0% found this document useful (0 votes)
23 views

New Study Materials

The document provides information about servers, Active Directory, and Flexible Single Master Operations (FSMO) roles. It defines different types of servers like mail, file, and web servers. It also explains the differences between a server and client operating system. The document then describes what Active Directory is and its components like the directory database and services. It provides steps to promote a server to a domain controller. Finally, it outlines the five FSMO roles in Active Directory - Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master - and describes the function of each role.

Uploaded by

Anjali Nagar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

New Study Materials

The document provides information about servers, Active Directory, and Flexible Single Master Operations (FSMO) roles. It defines different types of servers like mail, file, and web servers. It also explains the differences between a server and client operating system. The document then describes what Active Directory is and its components like the directory database and services. It provides steps to promote a server to a domain controller. Finally, it outlines the five FSMO roles in Active Directory - Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master - and describes the function of each role.

Uploaded by

Anjali Nagar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Websites for candidates to refer for Better Understanding:

Technet.microsoft.com
Channel9.msdn.com

Basic Server understanding


1. What is Server? Difference between mail server, file server and web server?
A server is a computer or system that provides resources, data, services, or programs to other computers, known as
clients, over a network
Servers are computers that run services to serve the needs of other computers. There are, for example, home
media servers, web servers, and print servers. There are also file servers and database servers.
File servers
File servers store and distribute files. Multiple clients or users may share files stored on a server. In addition,
centrally storing files offers easier backup or fault tolerance solutions than attempting to provide security and
integrity for files on every device in an organization. File server hardware can be designed to maximize read
and write speeds to improve performance.
Mail servers
Mail servers are a very common type of application server. Mail servers receive emails sent to a user and
store them until requested by a client on behalf of said user. Having an email server allows for a single
machine to be properly configured and attached to the network at all times. It is then ready to send and
receive messages rather than requiring every client machine to have its own email subsystem continuously
running.
Web servers
One of the most abundant types of servers in today’s market is a web server. A web server is a special kind of
application server that hosts programs and data requested by users across the Internet or an intranet. Web
servers respond to requests from browsers running on client computers for web pages, or other web-based
services. Common web servers include Apache web servers, Microsoft Internet Information Services (IIS)
servers and Nginx servers.

2. Difference between server operating system and client operating system


1. Client OS :
It is an operating system that operates within desktop. It is used to obtain services from a server. It run on the client
devices like laptop, computer and is very simple operating system.

2. Server OS :
It is an operating system that is designed to be used on server. It is used to provide services to multiple client. It can
serve multiple client at a time and is very advanced operating system.

Server Operating System Client Operating System


It can be used to provide services to multiple client. It can obtain services from a server.
It can serve multiple client at a time. It serves a single user at a time.
It is complex operating system. It is simple operating system.
It runs on the server. It runs on the client devices like laptop, computer etc.
It is an operating system that is designed to be used on server. It is an operating system that operates within desktop.
It provides more security. It provides less security.
It has greater processing power. It has less processing power.
It is more stable. It is less stable.
It is highly efficient. It is less efficient.
Examples: Red Hat, Linux. Examples: Windows, Android.

Active Directory
1. What is Active Directory?
Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks. ... It authenticates and
authorizes all users and computers in a Windows domain type network, assigning and enforcing security policies for all
computers, and installing or updating software.

Active Directory (AD) is a database and set of services that connect users with the network resources they need to get their work
done.

The database (or directory) contains critical information about your environment, including what users and computers there are
and who’s allowed to do what. For example, the database might list 100 user accounts with details like each person’s job title,
phone number and password. It will also record their permissions.

The services control much of the activity that goes on in your IT environment. In particular, they make sure each person is who
they claim to be (authentication), usually by checking the user ID and password they enter, and allow them to access only the data
they’re allowed to use (authorization).

Active Directory (AD) is a directory service created by Microsoft, and it comes as a set of processes and services in most versions
of Windows Server operating systems.

