What is Active Directory

Published on January 2017 | Categories: Documents | Downloads: 26 | Comments: 0 | Views: 258
of 22
Download PDF   Embed   Report

Comments

Content

1) What is Active Directory? A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments. For example we can create, manage and administrator users, computers and printers in the network from active directory. 2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS? What are A records and mx records? DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request. Forward lookup: Converting names to IP address is called forward lookup. Reverse lookup: Resolving IP address to names is called reverse lookup. 'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of which DNS can find out the IP address of a name. 'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is also found in DNS. 3) What id DHCP? Why it is used? What are scopes and super scopes? DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy. Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network. Superscope: When we combine two or more scopes together its called super scope. 4) What are the types of LAN cables used? What is a cross cable? Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can support 1Gbps of speed. Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.

5) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the LAN cable? The way the paired wires are connected to the connector (RJ45) is different in cross cable and normal LAN cable. The theoretical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal. 6) What would you use to connect two computers without using switches? Cross cable. 7) What is IPCONFIG command? Why it is used? IPCONFIG command is used to display the IP information assigned to a computer. From the output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer. 8) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available? When DHCP server is not available the Windows client computer assigns an automatic IP address to itself so that it can communicate with the network computers. This ip address is called APIPA. ITs in the range of 169.254.X.X. APIPA stands for Automatic private IP addressing. Its in the range of 169.254.X.X. 9) What is a DOMAIN? What is the difference between a domain and a workgroup? Domain is created when we install Active Directory. It's a security boundary which is used to manage computers inside the boundary. Domain can be used to centrally administrator computers and we can govern them using common policies called group policies. We can't do the same with workgroup. 10) Do you know how to configure outlook 2000 and outlook 2003 for a user? Please visit the link below to find out how to configure outlook 2000 and outlook 2003. http://www.it.cmich.edu/quickguides/qg_outlook2003_server.asp 11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express? PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express used odb file. 12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it? BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is "Last known good configuration".

If this doesn't work than boot the computer in safe mode. If it boots up than the problems with one of the devices or drivers. 13) What is RIS? What is Imaging/ghosting? RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or imaging/ghosting because installing OS every time using a CD can be a very time consuming task. So to save that time we can go for RIS/Ghosting/imaging. 14) What is VPN and how to configure it? VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the resources like mail and files in the LAN. VPN can be configured using the steps mentioned in the KB: http://support.microsoft.com/kb/305550 15) Your computer slowly drops out of network. A reboot of the computer fixes the problem. What to do to resolve this issue? Update the network card driver. 16) Your system is infected with Virus? How to recover the data? Install another system. Install the OS with the lates patches, Antivirus with latest updates. Connect the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system. 17) How to join a system to the domain? What type of user can add a system to the domain? Please visit the article below and read "Adding the Workstation to the Domain" http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologi /directory/ 18) What is the difference between a switch and a hub? Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports. 19) What is a router? Why we use it? Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across but it uses the routing protocols to do so. 20) What are manageable and non manageable switches? Switches which can be administered are called manageable switches. For example we can create VLAN for on such switch. On no manageable switches we can't do so.

Back to Questions Page
What applications does not use VSS?

Question

Rank

Answer Posted By

Question Submitted By :: Guest I also faced this Question!! Answer
VSS doeasnot allow allow the backup of SQL transcation © ALL Interview .com

0

Gangadharan

Question

There are 50 systems, all systems are joined in domaincontroller,in that one of the pc got disconnected from the domain suddenly,how can u solve the problem,what are the steps do you follow to overcome?

Rank

Answer Posted By

Question Submitted By :: Arun Kumar This Interview Question Asked @ Genpact I also faced this Question!! Answer
This plm we are facing sometimes because of virus. then u can do one thing just remove the domain and add the work group, after u have to restart the system , and again add the domain then u can check the system working or not ...? © ALL Interview .com

0

Krishna

Question

there are 2 network printers,i have given print to one of the networkprinter,due to some reason it's not print,and it's stored in printque but now i want to change printque to another printer without deleting printque,

Rank

Answer Posted By

Question Submitted By :: Arun Kumar This Interview Question Asked @ Genpact I also faced this Question!! Answer
Change the port or IP of the printer © ALL Interview .com

0

Abhijit Paul

Answer

Not possible........

