SERVER TROUBLESHOOTING INTERVIEW QUESTIONS

server


1)What is Active Directory? 
·         Active Directory (AD) is a directory service that Microsoft developed for Windows domain networks
·         A server running Active Directory Domain Services (AD DS) is called a domain controller.
·         Active Directory is a centralized database that keeps track of all the user accounts and passwords in your organization.
·         Active Directory is subdivided into one or more domains. Such as PDC,ADC,Child Domain, Tree root Domain and RODC.

2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS?
 DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request.
Types of Zones in DNS :
Forward lookup: Converting names to IP address is called forward lookup.
Reverse lookup: Resolving IP address to names is called reverse lookup.


3) What id DHCP? Why it is used? What are scopes and super scopes? 
 DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy.

DHCP operations fall into four basic phases. These phases are IP lease request, IP lease offer, IP lease selection, and IP lease acknowledgement
DHCP- discovery
DHCP -offers
DHCP - Requests
DHCP - Acknowledgment
4) What is a DOMAIN? What is the difference between a domain and a workgroup?
Domain is created when we install Active Directory. It's a security boundary which is used to manage computers inside the boundary. Domain can be used to centrally administor computers and we can govern them using common policies called group policies.
We can't do the same with workgroup.
5)What is the function of a domain controller?
The function of a domain controller is to authenticate users , computers and other network resources in a domain.

6)Differentiate between forward lookup and reverse lookup in DNS?

Forward lookup convert: Host name to IP address.
Reverse lookup convert: IP address to Host name


7) What is the difference between tree and forest?

Forest:  Collection of Trees

Tree:  Collection of Domains

Domain : Collection of clients controlled by server

Multiple domain models create logical structures called trees, when they share contiguous DNS names. For example, contoso.com, us.contoso.com, andeurope.contoso.com share contiguous DNS namespaces and would together be considered a tree.
An Active Directory that consists of multiple trees is naturally called a forest.


8) Write Hierarchy of ADS?

·         Forest 
·         Tree    
·         Domain           |
·         Organizational Unit [OU]  
·                  Group 
·                  User


9. What is global catalog?
When you installing a new domain in the forest it is called as global catalog. It will have all the information object of entire forest

9) If Account lockout or password reset has been done, what is the replication time between domain controllers?

 Ans: Immediately

10) What is difference between Server 2003 vs. 2008?

2008 is combination of vista and windows 2003r2. Some new services are introduced in it.

  1. Hyper-Virtualization(Hyper-V)
  2. RODC (Read Only Domain Controller)
  3. WDS (windows deployment services) instead of RIS in 2003 server
  4. Power Shell (Ver2.0)
  5. Bit locker
  6. IIS updated version(IIS Ver7.5,2003 –ver.6.0, 2008 ver.7.0)
  7. Role based Installation
  8. New power-saving features been introduced in windows server 2008.  Advanced Configuration and Power Interface (ACPI) ,processor power management (PPM) features
  9. shadow copy for each and every folders
  10.  Windows server 2008 Installation is faster because it’s 32 bit where as 2003 it is 16 bit 



System Administrator  Question & Answers

1. What is IP address?

IP address is an identifier for a Computer or Device.
Class A IP Address 1 – 126, Class B IP Address 128 – 191, Class C IP Address 192 –223. And 127.0.0.1 is Loop back IP address. It will check the System Connectivity. Each machine connected to the Internet has an address known as an Internet Protocol address (IP address). The IP address takes the form of four numbers separated by dots, for example: 192.168.0.1 

You want to see System IP address goes to
Start- Run- Type cmd – type ipconfig /all

You want to confirm any system connected in the system network type ping 192.168.0.1 (192.168.0.1 this system IP address)

2. What is subnet mask?
Subnet mask is used for identify the Network.
Example:
For a class A address, a standard subnet mask is 255.0.0.0,
For a class B address, a standard subnet mask is 255.255.0.0,
For a class C address, a standard subnet mask is 255.255.255.0,

3. What is DNS?
Domain Naming Service. It‘ll Resolve IP Address to Hostname (FQDN) and Hostname to IP address. In DNS there are two Zones.
1.   Forward Lookup Zone
2.   Reverse Lookup Zone.
FQDN – Fully Qualified Domain Name

4. What is WINS?
Windows Internet Naming Service. It is used to resolve NetBIOS name to IP address & Vice versa. Short for Windows Internet Naming Service, a system that determines the IP address associated with a particular network computer. This is called name resolution. WINS supports network client and server computers running Windows and can provide name resolution for other computers with special arrangements. Determining the IP address for a computer is a complex process when DHCP servers assign IP addresses dynamically. For example, it is possible for DHCP to assign a different IP address to a client each time the machine logs on to the network.
WINS uses a distributed database that is automatically updated with the names of computers currently available and the IP address assigned to each one.
DNS is an alternative system for name resolution suitable for network computers with fixed IP addresses.

