2008
5)Hyper-V 3.0
6)PowerShell 3.0
16)How Long My Computer Has BeenRunning? Get to Know My
Computer’sUptime.
Start Task manager, and selectPerformance tab.
In performance tabwe can see systemup time
Method2: By typingsysteminfoincommandprompt we canfindoutuptime of your server
In systemboottime.
17)Event viewerin Windowsserver
Control panel - Administrative tools- ComputerManagement - eventViewer
Three typesevents
Error.
Warning.
Information.
18)
Manage Multiple,Remote ServerswithServer Manager.
ServerManageris a managementconsole inWindowsServer® 2012R2 Preview andWindowsServer®
2012 that helpsITprofessionalsprovisionandmanage bothlocal andremote Windows-based
serversfromtheirdesktops,withoutrequiringeitherphysicalaccesstoservers,orthe needtoenable
Remote Desktopprotocol (RDP)connectionstoeachserver.Although ServerManageris available
inWindowsServer2008 R2 andWindowsServer2008, ServerManagerwasupdatedinWindowsServer
2012, to supportremote,multi-servermanagement,andhelpincrease the numberof servers
anadministratorcanmanage.
19) What happenswhenwe type URL in browser
.
Firstthe computerlooksupthe destinationhost.If itexistsinlocalDNScache,itusesthatinformation.
Otherwise, DNSqueryingisperformeduntil the IPaddressisfound.
Then,yourbrowseropensa TCP connectiontothe destinationhostandsendsthe requestaccordingto
HTTP 1.1 (or mightuse HTTP 1.0,
but normal browsersdon'tdoit any more).
The serverlooksupthe requiredresource (ifitexists) andrespondsusingHTTPprotocol,sendsthe data
to the client(=yourbrowser)
The browserthenusesHTML parserto re-create documentstructurewhichislaterpresentedtoyouon
screen.If itfindsreferencestoexternal resources,suchaspictures,cssfiles,javascriptfiles,theseareis
deliveredthe same wayas the HTML documentitself.
Exportdomainusersand groupsforActive Directory
To export usersfrom Active directory
csvde -f domain.csv -r(objectclass=user) -l "sn,givenname,department,mail"
Export all informationform AD through cmd prompt
csvde -m-f AccountName_mailboxes.txt -r"(&(objectClass=*)(mail=*))" -l
objectClass,member,displayName,memberOf,proxyAddresses,legacyExchangeDN,title,telephoneNumbe
r,facsimileTelephoneNumber,mobile,homephone,givenName,company,userPrincipalName,co,c,physical
DeliveryOfficeName,postalCode,sn,st,streetAddress,title,wWWHomePage,description,l,initials,info,sAM
AccountName
Export only OU informationform AD through cmd prompt
csvde -m-f AccountName_mailboxes.txt -d"OU=,OU=,DC=,DC=,DC=" -r "(&(objectClass=*)(mail=*))" -l
objectClass,member,displayName,memberOf,proxyAddresses,legacyExchangeDN,title,telephoneNumbe
r,facsimileTelephoneNumber,mobile,homephone,givenName,company,userPrincipalName,co,c,physical
DeliveryOfficeName,postalCode,sn,st,streetAddress,title,wWWHomePage,description,l,initials,info,sAM
AccountName
Export Disabledusers from AD in command prompt:
dsqueryuserDC=Domainname,DC=int -disabled -limit1000
dsqueryuserDC=Domainname,DC=int -disabled -limit1000 | dsgetuser-display -samid–email
Export all the usersfrom AD in command prompt:
dsqueryuserDC=Domainname,DC=int -limit1000 >> prakash
Extract Security group userslist, run inpower shell.
netgroup “Group Name”/domain> memberlist.txt
dsquerygroup -name “group name”| dsgetgroup -members>memberlist.txt
For displayingonly securitygroups in domain,run in command prompt.
dsquerygroup -name * -limit0| dsgetgroup -samid-secgrp|find/i "yes">>c:secgrp.txt
Command prompt commands to run setof commands(tasks) in one click
@echooff
cmd.exe /K"dir&& cls && dir && d: && dir"
How can I override blockingof inheritance?
What isPOST?
PowerOnSelf Test,Whenthe computerbootsup,the BIOS
starts to poweroneveryportand device attachedtothe
computerone byone inorderto verifythe availabilityand
the correctnessof the device.
What are the requirementsforinstallingADona new server?
What Is The Functionof ConfigurationPartition?
ConfigurationPartitionisresponsible forReplicationto
all of the Domainsinside the Forest. Configuration partitionitcontainsthe informationof
whole forest.italsostore inexchange informationglobal
settingandsites
Name three bootingfiles?
command.com
msdos.sys
io.sys
1. What stepsare requiredtoperformabare-metal recovery?
1. What isa spindle?(Raid)
2. Disaster Recovery Plan?
What are the benefitsofusingNTFS?
 Betterscalabilitytolarge drives
 Active directorytoviewandcontrol networkresources
 Compressionfeatures
 File encryption
 Permissionsonindividualfilesratherthanjustfolders
 Remote storage
 Recoveryloggingof diskactivities
 Diskqoutas
List the standard NTFS folderpermissions?
 Full control
 Modify
 Readand Execute
 List foldercontent
 Read
 Write
What is AccessControl List (ACL) ?
 ACL isa listof all the useraccounts and groupsthat have beengrantedordeniedaccesstoa file
or a folder.Whenauserattemptstogain accessto a resource,the ACLmustcontainan access
control entryfor the useraccount or a groupto whichthe userbelongs.
Do file permissionsoverride folderpermissions?
 Yes,NTFS file permissionstake priorityoverNTFSfolderpermissions.
If you do not have the permissiontoaccess the folderbut have the permissionon the file,thenhow
will you access the file?
 You needtoknowthe full pathof the file toaccessit whenyoudo nothave a folderlevel
permission.
Does the Denypermissionoverride all permissions?
 Yes
ExplainNTFS permissioninheritance?
 NTFSpermissionsinheritance impliesthatthe permissionsassignedtoa parentfolderare
inheritedandpropagatedtothe subfoldersandfilescontainedinthe parentfolder.
How can you preventpermissioninheritance?
 You can preventpermissioninheritance bysettinganoptionof preventinginheritance atparent
folderlevel.
Where do permissionsassignedtoCREATOR OWNER group apply?
 The permissionassignedtothe CREATOROWNER groupapplyonlyto the filesandthe
subfoldersinthe foldertowhichpermissionsare assignedandnotto the folderitself.
List the basic guidelinestofollowwhile assigningNTFSpermisions
 Grant usersonlythe level of accesstheyrequire
 Assigngroupmembershipbasedonaccessto resources
 Denypermissionsonlywhenitisessential.
If an employee leavesanorganization, what shouldbe done to transferthe ownershipof his/herfiles
and foldersto another employee?
 Log in as administrator
 Assignownershippermissionstoanotheremployee
 Notifythe employee thathe/shehasbeengivenspecial permissionstotake ownershipof files
and foldersof the ex-employee
Whichspecial permissionenablesyouto browse through a folder,ifyou do have permissiontoaccess
it?
 Traverse folderpermission
What is primary and extendedpartition?
 Primarypartitionisan active partitionwhere the hardware looksforbootfilestostartthe
operatingsystem.Extendedpartitioniscreatedfromwhateverfree space remainsonthe disk
aftercreatingthe primarypartition.
Q2. What isInternetSCSI (iSCSI)?
 iSCSIisan industrystandardthat enablestransmissionof Small ComputerSystemInterface
(SCSI) blockcommandsoverthe existingInternetProtocol (IP) networkbyusingthe TCP/IP
protocol.Itprovidesthe possibilityof deliveringbothmessagingtrafficandblock-basedstorage
overexistingIPnetworks,withoutinstallingaseparate andexpensive FiberChannel Network.
Q3. What isSCSI?
 SCSI(Pronouncedasscuzzy) isa setof standardsfor physicallyconnectingandtransferringdata
betweenperipheral devicesandcomputers.

