New Study Materials
New Study Materials
Technet.microsoft.com
Channel9.msdn.com
2. Server OS :
It is an operating system that is designed to be used on server. It is used to provide services to multiple client. It can
serve multiple client at a time and is very advanced operating system.
Active Directory
1. What is Active Directory?
Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks. ... It authenticates and
authorizes all users and computers in a Windows domain type network, assigning and enforcing security policies for all
computers, and installing or updating software.
Active Directory (AD) is a database and set of services that connect users with the network resources they need to get their work
done.
The database (or directory) contains critical information about your environment, including what users and computers there are
and who’s allowed to do what. For example, the database might list 100 user accounts with details like each person’s job title,
phone number and password. It will also record their permissions.
The services control much of the activity that goes on in your IT environment. In particular, they make sure each person is who
they claim to be (authentication), usually by checking the user ID and password they enter, and allow them to access only the data
they’re allowed to use (authorization).
Active Directory (AD) is a directory service created by Microsoft, and it comes as a set of processes and services in most versions
of Windows Server operating systems.
You can imagine AD as a database or a safe location that stores all the attributes of your users such as usernames, passwords, and
more. This central repository automates many tasks such as management of user data, provision of security, and inter-operations
with other directories.
2. Database of AD
The Active Directory database is made up of a single file named ntds. dit. By default, it is stored in the %SYSTEMROOT%\
NTDS folder
3. How do you promote a server to DC?
Open Server Manager. ...
Launch DC promotion wizard from Notification Flag. ...
Select the Deployment Operation. ...
Configure Domain Controller Options. ...
Configure the DNS Options. ...
Additional Options. ...
Paths. ...
Review Options.
Prerequisites Check
Install:
The installation can take up to 30 minutes depending on the resources your server has available. During the installation the server
will reboot, when it’s complete you will be brought to the login screen:
https://www.youtube.com/watch?v=oljD-ouI7xI
4. FSMO roles and function of each role? forest wide and domain wide roles? best role and why?
FSMO stands for Flexible Single Master Operation. Active directory database follows multiple master model which
means changes in active directory database get replicated to all the Domain Controllers in the domain
FSMO is broadly divided into five roles and they are:
Schema master
Domain naming master]
RID master
PDC emulator
Infrastructure master
Out of these, the first two FSMO roles are available at the forest level while the remaining three are necessary for every
domain.
Schema master
Schema master, as the name suggests, holds a read-write copy of your AD’s entire schema. If you’re wondering what a
schema is, it’s all the attributes associated with a user object and includes password, role, designation, and employee
ID, to name a few.
So, if you want to change the employee ID, you’ll have to do it in this DC. By default, the first controller you install in
your forest will be the schema master.
Domain naming master: is responsible for verifying domains, so there’s only one for every forest. This means if you’re
creating a brand new domain in an existing forest, this controller ensures that such a domain doesn’t already exist. If
your domain naming master is down for any reason, you can’t create a new domain.
Since you don’t create domains often, some enterprises prefer to have schema master and domain naming master
within the same controller.
RID master
Every time you create a security principle, be it a user account, group account, or a master account, you want to add
access permissions to it. But you can’t do it based on the name of a user or group because that can change at any time.
Let’s say you had Andy with a particular role, and he left the company. So, you closed Andy’s account and instead
brought in Tim. Now, you’ll have to go and replace Andy with Tim in the security access lists of every resource.
This is not practical, as it’s time-consuming and error prone.
This is why you associate every security principle with something called a security ID or SID. This way, even if Andy
changes to Tim, the SID will remain the same, so you’ll have to make just one change.
PDC emulator
PDC stands for Primary Domain Controller and it comes from a time when there was only one domain controller that
had a read-write copy of the schema. The remaining domain controllers were a backup for this PDC. So, if you wanted
to change a password, you’d have to go to the PDC.
Today, there are no more PDCs. But a few of its roles like time synchronization and password management are taken
over by a domain controller called PDC emulator.
Infrastructure master
The core functionality of an infrastructure master is to reference all local users and references within a domain. This
controller understands the overall infrastructure of the domain including what objects are present it.
It is responsible for updating object references locally and also ensures that it is up to date in the copies of other
domains. It handles this update process through a unique identifier, possibly a SID.
Infrastructure master is similar to another AD tool called Global Catalog (GC). This GC is like an index that knows where
everything is, inside an active directory. The infrastructure master, on the other hand, is a smaller version of GC, as it is
restricted within a single domain.
https://techgenix.com/fsmo-roles-in-active-directory/
5. Tree Vs Forest
The main difference between Tree and Forest in Active Directory is that Tree is a collection of domains while forest is a set of
trees in active directory. In brief, a tree is a collection of domains whereas a forest is a collection of trees.
12. AD backup
13. SYSVOL
SYSVOL is a folder that exists on all domain controllers. It is the repository for all of the active directory files. It stores all the
important elements of the Active Directory group policy.
The default file location is C:\Windows\SYSVOL but it can be change during the DC setup.
Sysvol is an important component of Active Directory.