You can imagine AD as a database or a safe location that stores all the attributes of your users such as usernames, passwords, and
more. This central repository automates many tasks such as management of user data, provision of security, and inter-operations
with other directories.
2. Database of AD
The Active Directory database is made up of a single file named ntds. dit. By default, it is stored in the %SYSTEMROOT%\
NTDS folder
3. How do you promote a server to DC?
Open Server Manager. ...
Launch DC promotion wizard from Notification Flag. ...
Select the Deployment Operation. ...
Configure Domain Controller Options. ...
Configure the DNS Options. ...
Additional Options. ...
Paths. ...
Review Options.
Prerequisites Check
Install:
The installation can take up to 30 minutes depending on the resources your server has available. During the installation the server
will reboot, when it’s complete you will be brought to the login screen:
https://www.youtube.com/watch?v=oljD-ouI7xI

4. FSMO roles and function of each role? forest wide and domain wide roles? best role and why?

FSMO stands for Flexible Single Master Operation. Active directory database follows multiple master model which
means changes in active directory database get replicated to all the Domain Controllers in the domain
FSMO is broadly divided into five roles and they are:
Schema master
Domain naming master]
RID master
PDC emulator
Infrastructure master
Out of these, the first two FSMO roles are available at the forest level while the remaining three are necessary for every
domain.
Schema master
Schema master, as the name suggests, holds a read-write copy of your AD’s entire schema. If you’re wondering what a
schema is, it’s all the attributes associated with a user object and includes password, role, designation, and employee
ID, to name a few.
So, if you want to change the employee ID, you’ll have to do it in this DC. By default, the first controller you install in
your forest will be the schema master.
Domain naming master: is responsible for verifying domains, so there’s only one for every forest. This means if you’re
creating a brand new domain in an existing forest, this controller ensures that such a domain doesn’t already exist. If
your domain naming master is down for any reason, you can’t create a new domain.
Since you don’t create domains often, some enterprises prefer to have schema master and domain naming master
within the same controller.
RID master
Every time you create a security principle, be it a user account, group account, or a master account, you want to add
access permissions to it. But you can’t do it based on the name of a user or group because that can change at any time.
Let’s say you had Andy with a particular role, and he left the company. So, you closed Andy’s account and instead
brought in Tim. Now, you’ll have to go and replace Andy with Tim in the security access lists of every resource.
This is not practical, as it’s time-consuming and error prone.
This is why you associate every security principle with something called a security ID or SID. This way, even if Andy
changes to Tim, the SID will remain the same, so you’ll have to make just one change.
PDC emulator
PDC stands for Primary Domain Controller and it comes from a time when there was only one domain controller that
had a read-write copy of the schema. The remaining domain controllers were a backup for this PDC. So, if you wanted
to change a password, you’d have to go to the PDC.
Today, there are no more PDCs. But a few of its roles like time synchronization and password management are taken
over by a domain controller called PDC emulator.
Infrastructure master
The core functionality of an infrastructure master is to reference all local users and references within a domain. This
controller understands the overall infrastructure of the domain including what objects are present it.
It is responsible for updating object references locally and also ensures that it is up to date in the copies of other
domains. It handles this update process through a unique identifier, possibly a SID.
Infrastructure master is similar to another AD tool called Global Catalog (GC). This GC is like an index that knows where
everything is, inside an active directory. The infrastructure master, on the other hand, is a smaller version of GC, as it is
restricted within a single domain.
https://techgenix.com/fsmo-roles-in-active-directory/

5. Tree Vs Forest
The main difference between Tree and Forest in Active Directory is that Tree is a collection of domains while forest is a set of
trees in active directory. In brief, a tree is a collection of domains whereas a forest is a collection of trees.

6. Difference between member server and domain controller?


https://www.itingredients.com/domain-controller-vs-member-server-vs-client/
A Domain controller authenticates the users and the computers to join the domain. You can have many Domain controllers in your
AD for many reasons, like redundancy and load balance as users can use anyone of them as they are replicating AD database.
Member servers are servers running within a domain. Member sever runs an operating system which belongs to a domain and is
not a DC. Member server typically run different services on the machine can act like a file server web server application server
print server.
// When a server is connected to an Active Directory domain, it becomes a member server and permits a local logon and a domain
logon. Every company has member servers, ranging from just a few to thousands. Member servers are the core production service
of the company. They are available in all sizes, and perform a variety of responsibilities and functions.
A member server's key functions include:
Email management
Web services
Faxing
Image management
File storage