5. What is DHCP?

Dynamic Host Configuration Protocol. It is used to Assign IP address automatically to the Client Machine.
DHCP is a protocol used by networked computers (clients) to obtain IP addresses and other parameters such as the default gateway, subnet mask, and IP addresses of DNS servers from a DHCP server. It facilitates access to a network because these settings would otherwise have to be made manually for the client to participate in the network.
DHCP operations fall into four basic phases. These phases are IP lease request, IP lease offer, IP lease selection, and IP lease acknowledgement
DHCP discovery
DHCP offers
DHCP requests
DHCP acknowledgement
What protocol and port does DHCP use?
DHCP, like BOOTP runs over UDP, utilizing ports 67 and 68.

DNS Root Hints in Windows 2003
Root Hints are a vital cog in configuring your DNS Server.  If your server receives a query for an unknown domain, then the root hints give a clue as to where to search for the answer.  Maybe you were lucky and the root hints magically configured themselves correctly.  Perhaps it was a triumph for planning that you examined the root hints as soon as you ran DCPROMO.  However, in my opinion you cannot be a successful DNS troubleshooter without understanding root hints.

DHCP in Windows Server 2003
D ynamic        - Means that clients IP address may change
H ost             - Indicates that this is a system for clients, e.g. XP machines
C onfiguration  - A clue that you are in charge of the options, e.g. DNS Server
P rotocol         - The rules controlling the flow of packets between client and server

Lease is a good name for a DHCP IP property.  Take for example the 8 day default lease;  if the client is shutdown for 2 days, when it restarts it will continue to have the same IP address.  Halfway through their lease clients attempt to renew their lease.  IPCONFIG /all will show you the lease, while /renew will do what it says, top up the lease.
Only reduce the duration if you are short of IP addresses.  For example, if you only have 250 IP addresses but 300 possible clients.  It also makes sense to set short leases if you are likely to discontinue a scope in the near future.
Here is a table summarising how a DHCP service results in clients getting an IP address.  If you are interested in seeing these packets, use Network monitor to capture DHCP in action.  Here are the classic 4 packets that clients exchange during a lease negotiation.
Client
 Server
DHCPDiscover  -->
<--- DHCPOffer
DHCPRequest   -->
<--- DHCPack


 DHCPInform  Server check that it is Authorized in Active Directory

Note 1: DHCPRequest may seem strange, but it comes into play if there are two DHCP servers and both make an offer to a potential client.
Note 2: DHCPack.  Once in a blue moon you see DHCPNack this is a negative acknowledgement which mean, ' I do no know you'.  The most likely cause of Nack is the client is trying to renew an IP address from the wrong DHCP server.
Take the time to investigate Scope Options, this the most likely place that I will win my bet that you will find a new setting which will improve your network performance.  These options can be set at the Scope Level, Server Level, Reservation Level or at the Class Level (Tricky).  So find all four places and make up your mind which would be the best level for your network.
Examples of DHCP Scope Options:
*       Router (Default Gateway), DNS Servers (006)
*       Domain Name (015) WINS (044 and 046)
 Classes (Advanced Tab)
*       Vendor Class - Windows 98 Machines
*       User Class - Routing and Remote Access
*       Creating your own User Class
Reserving IP addresses is useful in two situations, for file and print servers and for important machines where leases are in short supply.  How does DHCP know which machine to lease a particular IP?  The answer is by its MAC address (also called NIC or Physical address).  In Windows 2003 when you enter the MAC address DHCP strips out the hyphens if you absentmindedly include them amongst the HEX numbers.  To find the MAC address ping the machine then type arp -a.
Remember that you can set DHCP Options for the reservations; after all that may have been the very reason why you decided to make reservations in the first place.
In a Windows Server 2003 (or 2000) domain all DHCP servers need to be authorized in Active Directory.  This is an example of Microsoft's new security initiative, and an attempt to eliminate rogue DHCP servers set up junior administrators in a large company.  So, you need to logon (or RunAs) a member of the Enterprise Admins group.  Then right click the DHCP server icon, and authorize.
Incidentally, The RIS service also needs to be authorized before it becomes active.
Even after you authorize a server, each scope must be activated individually.  So, right click the scope to activate (or deactivate).  Keep your eye on the red or green arrows to judge your success.  Note you may have to refresh from the server icon, often pressing F5 is not enough.