Q4. What isDistributedFile Systemor NetworkFile System (DFS/NFS)?
 DFS/NFSisany file systemthatallowsaccesstomultiple useronmultiple machinestoshare files
and storage resources.
Q5. What technologiesare usedin DFS?
 The two technologiesusedinDFSare DFS NamespacesandDFSreplication.
Q6. What isthe role of DFS Namespaces?
 DFS Namespacesenablegroupingof sharedfolderslocatedondifferent serversintoone or
more logicallystructurednamespaces.
Q7. What isthe role of DFS replication?
 DFS replicationkeepsthe folderssynchronizedbetweenserversacrossnetworkconnections.It
replacesthe File ReplicationServiceasthe replicationengineforDFSNamespaces,aswell asfor
replicatingthe ADDSSYSVOL folderindomainsthatuse the WindowsServer2008 domain
functional level.
Q8. What are Shadow Copiesfor SharedFolders?
 ShadowCopiesforSharedFoldersare point-in-timecopiesof filesthatare locatedonshared
resources,suchas a file server.Userscanview sharedfilesandfoldersastheyexistedatpoints
of time inthe past byusingShadow CopiesforSharedFolders.
Q9. What isthe use of Shadow Copies?
 Recoveryof filesthatare accidentallydeleted
 Recoveryof accidentallyoverwrittenfile
 Comparingdifferentversionsof afile while working
What is File ServerResource Manager?
 File ServerResource Managerisa suite of toolsforwindowsServerthatallowsadministratorsto
control,manage,andunderstandthe quantityandtype of data storedon theirserver.
Q2. What isShare and Storage Management?
 Share and Storage Managementprovidesacentralizedlocationtomanage the followingserver
resources
1. Foldersandvolumesthatare sharedon the network
2. Volumesindisksandstorage subsystems
Q3. What isthe use of Storage Explorer?
 Storage Explorerisusedtoviewandmanage the Fibre Channel andiSCSIfabricsthatare
available inyourStorage AreaNetwork(SAN)
Q4. What isthe use of Storage Manager for SANs?
 Storage Manager for SANsisusedto create and manage Logical UnitNumbers(LUNs) onFibre
Channel andiSCSIdiskdrive subsystemsthatsupportVirtual DiskService (VDS)inSAN.
Q5. What isLUN?
 LUN is logical reference toa portionof a storage subsystems.Itconsistsof adisk,a sectionof a
disk,a whole diskarray,or a sectionof a diskarray in the subsystem.
Q6. What isDisk Management?
 DiskManagementisa utilityformanagingharddisks and the volumesorpartitions.Ithelpsin
initializingdisks,creatingvolumes,andformattingvolumeswiththe FileAllocationTable (FAT),
FAT32, or NewTechnologyFile System(NTFS) filesystems.
Q7. How many types of dynamic volumesare there?
 Simple
 Spanned
 Striped
 Mirrored
 RAID-5
Q8. What are Spanneddisk volumes?
 Spanneddiskvolumescombine areasof unallocatedspace frommultiple disksintoone logical
volume.Theyrequire minimumof twodisks;however,youcanuse up-to32 disks
Q9. What isstriped diskvolume?
 Stripeddiskvolumesare made upof stripesof dataof equal size writtenacrosseachdiskinthe
volumes.Theyare createdfromequallysized,unallocatedareasontwoor more disks.If one of
the diskscontainingastripedvolume fails,the entirevolume fails,andall dataon the striped
volume becomesinaccessible.
Q10. What is mirroredvolume?
 A mirroredvolume providesacopyof a volume onanotherdisk.Thisisa fault-tolerantvolume,
whichprovidesdataredundancybyduplicatingthe informationcontainedonthe volume.The
twodisksthat make up a mirroredvolume are knownasmirrors.
Q11. What is RAID-5 volume?
 RAID-5volumesare available onlyoncomputersrunningthe Windows200Serverfamilyor
WindowsServer2003. It stripesdata andparityacross three or more disks.Parityisa calculated
value usedtoreconstructdata if one diskfails.Whena diskfails,WindowsServer2003
continuestooperate byrecreatingthe datathat was on the faileddiskfromthe remainingdata
and Parity.
What is DFS name Space?
A DFS namespace isa virtual viewof sharedfolderslocatedondifferentserversinanorganization.
Users can navigate the namespace withoutneedingtoknow the servernamesorsharedfoldershosting
the data. Whena user viewsthe namespace,the foldersappearinasingle,virtual namespace.
What is Domain-basednamespace?
A domain-basednamespaceisstoredonone or more namespace serversandinActive Directory
DomainServices.Youcan increase the availabilityof adomain-basednamespacebyusingmultiple
servers.WhencreatedinWindowsServer2008 mode,the namespace supportsncreasedscalabilityand
access-basesenumeration.
What is stand-alone namespace?
A stand-alone namespace isstoredonasingle namespace server.Youcanincrease the availabilityof a
stand-alone namespace byhostingonafailovercluster.
NOTE:
1. Changesto the DFS namespace are made onone domaincontrollerthathasthe role PDC
Emulator,thisensuresthatmultiplechangesare notmade indifferentplaces.
2. If you have a lot of DFS serversonyournetwork,this will create lotsof network trafficandwill
create lotsof workloadon the PDC Emulator
3. Microsoftrecommendfewerthan16 namesspace servers.
29. What’s the difference between standalone andfault-tolerantDFS(DistributedFile System)
installations?The standaloneserverstoresthe Dfsdirectorytree structure ortopologylocally.Thus,if a
sharedfolderisinaccessible orif the Dfsroot serverisdown,usersare leftwithnolinktothe shared
resources.A fault-tolerantrootnode storesthe Dfstopologyinthe Active Directory,whichisreplicated
to otherdomaincontrollers.Thus,redundantrootnodesmayinclude multiple connectionstothe same
data residingindifferent sharedfolders.
30. We’re usingthe DFSfault-tolerantinstallation,butcannotaccessit froma Win98 box.Use the UNC
path,not client,only2000 and2003 clientscanaccessServer2003 fault-tolerantshares.
31. Where exactlydofault-tolerantDFSsharesstore informationinActive Directory?InPartition
KnowledgeTable,whichisthenreplicatedtootherdomaincontrollers.
32. Can you use Start->Search with DFS shares? Yes.
33. What problemscanyouhave withDFS installed?Twousersopeningthe redundantcopiesof the file
at the same time,withnofile-lockinginvolvedinDFS,changingthe contentsandthensaving.Onlyone
file will be propagatedthroughDFS.
34. I run MicrosoftClusterServerandcannotinstall fault-tolerantDFS.Yeah,youcan’t.Install a
standalone one.
what is file server. and how to configure ?
A File Serverisacomputerattachedto a networkthat has
the primarypurpose of providingalocationforthe shared
storage of information(suchasdocuments,soundfiles,
photographs,movies,images,databases,etcetera) thatcan
be accessedby the workstationsthatare attachedto the
network.AsdistinguishedfromTimesharingoraMainframe
(where acentral computerprovidescalculationresources
for "dumb"terminals) aFile Serverisdesignedprimarily
to enable the rapidstorage andretrieval of datawhere the
heavycomputationisprovidedbythe workstations.
16) OSI model & protocolsin each layer?
Ans: The OSI model describesa fixed,sevenlayerstack for networkingprotocols.
7. APPLICATION:HTTP, SMTP, SNMP,FTP, Telnet,ECHO, SIP, SSH, NFS,RTSP, XMPP,Whois,ENRP
6. PRESENTATION: XDR, ASN.1, SMB, AFP,NCP.
5. SESSION: ASAP,TLS, SSL, ISO 8327 / CCITT X.225, RPC, NetBIOS,ASP. Establishing& managing
sessions.
4. TRANSPORT: TCP, UDP, RTP, SCTP, SPX, ATP, IL. This layeris for flow control.
3. NETWORK: IP,ICMP, IGMP,IPX, BGP,OSPF, RIP, IGRP,EIGRP, ARP, RARP, X.25. Router works on
network layer.Connectingover a network.
2. DATA LINK: Ethernet, Tokenring, HDLC, Frame relay,ISDN, ATM, 802.11 WiFi,FDDI, PPP. Switch
works on this layer.
1. PHYSICAL:10BASE-T, 100BASE-T, 1000BASE-T, SONET/SDH, T-carrier/E-carrier, various 802.11
physical layers. Hubs & repeatersoperate on this layer.
TCP/IP model:
4 Application:DNS , TFTP , TLS/SSL, FTP, HTTP , IMAP , IRC , NNTP,POP3 ,SIP ,SMTP,SNMP,SSH
,TELNET ,ECHO ,Bit Torrent, RTP , PNRP , rlogin, ENRP, …
Routing protocols like BGPand RIP , which for a variety of reasons run over TCP and UDP respectively,
may also be consideredpart of the applicationor network layer.
3 Transport: TCP ,UDP ,DCCP,SCTP ,IL ,… Routing protocolslike OSPF , which run over IP, may also be
consideredpart of the transport or networklayer. ICMP and IGMPrun overIP may be consideredpart
of the networklayer.
2 Network:IP , ARP and RARP operate underneathIP but above the linklayer so theybelong
somewhere inbetween.
1 Link: Ethernet, Wi-Fi ,Token ring , PPP, SLIP , FDDI , ATM , Frame Relay,SMDS , …
17) What isping?
Ans: Packet internetgropher & it uses ICMPprotocol. It is usedto check connectivityto an IP or PC
name. try ping command on your PC & check for replies.
what is ping (packet internetgropher) & its protocol (ICMP) -- ping is usedto check connectivityto an
IP
26) Boot sequence ofPC?
Ans: For System Boot Sequence gothrough this:
The systemBIOS iswhat starts the computer runningwhen you turn it on. The followingare the steps
that a typical boot sequence involves. Ofcourse this will vary by the manufacturer of your hardware,
BIOS, etc., and especiallybywhat peripheralsyouhave in the PC. Here iswhat generallyhappens
whenyou turn on your systempower:
1. The internal powersupply turns on and initializes.The powersupply takes some time until it can
generate reliable powerfor the rest of the computer,and havingit turn on prematurelycould
potentiallyleadto damage. Therefore,the chipsetwill generate a resetsignal to the processor (the
same as if you heldthe reset button down for a while on your case) until it receivesthe Power Good
signal from the power supply.
2. Whenthe resetbutton is released,the processorwill be ready to start executing.Whenthe
processor firststarts up, it is suffering fromamnesia; there is nothingat all in the memory to execute.
Of course processormakers know this will happen,so they pre-program the processor to always look
at the same place inthe systemBIOS ROM for the start ofthe BIOS boot program. This is normally
location FFFF0h,right at the end of the system memory.They put it there so that the size of the ROM
can be changed withoutcreating compatibilityproblems.Since there are only16 bytesleftfrom there
to the endof conventional memory,this location just contains a "jump" instructiontellingthe
processor where to go to findthe real BIOS startup program.
3. The BIOS performsthe power-onselftest(POST). Ifthere are any fatal errors, the boot process
stops. POST beepcodescan be foundin this area of the TroubleshootingExpert.
4. The BIOS looksfor the videocard. In particular, it looks for the videocard's builtin BIOS program
and runs it. This BIOS isnormally foundat location C000h in memory.The system BIOS executesthe
videocard BIOS, which initializesthe videocard. Most moderncards will displayinformationon the
screenabout the videocard. (Thisis why on a modernPC you usually see somethingonthe screen
about the videocard before you see the messagesfrom the systemBIOS itself).
5. The BIOS thenlooks for other devices' ROMsto see if any of them have BIOSes. Normally,the
IDE/ATA hard diskBIOS will be found at C8000h and executed.Ifany otherdevicesBIOSes are found,
they are executedaswell.
6. The BIOS displaysits startup screen.
7. The BIOS doesmore testson the system,includingthe memorycount-up test whichyou see on the
screen.The BIOS will generallydisplaya texterror message on the screenif it encountersan error at
this point;these error messages and theirexplanationscan be foundin this part of the
TroubleshootingExpert.
8. The BIOS performsa "systeminventory" ofsorts, doingmore tests to determine what sort of
hardware is in the system.ModernBIOSes have many automatic settingsand will determine memory
timing(for example) basedon what kind of memoryit finds.Many BIOSescan also dynamicallyset
hard drive parameters and access modes,and will determine these at roughly thistime. Some will
displaya message on the screenfor each drive they detectand configure this way. The BIOS will also
now search for and label logical devices(COMand LPT ports).
9. If the BIOS support the Plug and Play standard, it will detect and configure Plugand Play devicesat
this time and display a message on the screenfor each one it finds.See here for more detailson how
PnP detectsdevicesand assignsresources.
10. The BIOS will display a summary screenabout your system'sconfiguration.Checkingthis page of
data can be helpful indiagnosingsetup problems,although it can be hard to see because sometimesit
flasheson the screenvery quicklybefore scrollingoffthe top.
11. The BIOS beginsthe search for a drive to boot from. Most modern BIOSescontain a settingthat
controls ifthe systemshould firsttry to boot from the floppydisk (A:) or firsttry the hard disk (C:).
Some BIOSes will evenletyou boot from your CD-ROM drive or other devices,dependingonthe boot
sequence BIOSsetting.
12. Having identifieditstarget boot drive,the BIOS looksfor boot informationto start the operating
systemboot process. If it is searchinga hard disk, it looksfor a master boot record at cylinder0, head
0, sector1 (the first sector on the disk);if it issearching a floppy disk,it looks at the same addresson
the floppydisk for a volume boot sector.
13. If it findswhat it islooking for,the BIOS starts the processof booting the operating system,using
the informationin the boot sector. At this point, the code in the boot sector takes over from the BIOS.