7. What is Global Catalogue?


This GC is like an index that knows where everything is, inside an active directory
A Global Catalog is a Global Catalog Server. A Global Catalog holds a full set of attributes for the domain in which it resides and
a subset of attributes for all objects in the Microsoft Active Directory Forest. ... You can use the Global Catalog on any domain
controller in the forest, even in subdomains.
8. Forest architecture? Domain architecture?
A Windows domain is a form of a computer network in which all user accounts, computers, printers and other security principals,
are registered with a central database located on one or more clusters of central computers known as domain controllers.
Authentication takes place on domain controllers. Each person who uses computers within a domain receives a unique user
account that can then be assigned access to resources within the domain.
A forest is a set of one or more domain trees that do not form a contiguous namespace. All trees in a forest share a common
schema, configuration, and global catalog. ... A forest exists as a set of cross-reference objects and Kerberos trust relationships
recognized by the member trees

9. What to not have infrastructure master on Global catalog server?


The Infrastructure Master is responsible for updating references from objects in the local domain to objects in other domains.
There can be only one Infrastructure Master DC in each domain.
10. What is LDAP and its port number?
The Lightweight Directory Access Protocol is an open, vendor-neutral, industry standard application protocol for accessing and
maintaining distributed directory information services over an Internet Protocol network
LDAP is a way of speaking to Active Directory.
LDAP is a protocol that many different directory services and access management solutions can understand.
The relationship between AD and LDAP is much like the relationship between Apache and HTTP:
HTTP is a web protocol.
Apache is a web server that uses the HTTP protocol.
LDAP is a directory services protocol.
Active Directory is a directory server that uses the LDAP protocol.
11. Physical and logical components of AD
The logical parts of Active Directory include forests, trees, domains, OUs and global catalogs.
The Logical Structure consists of Forests, Domain Trees, Domains, Organizational Units, and Objects
Sites and Domain Controllers Are Part of the Physical Structure
https://www.distributednetworks.com/active-directory/module3/activeDirectory-physical-structure.php

12. AD backup
13. SYSVOL
SYSVOL is a folder that exists on all domain controllers. It is the repository for all of the active directory files. It stores all the
important elements of the Active Directory group policy.
The default file location is C:\Windows\SYSVOL but it can be change during the DC setup.
Sysvol is an important component of Active Directory.

14. GROUP POLICIES and their hierarchy


Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to
implement specific configurations for users and computers. Group Policy is primarily a security tool, and can be used to apply
security settings to users and computers
The Group Policy hierarchy
Group Policy objects are applied in a hierarchical manner, and often multiple Group Policy objects are combined together to form
the effective policy. Local Group Policy objects are applied first, followed by site level, domain level, and organizational unit
level Group Policy objects.

15. AD restore
To enter DS Restore Mode, you must reboot the server at the console. Press F8 after the power-on self test (POST), which will
bring up a menu,

16. Directory services restore mode


DSRM Directory Services Restore Mode is a function on Active Directory Domain Controllers to take the server offline for
emergency maintenance, particularly restoring backups of AD objects. It is accessed on Windows Server via the advanced startup
menu, similarly to safe mode

17. What are Group Policies

Group Policy is a feature of the Microsoft Windows NT family of operating systems that controls the working
environment of user accounts and computer accounts. Group Policy provides centralized management and
configuration of operating systems, applications, and users' settings in an Active Directory environment

Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active
Directory to implement specific configurations for users and computers. Group Policy is primarily a security tool, and
can be used to apply security settings to users and computers. Group Policy allows administrators to define security
policies for users and for computers. These policies, which are collectively referred to as Group Policy Objects (GPOs),
are based on a collection of individual Group Policy settings
18. What is the difference between a Domain and a Workgroup

1. Domain :
Domain is a client/server network where user can login from any device of the office. Also known as Remote login. It
has a centralized administration and all devices can be managed from a centralized device. It prefers a centralized
storage and all the users data is stored at a centralized storage device which can be NAS or SAN.

2. Workgroup :
Workgroup is a peer to peer windows computer network, where users can use his login credentials only on his or her
system and not others. It holds an distributed administration wherein each user can manage his machine
independently. Most storage is distributed. Each device has its own dedicated storage.
S.NO. Domain Workgroup
1. The computers in a domain have a centralized database. -The computers in workgroup mainly has its own
local database.
2. A domain is mainly to transfer and share sensitive and important data only.- A Workgroup is used to
share less secure and personal data only due to less security.
3. A domain is mainly preferred for large public and business networks. -A workgroup is mainly preferred for
small local area networks like schools, colleges, buildings, etc.
4. A domain is used to transfer and share sensitive and important data due to security.- A workgroup is used
to share personal data as it is less secure.
5. A domain can work better for large numbers of devices.- A workgroup works better for fewer computers.
6. The domain names are provided by domain controller on the basis of IP address.-- In workgroup there
is no dependencies on any hardware components and server for assigning the name.
7. Data can be recovered in a domain from the centralized storage. --Data recovery is not possible in a
workgroup due to the local storage of each device.
8. A Domain can be formed using the devices of one or more different networks domain and adding all the
intended devices to it. --The devices of the same network can only be added to a workgroup.