6. What is Relay Agent?
If we want to assign IP address automatically to other subnets then we need to require relay agent. DHCP server always uses broadcast traffic to assign IP address for the clients. But Router does not forward broadcast Packets. Router only broadcast unicast packets. To overcome this problem across subnets we are using DHCP Relay agent.

7. What is Clustering?
Clustering means it is a group of two or more server running same application and fault tolerance it is called Clustering.
Windows 2000 Advanced server support and Data center server support 8 Nodes.
Windows 2003 enterprise edition and Datacenter server support 4 Nodes.
But, Windows 2000 server and 2003 Standard Edition Not support for Clustering.

8. What is Transferring and Seizing?
Transferring: If your Domain Computer wants to Shutdown for a while, you can transfer roles to another domain controller.
Seizing:  If your Computer wants to Shutdown Permanently then you can seize your Roles from your Computer to another Computer by using Ntdsutil.

9. What is Device manager?
The Device Manager is a tool included with Microsoft Windows operating systems that allows the user to display and control the hardware attached to the computer. When a piece of hardware is not working, the offending hardware is highlighted where the user can deal with it.

10. Definition of CMOS? (Complementary Metal oxide Semiconductor)
A part of the motherboard that maintains system variables in static RAM. It also supplies a real-time clock that keeps track of the date, day and time. CMOS Setup is typically accessible by entering a specific sequence of keystrokes during the POST at system start-up.

11. FSMO (Flexible Single Master Operation) Roles?
  1. Schema Master: It will Contain all the object Attributes, Nothing but user Properties.
  2. Domain naming Master: If we are adding any server or Removing any server from the Domain. This will contain all the information.
  3. PDC Emulator: Any password changes by other Domain it will be updated to PDC Emulator, It will work in mixed mode, where NT B dc domain is there.
  4. RID Master: It will give SID ( Security Identify) to any objects created in that Domain.
  5. Infrastructure Master: It will have the group information for that Domain.

12. Volume types?
1) Simple volume,
2) Stripped volume
3) Spanned Volume
4) Mirrored Volume (Raid 1)
5) Raid 5 Volume.

Raid 1 (Mirrored Volume)
Mirrored volumes are created using two physical disks. A mirrored volume required same amount of unallocated space on each physical disk is used. When the data is written to a mirrored volume the data is written to a disk and then synchronized on the second disk an exact copy of the data is available on both physical disks.

Raid 5

Raid 5 volume provides fault tolerance and performance. But write operation is slower than stripped volume. Here we need 3 hard disk. Here it is a distributed data, data and parity. If data loss we can get information from parity

13. FAT file system want to convert in to NTFS file system which command?

 Convert E: /FS: NTFS

14. What is NAT?                                      

 Network Address Translator. Network devices that are assigned private IP address cannot access Internet site directly therefore traffic must be routed through a net device called NAT.
Here we have to assign Private IP address and a Public IP address

15. What is ADS?

 Ads is the Active directory service It will store all the information database  in the centralized location and allow the users to access the resources from the network.
In windows Ntds.dit database
IN Win NT SAM database

Active Directory is an implementation of LDAP directory services by Microsoft for use in Windows environments. Active Directory allows administrators to assign enterprise-wide policies, deploy programs to many computers, and apply critical updates to an entire organization. An Active Directory stores information and settings relating to an organization in a central, organized, accessible database. Active Directory networks can vary from a small installation with a few hundred objects, to a large installation with millions of objects.

Active Directory is a directory service used to store information about the network resources across a domain.
An Active Directory (AD) structure is a hierarchical framework of objects. The objects fall into three broad categories — resources (e.g. printers), services (e.g. e-mail), and users (accounts, or users and groups). The AD provides information on the objects, organizes the objects, controls access, and sets security.
Each object represents a single entity — whether a user, a computer, a printer, an application, or a shared data source—and its attributes. Objects can also be containers of other objects. An object is uniquely identified by its name and has a set of attributes—the characteristics and information that the object can contain—defined by a schema, which also determines the kind of objects that can be stored in the AD.
Each attribute object can be used in several different schema class objects. These schema objects exist to allow the schema to be extended or modified when necessary. However, because each schema object is integral to the definition of AD objects, deactivating or changing these objects can have serious consequences because it will fundamentally change the structure of AD itself. A schema object, when altered, will automatically propagate through Active Directory and once it is created it can only be deactivated — not deleted. Changing the schema usually requires a fair amount of planning
Active directory Logical Unit => Schema, Domain Tree
Active Directory Physical Unit  => OU, Site, Objects

Schema
Flexible single master operation:

Forest-wide FSMO Roles:
  • Schema Master that manages modifications to the AD schema and its replication to other Domain controllers.
  • Domain Naming Master that manages adding, and some modification operations for domains.