The DOS boot process is describedindetail here.If the firstdevice that the system tries(floppy,hard
disk,etc.) is not found,the BIOS will then try the nextdevice in the boot sequence,and continue until
it findsa bootable device.
14. If no boot device at all can be found, the system will normallydisplay an error message and then
freeze upthe system.What the error message is dependsentirelyonthe BIOS, and can be anything
from the rather clear "Noboot device available" to the very cryptic "NOROM BASIC - SYSTEM
HALTED". This will also happenif you have a bootable hard diskpartition but forget to set it active.
This processis calleda "coldboot" (since the machine was off,or cold,when it started).A "warm
boot" is the same thingexceptit occurs whenthe machine is rebootedusing{Ctrl}+{Alt}+{Delete}or
similar.In this case the POST is skippedand the boot processcontinuesroughly at step 8 above.
27) MBR (master boot record)?
46) How do you convert a drive from FAT/FAT32 to NTFS from the command line?
A) convertc: /fs:ntfs
64) Difference betweenNTFSandFAT32
A)
NTFS FAT32
Allowsaccess local to Win2k,Win2k3,
WinXP,WinNT4withSP4 & latermay get
access for some file.
Fat 32 Allows access to Win95, Win98,
WinMe,Win2k,WinXPon local partition.
Maximumsize of partitionis2 Terabytes
& more.
Maximumsize of partitionisupto2 TB.
MaximumFile size isupto 16TB. MaximumFile size isupto 4 GB.
File & folderEncryptionispossible File & folderEncryptionisnotpossible.
Support255 characters longfile name
FAT support8.3 character file name(
avail.inFAT32)
73) What languages can you use for log-onscripts?
A) JavaScipt,VBScript,DOSbatchfiles(.com, .bat,oreven.exe)
What’sa heartbeat?
A) Communicationprocessesbetweenthe nodesdesignedtoensure node’shealth.
134) Youneedto change and admin password on a clusteredWindowsbox,but that requires
rebootingthe cluster,doesn’tit?
A) No,itdoesn’t.In 2003 environmentyoucando that via cluster.exeutilitywhichdoesnotrequire
rebootingthe entire cluster.
135) Whichadd-onpackage for Windows2003 Server wouldyou use to monitor the installed
software and license compliance?
A) SMS (SystemManagementServer).
136) Whichservice do you use to set up various alerts?
A) MOM (MicrosoftOperationsManager).
137) Whatare the differentEditionsofWindowsServer2003?
Requirement WebEdition
Standard
Edition
Enterprise Edition DatacenterEdition
MinimumCPU
Speed
133 MHz 133 MHz
133 MHz for x86-
based
computers733
MHz for Itanium-
basedcomputers*
400 MHz for x86-
based
computers733
MHz for Itanium-
basedcomputers*
Recommended
CPU Speed
550 MHz 550 MHz 733 MHz 733 MHz
MinimumRAM 128 MB 128 MB 128 MB 512 MB
Recommended
MinimumRAM
256 MB 256 MB 256 MB 1 GB
MaximumRAM 2 GB 4 GB
64 GB for x86-
basedcomputers2
TB for x64 and
ia64 computers
128G for x86-
basedcomputers2
TB for x64 and
ia64 computers
Multiprocessor
Support
Up to 2 Up to 4 Up to 8
Minimum2-
way capable
machine
requiredMaximum
64
DiskSpace
Required
1.2 GB
for Network
Install2.9GB
for
CD Install
1.2 GB
for Network
Install2.9GB
for CD Install
1.2 GB
for Network
Install2.9GB for
CD Install
1.2 GB
for Network
Install2.9GB for
CD Install
WebEdition
 Designedtobe usedprimarilyasanIIS 6.0 Webserver.
 UsedmainlyforbuildingandhostingWebapplications,Webpages,andXMLWeb Services.
 Doesnot require ClientAccessLicensesandTerminal Server mode isnotincluded.However,
Remote DesktopforAdministrationisavailable.
 Supportsa maximumof 4 processorswithsupportfora maximumof 2GB of RAM.
 Onlyversionof WindowsServer2003 that DOES NOTincludesClientNumberlimitationupon
Windowsupdate servicesasitdoesnot require ClientAccessLicenses.
 Cannotact as a domaincontroller
StandardEdition
 Aimedtowardssmall tomediumsizedbusinesses.
 Supportsfile andprintersharing,secure Internetconnectivity,andallowscentralizeddesktop
applicationdeployment.
 Can run onup to 4 processorswithupto 4 GB RAM.
 64-bit versionsare alsoavailableforthe x86-64 architecture (AMD64 and Intel64,called
collectivelyx64byMicrosoft).
 The 64-bit versioniscapable of addressingupto32 GB of RAM.
 64-bit versionsupportsNon-UniformMemoryAccess(NUMA),somethingthe 32-bitversion
doesnotdo.
Enterprise Edition
 A full-functionserveroperatingsystemaimedtowardsmediumtolarge businesses.
 Supportsupto 8 processorsandcan supportupto 32 GB of memorywithadditionof the PAE
parameterinthe initializationfile.
 Providesenterprise-classfeaturessuchaseight-node clusteringusingMicrosoftClusterServer
(MSCS) software.
 Enterprise Editionalsocomesin64-bitversionsforthe Itanium andx64 architectures.
 The 64-bit versioniscapable of addressingupto1 Terabyte (1024 GB) of RAM.
 Both 32-bitand 64-bit versionssupportNon-UniformMemoryAccess(NUMA).
 Alsoprovidesthe abilitytohot-addsupportedhardware.
DataCenterEdition
 Aimedforinfrastructuresdemandinghighsecurityandreliability.
 WindowsServer2003 isavailable forx8632-bit, Itanium, andx64 processors.
 Supportsa minimumof 8 processorsanda maximumof 64 processors& memoryupto 512GB. [
* Whenrun on32-bit architecture Limitedto32 processors& limitsmemoryaddressabilityto
64GB.]
 WindowsServer2003, DatacenterEdition,alsoallowslimitingprocessorandmemoryusage on
a per-applicationbasis.
 SupportsNon-UniformMemoryAccess.
 Supports8-node clustering.
 BettersupportforStorage AreaNetworks(SAN).
Small BusinessServer
 Designedkeepingthe belowgoalsinmindprimarilyforSmall Businesses:
– Provide small businesseswithconnectivityforcollaboration,communication,andmobility.
– Provide simplicityininstallation,management,anduse.
– Provide flexible deploymentfeaturesthatbenefitbothsmall-businesscustomersandtechnology
providers.
 To bettermeetthe variationina largerpopulationof small businesses,WindowsSmall Business
Server2003 isavailable intwoeditions,StandardandPremium.
 StandardEditionisideal forfirst-servercustomerswhoare lookingtoleverage the benefitsof
servertechnologyintheirnetwork,orforcustomersmigratingfroma stand-alone serverto an
integratedtechnologyplatform.
 PremiumEditionisideal forsmall businesseswithmore demandingITneeds,suchasdata-
intensiveline-of-businessapplications,orforcustomerswithmore stringentmonitoringand
managementof Internetservicesandconnectivity.
138) Are there any differencesbetween32-bit,x64, and 64-bit versionsof WindowsServer2003?
A)
Versions 32-bit x86 64-bit x64 64-bit Itanium
Data CenterEditionUp to 32-way, 64 GB RAMUp to 64-way, 1 TB RAM Up to 64-way, 1 TB RAM
Enterprise Edition Up to 8-way,32 GB RAM Up to 8-way,1 TB RAM Up to 8-way,1 TB RAM
Standard Edition Up to 4-way,4 GB RAM Up to 4-way,32 GB RAMn/a
Web Edition Up to 2-way,2 GB RAM n/a n/a
SymmetricMultiprocessing(SMP) support
SMP: The WindowsServer2003 Familysupportssingle ormultiple CPUsthatconformto the SMP
standard.UsingSMP, the operatingsystemcanrunthreadson anyavailable processor,whichmakesit
possible forapplicationstouse multiple processorswhenadditional processingpowerisrequiredto
increase the capabilityof asystem.NewfeaturesincludeSMPlockingperformance,improvedregistry
performance,andincreasedTerminal Serversessions.
139) What’sNew inWindows2003 R2?
A) WithWindowsServer2003 R2, youget the followingimprovements:
 Identityandaccessmanagement
 Branch office servermanagement
 Storage setupand management
 Applicationdevelopmentinsideandoutside yourorganization’straditional boundaries
Thistopic describesthe followingnew componentsthatyoucan install withWindowsServer 2003 R2:
ServerManageability
 AdministrationToolsPacks
 Hardware Management
 MMC 3.0
FeaturesforActive Directory
 Active DirectoryApplicationMode (ADAM)
 Active DirectoryFederationServices
Diskand File ManagementFeatures
 Branch Office:DistributedFileSystem(DFS)
 CommonLog File System(CLFS)
 File ServerManagement
 MicrosoftServicesforNetworkFile System
 Storage ManagementforSANs
 File ServerResource Manager
PrinterandProtocol Support
 PrintManagement
Microsoft.NET Framework
 Microsoft.NET Framework2.0
InternetandE-Mail ServicesandFeatures
 WindowsSharepointServices
UNIX Interoperability
 IdentityManagementforUNIX
 SubsystemforUNIX-basedApplications
140) Whatspecificupdatesare there in 2003 SP2?
A) The updatesare as below:
Clustering
A neweventlogeventhasbeencreatedtoaddresscertainsituationsinwhichthe Clusterservice
account becomesexcessivelyrestrictedbydomainpolicy.The new eventIDis1239. The eventtext
includestroubleshootinginformation.
Data access components
XmlLite isnewwithWindowsServer2003 SP2.XmlLite isa fast,low-level,nativeXMLparserwitha
small memoryfootprint.
Distributedsystems
Newoptionshave beenaddedtothe Dcdiag.exeDomainName System(DNS) teststogenerate XMLtags
whenthe testsare run withthe /test:dnsoption.Itcan be usedto more easilyparse the verbose log
that the DNS testsgenerate.
File systems
Icacls.exe isanupgrade of the Cacls.exe tool inWindowsServer2003 SP2,and can be usedtoresetthe
access control lists(ACLs) onfilesfromRecoveryConsole,andtoback upACLs.Also,
unlike Cacls.exe, Icacles.exe correctlypropagatesthe creationof inheritedACLsandchangesto them.
MicrosoftMessage Queuing
The defaultstorage limitformessage queuinghasbeenchangedto1 gigabyte (GB).If youchoose to
have a storage limitof more than 1 GB, youcan change the storage limitsettinginMicrosoft
ManagementConsole (MMC) onthe General tab of Message QueuingProperties.
Networkingandcommunications
1. Includesanupdate that enablesyoutosimplifythe creationandmaintenanceof InternetProtocol
security(IPsec) policy.Thisupdate enablesyoutouse an IPsec“Simple Policy”.Formostenvironments,
the installationof thisupdate allowsyoutoreduce the numberof IPsecfiltersthatare requiredfora
ServerIsolationdeploymentorfora DomainIsolationdeployment.Youcan reduce the numberof IPsec
filtersfrommanyhundredsof filterstoonlytwofilters.
3. Group Policysupportfornon-broadcastingnetworksandWi-Fi ProtectedAccess2(WPA2) settings
has beenaddedtothe WindowswirelessclientinWindowsServer2003 SP2. Thisupdate allowsthe
Windowswirelessclienttoacceptadditional wirelessGroupPolicyconfigurationoptions.These new
settingsinclude supportforWPA2parametersandnon-broadcastnetworks.
4. The WindowswirelessclientnowsupportsWPA2,whichenablesyoutotake advantage of highlevels
of standards-basedconnectionandencryptionsecurity.New securityfeaturesinclude:
Non-broadcastnetworkprofilesare nowmarkedwithaflagto improve the securityof the Windows
wirelessclient.
Windowswill notautomaticallyconnecttoapeer-to-peernetwork,evenif ithasbeen automatically
savedinthe preferrednetworklist.Youmustmanuallyconnecttoa peer-to-peernetworkprofile.
WindowsDeploymentServices
Remote InstallationServicesisreplacedbyWindowsDeploymentServices.Youcan use Windows
DeploymentServicesto setupnewcomputersthrougha network-basedinstallationwithouthavingto
be physicallypresentateachcomputerand withouthavingtoinstall directlyfromDVDmedia.
What isa “Single label domainname”andwhatsort of issuescanit cause?
What isthe “in-addr.arpa”zone usedfor?
What are the requirementsfromDNStosupportAD?
How doyou manuallycreate SRV recordsinDNS?
Name 3 benefitsof usingAD-integratedzones?
What are the benefitsof usingwindows2012 DNSwhenusingAD-integratedzones?
You installedanewADdomainandthe new (andfirst) DC has notregistereditsSRV recordsinDNS.
Name a few possible causes.
What are the nenefitsandscenariosof usingstubzones?
What are the benefitsandscenariosof usingconditionalforwarding?
What are the differencesbetweenwindowsclustering,networkloadbalancingandRoundRobin,and
scenariosforeachuse?
How doI work withthe hostname cache on a clientcompuer?
How doI clear the DNS cache on the DNS server?
What isthe 224.0.1.24 addressusedfor?
What isWINS andwhendo we use it?
Can youhae a Microsoft-basednetworkwithoutanyWINSserveronit?What are the “considerations”
regardingnotusingWINS?
Describe the differencesbetweenWINSpushandpull replications?
What isthe differencesbeweentombstoningaWINSrecordand simplydeletingit?
Name isthe difference betweentombstoningaWINSrecordand simplydeletingit?
Name the NetBIOSnamesyoumightexpectfromawindows2003 DC that isregisteredinWINS.
Describe the role of the routingtable ona host and ona router
What are routerinterfaces?Whattypescantheybe?
In Windows2003 routing,whatare the interface filters?
What isNAT?
What isthe real difference betweenNATandPAT?
How doyou configure NATonWindows 2003?
How doyou configure NATonWindows2003?
How doyou allowinboundtrafficforspecifichostsonWindows2003 NAT?
What isVPN?What typesof VPN doesWindows2000 and beyondworkwithnatively?
What isIAS?In what scenariosdowe use it?
What isthe difference betweenMixedmodeandnative mode inADwhendealingwithRRAS?
What isthe RASand IASgroup inAD?
What are ConditionsandProfile inRRASpolicies?
What typesor authendicationcanaWindows2003 basedRRAS workwith?
How doesSSLwork?
How doesIPSecwork?
How doI deployIPSecfora large numberof computers?
What typesof authenticationcanIPSecuse?
What isPFS (PerfectForwardSecrecy) inIPSec?
How doI monitorIPSec?
Lookingat IPSec-encryptedtrafficwithasniffer.WhatpackettypesdoI see?
What can you dowithNETSH?
How doI lookat the openportson my machine?
What are Applicationpartition?WhendoIuse them?