19. Proxy Server


A proxy server provides a gateway between users and the internet. It is a server, referred to as an “intermediary”
because it goes between end-users and the web pages they visit online. When a computer connects to the internet, it
uses an IP address.
In computer networking, a proxy server is a server application that acts as an intermediary between a client
requesting a resource and the server providing that resource
For example, an HTTP proxy intercepts web access, and an SMTP proxy intercepts email.

20. What is firewall, how to change the settings for windows firewall, 3 rd party firewalls
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic
based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an
untrusted network, such as the Internet.
Disable fireball:
Open the Control Panel.
Choose System and Security and then choose Windows Firewall.
From the list of links on the left side of the window, choose Turn Windows Firewall On or Off.
Choose the option Turn Off Windows Firewall (Not Recommended).
Click the OK button.
3rd partry firewalls:
Bitdefender Total Security. Total security with firewall protection. ...
Avast Premium Security. Powerful multi-device firewall and more. ...
Norton 360 Premium. Multi-feature firewall protection and more. ...
Comodo Firewall.
Networking
1. Public IP Vs private IP
Private IP address of a system is the IP address which is used to communicate within the same network. Using private IP data or
information can be sent or received within the same network.

Public IP address of a system is the IP address which is used to communicate outside the network. Public IP address is basically
assigned by the ISP (Internet Service Provider).
Difference between Private and Public IP address:

PRIVATE IP ADDRESS PUBLIC IP ADDRESS


Scope is local. Scope is global.
It is used to communicate within the network. It is used to communicate outside the network.
Private IP addresses of the systems connected in a network differ in a uniform manner. Public IP may differ in uniform or non-
uniform manner.
It works only in LAN. It is used to get internet service.
It is used to load network operating system. It is controlled by ISP.
It is available in free of cost. It is not free of cost.
Private IP can be known by entering “ipconfig” on command prompt. Public IP can be known by searching “what is my
ip” on google.
Range:
10.0.0.0 – 10.255.255.255,
172.16.0.0 – 172.31.255.255,
192.168.0.0 – 192.168.255.255
Range:
Besides private IP addresses, rest are public

2. Static Vs dynamic IP
When a device is assigned a static IP address, the address does not change. Most devices use dynamic IP addresses, which are
assigned by the network when they connect and change over time.
S.NO Static IP Address Dynamic IP address
1. It is provided by ISP(Internet Service Provider). While it is provided by DHCP (Dynamic Host
Configuration Protocol).
2. Static ip address does not change any time, it means if a static ip address is provided then it can’t be changed or
modified. While dynamic ip address change any time.
3. Static ip address is less secure. While in dynamic ip address, there is low amount
of risk than static ip address’s risk.
4. Static ip address is difficult to designate. While dynamic ip address is easy to designate.
5. The device designed by static ip address can be trace. But the device designed by dynamic ip address can’t be
trace.
6. Static ip address is more stable than dynamic ip address. While dynamic ip address is less stable than
static ip address.
7. The cost to maintain the static ip address is higher than dynamic ip address . While the maintaining cost of
dynamic ip address is less than static ip address.
8. It is used where computational data is less confidential. While it is used where data is more confidential
and needs more security.

3. What is PING- protocol behind ping

Ping protocol
Internet Control Message Protocol (ICMP) is an important diagnostic tool for troubleshooting the Internet. Though ICMP
provides many specialized message services, three are particularly important: • Ping. Ping is a request/response protocol designed
to determine the reachability of another IP address.
4. Class A/B/C network
What is the difference between Class A Class B and Class C networks?
For any given IP address, the address class is easy to determine. ... If the first number is between 0 and 127 inclusive, the address
is class A. If the first number is between 128 and 191 inclusive, the address is class B. If the first number is between 192 and 223
inclusive, the address is class C.
https://docs.oracle.com/cd/E19504-01/802-5753/planning3-78185/index.html