0

Jai

Question 2003

what is the diffrence between 2000 to

Rank

Answer Posted By

Question Submitted By :: Vijay This Interview Question Asked @ TCS I also faced this Question!! Answer
it is a most secure os............. © ALL Interview .com

1

Vijay

Answer

difference between win 2000 and win2k3 is theres is one new service added in win 2k3 sercvice that is vscs(Volume shadow copy service)

3

Harinder Singh

Question and core 2duo processor

what is the difference between dual core

Rank

Answer Posted By

Question Submitted By :: Abhishekdixit03 I also faced this Question!! Answer
Dual core means two processors on a single silicon chip whereas core 2 duo is the second version of dual core processor. © ALL Interview .com

0

Jyoti

Answer

Core 2deo have 4 processor on 1 silicon chip

0

Hemant Arya

Question ddr2 and ddr3

what is the difference between ddr1 and

Rank

Answer Posted By

Question Submitted By :: Abhishekdixit03 This Interview Question Asked @ HCL , What Is Van I also faced this Question!! Answer
ddr1 ram is 184 pins fsb of 333mhx and ddr2 is 240 pins and fsb of 666mhz and ddr 3 too is 240 and fsb of 1333mhz © ALL Interview .com

0

Vishal Awasthi

Question window 7

what is the difference between vista and

Rank

Answer Posted By

Question Submitted By :: Abhishekdixit03 I also faced this Question!! Answer
both are Latest operating system of Microsoft. as performance level windows 7 is very better then Vista...vista need more hardware configuration then windows 7. thanks, MAK 9595959869 © ALL Interview .com

0

Mak

Question a work of RAM in a
computer device.

What is a full form of RAM ? And what is

Rank

Answer Posted By

Question Submitted By :: Chintan Desai I also faced this Question!! Answer
The full form of RAM is : Random Access © ALL Interview .com

0

Chintan Desai

Memory The RAM is a valentine memory. The data processing and the speed of computer is depend on this types of memory.

Answer

RAM stands for Random Access Memory. When user performs any operation then the intermediate results and data is stored in RAM.

0

Sunita

Question

which language the data are store in compute. And how the computer known what we tell them.

Rank

Answer Posted By

Question Submitted By :: Chintan Desai I also faced this Question!! Answer
The data are store in computer as a binary language. Because the computer only known binary language so when we store the data in a computer that time computer convert them in binary language and after that store them. © ALL Interview .com

1. 2. 3. 4. 5. 6. 7. 8. 9.

What is MTU? How does TCP handshake work? How does SSL handshake work? What are the different phases in VPN establishment? How does DH (deffie helman) work? What is TCP window sizing? What is the difference between passive FTP and active FTP? What is the difference between socket and session? How does network management station work?

The Answers:

1. How does TCP handshake work? Transmission Control Protocol/Internet Protocol. There are 3 steps. 1. Local device sends sequence number and maximum segment size. 2. Destination device responds by sending its sequence number and maximum segment size back to local device. 3. Local device acknowledges receipt of the sequence number and segment size information. 2. How does SSL handshake work? Secure Sockets Layer. There are 4 steps. 1. Browser checks the certificate to make sure that the site you are connecting to is the real site and not someone intercepting. 2. Determine encryption types that the browser and web site server can both use to understand each other. 3. Browser and Server send each other unique codes to use when scrambling (or encrypting) the information that will be sent. 4. The browser and Server start talking using the encryption, the web browser shows the encrypting icon, and web pages are processed secured. 3. What is the difference between passive FTP and active FTP? FTP is an unusual protocol in that it uses two ports, one for commands and the other for data. (This is one of the reasons it is superior to HTTP for transferring large files.) Active FTP was invented first. The client initiates a connection on the server’s command port. The server then initiates a connection with the client from its data port. In Passive FTP, the client initiates both connections with the server, which remains “passive”. Active FTP may cause problems if your client is behind a firewall. From the firewall’s point of view, the FTP server that is trying to initiate a connection with your client looks like an intruder and is usually blocked. This is why many users have difficulty using FTP to download files from behind a firewall. Passive FTP solves this problem, but creates other problems, notably where FTP server security is concerned. The server must listen on a large number of ports. This requires the firewall to let a lot of unqualified traffic through. Most firewall administrators do not like this. As a rule, you do not need to be concerned about passive and active FTP unless you administer an FTP server or a firewall. If you experience difficulty using your FTP client from behind a firewall, this is likely the reason. Perhaps you should discuss the matter with your firewall administrator. 4. What is the difference between socket and session? 1. An SSL session is a mechanism through which connections can be established by reusing previously negotiated handshakes. 2. A socket is one endpoint of a two-way communication link between two programs running on the network. A socket is bound to a port number so that the TCP layer can identify the application that data is destined to be sent. 5. How does network management station work? Network management stations execute management applications which monitor and control network elements. Network elements