Domain-wide FSMO Roles:
  • Relative ID Master that allocates security RIDs to DCs to assign to new AD security principals (users, groups or computer objects). It also manages objects moving between domains.
  • Infrastructure Master that maintains security identifiers, GUIDs, and DNs for objects referenced across domains. Most commonly it updates user and group links.
  • PDC Emulator that emulates a Windows NT Primary Domain Controller (PDC). It is also the favored DC for other DCs in replicating and confirming password information, and is the authoritative source of time in the domain.

Lightweight Directory Access Protocol (LDAP)
In computer networking, the Lightweight Directory Access Protocol, or LDAP (It is a networking protocol for querying and modifying directory services running over TCP/IP.

A directory is a set of information with similar attributes organized in a logical and hierarchical manner. The most common example is the telephone directory, which consists of a series of names (either of a person or organization) organized alphabetically, with an address and phone number attached.

A client starts an LDAP session by connecting to an LDAP server, by default on TCP port 389. The client then sends operation requests to the server, and the server sends responses in turn. With some exceptions the client need not wait for a response before sending the next request, and the server may send the responses in any order.

The basic operations are:
  • Start TLS - optionally protect the connection with Transport Layer Security (TLS), to have a more secure connection
  • Bind - authenticate and specify LDAP protocol version
  • Search - search for and/or retrieve directory entries
  • Compare - test if a named entry contains a given attribute value
  • Add a new entry
  • Delete an entry
  • Modify an entry
  • Modify DN - move or rename an entry
  • Abandon - abort a previous request
  • Extended Operation - generic operation used to define other operations
  • Unbind - close the connection (not the inverse of Bind)

 

FSMO PARTITION

Application partition
Schema Partition
Configuration Partition
  
17. What's the difference between Windows 2000 and Windows XP?
Windows 2000 and Windows XP are essentially the same operating system (known internally as Windows NT 5.0 and Windows NT 5.1, respectively.) Here are some considerations if you're trying to decide which version to use:
Windows 2000 benefits
  • Windows 2000 has lower system requirements, and has a simpler interface (no "Styles" to mess with).
  • Windows 2000 is slightly less expensive, and has no product activation.
  • Windows 2000 has been out for a while, and most of the common problems and security holes have been uncovered and fixed.
  • Third-party software and hardware products that aren't yet XP-compatible may be compatible with Windows 2000; check the manufacturers of your devices and applications for XP support before you upgrade.
Windows XP benefits
  • Windows XP is somewhat faster than Windows 2000, assuming you have a fast processor and tons of memory (although it will run fine with a 300 Mhz Pentium II and 128MB of RAM).
  • The new Windows XP interface is more cheerful and colorful than earlier versions, although the less-cartoon "Classic" interface can still be used if desired.
  • Windows XP has more bells and whistles, such as the Windows Movie Maker, built-in CD writer support, the Internet Connection Firewall, and Remote Desktop Connection.
  • Windows XP has better support for games and comes with more games than Windows 2000.
  • Windows XP is the latest OS - if you don't upgrade now, you'll probably end up migrating to XP eventually anyway, and we mere mortals can only take so many OS upgrades.
  • Manufacturers of existing hardware and software products are more likely to add Windows XP compatibility now than Windows 2000 compatibility.
18. Difference bet domain and workgroup.

Domains
Domains are collections of computers grouped for management purposes; they share a group name. Domains let users’ access resources using a single logon. Administrators don’t have to create multiple user accounts for a single user to give that user access to all domain resources.
From a security perspective, a domain is a set or collection of computers that share a common security database and a common security policy. NT domains advance the concepts seen in LAN Manager for UNIX and LAN Server domains. Each domain has a unique domain name.

Workgroups
The terms workgroup and domain are used extensively in Microsoft networking and refer to the management mechanisms available to network members. Workgroups imply decentralized management, whereas domains imply centralized control.
Workgroups are collections of computers grouped just for viewing purposes; each computer user is responsible for managing its security functions. A workgroup can consist of NT Workstations, NT Servers, UNIX computers running Server Message Block (SMB) services, and others. They communicate using a common set of networking protocols at all seven layers of the OSI model