5. What is Subnet mask


A subnetwork or subnet is a logical subdivision of an IP network. The practice of dividing a network into two or more networks is
called subnetting. Computers that belong to the same subnet are addressed with an identical most-significant bit-group in their IP
addresses.
6. OSI layers

7. Hub Vs switch Vs router


Hub and Switch are both network connecting devices. Hub works at physical layer and is responsible to transmit the signal to port
to respond where the signal was received whereas Switch enable connection setting and terminating based on need.
Following are the important differences between Hub and Switch.
https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch-router-gateways/

Hub Physical layer


Switch Data link layer
Router Network layer
Objective Hub main objective is to transmit the signal to port to respond where the signal was received. Switch
enables connection setting and terminating based on need.
2 Layer Hub works in Physical Layer. Switch works in Data Link Layer.
3 Transmission Type Hub uses broadcast type transmission. Switch uses unicast, multicast as well as
broadcast type transmision.
4 Ports Hub can have maximum 4 ports. Switch can have 24 to 28 ports.
5 Collision DomainHub has a single collision domain. In Switch, each port have their own collision domain.
6 Packet Filtering Hub do not provide packet filtering.Switch provides packet filtering.
7 Transmission Mode Hub uses half duplex transmission mode. Switch uses full duplex transmission mode.
8. Unicast Vs multicast

Unicast: a phone call between two people


Broadcast: Television signals sent from a public network to viewers across the country or globe, Online streaming
Multicast: sending an e-mail message to a mailing list
9. LAN Vs WAN
LAN is a computer network that covers a small geographic area, like a home, office, or group of buildings, while WAN is a
computer network that covers a broader area. The speed of LAN is high whereas the speed of WAN is slower than LAN. LAN
offers more fault tolerance but WAN offers less fault tolerance in WAN.
10. TCP handshake
In telecommunications, a handshake is an automated process of negotiation between two participants through the exchange of
information that establishes the protocols of a communication link at the start of the communication, before full communication
begins.

11. Sub netting


A subnetwork or subnet is a logical subdivision of an IP network. The practice of dividing a network into two or more
networks is called subnetting. Computers that belong to the same subnet are addressed with an identical most-significant
bit-group in their IP addresses

12. TCP Vs UDP


TCP is a connection-oriented protocol, whereas UDP is a connectionless protocol. A key difference between TCP and
UDP is speed, as TCP is comparatively slower than UDP. Overall, UDP is a much faster, simpler, and efficient protocol,
however, retransmission of lost data packets is only possible with TCP.

13. Socket
A network socket is a software structure within a network node of a computer network that serves as an endpoint for sending and
receiving data across the network.

14. Ports used by DHCP, DNS, SMTP, Kerberos, LDAP. FTP, telnet, GC

DHCP clients need to use the UDP port 68, Server uses port 67
DNS: port 53
SMTP: port 25
Kerberos: 88
LDAP: 389 UDP/ LDAPS:636TCP/
DNS
15. What is DNS? DNS server?
The Domain Name System is a hierarchical and decentralized naming system for computers, services, or other resources
connected to the Internet or a private network. It associates various information with domain names assigned to each of the
participating entities
The Domain Name System (DNS) is an important part of the internet, providing a way to map names (a website you're seeking) to
numbers (the address for the website). Anything connected to the internet - laptops, tablets, mobile phones, websites - has an
Internet Protocol (IP) address.
16. What are DNS zones?
A DNS zone is an administrative suvdivision of the DNS namespace
A DNS zone is any distinct, contiguous portion of the domain name space in the Domain Name System (DNS) for which
administrative responsibility has been delegated to a single manager.

17. Forward Vs reverse lookup zone


Forward lookup zones resolve names to IP addresses and Reverse lookup zones resolve IP addresses to names.

18. Iterative Vs recursive query


https://www.omnisecu.com/tcpip/recursive-and-iterative-dns-queries.php
https://www.slashroot.in/difference-between-iterative-and-recursive-dns-query
What is a recursive query? A recursive query is a kind of query, in which the DNS server, who received your query will
do all the job of fetching the answer, and giving it back to you. During this process, the DNS server might also query
other DNS server's in the internet on your behalf, for the answer
19. Resolver
A DNS resolver, also called a recursive resolver, is a server designed to receive DNS queries from web browsers and other
applications. The resolver receives a hostname - for example, www.example.com - and is responsible for tracking down the IP
address for that hostname.
The DNS resolver might be operated by the local network, an Internet Service Provider (IP), a mobile carrier, a WIFI network, or
other third party. The resolver starts by looking in its local cache or that of the operating system on the local device - if the
hostname is found, it is resolved immediately.
If not found, the resolver contacts a DNS Root Server and receives details of a TLD Name Server. Via the TLD Name Server, it
receives details of an Authoritative Name Server, and asks it for the IP that matches the requested hostname. When it receives the
IP, the query is resolved.