are devices such as hosts, gateways, terminal servers, and the like, which have management agents responsible for performing the network management functions requested by the network management stations. The Simple Network Management Protocol (SNMP is used to communicate management information between the network management stations and the agents in the network elements. There are a few network management features that may be used to provide network monitoring for this advisory. 1. Device Availability Monitoring 2. SNMP MIB object monitoring 3. Cisco Service Assurance Agent (Cisco SAA) 4. RMON Alarm and Events 5. Event-MIB 6. CiscoWorks RME Network Show Commands and CLI scripting 6. What are the different phases in VPN establishment? Successful VPN establishment consists of two levels of SA’s known as phases. Phase 1 authentication establishes session keys. Using the Xauth feature, the client waits for a “username/password” challenge after the IKE Phase 1 SA has been established. When the end user responds to the challenge, the response is forwarded to the IPsec peers for an additional level of authentication completing Phase 2. 1. Phase 1 of a 2 phase VPN tunnel establishment process. Phase 1 negotiates the security parameter agreement. 2. Phase 2 of 2 phase VPN tunnel establishment process. Phase 2 uses the agreed parameters from Phase 1 to bring the tunnel up. 7. How does DH (deffie helman) work? Diffie-Hellman key agreement was invented in 1976 during a collaboration between Whitfield Diffie and Martin Hellman and was the first practical method for establishing a shared secret over an unprotected communications channel. Based on Ralph Merkle’s public key cryptosystem. Public key cryptography is a form of cryptography which generally allows users to communicate securely without having prior access to a shared secret key, by using a pair of cryptographic keys, designated as public key and private key, which are related mathematically. 8. What is TCP window sizing? The window size is the maximum number of bytes of data that can be transmitted in one segment. Increasing the window size for a TCP-based file transfer would increase throughput until the slowest link in the path saturates. It would be preferable to have a window size appropriate to the size of the link. There would be less buffering, the ACKs would return more quickly and more of the bandwidth would be used. Ideally you are looking for a Window Size >= Bandwidth * RTT. 9. What is MTU? Maximum Transmission Unit. The greatest amount of data or “packet” size that can be transferred in one physical frame on a network. This packet also contains the header and trailer information, which are like addresses for each packet that are required by the routers on the network.