19. Difference between NT4.0 & windows 2000

·          File system difference (NTFS, FAT, FAT32)
·          In winnt server concept pdc and bdc but there is no concept in 2000.
·          In winnt server sam database r/w format in pdc and read only format in bdc ,but in 2000 domain and every domain controller sam database read/writer format .
2000 server can any time any moment become server or member of server simple add/remove dcpromo. But in winnt you have to reinstall operating system.
  • Even though Windows 2000 is built on the Windows NT architecture, Microsoft has added many new features (Plug and Play, USB support, Recovery Console, IntelliMirror, Group Policy, Active Directory, integration of IIS and Terminal Services) 

20. What is Boot.ini?
The "boot.ini" is a Microsoft initialization file found on the Microsoft Windows NT Microsoft Windows 2000, and Microsoft Windows XP operating systems. This file is always located on the root directory of the primary hard disk drive. In other words, it is located at "C:\" directory or the "C Drive". This file is used by Microsoft Windows as a method of displaying a menu of operating systems currently on the computer and allowing the user to easily select which operating system to load. In addition, this file is also used to point to the locations of each of the operating systems. 
Basic example of the boot.ini file:
[boot loader]
timeout=5
default=multi(0)disk(0)rdisk(1)partition(1)\WINDOWS
[operating systems]
multi(0)disk(0)rdisk(1)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect
In the above example, the boot.ini contains two sections, the "[boot loader]", and "[operating systems]". Within the boot loader section there are two lines. The "timeout" line is used for how long the boot menu time should be displayed, in seconds; we recommend that the timeout be set to at least five if you wish the computer to boot faster and commonly use the default operating systems. The "default" line is the default operating system that the boot.ini will load. If multiple operating systems are in the boot.ini, the default operating system will be automatically selected and used if the user does not specify a different operating system by the time the timeout value expires.
The next section, or the "operating system" section, is used to list and specify the location of each of the operating systems installed on the computer. Below is a listing of each of the options.



11)What is a Forest
A forest is a collection of domains that don’t necessarily form a contiguous namespace. By default every domain in a forest will have 2 way transitive trust with other domains which means the resources can be accessed across domains. All child domains share same schema in entire forest

12) What happens if a Schema or Domain naming master goes down, wouldthere be any impact on the end user authentication?
Actually, Schema master and domain naming master are on forest level andSchema master is responsible for schema modification. So if a user going to loginand user doesn’t modify the schema. finally No impact from schema master.Domain naming master responsible for adding for removing/modify any domain inthe forest. So again No impact. Finally if my both server are down so there is noimpact of user login.

13)If RID master is down, can domain user login in domain?
A server that has RID (Relative Identifiers) master role only generates the uniqueIDs to the newly created objects. Hence if your RID master is down; no new objectscould be created however the existing users would keep on getting authenticatedas authentication is done via Kerberos v5 in server 2003 that does not include RISmaster server.

14)Can I edit Schema....?
 Yes, for editing the schema the user must be member of Schema Admin Group.

15)There are 50 systems, all systems are joined in domain controller, in that one of the pc got disconnected from the domain suddenly, how can u solve the problem, what are the steps do you follow to overcome?
(1) check logical problems like TCP/IP whether it is configured properly or not.
(2) check physical problems like cable, rj45 whether it is inserted properly or not.
(3) Check ICMP in firewall


16)How to troubleshoot the Replication Issue with the Active Directory?Explain
1. Repadmin.exe
2.Remplmon
3. Active directory sites andservice

17) What is Kerberos? Which version is currently used by Windows?
 Kerberos is a network authentication protocol that verifies both the identity of theuser that is requesting authentication as well as the server providing the requestedauthentication, also known as mutual authentication.
The Kerberos version 5 authentication protocols provide a mechanism forauthentication and mutual authentication between a client & a server, or betweenone server and another server.



18)What is Proxy server?
A proxy server is computer that functions as an intermediary between a webbrowser (such as Internet Explorer) and the Internet. Proxy servers help improveweb performance by storing a copy of frequently used WebPages. When a browserrequests a webpage stored in the proxy server's collection (its cache), it is providedby the proxy server, which is faster than going to the web. Proxy servers also helpimprove security by filtering out some web content and malicious software.Proxy servers are used mostly by networks in organizations and companies. Typically, people connecting to the Internet from home will not use a proxy server.

19)DHCP Process and which Protocol DHCP uses?
Dynamic Host Configuration Protocol (DHCP) is a standard protocol defined by RFC1541 (which is superseded by RFC 2131) that allows a server to dynamicallydistribute IP addressing and configuration information to clients.
DHCP Process fall into four basic phases:
DHCP            DISCOVER
DHCP            OFFER
DHCP                REQUEST
DHCP            ACK 
Protocol and PortDHCP uses the same two ports assigned by IANA for BOOTP:
67/UDP for sending data to the server,  and 68/UDP for data to the client.