20. Primary Vs secondary server


A primary server is a server that acts as the first source for Domain Name System (DNS) data and responds to queries. It can be
contrasted to the secondary server, which acts like the primary server but does not have the same access to data.
A secondary server is a type of server that serves as an addition to the primary server and is used for a variety of services. It has
the same features and capabilities as the primary server and acts as a second or substitutive point of contact in case the primary
server is unavailable, busy or overloaded.

21. Stubs zone Vs forwarders


https://www.easy365manager.com/stub-zone/
A stub zone is a copy of a Domain Name System (DNS) zone that contains only resource records that identify the DNS
servers for that zone. You can add either a forward lookup zone or a reverse lookup zone.
A forward zone is where queries are sent before being forwarded to other remote name servers. A stub zone contains
records that identify the authoritative name servers in another zone.
22. Caching only server
A caching-only server saves data in a cache file until the data expires. Expiration occurs based on a ``time-to-live'' field
attached to data received from another server. A caching-only server answers data from its cache if it has the
information, or requests it from authoritative servers if it does not.
23. Root hints
Root hints are a list of the DNS servers on the Internet that your DNS servers can use to resolve queries for names that it does not
know. When a DNS server cannot resolve a name query by using its local data, it uses its root hints to send the query to a DNS
server.
Root hints are used If your Windows DNS server is connected to the internet and your clients want to find websites, then you need
to check your root hints. What Root Hints do is act as pointers to servers that know the IP address of the top level domains
DHCP

24. Define DHCP and its working? DHCP Server?


The Dynamic Host Configuration Protocol is a network management protocol used on Internet Protocol networks for
automatically assigning IP addresses and other communication parameters to devices connected to the network using a client–
server architecture.
A DHCP Server is a network server that automatically provides and assigns IP addresses, default gateways and other network
parameters to client devices.
25. DORA process? And on what protocol it works? Port number for DHCP?
DHCP operations fall into four phases: server discovery, IP lease offer, IP lease request, and IP lease acknowledgement. These
stages are often abbreviated as DORA for discover, offer, request, and acknowledgement

26. Is Dora process is Broadcast or Unicast process? What message is broadcasted when a new client joining the
network?
Broadcast: as client or host do not know the location of the server. A discover message is broadcasted.
27. What offer is made when any DHCP clients offer?
IP, Default gateway, Subnet mast, IP Lease and lease time
28. Lease process
server discovery, IP lease offer, IP lease request, and IP lease acknowledgement
29. Default period for which IP gets leased
24 hours. After that it can be renewed once expired.
30. What is APIPA?
APIPA stands for Automatic Private IP Addressing (APIPA). ... Windows) which enables computers to self-configure an IP
address and subnet mask automatically when their DHCP(Dynamic Host Configuration Protocol) server isn't reachable.
Communication can be established properly if not getting response from DHCP Server.
APIPA regulates the service, by which always checking response and status of the main DHCP server in a specific period of time.
It can be used as a backup of DHCP because when DHCP stops working then APIPA has the ability to assign IP to the networking
hosts.
It stops unwanted broadcasting.
It uses ARP(Address Resolution Protocol) to confirm the address isn’t currently in use.
APIPA ip addresses can slow you network.
APIPA doesnot provide network gateway as DHCP does.
APIPA addresses are restricted for use in local area network.
APIPA configured devices follow the peer to peer communication rule.
31. Scope
A scope is a consecutive range of IP addresses that a DHCP server can draw on to fulfill an IP address request from a DHCP
client. By defining one or more scopes on your DHCP server, the server can manage the distribution and assignment of IP
addresses to DHCP clients.
32. Exclusion list
An exclusion is an address or range of addresses taken from a DHCP scope that the DHCP server is not allowed to hand out.

Basic System topics

33. Knowledge of BIOS, Boot process and Booting Sequence for windows 7, 8 and 10?
BIOS:
which stands for Basic Input Output System, is software stored on a small memory chip on the motherboard. It's BIOS that's
responsible for the POST and therefore makes it the very first software to run when a computer is started.
The BIOS firmware is non-volatile, meaning that its settings are saved and recoverable even after power has been removed from
the device.