Windows Server 2003 interview and certification questions
By admin | December 7, 2003 1. How do you double-boot a Win 2003 server box? The Boot.ini file is set as read-only, system, and hidden to prevent unwanted editing. To change the Boot.ini timeout and default settings, use the System option in Control Panel from the Advanced tab and select Startup. 2. What do you do if earlier application doesn’t run on Windows Server 2003? When an application that ran on an earlier legacy version of Windows cannot be loaded during the setup function or if it later malfunctions, you must run the compatibility mode function. This is accomplished by right-clicking the application or setup program and selecting Properties –> Compatibility –> selecting the previously supported operating system. 3. If you uninstall Windows Server 2003, which operating systems can you revert to? Win ME, Win 98, 2000, XP. Note, however, that you cannot upgrade from ME and 98 to Windows Server 2003. 4. How do you get to Internet Firewall settings? Start –> Control Panel –> Network and Internet Connections –> Network Connections. 5. What are the Windows Server 2003 keyboard shortcuts? Winkey opens or closes the Start menu. Winkey + BREAK displays the System Properties dialog box. Winkey + TAB moves the focus to the next application in the taskbar. Winkey + SHIFT + TAB moves the focus to the previous application in the taskbar. Winkey + B moves the focus to the notification area. Winkey + D shows the desktop. Winkey + E opens Windows Explorer showing My Computer. Winkey + F opens the Search panel. Winkey + CTRL + F opens the Search panel with Search for Computers module selected. Winkey + F1 opens Help. Winkey + M minimizes all. Winkey + SHIFT+ M undoes minimization. Winkey + R opens Run dialog. Winkey + U opens the Utility Manager. Winkey + L locks the computer. 6. What is Active Directory? Active Directory is a network-based object store and service that locates and manages resources, and makes these resources available to authorized users and groups. An underlying principle of the Active Directory is that everything is considered an object—people, servers, workstations, printers, documents, and devices. Each object has certain attributes and its own security access control list (ACL). 7. Where are the Windows NT Primary Domain Controller (PDC) and its Backup Domain Controller (BDC) in Server 2003? The Active Directory replaces them. Now all domain controllers share a multimaster peer-to-peer read and write relationship that hosts copies of the Active Directory.

8. How long does it take for security changes to be replicated among the domain controllers? Security-related modifications are replicated within a site immediately. These changes include account and individual user lockout policies, changes to password policies, changes to computer account passwords, and modifications to the Local Security Authority (LSA). 9. What’s new in Windows Server 2003 regarding the DNS management? When DC promotion occurs with an existing forest, the Active Directory Installation Wizard contacts an existing DC to update the directory and replicate from the DC the required portions of the directory. If the wizard fails to locate a DC, it performs debugging and reports what caused the failure and how to fix the problem. In order to be located on a network, every DC must register in DNS DC locator DNS records. The Active Directory Installation Wizard verifies a proper configuration of the DNS infrastructure. All DNS configuration debugging and reporting activity is done with the Active Directory Installation Wizard. 10. When should you create a forest? Organizations that operate on radically different bases may require separate trees with distinct namespaces. Unique trade or brand names often give rise to separate DNS identities. Organizations merge or are acquired and naming continuity is desired. Organizations form partnerships and joint ventures. While access to common resources is desired, a separately defined tree can enforce more direct administrative and security restrictions. 11. How can you authenticate between forests? Four types of authentication are used across forests: (1) Kerberos and NTLM network logon for remote access to a server in another forest; (2) Kerberos and NTLM interactive logon for physical logon outside the user’s home forest; (3) Kerberos delegation to N-tier application in another forest; and (4) user principal name (UPN) credentials. 12. What snap-in administrative tools are available for Active Directory? Active Directory Domains and Trusts Manager, Active Directory Sites and Services Manager, Active Directory Users and Group Manager, Active Directory Replication (optional, available from the Resource Kit), Active Directory Schema Manager (optional, available from adminpak) 13. What types of classes exist in Windows Server 2003 Active Directory? o Structural class. The structural class is important to the system administrator in that it is the only type from which new Active Directory objects are created. Structural classes are developed from either the modification of an existing structural type or the use of one or more abstract classes. o Abstract class. Abstract classes are so named because they take the form of templates that actually create other templates (abstracts) and structural and auxiliary classes. Think of abstract classes as frameworks for the defining objects. o Auxiliary class. The auxiliary class is a list of attributes. Rather than apply numerous attributes when creating a structural class, it provides a streamlined alternative by applying a combination of attributes with a single include action. o 88 class. The 88 class includes object classes defined prior to 1993, when the 1988 X.500 specification was adopted. This type does not use the

