File

advertisement
Windows 2008 server Part I
1. What are some of the new tools and features provided by Windows Server 2008?
Ans:- Windows Server 2008 now provides a desktop environment similar to Microsoft Windows Vista
and includes tools also found in Vista, such as the new backup snap-in and the BitLocker drive encryption
feature. Windows Server 2008 also provides the new IIS7 web server and the Windows Deployment
Service.
2. What are the different editions of Windows Server 2008?
Ans:- The entry-level version of Windows Server 2008 is the Standard Edition. The Enterprise Edition
provides a platform for large enterprisewide networks. The Datacenter Edition provides support for
unlimited Hyper-V virtualization and advanced clustering services. The Web Edition is a scaled-down
version of Windows Server 2008 intended for use as a dedicated web server. The Standard, Enterprise,
and Datacenter Editions can be purchased with or without the Hyper-V virtualization technology.
3. When a child domain is created in the domain tree, what type of trust relationship exists between
the new child domain and the trees root domain?
Ans:- Child domains and the root domain of a tree are assigned transitive trusts. This means that the root
domain and child domain trust each other and allow resources in any domain in the tree to be accessed by
users in any domain in the tree.
4. What is the primary function of domain controllers?
Ans:- The primary function of domain controllers is to validate users to the network. However, domain
controllers also provide the catalog of Active Directory objects to users on the network.
5. What are two command-line utilities that can be used to check TCP/IP configurations and IP
connectivity, respectively?
Ans:- The ipconfig command can be used to check a computer’s IP configuration and also renew the
client’s IP address if it is provided by a DHCP server. ping can be used to check the connection between
the local computer and any computer on the network, using the destination computer’s IP address.
6. What term is used to refer to the first domain created in a new Active Directory tree?
Ans:- The first domain created in a tree is referred to as the root domain. Child domains created in the tree
share the same namespace as the root domain.
7. What type of Active Directory objects can be contained in a group?
Ans:- A group can contain users, computers, contacts, and other nested groups.
8. What types of Active Directory objects can be contained in an Organizational Unit?
Ans:- Organizational Units can hold users, groups, computers, contacts, and other OUs. The
Organizational Unit provides you with a container directly below the domain level that enables you to
refine the logical hierarchy of how your users and other resources are arranged in the Active Directory.
9. How can client computer accounts be added to the Active Directory?
Ans:- Client computer accounts can be added through the Active Directory Users and Computers snap-in.
You can also create client computer accounts via the client computer by joining it to the domain via the
System Properties dialog box. This requires a user account that has administrative privileges, such as
members of the Domain Administrator or Enterprise Administrator groups.
10. What is the purpose of deploying local DNS servers?
Ans:- A domain DNS server provides for the local mapping of fully qualified domain names to IP
addresses. Because the DNS is a distributed database, the local DNS servers can provide record
information to remote DNS servers to help resolve remote requests related to fully qualified domain
names on your network.
11. What is LPD?
Ans:-It enables Printing using the line printer daemom protocol, which is used by UNIX clients.
12. What is printer pooling?
Ans:- Printer pooling is used for load balancing. When an end user puts a print job in the queue, the first
available printer is the pool will take the job.
13. What is HARD quota?
Ans:- It prevents users from saving a file after the volume or folder has reached the specified space limit
and generates notification.
14. What is the use of OFFLINE file features?
Ans:- Mobile users might need access to shared folders even when they’re disconnected from your
internal network. Offline Files makes this possible by allowing client computers to automatically cache a
copy of files on shared folders and by providing transparent access to the files when the user is
disconnected from the network.
15.What is Quotas?
Ans:- disk quotas allow Windows administrators to monitor and control the use of disk space by users.
Disk quotas can be deployed in a number of different ways.
16. What is the primary and extended partition?
Ans:- Primary and extended partitions are the main disk divisions; one hard disk may contain up to four
primary partitions, or three primary partitions and one extended partition.
