Interview_Questions
Interview_Questions
Ans(2):
A server operating system (OS) is installed on a server computer to manage
resources and provide services to multiple programs. A client OS runs on
devices like computers, laptops, and smartphones. Client OSs support one
user at a time and can handle hardware like printers and cameras.
Purpose: Server OSs are optimized for providing services and managing
resources, while client OSs are optimized for accessing and interacting with
resources.
Complexity: Server OSs are more complex and can handle critical
operations. Client OSs are simpler and can work on local processes.
Security: Server OSs are more secure than client OSs.
Number of clients: Server OSs can serve multiple clients simultaneously.
Ans(3):
Ans(5):
To promote a server to a domain controller, you can:
1. Open Server Manager
2. Click the Notification Flag
3. Select Promote this server to a domain controller
4. Choose the Deployment Operation
5. Configure Domain Controller Options
6. Configure DNS Options
7. Choose Additional Options
8. Select Paths
9. Review Options
Ans(6):
Here are the five FSMO roles in Active Directory and their functions:
Schema Master
RID Master
PDC Emulator
Infrastructure Master
A domain controller (DC) can hold multiple roles at one time. For
example, a forest with two domains will have one DC in each
domain hosting the RID Master role.
Ans(7):
Ans(8):
A member server is a computer that belongs to a domain but is not the
domain controller. A domain controller is a server that stores directory
information and provides authentication and directory services for the
domain.
Identity management
A domain controller hosts Microsoft Active Directory Domain Services
(AD DS), which is an identity management, authentication, and
authorization service. A member server is a server whose identity is
managed by AD DS.
Directory information
Member servers don't store directory information, but domain
controllers do.
Functions
Member servers can function as file servers, database servers,
application servers, firewalls, remote access servers, and certificate
servers.
Authentication requests
Domain controllers are responsible for authenticating security requests
such as logins and permission checking.
Ans(9):
The global catalog (GC) is a feature of Active Directory (AD) that allows a
domain controller (DC) to provide information on any object in the
forest. It is a distributed data storage that is stored in domain controllers
(also known as global catalog servers) and is used for faster searching.
Ans(10):
Forest architecture is a collection of one or more domain trees that
share a common logical structure, directory configuration, directory
schema, and global catalog. The first domain in the forest is called the
forest root domain.
Ans(11):
The infrastructure master should not be on the global catalog (GC)
server in a multi-domain forest if every domain controller in the domain
doesn't host the GC. In this case, the infrastructure master should be
placed on a domain controller that doesn't host the GC.
Ans(12):
The infrastructure master is responsible for updating references from
objects in the local domain to objects in other domains. The GC server
holds a copy of all the objects in the domain and a partial replica of
other domains in the forest.
Ans(13):
Active Directory (AD) has both physical and logical structures. The logical
structure organizes network resources, while the physical structure
manages and configures network traffic.
Domain controllers
Domain controllers are computers that run Windows Server and hold
the Active Directory Domain Services role. They can be either physical or
virtual servers. Domain controllers are responsible for the security and
authentication of AD objects.
Ans(14):
Active Directory (AD) backups are used to recover critical system
components in case of a crash. Backups create a consistent copy of the
AD database, which can be used to restore the system if there is a failure
or disaster.
Ans(15):
SYSVOL, or System Volume, is a folder that contains files and folders on
the local hard disk of each domain controller in a domain. It's a
repository for all active directory files and stores important elements of
the Active Directory group policy.
Ans(16):
Group Policy is a Windows feature that allows for the centralized
management and configuration of user settings, computer settings, and
operating systems. Each policy is defined by a Group Policy object (GPO).
Group Policy adheres to a strict hierarchy. The four levels of hierarchy for
Group Policy processing are: Local, Site, Domain, OU.
The order that GPOs are processed is known as LSDOU, which stands for
local, site, domain, and organizational unit.
Local
Site
Domain
OU
Ans(18):
Active Directory (AD) restore can be performed in Directory Services
Restore Mode (DSRM). DSRM is a Safe Mode boot option for Windows
Server domain controllers. It allows an administrator to repair, recover,
or restore an AD database
In the left pane, click the domain name and select the Deleted Objects
container
Ans(19):
Directory Services Restore Mode (DSRM) is a safe mode boot option for
Windows Server domain controllers. It allows administrators to repair,
recover, or restore an Active Directory (AD) database.
Do this immediately after the BIOS POST screen, before the Windows
logo appears
After logging in, you will see a Safe Mode watermark on the desktop,
and AD services won't start.
Ans(19):
A domain is a network of computers and devices that are controlled by
one authority. A workgroup is a group of people who work together, or a
collection of networked computers.
Ans(20):
A proxy server is a system or router that acts as a gateway between users and the
internet. It's also known as an "intermediary" because it goes between end-users
and the web pages they visit.
Proxy servers use a different IP address on behalf of the user, concealing the user's
real address from web servers. They can help prevent cyber attackers from
entering a private network.
Ans(21):
A firewall is a network security device that monitors and controls network traffic.
It can be a hardware or software unit that filters incoming and outgoing traffic
based on a set of rules. Firewalls are used in both personal and enterprise
settings.
Third-party firewalls are important for securing corporate networks. They provide
an extra layer of protection against external threats.
Click the Windows Defender Firewall button to turn the firewall on or off