15. AD restore
To enter DS Restore Mode, you must reboot the server at the console. Press F8 after the power-on self test (POST), which will
bring up a menu,
Group Policy is a feature of the Microsoft Windows NT family of operating systems that controls the working
environment of user accounts and computer accounts. Group Policy provides centralized management and
configuration of operating systems, applications, and users' settings in an Active Directory environment
Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active
Directory to implement specific configurations for users and computers. Group Policy is primarily a security tool, and
can be used to apply security settings to users and computers. Group Policy allows administrators to define security
policies for users and for computers. These policies, which are collectively referred to as Group Policy Objects (GPOs),
are based on a collection of individual Group Policy settings
18. What is the difference between a Domain and a Workgroup
1. Domain :
Domain is a client/server network where user can login from any device of the office. Also known as Remote login. It
has a centralized administration and all devices can be managed from a centralized device. It prefers a centralized
storage and all the users data is stored at a centralized storage device which can be NAS or SAN.
2. Workgroup :
Workgroup is a peer to peer windows computer network, where users can use his login credentials only on his or her
system and not others. It holds an distributed administration wherein each user can manage his machine
independently. Most storage is distributed. Each device has its own dedicated storage.
S.NO. Domain Workgroup
1. The computers in a domain have a centralized database. -The computers in workgroup mainly has its own
local database.
2. A domain is mainly to transfer and share sensitive and important data only.- A Workgroup is used to
share less secure and personal data only due to less security.
3. A domain is mainly preferred for large public and business networks. -A workgroup is mainly preferred for
small local area networks like schools, colleges, buildings, etc.
4. A domain is used to transfer and share sensitive and important data due to security.- A workgroup is used
to share personal data as it is less secure.
5. A domain can work better for large numbers of devices.- A workgroup works better for fewer computers.
6. The domain names are provided by domain controller on the basis of IP address.-- In workgroup there
is no dependencies on any hardware components and server for assigning the name.
7. Data can be recovered in a domain from the centralized storage. --Data recovery is not possible in a
workgroup due to the local storage of each device.
8. A Domain can be formed using the devices of one or more different networks domain and adding all the
intended devices to it. --The devices of the same network can only be added to a workgroup.
20. What is firewall, how to change the settings for windows firewall, 3 rd party firewalls
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic
based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an
untrusted network, such as the Internet.
Disable fireball:
Open the Control Panel.
Choose System and Security and then choose Windows Firewall.
From the list of links on the left side of the window, choose Turn Windows Firewall On or Off.
Choose the option Turn Off Windows Firewall (Not Recommended).
Click the OK button.
3rd partry firewalls:
Bitdefender Total Security. Total security with firewall protection. ...
Avast Premium Security. Powerful multi-device firewall and more. ...
Norton 360 Premium. Multi-feature firewall protection and more. ...
Comodo Firewall.
Networking
1. Public IP Vs private IP
Private IP address of a system is the IP address which is used to communicate within the same network. Using private IP data or
information can be sent or received within the same network.
Public IP address of a system is the IP address which is used to communicate outside the network. Public IP address is basically
assigned by the ISP (Internet Service Provider).
Difference between Private and Public IP address:
2. Static Vs dynamic IP
When a device is assigned a static IP address, the address does not change. Most devices use dynamic IP addresses, which are
assigned by the network when they connect and change over time.
S.NO Static IP Address Dynamic IP address
1. It is provided by ISP(Internet Service Provider). While it is provided by DHCP (Dynamic Host
Configuration Protocol).
2. Static ip address does not change any time, it means if a static ip address is provided then it can’t be changed or
modified. While dynamic ip address change any time.
3. Static ip address is less secure. While in dynamic ip address, there is low amount
of risk than static ip address’s risk.
4. Static ip address is difficult to designate. While dynamic ip address is easy to designate.
5. The device designed by static ip address can be trace. But the device designed by dynamic ip address can’t be
trace.
6. Static ip address is more stable than dynamic ip address. While dynamic ip address is less stable than
static ip address.
7. The cost to maintain the static ip address is higher than dynamic ip address . While the maintaining cost of
dynamic ip address is less than static ip address.
8. It is used where computational data is less confidential. While it is used where data is more confidential
and needs more security.
Ping protocol
Internet Control Message Protocol (ICMP) is an important diagnostic tool for troubleshooting the Internet. Though ICMP
provides many specialized message services, three are particularly important: • Ping. Ping is a request/response protocol designed
to determine the reachability of another IP address.
4. Class A/B/C network
What is the difference between Class A Class B and Class C networks?
For any given IP address, the address class is easy to determine. ... If the first number is between 0 and 127 inclusive, the address
is class A. If the first number is between 128 and 191 inclusive, the address is class B. If the first number is between 192 and 223
inclusive, the address is class C.
https://docs.oracle.com/cd/E19504-01/802-5753/planning3-78185/index.html
13. Socket
A network socket is a software structure within a network node of a computer network that serves as an endpoint for sending and
receiving data across the network.