More Related Content

What's hot

Hpe Data Protector integration guide
Hpe Data Protector integration guideHpe Data Protector integration guide
Hpe Data Protector integration guide
Andrey Karpov
 
Data Protector 9.07 what is new
Data Protector 9.07 what is new Data Protector 9.07 what is new
Data Protector 9.07 what is new
Andrey Karpov
 
PXE Lot or PXE Lite
PXE Lot or PXE LitePXE Lot or PXE Lite
Must Read HP Data Protector Interview Questions
Must Read HP Data Protector Interview QuestionsMust Read HP Data Protector Interview Questions
Must Read HP Data Protector Interview Questions
Laxman J
 
RH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux CertificationRH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux Certification
Isabella789
 
Active directory job_interview_preparation_guide
Active directory job_interview_preparation_guideActive directory job_interview_preparation_guide
Active directory job_interview_preparation_guideabdulkalamattari
 
TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014
TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014
TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014
Symantec
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsCTIN
 
Dell powervault
Dell powervaultDell powervault
Dell powervault
ssuser1eca7d
 
File server performance on the Intel processor-powered Dell PowerEdge R730xd ...
File server performance on the Intel processor-powered Dell PowerEdge R730xd ...File server performance on the Intel processor-powered Dell PowerEdge R730xd ...
File server performance on the Intel processor-powered Dell PowerEdge R730xd ...
Principled Technologies
 
Mac Forensics
Mac ForensicsMac Forensics
Mac ForensicsCTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3CTIN
 
Better email response time using Microsoft Exchange 2013 with the Dell PowerE...
Better email response time using Microsoft Exchange 2013 with the Dell PowerE...Better email response time using Microsoft Exchange 2013 with the Dell PowerE...
Better email response time using Microsoft Exchange 2013 with the Dell PowerE...
Principled Technologies
 
Lab01 installing-browsing-building
Lab01 installing-browsing-buildingLab01 installing-browsing-building
Lab01 installing-browsing-buildingArun Kumar
 
Benz Star diagnosis transfer from external hdd to internal hdd
Benz Star diagnosis transfer from external hdd to internal hdd Benz Star diagnosis transfer from external hdd to internal hdd
Benz Star diagnosis transfer from external hdd to internal hdd
buyobdii
 
Hpe Data Protector troubleshooting guide
Hpe Data Protector troubleshooting guideHpe Data Protector troubleshooting guide
Hpe Data Protector troubleshooting guide
Andrey Karpov
 
Hpe Data Protector Disaster Recovery Guide
Hpe Data Protector Disaster Recovery GuideHpe Data Protector Disaster Recovery Guide
Hpe Data Protector Disaster Recovery Guide
Andrey Karpov
 
Aspnet mtwaa using_storage_tables_queues_and_blobs
Aspnet mtwaa using_storage_tables_queues_and_blobsAspnet mtwaa using_storage_tables_queues_and_blobs
Aspnet mtwaa using_storage_tables_queues_and_blobsSteve Xu
 
Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drivesCTIN
 

What's hot (19)

Hpe Data Protector integration guide
Hpe Data Protector integration guideHpe Data Protector integration guide
Hpe Data Protector integration guide
 
Data Protector 9.07 what is new
Data Protector 9.07 what is new Data Protector 9.07 what is new
Data Protector 9.07 what is new
 
PXE Lot or PXE Lite
PXE Lot or PXE LitePXE Lot or PXE Lite
PXE Lot or PXE Lite
 
Must Read HP Data Protector Interview Questions
Must Read HP Data Protector Interview QuestionsMust Read HP Data Protector Interview Questions
Must Read HP Data Protector Interview Questions
 
RH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux CertificationRH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux Certification
 
Active directory job_interview_preparation_guide
Active directory job_interview_preparation_guideActive directory job_interview_preparation_guide
Active directory job_interview_preparation_guide
 
TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014
TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014
TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Dell powervault
Dell powervaultDell powervault
Dell powervault
 
File server performance on the Intel processor-powered Dell PowerEdge R730xd ...
File server performance on the Intel processor-powered Dell PowerEdge R730xd ...File server performance on the Intel processor-powered Dell PowerEdge R730xd ...
File server performance on the Intel processor-powered Dell PowerEdge R730xd ...
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Better email response time using Microsoft Exchange 2013 with the Dell PowerE...
Better email response time using Microsoft Exchange 2013 with the Dell PowerE...Better email response time using Microsoft Exchange 2013 with the Dell PowerE...
Better email response time using Microsoft Exchange 2013 with the Dell PowerE...
 
Lab01 installing-browsing-building
Lab01 installing-browsing-buildingLab01 installing-browsing-building
Lab01 installing-browsing-building
 
Benz Star diagnosis transfer from external hdd to internal hdd
Benz Star diagnosis transfer from external hdd to internal hdd Benz Star diagnosis transfer from external hdd to internal hdd
Benz Star diagnosis transfer from external hdd to internal hdd
 
Hpe Data Protector troubleshooting guide
Hpe Data Protector troubleshooting guideHpe Data Protector troubleshooting guide
Hpe Data Protector troubleshooting guide
 
Hpe Data Protector Disaster Recovery Guide
Hpe Data Protector Disaster Recovery GuideHpe Data Protector Disaster Recovery Guide
Hpe Data Protector Disaster Recovery Guide
 
Aspnet mtwaa using_storage_tables_queues_and_blobs
Aspnet mtwaa using_storage_tables_queues_and_blobsAspnet mtwaa using_storage_tables_queues_and_blobs
Aspnet mtwaa using_storage_tables_queues_and_blobs
 
Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 

Viewers also liked

Technical interview questions -networking
Technical interview questions -networkingTechnical interview questions -networking
Technical interview questions -networking
rafiq123
 
Problemas Ambientales Xxxxxxxxx
Problemas Ambientales XxxxxxxxxProblemas Ambientales Xxxxxxxxx
Problemas Ambientales Xxxxxxxxx
bibliomania1720
 
Acordão do STJD sobre o título brasileiro de 1987
Acordão do STJD sobre o título brasileiro de 1987Acordão do STJD sobre o título brasileiro de 1987
Acordão do STJD sobre o título brasileiro de 1987
Cassio Zirpoli
 
Encuesta sobre comida nutritiva
 Encuesta sobre comida nutritiva Encuesta sobre comida nutritiva
Encuesta sobre comida nutritiva
davidgarfias123
 
Doces atraem sábado e domingo ao quartel
Doces atraem sábado e domingo ao quartelDoces atraem sábado e domingo ao quartel
Doces atraem sábado e domingo ao quartel
Câmara Municipal de Coimbra
 
Jovens e dinheiro
Jovens e dinheiroJovens e dinheiro
Jovens e dinheiro
Patrícia Soares
 
JESUS EL CORDERO DE DIOS
JESUS EL CORDERO DE DIOSJESUS EL CORDERO DE DIOS
JESUS EL CORDERO DE DIOS
Gladysmorayma Creamer Berrios
 
Portaria nº 1010 de 5 de novembro de 2009
Portaria nº 1010 de 5 de novembro de 2009Portaria nº 1010 de 5 de novembro de 2009
Portaria nº 1010 de 5 de novembro de 2009
EMBcae consultoria e assessoria educacional
 
Manaul de serviço cbr600 f(3) (2001~) ctracapa
Manaul de serviço cbr600 f(3) (2001~) ctracapaManaul de serviço cbr600 f(3) (2001~) ctracapa
Manaul de serviço cbr600 f(3) (2001~) ctracapaThiago Huari
 
Jesucristo
JesucristoJesucristo
Jesucristoluisguil
 
Grandma's Bread Bowl article and recipe
Grandma's Bread Bowl article and recipeGrandma's Bread Bowl article and recipe
Grandma's Bread Bowl article and recipeCarol Butler
 
Chamada do futebol de domingo!
Chamada do futebol de domingo!Chamada do futebol de domingo!
Chamada do futebol de domingo!
Michel Victor
 
Aborto
AbortoAborto
01 discriminação auditiva
01 discriminação auditiva01 discriminação auditiva
01 discriminação auditiva
Eleonora Moita
 
Ficha jogo 1ª jornada Torneio Abertura
Ficha jogo 1ª jornada Torneio AberturaFicha jogo 1ª jornada Torneio Abertura
Ficha jogo 1ª jornada Torneio Abertura
Nuno Vieira
 
SOBRE O SERVIÇO TÉCNICO DE BIBLIOTECA E DOCUMENTAÇÃO
SOBRE O SERVIÇO TÉCNICO DE BIBLIOTECA E DOCUMENTAÇÃOSOBRE O SERVIÇO TÉCNICO DE BIBLIOTECA E DOCUMENTAÇÃO
SOBRE O SERVIÇO TÉCNICO DE BIBLIOTECA E DOCUMENTAÇÃO
Biblioteca FOA
 
Entrevista sobre o transito
Entrevista sobre o transitoEntrevista sobre o transito
Entrevista sobre o transitojulliana brito
 

Viewers also liked (20)

Technical interview questions -networking
Technical interview questions -networkingTechnical interview questions -networking
Technical interview questions -networking
 
Problemas Ambientales Xxxxxxxxx
Problemas Ambientales XxxxxxxxxProblemas Ambientales Xxxxxxxxx
Problemas Ambientales Xxxxxxxxx
 
Acordão do STJD sobre o título brasileiro de 1987
Acordão do STJD sobre o título brasileiro de 1987Acordão do STJD sobre o título brasileiro de 1987
Acordão do STJD sobre o título brasileiro de 1987
 
Encuesta sobre comida nutritiva
 Encuesta sobre comida nutritiva Encuesta sobre comida nutritiva
Encuesta sobre comida nutritiva
 
Doces atraem sábado e domingo ao quartel
Doces atraem sábado e domingo ao quartelDoces atraem sábado e domingo ao quartel
Doces atraem sábado e domingo ao quartel
 
Jovens e dinheiro
Jovens e dinheiroJovens e dinheiro
Jovens e dinheiro
 
Almas Dandekar
Almas DandekarAlmas Dandekar
Almas Dandekar
 
JESUS EL CORDERO DE DIOS
JESUS EL CORDERO DE DIOSJESUS EL CORDERO DE DIOS
JESUS EL CORDERO DE DIOS
 
Portaria nº 1010 de 5 de novembro de 2009
Portaria nº 1010 de 5 de novembro de 2009Portaria nº 1010 de 5 de novembro de 2009
Portaria nº 1010 de 5 de novembro de 2009
 
Manaul de serviço cbr600 f(3) (2001~) ctracapa
Manaul de serviço cbr600 f(3) (2001~) ctracapaManaul de serviço cbr600 f(3) (2001~) ctracapa
Manaul de serviço cbr600 f(3) (2001~) ctracapa
 
Eventos
EventosEventos
Eventos
 
Jesucristo
JesucristoJesucristo
Jesucristo
 
Grandma's Bread Bowl article and recipe
Grandma's Bread Bowl article and recipeGrandma's Bread Bowl article and recipe
Grandma's Bread Bowl article and recipe
 
Chamada do futebol de domingo!
Chamada do futebol de domingo!Chamada do futebol de domingo!
Chamada do futebol de domingo!
 