structural, abstract, and auxiliary definitions, nor is it in common use for the development of objects in Windows Server 2003 environments. 14. How do you delete a lingering object? Windows Server 2003 provides a command called Repadmin that provides the ability to delete lingering objects in the Active Directory. 15. What is Global Catalog? The Global Catalog authenticates network user logons and fields inquiries about objects across a forest or tree. Every domain has at least one GC that is hosted on a domain controller. In Windows 2000, there was typically one GC on every site in order to prevent user logon failures across the network. 16. How is user account security established in Windows Server 2003? When an account is created, it is given a unique access number known as a security identifier (SID). Every group to which the user belongs has an associated SID. The user and related group SIDs together form the user account’s security token, which determines access levels to objects throughout the system and network. SIDs from the security token are mapped to the access control list (ACL) of any object the user attempts to access. 17. If I delete a user and then create a new account with the same username and password, would the SID and permissions stay the same? No. If you delete a user account and attempt to recreate it with the same user name and password, the SID will be different. 18. What do you do with secure sign-ons in an organization with many roaming users? Credential Management feature of Windows Server 2003 provides a consistent single sign-on experience for users. This can be useful for roaming users who move between computer systems. The Credential Management feature provides a secure store of user credentials that includes passwords and X.509 certificates. 19. Anything special you should do when adding a user that has a Mac? "Save password as encrypted clear text" must be selected on User Properties Account Tab Options, since the Macs only store their passwords that way. 20. What remote access options does Windows Server 2003 support? Dial-in, VPN, dial-in with callback. 21. Where are the documents and settings for the roaming profile stored? All the documents and environmental settings for the roaming user are stored locally on the system, and, when the user logs off, all changes to the locally stored profile are copied to the shared server folder. Therefore, the first time a roaming user logs on to a new system the logon process may take some time, depending on how large his profile folder is. 22. Where are the settings for all the users stored on a given machine? \Document and Settings\All Users 23. What languages can you use for log-on scripts? JavaScript, VBScript, DOS batch files (.com, .bat, or even .exe)

Administrator Interview Questions and Answers
« On: January 10, 2009, 10:31:01 AM »


Quote

Windows Administrator Interview Questions and Answers 1. Describe how the DHCP lease is obtained. It’s a four-step process consisting of (a) IP request, (b) IP offer, © IP selection and (d) acknowledgement. 2. I can’t seem to access the Internet, don’t have any access to the corporate network and on ipconfig my address is 169.254.*.*. What happened? The 169.254.*.* netmask is assigned to Windows machines running 98/2000/XP if the DHCP server is not available. The name for the technology is APIPA (Automatic Private Internet Protocol Addressing). 3. We’ve installed a new Windows-based DHCP server, however, the users do not seem to be getting DHCP leases off of it. The server must be authorized first with the Active Directory. 4. How can you force the client to give up the dhcp lease if you have access to the client PC? ipconfig /release 5. What authentication options do Windows 2000 Servers have for remote clients? PAP, SPAP, CHAP, MS-CHAP and EAP. 6. What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP/IP? NWLink (Novell), NetBEUI, AppleTalk (Apple). 7. What is data link layer in the OSI reference model responsible for? Data link layer is located above the physical layer, but below the network layer. Taking raw data bits and packaging them into frames. The network layer will be responsible for addressing the frames, while the physical layer is reponsible for retrieving and sending raw data bits. 8. What is binding order? The order by which the network protocols are used for clientserver communications. The most frequently used protocols should be at the top. 9. How do cryptography-based keys ensure the validity of data transferred across the network? Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted. 10. Should we deploy IPSEC-based security or certificate-based security? They are really two different technologies. IPSec secures the TCP/IP communication and protects the integrity of the packets. Certificate-based security ensures the validity of authenticated clients and servers. 11. What is LMHOSTS file? It’s a file stored on a host machine that is used to resolve

NetBIOS to specific IP addresses. 12. What’s the difference between forward lookup and reverse lookup in DNS? Forward lookup is name-to-address, the reverse lookup is address-to-name. 13. How can you recover a file encrypted using EFS? Use the domain recovery agent.