Boot Process:
 1: BIOS and Setup Program
 2: The Power-On-Self-Test (POST)
 3: The Operating System (OS) Loads
 4: System Configuration
 5: System Utility Loads
 6: Users Authentication

Boot sequence
Alternatively referred to as boot options or boot order, the boot sequence defines which devices a computer should check for the
operating system's boot files. It also specifies the order devices are checked. The list can be changed and re-ordered in the
computer's BIOS, as shown in the example below.
34. Advance boot options
Windows+R = Msconfig =

35. Clean boot Vs advance clean boot


Clean boot: Win+R = Msconfig > Services > Hide all ms services> Disable all.
Advanced clean boot:
Clean boot + Select Startup form the msconfig page > Disable the startup apps form the task manager

36. Latest version of Client operating system and server operating system.
The latest version of Windows 10 is the May 2021 Update. ... This update was codenamed “21H1” during its
development process, as it was released in the first half of 2021. Its final build number is 19043.

Windows Server 2019 is the ninth (and the latest) version of the Windows Server operating system by
Microsoft

37. How to check an IP address through command prompt?


ipconfig

38. What is telnet?


Telnet is a network protocol used to virtually access a computer and to provide a two-way, collaborative and text-based
communication channel between two machines. It follows a user command Transmission Control Protocol/Internet
Protocol (TCP/IP) networking protocol for creating remote sessions.
Source: https://searchnetworking.techtarget.com/definition/Telnet
39. What is PING command used for?
To check the reachability of a host or a device on a network.
ping is the primary TCP/IP command used to troubleshoot connectivity, reachability, and name resolution. Used
without parameters, this command displays Help content. You can also use this command to test both the computer
name and the IP address of the computer.

40. What is MS-configuration?


MSConfig is a system utility to troubleshoot the Microsoft Windows startup process. It can disable or re-enable
software, device drivers and Windows services that run at startup, or change boot parameters.

41. IF PC is working slow? What is the basic troubleshooting you would do? Explain?
Restart
Win + R > %temp% > Delete all the files.
Disable start up applications.
Update the OS
IF the speed got slow after a windows update> Uninstall recent updates
Disable unneccessary third party services from services.msc
Free up space form the hard drive.
In worst case where the work load is high> increase the computer memory.

42. What is virtual memory in windows servers?


This pc> Properties> Advanced system settings> Advanced> Performance> Settings> virtual memroy

43. Difference between 32bit Operating system and 64bit operating system

Sr. Key 32-bit OS. 64-bit OS.


No.
Data and storage As the name suggests 32 bit OS On the other hand, 64 bit OS can handle more
handling. handle and store less data as data than 32 bit OS, in numbers, it can address
compared to 64 bit OS. More 264 memory addresses, i.e actually 18-Quintillion
1
specifically 32-bit OS can address GB of RAM.
a maximum of 4 GB
4,294,967,296 bytes) of RAM
System A system with a 64-bit processor On the other hand systems with a 32-bit
compatibility. can run either of a 64-bit or 32-bit processor could run 32 bit OS properly but 64-bit
2
version of an operating system OS would not run at its full capability.
installed.
Performance The 32-bit processor as On the other hand, a 64-bit processor is more
compared to the 64-bit processor recommended for multitasking and other heavy
is less efficient in a factor of application execution due to its high performance
3 performance. as compared to a 32-bit processor.

44. Difference between temp command and %temp% command


The two Temp folders mentioned are not same. First "Temp" folder is related to windows temporary data. The second
"%Temp%" is a temporary folder which is used to store the application related data (Not operating system data). If you
update any application (say firefox) the application is downloaded to this temp folder and then installed and then the
setup file is deleted. It is just used as a garbage space for some application related activities.

45. Print spooler service


Print Spooler is a Windows service enabled by default in all Windows clients and servers. The service manages print jobs
by loading printer drivers, receiving files to be printed, queuing them, scheduling, and so on.

46. What is IPCMP PROTOCOL?


The ICMP stands for Internet Control Message Protocol. It is a network layer protocol. It is used for error handling in the
network layer, and it is primarily used on network devices such as routers. As different types of errors can exist in the
network layer, so ICMP can be used to report these errors and to debug those errors.
For example, some sender wants to send the message to some destination, but the router couldn't send the message to
the destination. In this case, the router sends the message to the sender that I could not send the message to that
destination.