20)What is the impact if DNS Server fails?

If you DNS server fails, Active Directory stops working & server stops responding. You can't resolve host names.

21)What are the AD database types and its flow?

 The Active Directory creates and stores four types of log files on the maintenance and management of transactions. These files are stored in %system/NTDS and Syscvol.
• Transaction log files. The current transaction file is Edb.log, which by  default contains information about recent transactions and is limited to 10MB. When this limit is reached, transaction files are automatically created with the name
Checkpoint files. The checkpoint is Edb.chk, and it is used to list transactions thathave been committed to the Active Directory
Reserved log files. The reserved log file can be a number sequence of logs, with amaximum size of 10MB, named res1.log, res2.log, and so on. These logs are used inplace of the transaction log when the creation of a new log file is attempted
•Patch files. Patch files (with a .pat suffix) are used during the backup-and-restore process of the Active Directory. Database entries are sometimes divided during backup into what is known as split transactions. The patch files are used to record these splits, and "patch" the transaction back together during restoration.



22) What is offline defragmentation in AD and how do we do it?
Performing an offline defragmentation creates a new, compacted version of thedatabase file. Depending on how fragmented the original database file was, the newfile may be considerably smaller. To perform offline defragmentation of the Active Directory database:

1.Back up Active Directory
Reboot the domain controller, press F8 & Choose Directory ServicesRestore Mode   and press ENTER. Press ENTER again to start the bootprocess.

2.Log on using the Administrator account with the password
Click Start, point to Programs, point to Accessories, and then clickCommand Prompt. At the command prompt, type ntdsutil, and thenpress ENTER

3.Type files, and then press ENTER.
1.Type info, and then press ENTER. This displays current informationabout the path and size of the Active Directory database and its logfiles. Note the path.
2.Establish a location that has enough drive space for the compacteddatabase to be stored.
3.Type compact to
drive:\directory 
 and then press ENTER, where
drive
and
directory is the path to the location you established in the previousstep.Note You must specify a directory path. If the path contains anyspaces, the entire path must be surrounded by quotation marks. Forexample, type: compact to "c:\new folder"

4.A new database named Ntds.dit is created in the path you specified.

5.Type quit, and then press ENTER. Type quit again to return to the commandprompt.
If defragmentation succeeds without errors, follow the Ntdsutil.exe on-screen instructions.

Delete all the log files in the log directory by typingthe following command:
del drive :\ pathToLogFiles \*.logCopy the new Ntds.dit file over the old Ntds.dit file in the current Active Directorydatabase path that you noted in step

 6.Note you do not have delete the Edb.chk file.Restart the computer normally.


23)Different types of backups ?

 This article explains different types of backup available in windows (ntbackup.exe). The Backup utility supports five methods of backing up data on your computer or network.
a)Copy backup :A copy backup copies all selected files but does not mark each file as having beenbacked up

b)Daily backup : A daily backup copies all selected files that have been modified the day the dailybackup is performed. The backed-up files are not marked as having been backed up
c)Differential backup : A differential backup copies files created or changed since the last normal orincremental backup. It does not mark files as having been backed up.
d)Incremental backup : An incremental backup backs up only those files created or changed since the lastnormal or incremental backup. It marks files as having been backed up.
e)Normal backup : A normal backup copies all selected files and marks each file as having been backedup
Strategy : Normal + Incremental  :
Backing up your data using a combination of normal backups and incrementalbackups requires the least amount of storage space and is the quickest backupmethod.
Strategy : Normal + Differential
Backing up your data using a combination of normal backups and differential backups is more time-consuming, especially if your data changes frequently, but itis easier to restore the data because the backup set is usually stored on only a few disks or tapes.

24) How to host multiple website using IIS 6.0?
Every Web site has a descriptive name, and can support one or more host headernames. Organizations that host multiple Web sites on a single server often use hostheaders because this method enables them to create multiple Web site identitieswithout using a unique IP address for each site. 
You must be a member of the Administrators group on the local computer To add a Web site using a host header identifier using the Web Site Creation Wizard
1.In IIS Manager, expand the local computer, right-click the Web Sites directory,point to New, and then click Web Site.
2.Click Next.
3.In the Description box, type the name you have selected for the Web site, andthen click Next
4.In the Enter the IP address to use for this Web site box, click the IP address usedby all sites on the server.
5.In the TCP port this Web site should use box, type the port number used by allsites on the server.
6.In the Host Header for this Web site (Default:None) box, type the host headername to identify the Web site. The host header name must contain the full nameof the site, for example, www.microsoft.com.
7.If SSL encryption is not enabled on the server, the SSL port box does not appear.If SSL encryption is enabled on the server, type the SSL port number, and thenclick Next. Note that you cannot use host headers with SSL encryption.
8.In the Path box, type or browse to the path of your Web site home directory.
9.To create a secured or private Web site, clear the Allow anonymous access to thisWeb site check box, and click Next. (Web sites are configured for anonymousaccess by default.)10.In the Web Site Access Permissions box, set the permissions for the homedirectory.1Click Next, and then click Finish.