UNC

Universal Naming Convention \\servername\shared name (It is used to access the shared folder) MAC Media Access Control PDC Primary Domain Controllers BDC Backup Domain Controllers SMP Symmetric Multi Processors AMP Asymmetric Multi Processing EFS Encrypted File System FAT File Allocation Table HCL Hardware Compatibility List IIS Internet Information Service LSA Local Security Authority MMC Microsoft Management Console OU Organizational Unit RAS Remote Access Service RDP Remote Desktop Protocol (used for Terminal Services) RRAS Routing and Remote Access Service SID Security Identifier WINS Windows Internet Name Service GUID Globally Unique identifier IAS Internet Authentication Service UPN User Principle Name ([email protected]) BIOS

Basic Input Output System Net BIOS Network Basic Input/Output System ARP Address Resolution Protocol DVD Digital Video Disk GPO Group Policy Object (LGPO Local Group Policy Object) IPsec Internet Protocol Security ISP Internet Service Provider NAT Network Address Translation MBT Master Boot Record USB Universal Serial Bus POST Power On Self Test SCSI Small Computer System Interface SMTP Simple Mail Transfer Protocol URL Uniform Resource Locator RAID Redundant Array of Independent Disk IDE Intelligent drive Electronicsor Integrated Drive Electronics FQDN Fully Qualified Domain Name (full computer name) [computername.domainname.com] OSPF Open Shortest Path First (these two are routing protocols) RIP Routing Information Protocol POP3 Post Office Protocol (used to receive the mails) SMTP Simple Mail Transfer Protocol (Used to send the mails) SMPS Switch Mode Power Supply PING Packet Internet Grope

Windows Server 2003 Interview Questions & Answers

1. How do you double-boot a Win 2003 server box? The Boot.ini file is set as read-only, system, and hidden to prevent unwanted editing. To change the Boot.ini timeout and default settings, use the System option in Control Panel from the advanced tab and select Startup. 2. What do you do if earlier application doesn’t run on Windows Server 2003? When an application that ran on an earlier legacy version of Windows cannot be loaded during the setup function or if it later malfunctions, you must run the compatibility mode function. This is accomplished by right-clicking the application or setup program and selecting Properties –> Compatibility –> selecting the previously supported operating system. 3. If you uninstall Windows Server 2003, which operating systems can you revert to? Win ME, Win 98, 2000, XP. Note, however, that you cannot upgrade from ME and 98 to Windows Server 2003. 4. How do you get to Internet Firewall settings? Start –> Control Panel –> Network and Internet Connections –> Network Connections. 5. What are the Windows Server 2003 keyboard shortcuts? Winkey opens or closes the Start menu. Winkey + BREAK displays the System Properties dialog box. Winkey + TAB moves the focus to the next application in the taskbar. Winkey + SHIFT + TAB moves the focus to the previous application in the taskbar. Winkey + B moves the focus to the notification area. Winkey + D shows the desktop. Winkey + E opens Windows Explorer showing My Computer. Winkey + F opens the Search panel. Winkey + CTRL + F opens the Search panel with Search for Computers module selected. Winkey + F1 opens Help. Winkey + M minimizes all. Winkey + SHIFT+ M undoes minimization. Winkey + R opens Run dialog. Winkey + U opens the Utility Manager. Winkey + L locks the computer. 6. What is Active Directory? Active Directory is a network-based object store and service that locates and manages resources, and makes these resources available to authorized users and groups. An underlying principle of the Active Directory is that everything is considered an object— people, servers, workstations, printers, documents, and devices. Each object has certain attributes and its own security access control list (ACL). 7. Where are the Windows NT Primary Domain Controller (PDC) and its Backup Domain Controller (BDC) in Server 2003?

The Active Directory replaces them. Now all domain controllers share a multimaster peer-to-peer read and write relationship that hosts copies of the Active Directory. 8. How long does it take for security changes to be replicated among the domain controllers? Security-related modifications are replicated within a site immediately. These changes include account and individual user lockout policies, changes to password policies, changes to computer account passwords, and modifications to the Local Security Authority (LSA). 9. What’s new in Windows Server 2003 regarding the DNS management? When DC promotion occurs with an existing forest, the Active Directory Installation Wizard contacts an existing DC to update the directory and replicate from the DC the required portions of the directory. If the wizard fails to locate a DC, it performs debugging and reports what caused the failure and how to fix the problem. In order to be located on a network, every DC must register in DNS DC locator DNS records. The Active Directory Installation Wizard verifies a proper configuration of the DNS infrastructure. All DNS configuration debugging and reporting activity is done with the Active Directory Installation Wizard. 10. When should you create a forest? Organizations that operate on radically different bases may require separate trees with distinct namespaces. Unique trade or brand names often give rise to separate DNS identities. Organizations merge or are acquired and naming continuity is desired. Organizations form partnerships and joint ventures. While access to common resources is desired, a separately defined tree can enforce more direct administrative and security restrictions. 11. How can you authenticate between forests? Four types of authentication are used across forests: (1) Kerberos and NTLM network logon for remote access to a server in another forest; (2) Kerberos and NTLM interactive logon for physical logon outside the user’s home forest; (3) Kerberos delegation to N-tier application in another forest; and (4) user principal name (UPN) credentials.