Aborto
AbortoAborto
Aborto
 
01 discriminação auditiva
01 discriminação auditiva01 discriminação auditiva
01 discriminação auditiva
 
Planfeto propaganda
Planfeto propagandaPlanfeto propaganda
Planfeto propaganda
 
Ficha jogo 1ª jornada Torneio Abertura
Ficha jogo 1ª jornada Torneio AberturaFicha jogo 1ª jornada Torneio Abertura
Ficha jogo 1ª jornada Torneio Abertura
 
SOBRE O SERVIÇO TÉCNICO DE BIBLIOTECA E DOCUMENTAÇÃO
SOBRE O SERVIÇO TÉCNICO DE BIBLIOTECA E DOCUMENTAÇÃOSOBRE O SERVIÇO TÉCNICO DE BIBLIOTECA E DOCUMENTAÇÃO
SOBRE O SERVIÇO TÉCNICO DE BIBLIOTECA E DOCUMENTAÇÃO
 
Entrevista sobre o transito
Entrevista sobre o transitoEntrevista sobre o transito
Entrevista sobre o transito
 

Similar to What is dfs name space

RH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux CertificationRH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux Certification
Isabella789
 
Windows sys admin interview questions
Windows sys admin interview questionsWindows sys admin interview questions
Windows sys admin interview questions
Student
 
System admin virtualization
System admin   virtualizationSystem admin   virtualization
System admin virtualization
Mark John Lado, MIT
 
2.1 design hard disk layout v2
2.1 design hard disk layout v22.1 design hard disk layout v2
2.1 design hard disk layout v2
Acácio Oliveira
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
Sandra Ahn
 
System and Network Administration/ SNA
System and Network Administration/ SNASystem and Network Administration/ SNA
System and Network Administration/ SNA
FaisalMashood
 
29041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-200329041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-2003
rafiq123
 
32 Most Commonly Asked Windows Server Administrator Interview Questions (With...
32 Most Commonly Asked Windows Server Administrator Interview Questions (With...32 Most Commonly Asked Windows Server Administrator Interview Questions (With...
32 Most Commonly Asked Windows Server Administrator Interview Questions (With...
Temok IT Services
 
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxChapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
christinemaritza
 
Managing Your Runtime With P2
Managing Your Runtime With P2Managing Your Runtime With P2
Managing Your Runtime With P2Pascal Rapicault
 
10 resource kit remote administration tools
10 resource kit remote administration tools10 resource kit remote administration tools
10 resource kit remote administration tools
Duggesh Talawar
 
John
JohnJohn
Study notes for CompTIA Certified Advanced Security Practitioner
Study notes for CompTIA Certified Advanced Security PractitionerStudy notes for CompTIA Certified Advanced Security Practitioner
Study notes for CompTIA Certified Advanced Security Practitioner
David Sweigert
 
101 2.1 design hard disk layout v2
101 2.1 design hard disk layout v2101 2.1 design hard disk layout v2
101 2.1 design hard disk layout v2
Acácio Oliveira
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answer
mandarshetye45
 
FP 202 - Chapter 5
FP 202 - Chapter 5FP 202 - Chapter 5
FP 202 - Chapter 5rohassanie
 
Interview questions n answers
Interview questions n answersInterview questions n answers
Interview questions n answers
Santosh Kulkarni
 
Virtualization And Disk Performance
Virtualization And Disk PerformanceVirtualization And Disk Performance
Virtualization And Disk Performance
Diskeeper
 

Similar to What is dfs name space (20)

RH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux CertificationRH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux Certification
 
Windows sys admin interview questions
Windows sys admin interview questionsWindows sys admin interview questions
Windows sys admin interview questions
 
System admin virtualization
System admin   virtualizationSystem admin   virtualization
System admin virtualization
 
2.1 design hard disk layout v2
2.1 design hard disk layout v22.1 design hard disk layout v2
2.1 design hard disk layout v2
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
System and Network Administration/ SNA
System and Network Administration/ SNASystem and Network Administration/ SNA
System and Network Administration/ SNA
 
Red Hat Training
Red Hat   TrainingRed Hat   Training
Red Hat Training
 
29041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-200329041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-2003
 
32 Most Commonly Asked Windows Server Administrator Interview Questions (With...
32 Most Commonly Asked Windows Server Administrator Interview Questions (With...32 Most Commonly Asked Windows Server Administrator Interview Questions (With...
32 Most Commonly Asked Windows Server Administrator Interview Questions (With...
 
Ads int faq
Ads int faqAds int faq
Ads int faq
 
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxChapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
 
Managing Your Runtime With P2
Managing Your Runtime With P2Managing Your Runtime With P2
Managing Your Runtime With P2
 
10 resource kit remote administration tools
10 resource kit remote administration tools10 resource kit remote administration tools
10 resource kit remote administration tools
 
John
JohnJohn
John
 
Study notes for CompTIA Certified Advanced Security Practitioner
Study notes for CompTIA Certified Advanced Security PractitionerStudy notes for CompTIA Certified Advanced Security Practitioner
Study notes for CompTIA Certified Advanced Security Practitioner
 
101 2.1 design hard disk layout v2
101 2.1 design hard disk layout v2101 2.1 design hard disk layout v2
101 2.1 design hard disk layout v2
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answer
 
FP 202 - Chapter 5
FP 202 - Chapter 5FP 202 - Chapter 5
FP 202 - Chapter 5
 
Interview questions n answers
Interview questions n answersInterview questions n answers
Interview questions n answers
 
Virtualization And Disk Performance
Virtualization And Disk PerformanceVirtualization And Disk Performance
Virtualization And Disk Performance
 

Recently uploaded

Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 

Recently uploaded (20)

Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 

What is dfs name space

  • 1. Q: What are LingeringObjects? A: A lingeringobjectisa deletedADobjectthatstill remainsonthe restoreddomaincontrollerinits local copy of Active Directory.Theycanoccur whenchangesare made to directoriesaftersystem backupsare created. Whenrestoringa backupfile,Active Directorygenerallyrequiresthatthe backupfile be nomore than 180 daysold.Thiscan happenif,afterthe backup wasmade,the objectwasdeletedonanotherDC more than 180 daysago. Q: How can we remove Lingering Objects? A: WindowsServer2003 and 2008 have the abilitytomanuallyremove lingeringobjectsusingthe console utilitycommandREPADMIN.EXE. 4) What are Group Policies? Ans: Group policiesare usedbyadministratorstoconfigure andcontrol userenvironmentsettings. Group PolicyObjects(GPOs) are usedtoconfigure grouppolicieswhichare appliedtosites,domains, and organizational units(OUs).Settingsthatdothe followingmaybe appliedwithgrouppolicy:Manage userenvironments - Wallpaperandothersettings.Manage scripts - Logon/logoffandstartup/shutdown scripts.Manage security - Eventlogsettings,accountpolicies,andmore.Manage software deployment - Applicationsmaybe automaticallyinstalledwhenthe clientcomputerstarts.Redirectfolders - Folders on a local computermay be redirectedtoa networkshare. ComputerSecurityDo’sandDon’ts Do’s: 1) Shut downyourcomputers andlaptopswhenyouare not usingmore than 3 hoursand whenyou are leavingoffice. 2) Lock your computerswhennotinuse. 3) Dailycheckyour ComputerandLaptopsfor Antivirusupdationforcurrentdate. 4) Daly checkyourBackup status. 5) Create strongpasswordsthat are at leasteightcharacterslong,andincludingatleasta numerical value anda symbol,suchas #, to foil password-crackingsoftware.Avoidcommonwords,andnever disclose apasswordonline. 6) Change your passwordeveryninetydays. 7) Performregularbackupsof importantdata.
  • 2. 8) Create a passwordforyourfilesinorderto protectfile sharingactivities. 9) Physicallysecure yourlaptop. 10) Delete anymessage thatreferstogroupsor organizationsthatyouare not a part of. 11) Neverclickona linkfroman untrustedsource. 12) Be certainthat whenyouleave the cybercafé computeryouhave deletedeverythingyousavedto the desktop.make sure youpermanentlydelete all personal filesfromthe cybercafé computer. 13) Make sure that you logout of everysite you've loggedinto.Thiscan include webbrowsers,instant messagingclientsandftpsites. 14) Many browserswill offertostore yourusername and passwordwhenyoulogin,be sure not to allowit. 15) Close windowscontainingpop-upadsorunexpectedwarningsbyclickingonthe “X”buttoninthe uppermostright handcorner of that window,notbyclickingwithinthe window. DON’TS 1) Pluginyour personal deviseslike Smartphones,USBdevises,MP3Playerstocomputersand laptops. 2) Neverwrite downyourpassword.EspeciallyonaPost-Itnote stuckto yourcomputer! 3) Nevergive outyourpasswordto anyone,whetheryouknow themornot. 4) Neverselectthe "RememberMyPassword"option.Manyapplicationsdonotstore them securely. 5) Neverpurchase anythingpromotedinaspammessage.Evenif the offerisn’tascam, you are onlyhelpingtofinance andencourage spam. 6) Please refrain fromopeningane-mail attachment,evenfromsomeone youknow well,unless youwere expectingit. 7) Avoidcreatingcommonpasswordssuchas yourname,social security,UNI,etcetera. 8) Do notleave yourlaptopunattended,evenforafew minutes. 9) Neverreplytoe-mail(s) requestingfinancial orpersonal information.
  • 3. 10) Avoidopeninge-mail(s) ore-mail attachmentsfromanunknownsender. 11) Under nocircumstancesshouldyouinstall oruse piratedcopiesof software. 12) Do not install P2Pfile sharingprogramswhichcanillegallydownloadcopyrightedmaterial. 13) Neversetyoure-mail programto"auto-open"attachments. 14) Do not leave sensitiveinformationlyingaroundthe office,Don’tleaveprintoutscontaining confidentialinformationonyourdesk,locktheminyourdrawer,it’sveryeasyfor a visitortosee confidentialdocuments. 421. What is AccessControl List(ACL)? Answer ACL isa listof all the useraccounts and groupsthat have beengrantedordeniedaccess toa file ora folder.Whenauserattemptsto gainaccess to a resource,the ACLmust containan accesscontrol entry for the useraccount or a group to whichthe userbelongs. 422. What are effectivepermissionsforaresource? Answer Effective permissionsforaresource are the sum of the NTFSpermissionsthatyouassignto the individualuseraccountandgroupsto whichthe userbelongs. 423. Do file permissionsoverridefolderpermissions? Answer Yes,NTFS file permissionstake priorityoverNTFSfolderpermissions. 424. If youdo not have the permissiontoaccessthe folderbuthave the permissiononthe file,then howwill youaccessthe file? Answer You needtoknowthe full pathof the file toaccessit whenyoudo nothave a folderlevel permission. 425. Doesthe Denypermissionoverride all permissions? Answer Yes,the Denypermissionoverridesall the otherpermissions. 426. ExplainNTFSpermissionsinheritance? Answer NTFSpermissionsinheritance impliesthatthe permissionsassignedtoa parent folderare inheritedand propagatedtothe subfoldersandfilescontainedinthe parentfolder. 427. How can you preventpermissioninheritance? Answer You can preventpermissioninheritance bysettinganoptionof preventinginheritance atparentfolder level. 428. Where do permissionsassignedtoCREATOROWNER groupapply? Answer The permissionsassignedtothe CREATOROWNERgroup applyonlytothe filesandthe subfoldersinthe foldertowhichpermissionsare assignedandnottothe folderitself.
  • 4. 429. List the basicguidelinestofollow whileassigningNTFSpermissions? Answer Followingare the basicguidelines: Grant usersonlythe level of accesstheyrequire. Assigngroupmembershipbasedonaccessto resources. Denypermissionsonlywhenitisessential. 430. If an employeeleavesanorganization,whatshouldbe done totransferthe ownershipof his/her filesandfolderstoanotheremployee? Answer You shouldperformthe followingstepsforthis: Log in as administrator, Assignownershippermissions toanotheremployee, Notifythe employee thathe/shehasbeengivenspecial permissionstotake ownershipof filesand foldersof the ex-employee. 431. Which special permissionenablesyoutobrowse throughafolder,if youdonot have permissionto access it? Answer If you do nothave permissiontoaccessa folder,thenthe Traverse Folderpermissionenablesyouto browse throughthe folder. 432. Name the groups youmustbe a memberof to share a folder? Answer You mustbe a memberof the Administrator,ServerOperator,orPowerUsersgroupto share a folder. 433. What are the differentwaysinwhichausercan connectto a sharedfolder? Answer A usercan connectto a sharedfolderbyusingthe followingtools: Map NetworkDrive Wizard, AddNetworkPlace Wizard, The Run command, My NetworkPlaces. 434. Where doesthe Administratorsgroupshare the folder? Answer The Administratorgroupsharesthe folderresidingonanycomputerinthe domain. 435. Where doesthe ServerOperatorgroupshare the folder? Answer The ServerOperatorgroupsharesthe folderondomaincontrollers. 436. Where doesthe PowerUsersgroup share the folder? Answer The PowerUsers groupsharesthe folderonthe computerwhere the groupis located. 437. List the stepsto share the host drive withvirtual machines? Answer Performthe followingstepstoshare the hostdrive withvirtual machines: ClickWindowsVirtual PCfromthe Startmenuand Openthe Virtual Machinesfolder. Right-clickthe name of the virtual machine fromthe Virtual Machinesfolder. Clickthe Settingsoption.The WindowsVirtual PCSettingswindowappears. ClickIntegrationFeaturesInthe leftpane of the WindowsVirtual PCSettingswindow andthenclick Drivesonthe rightpane of the window. Reviewthe listof drives andclickthe checkbox of any drive thatyou wantto share. Clickthe OK button.
  • 5. 438. What is the functionof Access-basedEnumeration? Answer Access-basedEnumerationpermitsthe userstoview onlythose filesandfoldersonafile serverto whichthey have permissiontoaccess. 439. What is a printserver? Answer Printserverisa computeron whichthe printersassociatedwithlocal andnetworkprintdevicesresides. sectorof the hard disk.The program begins the bootprocessbylookingupthe partitiontable to determine which partitiontouse forbooting 13) What isBit Locker . BitLockerisan encryptionfeature availablein Ultimate andEnterpriseversionsof Windows7andVista, To encryptan entire drive,simplyright-clickonthe drive and selectTurnonBitLockerfromthe context menu. 14) Difference b/wsata and IDE. IDE and SATA are differenttypesof interfacestoconnectstoragedevices(like harddrives) toa computer'ssystembus.SATA standsforSerial AdvancedTechnologyAttachment (orSerial ATA) andIDE isalsocalledParallel ATA orPATA.SATA isthe newerstandardand SATAdrivesare fasterthanPATA (IDE) drives.FormanyyearsATA providedthemostcommonandthe leastexpensiveinterface for thisapplication.Butbythe beginning of 2007, SATA had largelyreplacedIDEinall new systems. 15)Main Difference BetweenWindowsserver2008 and 2012 1) NewServerManager:Create,Manage ServerGroups 2) Hyper-V Replication :The Hyper-V Replicafeatureallowsyou toreplicate avirtual machine fromone locationtoanotherwithHyper-Vandanetworkconnection — and withoutanysharedstorage required.Thisisabigdeal in the Microsoft worldfordisasterrecovery, highavailabilityandmore.VMware doesthis,too,butthe vendorchargesnew licenseesextraforthe capability. 3) ExpandedPowerShellCapabilities 4)IIS8.0 and IIS7 in 2008 5)Hyper-V 3.0 6)PowerShell 3.0 16)How Long My Computer Has BeenRunning? Get to Know My
  • 6. Computer’sUptime. Start Task manager, and selectPerformance tab. In performance tabwe can see systemup time Method2: By typingsysteminfoincommandprompt we canfindoutuptime of your server In systemboottime. 17)Event viewerin Windowsserver Control panel - Administrative tools- ComputerManagement - eventViewer Three typesevents Error. Warning. Information. 18) Manage Multiple,Remote ServerswithServer Manager. ServerManageris a managementconsole inWindowsServer® 2012R2 Preview andWindowsServer® 2012 that helpsITprofessionalsprovisionandmanage bothlocal andremote Windows-based serversfromtheirdesktops,withoutrequiringeitherphysicalaccesstoservers,orthe needtoenable Remote Desktopprotocol (RDP)connectionstoeachserver.Although ServerManageris available inWindowsServer2008 R2 andWindowsServer2008, ServerManagerwasupdatedinWindowsServer 2012, to supportremote,multi-servermanagement,andhelpincrease the numberof servers anadministratorcanmanage. 19) What happenswhenwe type URL in browser . Firstthe computerlooksupthe destinationhost.If itexistsinlocalDNScache,itusesthatinformation. Otherwise, DNSqueryingisperformeduntil the IPaddressisfound. Then,yourbrowseropensa TCP connectiontothe destinationhostandsendsthe requestaccordingto HTTP 1.1 (or mightuse HTTP 1.0, but normal browsersdon'tdoit any more). The serverlooksupthe requiredresource (ifitexists) andrespondsusingHTTPprotocol,sendsthe data to the client(=yourbrowser)
  • 7. The browserthenusesHTML parserto re-create documentstructurewhichislaterpresentedtoyouon screen.If itfindsreferencestoexternal resources,suchaspictures,cssfiles,javascriptfiles,theseareis deliveredthe same wayas the HTML documentitself. Exportdomainusersand groupsforActive Directory To export usersfrom Active directory csvde -f domain.csv -r(objectclass=user) -l "sn,givenname,department,mail" Export all informationform AD through cmd prompt csvde -m-f AccountName_mailboxes.txt -r"(&(objectClass=*)(mail=*))" -l objectClass,member,displayName,memberOf,proxyAddresses,legacyExchangeDN,title,telephoneNumbe r,facsimileTelephoneNumber,mobile,homephone,givenName,company,userPrincipalName,co,c,physical DeliveryOfficeName,postalCode,sn,st,streetAddress,title,wWWHomePage,description,l,initials,info,sAM AccountName Export only OU informationform AD through cmd prompt csvde -m-f AccountName_mailboxes.txt -d"OU=,OU=,DC=,DC=,DC=" -r "(&(objectClass=*)(mail=*))" -l objectClass,member,displayName,memberOf,proxyAddresses,legacyExchangeDN,title,telephoneNumbe r,facsimileTelephoneNumber,mobile,homephone,givenName,company,userPrincipalName,co,c,physical DeliveryOfficeName,postalCode,sn,st,streetAddress,title,wWWHomePage,description,l,initials,info,sAM AccountName Export Disabledusers from AD in command prompt: dsqueryuserDC=Domainname,DC=int -disabled -limit1000 dsqueryuserDC=Domainname,DC=int -disabled -limit1000 | dsgetuser-display -samid–email Export all the usersfrom AD in command prompt: dsqueryuserDC=Domainname,DC=int -limit1000 >> prakash Extract Security group userslist, run inpower shell. netgroup “Group Name”/domain> memberlist.txt dsquerygroup -name “group name”| dsgetgroup -members>memberlist.txt For displayingonly securitygroups in domain,run in command prompt. dsquerygroup -name * -limit0| dsgetgroup -samid-secgrp|find/i "yes">>c:secgrp.txt Command prompt commands to run setof commands(tasks) in one click @echooff cmd.exe /K"dir&& cls && dir && d: && dir"
  • 8. How can I override blockingof inheritance? What isPOST? PowerOnSelf Test,Whenthe computerbootsup,the BIOS starts to poweroneveryportand device attachedtothe computerone byone inorderto verifythe availabilityand the correctnessof the device. What are the requirementsforinstallingADona new server? What Is The Functionof ConfigurationPartition? ConfigurationPartitionisresponsible forReplicationto all of the Domainsinside the Forest. Configuration partitionitcontainsthe informationof whole forest.italsostore inexchange informationglobal settingandsites Name three bootingfiles? command.com msdos.sys io.sys 1. What stepsare requiredtoperformabare-metal recovery? 1. What isa spindle?(Raid) 2. Disaster Recovery Plan? What are the benefitsofusingNTFS?  Betterscalabilitytolarge drives  Active directorytoviewandcontrol networkresources  Compressionfeatures  File encryption  Permissionsonindividualfilesratherthanjustfolders  Remote storage  Recoveryloggingof diskactivities  Diskqoutas List the standard NTFS folderpermissions?  Full control  Modify  Readand Execute  List foldercontent  Read  Write What is AccessControl List (ACL) ?  ACL isa listof all the useraccounts and groupsthat have beengrantedordeniedaccesstoa file or a folder.Whenauserattemptstogain accessto a resource,the ACLmustcontainan access control entryfor the useraccount or a groupto whichthe userbelongs. Do file permissionsoverride folderpermissions?  Yes,NTFS file permissionstake priorityoverNTFSfolderpermissions.