47. Windows OS Services and commands.

O365

1. What is Exchange and various exchange servers? In depth understanding


[email protected] Pwd: Mnisb5596!?
Office.com > Admin > Admin centeres> Exchange

https://docs.microsoft.com/en-us/exchange/plan-and-deploy/deployment-ref/editions-and-versions?view=exchserver-
2019

2. How to set up an outlook account? In depth understanding


https://www.youtube.com/watch?v=JEQO0_Or04s

3. What is O365 and its web support? In depth understanding


https://itservices.usc.edu/office365/
Office 365 is a cloud-based, subscription model version of Microsoft’s popular productivity suite Microsoft Office.
Office 365 contains the same core applications as traditional versions of Office, including Word, Excel, PowerPoint,
Outlook, OneNote, and depending on the plan purchased, may also include other apps and services such as
Publisher, Planner, OneDrive, Exchange, SharePoint, Access, Skype, Yammer, and Microsoft Teams.

4. What are various services one can get with O365 package? In depth understanding
including Word, Excel, PowerPoint, Outlook, OneNote, and depending on the plan purchased, may also include other apps
and services such as Publisher, Planner, OneDrive, Exchange, SharePoint, Access, Skype, Yammer, and Microsoft Teams.
https://www.nigelfrank.com/blog/everything-you-ever-wanted-to-know-about-office-365/
5. Troubleshooting steps and knowhow of Outlook. In depth understanding
https://www.youtube.com/watch?v=enGl88M5Pxk

6. Exchange protocol IMAP, POP3 and SMTP, Mapi? In depth understanding


https://www.linkedin.com/pulse/e-mail-protocols-pop-smtp-imap-mapi-sumit-jain/

7. Difference between OST and PST file? In depth understanding


https://www.sysinfotools.com/blog/difference-between-ost-and-pst/
In Microsoft Outlook, Personal Storage Table (PST) stores the copies of the messages, contacts, calendars etc. on
user’s system from the account configured on the Outlook. PST is an Open file format. When a user creates the
account in the Outlook, a default PST file automatically created. A PST file also allows securing from the unauthorized
access with the password.
Offline Storage Table (.ost file) is an offline Outlook data file which stores an offline copy of Outlook data item that exists
on the server. OST file allows users to work even in the absence of the server connection. Users can edit the data, save
emails in the draft, adding and deleting etcetera. Whenever the user works in the absence of server, a carbon copy of
mailbox is created by MS Outlook and store locally on the users’ system.
OST is the offline folder created by the MS Outlook and Server to store offline copies of data whereas PST not created by
the Outlook or Exchange Server. Users create it to store emails, contacts and calendar entries etcetera.PST files are
friendly for the backup, as you can store them anywhere or can easily transfer from one system to another.

8. What port numbers for IMAP, POP3 and SMTP with SSL and without SSL?
imap : 143
pop3: 110
SMTP with SSL : Port 587
SMTP with SSL : Port 25 or 26

9. What is SharePoint? In depth understanding


https://www.youtube.com/watch?v=r8OXAjhhGAQ
SharePoint Online, while available on Office 365, is a collaborative platform that integrates with Microsoft Office.
SharePoint Online, which can be configured for a company’s usage, allows an enterprise to store, retrieve, search,
archive, track, manage, and report on digitized documents.

10. What is Yammer? In depth understanding


https://www.youtube.com/watch?v=zBwr7nAgcmk
Yammer is an enterprise social networking service used for private communication within organizations.

11. What is Skype for Business? In depth understanding


Skype for Business was an enterprise software application for instant messaging and videotelephony developed by
Microsoft as part of the Microsoft Office suite.
Replaced by> Microsoft Teams
12. How to create any outlook profile? In depth understanding
In Outlook, select File > Account Settings > Manage Profiles.
Choose Show Profiles > Add.
In the Profile Name box, type a name for the profile, and then choose OK
13. If outlook is not working? What is the basic troubleshooting step? In depth understanding
Start Outlook In Safe-Mode. ...
Run The Microsoft Support and Recovery Assistant. ...
Run The Inbox Repair Tool. ...
Repair Office. ...
Remove Outlook From Your Startup Folder. ...
Stop Performing a Send/Receive When Exiting Outlook. ...
Update All Your Add-Ins. ...
Try It On a Another Machine.

You might also like