14. Ports used by DHCP, DNS, SMTP, Kerberos, LDAP. FTP, telnet, GC
DHCP clients need to use the UDP port 68, Server uses port 67
DNS: port 53
SMTP: port 25
Kerberos: 88
LDAP: 389 UDP/ LDAPS:636TCP/
DNS
15. What is DNS? DNS server?
The Domain Name System is a hierarchical and decentralized naming system for computers, services, or other resources
connected to the Internet or a private network. It associates various information with domain names assigned to each of the
participating entities
The Domain Name System (DNS) is an important part of the internet, providing a way to map names (a website you're seeking) to
numbers (the address for the website). Anything connected to the internet - laptops, tablets, mobile phones, websites - has an
Internet Protocol (IP) address.
16. What are DNS zones?
A DNS zone is an administrative suvdivision of the DNS namespace
A DNS zone is any distinct, contiguous portion of the domain name space in the Domain Name System (DNS) for which
administrative responsibility has been delegated to a single manager.
26. Is Dora process is Broadcast or Unicast process? What message is broadcasted when a new client joining the
network?
Broadcast: as client or host do not know the location of the server. A discover message is broadcasted.
27. What offer is made when any DHCP clients offer?
IP, Default gateway, Subnet mast, IP Lease and lease time
28. Lease process
server discovery, IP lease offer, IP lease request, and IP lease acknowledgement
29. Default period for which IP gets leased
24 hours. After that it can be renewed once expired.
30. What is APIPA?
APIPA stands for Automatic Private IP Addressing (APIPA). ... Windows) which enables computers to self-configure an IP
address and subnet mask automatically when their DHCP(Dynamic Host Configuration Protocol) server isn't reachable.
Communication can be established properly if not getting response from DHCP Server.
APIPA regulates the service, by which always checking response and status of the main DHCP server in a specific period of time.
It can be used as a backup of DHCP because when DHCP stops working then APIPA has the ability to assign IP to the networking
hosts.
It stops unwanted broadcasting.
It uses ARP(Address Resolution Protocol) to confirm the address isn’t currently in use.
APIPA ip addresses can slow you network.
APIPA doesnot provide network gateway as DHCP does.
APIPA addresses are restricted for use in local area network.
APIPA configured devices follow the peer to peer communication rule.
31. Scope
A scope is a consecutive range of IP addresses that a DHCP server can draw on to fulfill an IP address request from a DHCP
client. By defining one or more scopes on your DHCP server, the server can manage the distribution and assignment of IP
addresses to DHCP clients.
32. Exclusion list
An exclusion is an address or range of addresses taken from a DHCP scope that the DHCP server is not allowed to hand out.
33. Knowledge of BIOS, Boot process and Booting Sequence for windows 7, 8 and 10?
BIOS:
which stands for Basic Input Output System, is software stored on a small memory chip on the motherboard. It's BIOS that's
responsible for the POST and therefore makes it the very first software to run when a computer is started.
The BIOS firmware is non-volatile, meaning that its settings are saved and recoverable even after power has been removed from
the device.
Boot Process:
1: BIOS and Setup Program
2: The Power-On-Self-Test (POST)
3: The Operating System (OS) Loads
4: System Configuration
5: System Utility Loads
6: Users Authentication
Boot sequence
Alternatively referred to as boot options or boot order, the boot sequence defines which devices a computer should check for the
operating system's boot files. It also specifies the order devices are checked. The list can be changed and re-ordered in the
computer's BIOS, as shown in the example below.
34. Advance boot options
Windows+R = Msconfig =
36. Latest version of Client operating system and server operating system.
The latest version of Windows 10 is the May 2021 Update. ... This update was codenamed “21H1” during its
development process, as it was released in the first half of 2021. Its final build number is 19043.
Windows Server 2019 is the ninth (and the latest) version of the Windows Server operating system by
Microsoft
41. IF PC is working slow? What is the basic troubleshooting you would do? Explain?
Restart
Win + R > %temp% > Delete all the files.
Disable start up applications.
Update the OS
IF the speed got slow after a windows update> Uninstall recent updates
Disable unneccessary third party services from services.msc
Free up space form the hard drive.
In worst case where the work load is high> increase the computer memory.
43. Difference between 32bit Operating system and 64bit operating system
O365
https://docs.microsoft.com/en-us/exchange/plan-and-deploy/deployment-ref/editions-and-versions?view=exchserver-
2019
4. What are various services one can get with O365 package? In depth understanding
including Word, Excel, PowerPoint, Outlook, OneNote, and depending on the plan purchased, may also include other apps
and services such as Publisher, Planner, OneDrive, Exchange, SharePoint, Access, Skype, Yammer, and Microsoft Teams.
https://www.nigelfrank.com/blog/everything-you-ever-wanted-to-know-about-office-365/
5. Troubleshooting steps and knowhow of Outlook. In depth understanding
https://www.youtube.com/watch?v=enGl88M5Pxk
8. What port numbers for IMAP, POP3 and SMTP with SSL and without SSL?
imap : 143
pop3: 110
SMTP with SSL : Port 587
SMTP with SSL : Port 25 or 26