  • 9. If you do not have the permissiontoaccess the folderbut have the permissionon the file,thenhow will you access the file?  You needtoknowthe full pathof the file toaccessit whenyoudo nothave a folderlevel permission. Does the Denypermissionoverride all permissions?  Yes ExplainNTFS permissioninheritance?  NTFSpermissionsinheritance impliesthatthe permissionsassignedtoa parentfolderare inheritedandpropagatedtothe subfoldersandfilescontainedinthe parentfolder. How can you preventpermissioninheritance?  You can preventpermissioninheritance bysettinganoptionof preventinginheritance atparent folderlevel. Where do permissionsassignedtoCREATOR OWNER group apply?  The permissionassignedtothe CREATOROWNER groupapplyonlyto the filesandthe subfoldersinthe foldertowhichpermissionsare assignedandnotto the folderitself. List the basic guidelinestofollowwhile assigningNTFSpermisions  Grant usersonlythe level of accesstheyrequire  Assigngroupmembershipbasedonaccessto resources  Denypermissionsonlywhenitisessential. If an employee leavesanorganization, what shouldbe done to transferthe ownershipof his/herfiles and foldersto another employee?  Log in as administrator  Assignownershippermissionstoanotheremployee  Notifythe employee thathe/shehasbeengivenspecial permissionstotake ownershipof files and foldersof the ex-employee Whichspecial permissionenablesyouto browse through a folder,ifyou do have permissiontoaccess it?  Traverse folderpermission What is primary and extendedpartition?  Primarypartitionisan active partitionwhere the hardware looksforbootfilestostartthe operatingsystem.Extendedpartitioniscreatedfromwhateverfree space remainsonthe disk aftercreatingthe primarypartition. Q2. What isInternetSCSI (iSCSI)?  iSCSIisan industrystandardthat enablestransmissionof Small ComputerSystemInterface (SCSI) blockcommandsoverthe existingInternetProtocol (IP) networkbyusingthe TCP/IP protocol.Itprovidesthe possibilityof deliveringbothmessagingtrafficandblock-basedstorage overexistingIPnetworks,withoutinstallingaseparate andexpensive FiberChannel Network. Q3. What isSCSI?  SCSI(Pronouncedasscuzzy) isa setof standardsfor physicallyconnectingandtransferringdata betweenperipheral devicesandcomputers. 
  • 10. Q4. What isDistributedFile Systemor NetworkFile System (DFS/NFS)?  DFS/NFSisany file systemthatallowsaccesstomultiple useronmultiple machinestoshare files and storage resources. Q5. What technologiesare usedin DFS?  The two technologiesusedinDFSare DFS NamespacesandDFSreplication. Q6. What isthe role of DFS Namespaces?  DFS Namespacesenablegroupingof sharedfolderslocatedondifferent serversintoone or more logicallystructurednamespaces. Q7. What isthe role of DFS replication?  DFS replicationkeepsthe folderssynchronizedbetweenserversacrossnetworkconnections.It replacesthe File ReplicationServiceasthe replicationengineforDFSNamespaces,aswell asfor replicatingthe ADDSSYSVOL folderindomainsthatuse the WindowsServer2008 domain functional level. Q8. What are Shadow Copiesfor SharedFolders?  ShadowCopiesforSharedFoldersare point-in-timecopiesof filesthatare locatedonshared resources,suchas a file server.Userscanview sharedfilesandfoldersastheyexistedatpoints of time inthe past byusingShadow CopiesforSharedFolders. Q9. What isthe use of Shadow Copies?  Recoveryof filesthatare accidentallydeleted  Recoveryof accidentallyoverwrittenfile  Comparingdifferentversionsof afile while working What is File ServerResource Manager?  File ServerResource Managerisa suite of toolsforwindowsServerthatallowsadministratorsto control,manage,andunderstandthe quantityandtype of data storedon theirserver. Q2. What isShare and Storage Management?  Share and Storage Managementprovidesacentralizedlocationtomanage the followingserver resources 1. Foldersandvolumesthatare sharedon the network 2. Volumesindisksandstorage subsystems Q3. What isthe use of Storage Explorer?  Storage Explorerisusedtoviewandmanage the Fibre Channel andiSCSIfabricsthatare available inyourStorage AreaNetwork(SAN) Q4. What isthe use of Storage Manager for SANs?  Storage Manager for SANsisusedto create and manage Logical UnitNumbers(LUNs) onFibre Channel andiSCSIdiskdrive subsystemsthatsupportVirtual DiskService (VDS)inSAN. Q5. What isLUN?  LUN is logical reference toa portionof a storage subsystems.Itconsistsof adisk,a sectionof a disk,a whole diskarray,or a sectionof a diskarray in the subsystem. Q6. What isDisk Management?
  • 11.  DiskManagementisa utilityformanagingharddisks and the volumesorpartitions.Ithelpsin initializingdisks,creatingvolumes,andformattingvolumeswiththe FileAllocationTable (FAT), FAT32, or NewTechnologyFile System(NTFS) filesystems. Q7. How many types of dynamic volumesare there?  Simple  Spanned  Striped  Mirrored  RAID-5 Q8. What are Spanneddisk volumes?  Spanneddiskvolumescombine areasof unallocatedspace frommultiple disksintoone logical volume.Theyrequire minimumof twodisks;however,youcanuse up-to32 disks Q9. What isstriped diskvolume?  Stripeddiskvolumesare made upof stripesof dataof equal size writtenacrosseachdiskinthe volumes.Theyare createdfromequallysized,unallocatedareasontwoor more disks.If one of the diskscontainingastripedvolume fails,the entirevolume fails,andall dataon the striped volume becomesinaccessible. Q10. What is mirroredvolume?  A mirroredvolume providesacopyof a volume onanotherdisk.Thisisa fault-tolerantvolume, whichprovidesdataredundancybyduplicatingthe informationcontainedonthe volume.The twodisksthat make up a mirroredvolume are knownasmirrors. Q11. What is RAID-5 volume?  RAID-5volumesare available onlyoncomputersrunningthe Windows200Serverfamilyor WindowsServer2003. It stripesdata andparityacross three or more disks.Parityisa calculated value usedtoreconstructdata if one diskfails.Whena diskfails,WindowsServer2003 continuestooperate byrecreatingthe datathat was on the faileddiskfromthe remainingdata and Parity. What is DFS name Space? A DFS namespace isa virtual viewof sharedfolderslocatedondifferentserversinanorganization. Users can navigate the namespace withoutneedingtoknow the servernamesorsharedfoldershosting the data. Whena user viewsthe namespace,the foldersappearinasingle,virtual namespace. What is Domain-basednamespace? A domain-basednamespaceisstoredonone or more namespace serversandinActive Directory DomainServices.Youcan increase the availabilityof adomain-basednamespacebyusingmultiple servers.WhencreatedinWindowsServer2008 mode,the namespace supportsncreasedscalabilityand access-basesenumeration. What is stand-alone namespace? A stand-alone namespace isstoredonasingle namespace server.Youcanincrease the availabilityof a stand-alone namespace byhostingonafailovercluster. NOTE:
  • 12. 1. Changesto the DFS namespace are made onone domaincontrollerthathasthe role PDC Emulator,thisensuresthatmultiplechangesare notmade indifferentplaces. 2. If you have a lot of DFS serversonyournetwork,this will create lotsof network trafficandwill create lotsof workloadon the PDC Emulator 3. Microsoftrecommendfewerthan16 namesspace servers. 29. What’s the difference between standalone andfault-tolerantDFS(DistributedFile System) installations?The standaloneserverstoresthe Dfsdirectorytree structure ortopologylocally.Thus,if a sharedfolderisinaccessible orif the Dfsroot serverisdown,usersare leftwithnolinktothe shared resources.A fault-tolerantrootnode storesthe Dfstopologyinthe Active Directory,whichisreplicated to otherdomaincontrollers.Thus,redundantrootnodesmayinclude multiple connectionstothe same data residingindifferent sharedfolders. 30. We’re usingthe DFSfault-tolerantinstallation,butcannotaccessit froma Win98 box.Use the UNC path,not client,only2000 and2003 clientscanaccessServer2003 fault-tolerantshares. 31. Where exactlydofault-tolerantDFSsharesstore informationinActive Directory?InPartition KnowledgeTable,whichisthenreplicatedtootherdomaincontrollers. 32. Can you use Start->Search with DFS shares? Yes. 33. What problemscanyouhave withDFS installed?Twousersopeningthe redundantcopiesof the file at the same time,withnofile-lockinginvolvedinDFS,changingthe contentsandthensaving.Onlyone file will be propagatedthroughDFS. 34. I run MicrosoftClusterServerandcannotinstall fault-tolerantDFS.Yeah,youcan’t.Install a standalone one. what is file server. and how to configure ? A File Serverisacomputerattachedto a networkthat has the primarypurpose of providingalocationforthe shared storage of information(suchasdocuments,soundfiles, photographs,movies,images,databases,etcetera) thatcan be accessedby the workstationsthatare attachedto the network.AsdistinguishedfromTimesharingoraMainframe (where acentral computerprovidescalculationresources for "dumb"terminals) aFile Serverisdesignedprimarily to enable the rapidstorage andretrieval of datawhere the heavycomputationisprovidedbythe workstations. 16) OSI model & protocolsin each layer? Ans: The OSI model describesa fixed,sevenlayerstack for networkingprotocols. 7. APPLICATION:HTTP, SMTP, SNMP,FTP, Telnet,ECHO, SIP, SSH, NFS,RTSP, XMPP,Whois,ENRP
  • 13. 6. PRESENTATION: XDR, ASN.1, SMB, AFP,NCP. 5. SESSION: ASAP,TLS, SSL, ISO 8327 / CCITT X.225, RPC, NetBIOS,ASP. Establishing& managing sessions. 4. TRANSPORT: TCP, UDP, RTP, SCTP, SPX, ATP, IL. This layeris for flow control. 3. NETWORK: IP,ICMP, IGMP,IPX, BGP,OSPF, RIP, IGRP,EIGRP, ARP, RARP, X.25. Router works on network layer.Connectingover a network. 2. DATA LINK: Ethernet, Tokenring, HDLC, Frame relay,ISDN, ATM, 802.11 WiFi,FDDI, PPP. Switch works on this layer. 1. PHYSICAL:10BASE-T, 100BASE-T, 1000BASE-T, SONET/SDH, T-carrier/E-carrier, various 802.11 physical layers. Hubs & repeatersoperate on this layer. TCP/IP model: 4 Application:DNS , TFTP , TLS/SSL, FTP, HTTP , IMAP , IRC , NNTP,POP3 ,SIP ,SMTP,SNMP,SSH ,TELNET ,ECHO ,Bit Torrent, RTP , PNRP , rlogin, ENRP, … Routing protocols like BGPand RIP , which for a variety of reasons run over TCP and UDP respectively, may also be consideredpart of the applicationor network layer.
  • 14. 3 Transport: TCP ,UDP ,DCCP,SCTP ,IL ,… Routing protocolslike OSPF , which run over IP, may also be consideredpart of the transport or networklayer. ICMP and IGMPrun overIP may be consideredpart of the networklayer. 2 Network:IP , ARP and RARP operate underneathIP but above the linklayer so theybelong somewhere inbetween. 1 Link: Ethernet, Wi-Fi ,Token ring , PPP, SLIP , FDDI , ATM , Frame Relay,SMDS , … 17) What isping? Ans: Packet internetgropher & it uses ICMPprotocol. It is usedto check connectivityto an IP or PC name. try ping command on your PC & check for replies. what is ping (packet internetgropher) & its protocol (ICMP) -- ping is usedto check connectivityto an IP 26) Boot sequence ofPC? Ans: For System Boot Sequence gothrough this: The systemBIOS iswhat starts the computer runningwhen you turn it on. The followingare the steps that a typical boot sequence involves. Ofcourse this will vary by the manufacturer of your hardware, BIOS, etc., and especiallybywhat peripheralsyouhave in the PC. Here iswhat generallyhappens whenyou turn on your systempower: 1. The internal powersupply turns on and initializes.The powersupply takes some time until it can generate reliable powerfor the rest of the computer,and havingit turn on prematurelycould potentiallyleadto damage. Therefore,the chipsetwill generate a resetsignal to the processor (the same as if you heldthe reset button down for a while on your case) until it receivesthe Power Good signal from the power supply. 2. Whenthe resetbutton is released,the processorwill be ready to start executing.Whenthe processor firststarts up, it is suffering fromamnesia; there is nothingat all in the memory to execute. Of course processormakers know this will happen,so they pre-program the processor to always look at the same place inthe systemBIOS ROM for the start ofthe BIOS boot program. This is normally location FFFF0h,right at the end of the system memory.They put it there so that the size of the ROM can be changed withoutcreating compatibilityproblems.Since there are only16 bytesleftfrom there to the endof conventional memory,this location just contains a "jump" instructiontellingthe processor where to go to findthe real BIOS startup program. 3. The BIOS performsthe power-onselftest(POST). Ifthere are any fatal errors, the boot process stops. POST beepcodescan be foundin this area of the TroubleshootingExpert.
  • 15. 4. The BIOS looksfor the videocard. In particular, it looks for the videocard's builtin BIOS program and runs it. This BIOS isnormally foundat location C000h in memory.The system BIOS executesthe videocard BIOS, which initializesthe videocard. Most moderncards will displayinformationon the screenabout the videocard. (Thisis why on a modernPC you usually see somethingonthe screen about the videocard before you see the messagesfrom the systemBIOS itself). 5. The BIOS thenlooks for other devices' ROMsto see if any of them have BIOSes. Normally,the IDE/ATA hard diskBIOS will be found at C8000h and executed.Ifany otherdevicesBIOSes are found, they are executedaswell. 6. The BIOS displaysits startup screen. 7. The BIOS doesmore testson the system,includingthe memorycount-up test whichyou see on the screen.The BIOS will generallydisplaya texterror message on the screenif it encountersan error at this point;these error messages and theirexplanationscan be foundin this part of the TroubleshootingExpert. 8. The BIOS performsa "systeminventory" ofsorts, doingmore tests to determine what sort of hardware is in the system.ModernBIOSes have many automatic settingsand will determine memory timing(for example) basedon what kind of memoryit finds.Many BIOSescan also dynamicallyset hard drive parameters and access modes,and will determine these at roughly thistime. Some will displaya message on the screenfor each drive they detectand configure this way. The BIOS will also now search for and label logical devices(COMand LPT ports). 9. If the BIOS support the Plug and Play standard, it will detect and configure Plugand Play devicesat this time and display a message on the screenfor each one it finds.See here for more detailson how PnP detectsdevicesand assignsresources. 10. The BIOS will display a summary screenabout your system'sconfiguration.Checkingthis page of data can be helpful indiagnosingsetup problems,although it can be hard to see because sometimesit flasheson the screenvery quicklybefore scrollingoffthe top. 11. The BIOS beginsthe search for a drive to boot from. Most modern BIOSescontain a settingthat controls ifthe systemshould firsttry to boot from the floppydisk (A:) or firsttry the hard disk (C:). Some BIOSes will evenletyou boot from your CD-ROM drive or other devices,dependingonthe boot sequence BIOSsetting. 12. Having identifieditstarget boot drive,the BIOS looksfor boot informationto start the operating systemboot process. If it is searchinga hard disk, it looksfor a master boot record at cylinder0, head 0, sector1 (the first sector on the disk);if it issearching a floppy disk,it looks at the same addresson the floppydisk for a volume boot sector. 13. If it findswhat it islooking for,the BIOS starts the processof booting the operating system,using the informationin the boot sector. At this point, the code in the boot sector takes over from the BIOS. The DOS boot process is describedindetail here.If the firstdevice that the system tries(floppy,hard disk,etc.) is not found,the BIOS will then try the nextdevice in the boot sequence,and continue until it findsa bootable device. 14. If no boot device at all can be found, the system will normallydisplay an error message and then freeze upthe system.What the error message is dependsentirelyonthe BIOS, and can be anything