25) What are the steps taken while moving the FSMO roles?

Windows 2000/2003 Active Directory domains utilize a Single Operation Mastermethod called FSMO (Flexible Single Master Operation) You can transfer FSMO roles by using the Ntdsutil.exe command-line utility or byusing an MMC snap-in tool. Depending on the FSMO role that you want to transfer,you can use one of the following three MMC snap-in tools:
Active Directory Schema snap-in
Active Directory Domains and Trusts snap-in
Active Directory Users and Computers snap-in
 To transfer the FSMO role the administrator must be a member of thefollowing group:

FSMO Role
Administrator must be a member of 
Schema
Schema Admins


Domain Naming
Enterprise Admins
RID
       
         Domain Admin
PDC Emulator
Infrastructure 

To Transfer the Domain-Specific RID Master, PDC Emulator, and InfrastructureMaster FSMO Roles:

1.Open the Active Directory Users and Computers snap-in from theAdministrative Tools folder.

2.If you are NOT logged onto the target domain controller, in the snap-in, right-click the icon next to Active Directory Users and Computers and pressConnect to Domain Controller.
3.Select the domain controller that will be the new role holder, the target, andpress OK.
4.Right-click the Active Directory Users and Computers and press OperationMasters.
5.Select the appropriate tab for the role you wish to transfer and press theChange button.
6.Press OK to confirm the change.
7.Press OK all the way out. 

To Transfer the Domain Naming Master Role:
1.Open the Active Directory Domains and Trusts snap-in from the Administrative Tools folder.
2.If you are NOT logged onto the target domain controller, in the snap-in, right-click the icon next to Active Directory Domains and Trusts and press Connectto Domain Controller.
3.Select the domain controller that will be the new role holder and press OK.
4.Right-click the Active Directory Domains and Trusts icon again and press Operation Masters.
5.Press the Change button.
6.Press OK to confirm the change.
7.Press OK all the way out. 
Transferring the Schema Master Role
1.Click Start, click run, type mmc, and then click OK.
2.On the Console, menu click Add/Remove Snap-in.
3.Click Add.
4.Click Active Directory Schema.
5.Click Add.
6.Click Close to close the Add Standalone Snap-in dialog box.
7.Click OK to add the snap-in to the console.
8.Right-click the Active Directory Schema icon, and then click Change DomainController.
9. Click Specify Domain Controller, type the name of the domain controller thatwill be the new role holder, and then click OK.
10.Right-click Active Directory Schema, and then click Operation Masters.
11.In the Change Schema Master dialog box, click Change.
12.Click OK.
13.Click OK .
14.Click Cancel to close the dialog box. 


To transfer the FSMO roles from the Ntdsutil command:
1.On any domain controller, click Start, click Run, type Ntdsutil in the Open box,and then click OK.
2.Type roles, and then press ENTER.
3.Type connections, and then press ENTER.
4.Type connect to server <servername>, where <servername> is the name of the server you want to use, and then press ENTER.
5.At the server connections: prompt, type q, and then press ENTER again.1.Type transfer <role>. where <role> is the role you want to transfer.

6.You will receive a warning window asking if you want to perform the transfer.Click on Yes.2.After you transfer the roles, type q and press ENTER until you quitNtdsutil.exe.1.Restart the server and make sure you update your backup.

26)What is the Protocol? How is it different than BOOTP or RARP?

DHCP is based on BOOTP and maintains some backward compatibility. The maindifference is that BOOTP was designed for manual pre-configuration of the hostinformation in a server database, while DHCP allows for dynamic allocation of network addresses and configurations to newly attached hosts. Additionally, DHCP

allows for recovery and reallocation of network addresses through a leasing mechanism. RARP is a protocol used by Sun and other vendors that allows a computer to find out its own IP number, which is one of the protocol parameters typically passed to the client system by DHCP or BOOTP. RARP doesn't support other parameters and usingit, a server can only serve a single LAN. DHCP and BOOTP are designed so they can be routed

27)How to rename domain name in win 2003 server?