Difference between windows 2000 server and windows 2003 server

1. Domain rename is not possible in windows 2000

2.In w 2003 server inbuilt firewall is there. 3. windows 2k - IIS 5 and windows 2k3 - II6 4.Windows 2k - IE 5 and Windows 2k3 - IE6 5. Terminal service are enhanced in win2k3 6.Windows 2k doesn't have 64 bit version 7. DNS Stub zone has introduced in win2k3. 8. Shadow copying has introduced. 9. Schema version has changed from ver.13 to ver.30. 10.Win2000 Supports 4-node clustering and 2003 supports 8-node clustering. 11Win 2003 has High HCL Support (Hardware Compatibility List) issued by Microsoft. 12.Code name of 2000 is Win NT 5.0 and Code name of 2003 is Win NT 5.1 13.In 2000 we can create 1 million users and in 2003 we can create 1 billion users. 14.Win2003 has Improved Print management

compared to 2000 server. 15.Win2003 has telnet sessions available. 16.Win2000 supports IPV4 whereas 2003 supports IPV4 and IPV6. 17In Win 2000 server we can apply 620 group policies but in 2003 we can apply nearly 720 so Win2003 server is more secure than win 2000 server. 18.Win2000 doesn’t support Dot net whereas 2003 Supports Microsoft .NET 2.0 19.In 2000 it supports of 8 processors and 64 GB RAM (In 2000 Advance Server) whereas in 2003 supports up to 64 processors and max of 512GB RAM. 20.Win2000 has Server and Advance Server editions whereas 2003 has Standard, Enterprise, Datacenter and Web server Editions. 21.Win2000 has basic concept of DFS (Distributed File systems) with defined oots whereas 2003 has Enhanced DFS support with multiple roots.

22.In 2000 there is complexality in administering Complex networks whereas 2003 is easy administration in all & Complex networks. 23.In 2003 we have concept of Volume shadow copy service which is used to create hard disk snap shot which is used in Disaster recovery and 2000 doesn’t have this service. 24.In 2000 we don’t have end user policy management, whereas in 2003 we have a End user policy management which is done in GPMC (Group policy management console). 25In 2000 we have cross domain trust relation ship and 2003 we have Cross forest trust relationship. 26.2003 has service called ADFS (Active Directory Federation Services) which is used to communicate between branches with safe authentication. 27.In 2003 their is improved storage management using service File Server Resource Manager (FSRM). 28.2003 has service called Windows Share point Services (It is an integrated portfolio of

collaboration and communication services designed to connect people, information, processes, and systems both within and beyond the organizational firewall). 29.When installing terminal services for win2000 u r prompted to select application server functions or administrative functions sets can be installed sequently on one server but it performs only one function at one time. But in 2003 still distinguishes between application and administrative services but installation and management are now consolidated. Win2000 ADS :1.Only one million object can be created. 2.Universal group membership is not present. 3. Between parent and child, there is no built in trust .It is called as non-transitive trust. 4. There is only three AD partition, Domain partition, configuration partition, schema partition. 5. In Win 2000 server we can apply 620 group policies. 6. But 2k only Emergency Repair Disk(ERD) is there. Win2003 ADS :1.2 Million object can be created .

2.Between parent and child, there is built in trust .It is called as transitive trust. 3. Same partitions are there in 2003, but one additional partition called Application directory partition is present. 4. but in 2003 we can apply nearly 720 so Win2003 server is more secure than win 2000 Server. 5. Automated System Recovery (ASR) is there.
Read more: http://newadmins.blogspot.com/2009/02/difference-between-windows-2000server.html#ixzz0rxXluA8a

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close