  • 16. from the rather clear "Noboot device available" to the very cryptic "NOROM BASIC - SYSTEM HALTED". This will also happenif you have a bootable hard diskpartition but forget to set it active. This processis calleda "coldboot" (since the machine was off,or cold,when it started).A "warm boot" is the same thingexceptit occurs whenthe machine is rebootedusing{Ctrl}+{Alt}+{Delete}or similar.In this case the POST is skippedand the boot processcontinuesroughly at step 8 above. 27) MBR (master boot record)? 46) How do you convert a drive from FAT/FAT32 to NTFS from the command line? A) convertc: /fs:ntfs 64) Difference betweenNTFSandFAT32 A) NTFS FAT32 Allowsaccess local to Win2k,Win2k3, WinXP,WinNT4withSP4 & latermay get access for some file. Fat 32 Allows access to Win95, Win98, WinMe,Win2k,WinXPon local partition. Maximumsize of partitionis2 Terabytes & more. Maximumsize of partitionisupto2 TB. MaximumFile size isupto 16TB. MaximumFile size isupto 4 GB. File & folderEncryptionispossible File & folderEncryptionisnotpossible. Support255 characters longfile name FAT support8.3 character file name( avail.inFAT32) 73) What languages can you use for log-onscripts? A) JavaScipt,VBScript,DOSbatchfiles(.com, .bat,oreven.exe) What’sa heartbeat? A) Communicationprocessesbetweenthe nodesdesignedtoensure node’shealth. 134) Youneedto change and admin password on a clusteredWindowsbox,but that requires rebootingthe cluster,doesn’tit? A) No,itdoesn’t.In 2003 environmentyoucando that via cluster.exeutilitywhichdoesnotrequire rebootingthe entire cluster. 135) Whichadd-onpackage for Windows2003 Server wouldyou use to monitor the installed software and license compliance? A) SMS (SystemManagementServer). 136) Whichservice do you use to set up various alerts? A) MOM (MicrosoftOperationsManager). 137) Whatare the differentEditionsofWindowsServer2003? Requirement WebEdition Standard Edition Enterprise Edition DatacenterEdition MinimumCPU Speed 133 MHz 133 MHz 133 MHz for x86- based computers733 MHz for Itanium- basedcomputers* 400 MHz for x86- based computers733 MHz for Itanium- basedcomputers* Recommended CPU Speed 550 MHz 550 MHz 733 MHz 733 MHz MinimumRAM 128 MB 128 MB 128 MB 512 MB
  • 17. Recommended MinimumRAM 256 MB 256 MB 256 MB 1 GB MaximumRAM 2 GB 4 GB 64 GB for x86- basedcomputers2 TB for x64 and ia64 computers 128G for x86- basedcomputers2 TB for x64 and ia64 computers Multiprocessor Support Up to 2 Up to 4 Up to 8 Minimum2- way capable machine requiredMaximum 64 DiskSpace Required 1.2 GB for Network Install2.9GB for CD Install 1.2 GB for Network Install2.9GB for CD Install 1.2 GB for Network Install2.9GB for CD Install 1.2 GB for Network Install2.9GB for CD Install WebEdition  Designedtobe usedprimarilyasanIIS 6.0 Webserver.  UsedmainlyforbuildingandhostingWebapplications,Webpages,andXMLWeb Services.  Doesnot require ClientAccessLicensesandTerminal Server mode isnotincluded.However, Remote DesktopforAdministrationisavailable.  Supportsa maximumof 4 processorswithsupportfora maximumof 2GB of RAM.  Onlyversionof WindowsServer2003 that DOES NOTincludesClientNumberlimitationupon Windowsupdate servicesasitdoesnot require ClientAccessLicenses.  Cannotact as a domaincontroller StandardEdition  Aimedtowardssmall tomediumsizedbusinesses.  Supportsfile andprintersharing,secure Internetconnectivity,andallowscentralizeddesktop applicationdeployment.  Can run onup to 4 processorswithupto 4 GB RAM.  64-bit versionsare alsoavailableforthe x86-64 architecture (AMD64 and Intel64,called collectivelyx64byMicrosoft).  The 64-bit versioniscapable of addressingupto32 GB of RAM.  64-bit versionsupportsNon-UniformMemoryAccess(NUMA),somethingthe 32-bitversion doesnotdo. Enterprise Edition  A full-functionserveroperatingsystemaimedtowardsmediumtolarge businesses.  Supportsupto 8 processorsandcan supportupto 32 GB of memorywithadditionof the PAE parameterinthe initializationfile.  Providesenterprise-classfeaturessuchaseight-node clusteringusingMicrosoftClusterServer (MSCS) software.  Enterprise Editionalsocomesin64-bitversionsforthe Itanium andx64 architectures.  The 64-bit versioniscapable of addressingupto1 Terabyte (1024 GB) of RAM.  Both 32-bitand 64-bit versionssupportNon-UniformMemoryAccess(NUMA).  Alsoprovidesthe abilitytohot-addsupportedhardware. DataCenterEdition  Aimedforinfrastructuresdemandinghighsecurityandreliability.  WindowsServer2003 isavailable forx8632-bit, Itanium, andx64 processors.
  • 18.  Supportsa minimumof 8 processorsanda maximumof 64 processors& memoryupto 512GB. [ * Whenrun on32-bit architecture Limitedto32 processors& limitsmemoryaddressabilityto 64GB.]  WindowsServer2003, DatacenterEdition,alsoallowslimitingprocessorandmemoryusage on a per-applicationbasis.  SupportsNon-UniformMemoryAccess.  Supports8-node clustering.  BettersupportforStorage AreaNetworks(SAN). Small BusinessServer  Designedkeepingthe belowgoalsinmindprimarilyforSmall Businesses: – Provide small businesseswithconnectivityforcollaboration,communication,andmobility. – Provide simplicityininstallation,management,anduse. – Provide flexible deploymentfeaturesthatbenefitbothsmall-businesscustomersandtechnology providers.  To bettermeetthe variationina largerpopulationof small businesses,WindowsSmall Business Server2003 isavailable intwoeditions,StandardandPremium.  StandardEditionisideal forfirst-servercustomerswhoare lookingtoleverage the benefitsof servertechnologyintheirnetwork,orforcustomersmigratingfroma stand-alone serverto an integratedtechnologyplatform.  PremiumEditionisideal forsmall businesseswithmore demandingITneeds,suchasdata- intensiveline-of-businessapplications,orforcustomerswithmore stringentmonitoringand managementof Internetservicesandconnectivity. 138) Are there any differencesbetween32-bit,x64, and 64-bit versionsof WindowsServer2003? A) Versions 32-bit x86 64-bit x64 64-bit Itanium Data CenterEditionUp to 32-way, 64 GB RAMUp to 64-way, 1 TB RAM Up to 64-way, 1 TB RAM Enterprise Edition Up to 8-way,32 GB RAM Up to 8-way,1 TB RAM Up to 8-way,1 TB RAM Standard Edition Up to 4-way,4 GB RAM Up to 4-way,32 GB RAMn/a Web Edition Up to 2-way,2 GB RAM n/a n/a SymmetricMultiprocessing(SMP) support SMP: The WindowsServer2003 Familysupportssingle ormultiple CPUsthatconformto the SMP standard.UsingSMP, the operatingsystemcanrunthreadson anyavailable processor,whichmakesit possible forapplicationstouse multiple processorswhenadditional processingpowerisrequiredto increase the capabilityof asystem.NewfeaturesincludeSMPlockingperformance,improvedregistry performance,andincreasedTerminal Serversessions. 139) What’sNew inWindows2003 R2? A) WithWindowsServer2003 R2, youget the followingimprovements:  Identityandaccessmanagement  Branch office servermanagement  Storage setupand management  Applicationdevelopmentinsideandoutside yourorganization’straditional boundaries Thistopic describesthe followingnew componentsthatyoucan install withWindowsServer 2003 R2: ServerManageability  AdministrationToolsPacks  Hardware Management  MMC 3.0 FeaturesforActive Directory
  • 19.  Active DirectoryApplicationMode (ADAM)  Active DirectoryFederationServices Diskand File ManagementFeatures  Branch Office:DistributedFileSystem(DFS)  CommonLog File System(CLFS)  File ServerManagement  MicrosoftServicesforNetworkFile System  Storage ManagementforSANs  File ServerResource Manager PrinterandProtocol Support  PrintManagement Microsoft.NET Framework  Microsoft.NET Framework2.0 InternetandE-Mail ServicesandFeatures  WindowsSharepointServices UNIX Interoperability  IdentityManagementforUNIX  SubsystemforUNIX-basedApplications 140) Whatspecificupdatesare there in 2003 SP2? A) The updatesare as below: Clustering A neweventlogeventhasbeencreatedtoaddresscertainsituationsinwhichthe Clusterservice account becomesexcessivelyrestrictedbydomainpolicy.The new eventIDis1239. The eventtext includestroubleshootinginformation. Data access components XmlLite isnewwithWindowsServer2003 SP2.XmlLite isa fast,low-level,nativeXMLparserwitha small memoryfootprint. Distributedsystems Newoptionshave beenaddedtothe Dcdiag.exeDomainName System(DNS) teststogenerate XMLtags whenthe testsare run withthe /test:dnsoption.Itcan be usedto more easilyparse the verbose log that the DNS testsgenerate. File systems Icacls.exe isanupgrade of the Cacls.exe tool inWindowsServer2003 SP2,and can be usedtoresetthe access control lists(ACLs) onfilesfromRecoveryConsole,andtoback upACLs.Also, unlike Cacls.exe, Icacles.exe correctlypropagatesthe creationof inheritedACLsandchangesto them. MicrosoftMessage Queuing The defaultstorage limitformessage queuinghasbeenchangedto1 gigabyte (GB).If youchoose to have a storage limitof more than 1 GB, youcan change the storage limitsettinginMicrosoft ManagementConsole (MMC) onthe General tab of Message QueuingProperties. Networkingandcommunications 1. Includesanupdate that enablesyoutosimplifythe creationandmaintenanceof InternetProtocol security(IPsec) policy.Thisupdate enablesyoutouse an IPsec“Simple Policy”.Formostenvironments, the installationof thisupdate allowsyoutoreduce the numberof IPsecfiltersthatare requiredfora ServerIsolationdeploymentorfora DomainIsolationdeployment.Youcan reduce the numberof IPsec filtersfrommanyhundredsof filterstoonlytwofilters. 3. Group Policysupportfornon-broadcastingnetworksandWi-Fi ProtectedAccess2(WPA2) settings has beenaddedtothe WindowswirelessclientinWindowsServer2003 SP2. Thisupdate allowsthe
  • 20. Windowswirelessclienttoacceptadditional wirelessGroupPolicyconfigurationoptions.These new settingsinclude supportforWPA2parametersandnon-broadcastnetworks. 4. The WindowswirelessclientnowsupportsWPA2,whichenablesyoutotake advantage of highlevels of standards-basedconnectionandencryptionsecurity.New securityfeaturesinclude: Non-broadcastnetworkprofilesare nowmarkedwithaflagto improve the securityof the Windows wirelessclient. Windowswill notautomaticallyconnecttoapeer-to-peernetwork,evenif ithasbeen automatically savedinthe preferrednetworklist.Youmustmanuallyconnecttoa peer-to-peernetworkprofile. WindowsDeploymentServices Remote InstallationServicesisreplacedbyWindowsDeploymentServices.Youcan use Windows DeploymentServicesto setupnewcomputersthrougha network-basedinstallationwithouthavingto be physicallypresentateachcomputerand withouthavingtoinstall directlyfromDVDmedia. What isa “Single label domainname”andwhatsort of issuescanit cause? What isthe “in-addr.arpa”zone usedfor? What are the requirementsfromDNStosupportAD? How doyou manuallycreate SRV recordsinDNS? Name 3 benefitsof usingAD-integratedzones? What are the benefitsof usingwindows2012 DNSwhenusingAD-integratedzones? You installedanewADdomainandthe new (andfirst) DC has notregistereditsSRV recordsinDNS. Name a few possible causes. What are the nenefitsandscenariosof usingstubzones? What are the benefitsandscenariosof usingconditionalforwarding? What are the differencesbetweenwindowsclustering,networkloadbalancingandRoundRobin,and scenariosforeachuse? How doI work withthe hostname cache on a clientcompuer? How doI clear the DNS cache on the DNS server? What isthe 224.0.1.24 addressusedfor? What isWINS andwhendo we use it? Can youhae a Microsoft-basednetworkwithoutanyWINSserveronit?What are the “considerations” regardingnotusingWINS? Describe the differencesbetweenWINSpushandpull replications? What isthe differencesbeweentombstoningaWINSrecordand simplydeletingit? Name isthe difference betweentombstoningaWINSrecordand simplydeletingit? Name the NetBIOSnamesyoumightexpectfromawindows2003 DC that isregisteredinWINS. Describe the role of the routingtable ona host and ona router What are routerinterfaces?Whattypescantheybe? In Windows2003 routing,whatare the interface filters? What isNAT? What isthe real difference betweenNATandPAT? How doyou configure NATonWindows 2003? How doyou configure NATonWindows2003? How doyou allowinboundtrafficforspecifichostsonWindows2003 NAT? What isVPN?What typesof VPN doesWindows2000 and beyondworkwithnatively? What isIAS?In what scenariosdowe use it? What isthe difference betweenMixedmodeandnative mode inADwhendealingwithRRAS? What isthe RASand IASgroup inAD?
  • 21. What are ConditionsandProfile inRRASpolicies? What typesor authendicationcanaWindows2003 basedRRAS workwith? How doesSSLwork? How doesIPSecwork? How doI deployIPSecfora large numberof computers? What typesof authenticationcanIPSecuse? What isPFS (PerfectForwardSecrecy) inIPSec? How doI monitorIPSec? Lookingat IPSec-encryptedtrafficwithasniffer.WhatpackettypesdoI see? What can you dowithNETSH? How doI lookat the openportson my machine? What are Applicationpartition?WhendoIuse them?