 To rename a domain controllerOpen Command Prompt. Type:netdom computername CurrentComputerName/add:NewComputerNameEnsure the computer account updates and DNS registrations are completed, thentype:netdom computername CurrentComputerName /makeprimary:NewComputerNameRestart the computer.From the command prompt, type:netdom computername NewComputerName /remove:OldComputerName
• To perform this procedure, you must be a member of the Domain Adminsgroup or the Enterprise Admins group in Active Directory.
This command-line method requires the Netdom Windows support tool.
• To enumerate the names with which the computer is currently configured, ata command prompt, type:netdom computername



ComputerName
/enumerate:
{AlternateNames |PrimaryName | AllNames}


To rename a domain controller in a domain that contains a single domain controllerInstall a Windows Server 2003 member server in the domain.On the new server, create an additional domain controller by installingActive Directory.After Active Directory is installed, enable the global catalog on the new domaincontroller. Transfer the operations master roles from the domain controller that you want torename to the new domain controller. Note that you must transfer the roles, do notseize them.Verify that the new domain controller is functioning correctly by doing the following:Verify authentications and global catalog searches.Run Dcdiag.exe against the domain controller.Perform any other appropriate tests to verify that the new domain controller canprovide all of the domain functions of the first domain controller.Verify that the \systole and \net logon drives are shared on the new domain controller by doing the following: On the new domain controller, open Command Prompt. Type: Net share In the list that is generated, verify the existence of Systole and Net logon. Uninstall Active Directory from the domain controller that you want to rename to be a member server. Rename the member server.

--
-- 
What is a Forest
A forest is a collection of domains that don’t necessarily form a contiguous namespace. By default every domain in a forest will have 2 way transitive trust with other domains which means the resources can be accessed across domains. All child domains share same schema in entire forest
What is a Domain
Domain is a logical structure that is used to make a network secure by applying security policies. Under a forest we can have Child domains or tree domains. Child domains share the same Domain naming master & schema master role & it inherits namespace of parent domain. In child domain, you don’t have Enterprise administrator account. It exists in parent domain only for most of the configuration. The trust between parent & child is Parent-child two way transitive trust. For example if parent domain is ABC.com, the child domain will be XYZ.ABC.com. If you don’t want to inherit parent domain name, you use new tree in the forest like parent is ABC & you can have new tree as XYZ.com
What is LDAP?
LDAP stands for Light Weight Directory Access protocol. It’s a protocol that is used to access the Active Directory database.
What is Active Directory Schema?
The schema is the Active Directory component that defines all the objects and their attributes. Objects in same forest will have same Schema.
What is the function of a domain controller?
The function of a domain controller is to authenticate users ,computers and other network resources in a domain.
Why do we need Netlogon?
This Service is responsible for creating Secure Channel between Domain Controllers and client computers. Secure Channel is created to pass the authentication packets.
What is the function of Kerberos?
Kerberos is a protocol that is used by domain controller to authenticate users,computers and other network resources in a domain.
Port Numbers
SMTP-25
POP3-110
IMAP4- 143
RPC-135
LDAP- 389
SSL-443
HTTP- 80
RDP- 3389
DNS- 53
DHCP-67,68
FTP-21
GC- 3268
Kerberos- 88
NNTP- 119
TFTP- 69
SNMP- 161
What is DNS Scavenging?
This is a mechanism by which stale(old) DNS resource records get deleted from DNS database after a certain interval.
What is the location of Active directory database?
By default its located at c:\windows\ntds folder
What is RODC and explain the Scenario in which it will be used?
This is explained in below link
Explain FSMO roles
This is explained in below link
What are the Forest wide FSMO roles?
Schema Master and Domain Naming Master
How do we check FSMO roles?
The command is netdom query fsmo
What are Active directory partitions?
There are three native partitions Schema/Configuration/Domain and additionally there is also the Application partition.
Schema partition contains details about objects and attributes that are stored in the AD. This partition gets replicated to all domain controllers across forest.
Configuration information contains configuration data about forest and trees. This partition gets replicated to all domain controllers across forest.
Domain partition contains object information for a domain. This partition gets replicated  to all domain controllers within a domain.
Application Partition – This partition contains information about applications in Active Directory. E.g. when AD integrated DNS is used there are two application partitions for DNS zones – Forest DNS Zones and Domain DNS Zones
What is Multi Master Operation?
Active directory database follows multiple master model which means changes in active directory database get replicated to all the Domain Controllers in the domain. If there are any conflicts in the data replication active directory uses a conflict resolution algorithm which resolves the conflict by allowing the changes on the last DC which means the last writer wins.
What are the domain wide FSMO roles?

Infrastructure Master

RID Pool Manager

PDC Emulator



No comments:

Post a Comment