17.Which File system is supported by windows 2008 server to secure file and folder?
Ans:- NT file system(NTFS) and Encrypting file system (EFS).
18. What is use of terminal services?
Ans:- Terminal Services provides the ability to host multiple, simultaneous client sessions on
Windows Server 2003. Terminal Services is capable of directly hosting compatible multi-user
client desktops running on a variety of Windows-based and non Windows-based computers.
19. Which editions of Windows 2008 server we will get Hyper-V role?
Ans:- Hyper-V is available in x64-based versions of Windows Server 2008—specifically, the
x64-based versions of Windows Server 2008 Standard, Windows Server 2008 Enterprise, and
Windows Server 2008 Datacenter.
20. What is use of Hyper-V role?
Ans:- Hyper-V Server is a dedicated stand-alone product that contains the hypervisor, Windows
Server driver model, virtualization capabilities, and supporting components such as failover
clustering.
21. Which role service is required for the Routing in Windows server 2008?
Ans:- RRAS role from Network policies and access services is required for Routing.
22. How to configure VPN server?
Ans:- – Server Manager -> Adding Roles -> Next -> Select Server Roles ->Network Policy and
Access Services ->Next ->Routing and Remote Access Services ->Remote Access Service >Routing -> Next ->Confirm Installation Selection ->Install ->Configure and Enable Routing and
Remote Access ->Next-> Routing and Remote Access Wizard ->Custom Configuration ->Next >VPN access ->Next ->Finish ->Start Service These are the steps to add VPN at server side.
23. What are the different types of VPN?
Ans:-
Private VPN
Internal VPN
External VPN
24. What is mean by IP routing?
Ans:- IP rounting is the process of determining the route i.e. communication path and sending
data from the source computer to the destination computer in a network.
25. What is static routing?
Ans:- static routing is a routing mechanism is allows you to define a static route from the sourceto
destination while transmitting data from one computer to another.
26. What is mean by performance monitor?
Ans:- performance monitor is a tool to provide real time data of either a local computer or a
network computer.
27. What is reliability monitor?
Ans:- Reliability monitor is a tool that tracks the stability of a computer. Computer can achieve
the maximum stability index if new software is not installed and system failures do not occur.
28. What is use of MBSA?
Ans:-Microsoft Baseline Security Analyzer is a Microsoft utility used to scan the server for
possible security vulnerabilities.
29. What is WSUS?
Ans:- Microsoft provides the Windows Server Update Services(WSUS) to allow the computer
automatically download the Microsoft software updates.
30. Why computer groups are required in WSUS?
Ans:- Using computer groups we can allow specify computers to install the updates and there are
two types of groups All computers and Unassigned computers.
Windows Server 2008 Part II
Ques.1:- What is server?
Ans.:- Server is a computer program that manages access to a centralized resource in a network.
Ques.2:- What is Domain?
Ans.:- Domain made up of a group of client and servers under the control of one central security
database. Within a domain, user authenticates once to a centralized server known as domain controller.
Ques.3:- What is the use of Domain Controller?
Ans.:- Domain controller is a server, It is control or responsible of provide to host access of all resource
like printer, files, mail within the domain from the central point.
Ques.4:- What is the use of ADDS?
Ans.:- ADDS stands for Active Directory Domain Services it is new feature of Windows Server 2008.
ADDS
provides a database which store the information of directory services and manage
communication between domains and users.
Ques.5:-What are functional levels in Server 2008?
Ans.:- Functional level determine the features of Active Directory(AD) that a you can use within the
domain basically two type of functional levels are in Server 2008
1. Domain Functional Level
2. Forest Functional Level
Ques.6:-what is DNS?
Ans.:- DNS stands for Domain Name System, DNS use domain name resolution mechanism which
resolve host name to IP and IP to host name.
Ques.7:-What is DNS Zone?
Ans.:-DNS zone is an entity that stores the object information in to the various records. Windows Server
2008 supports three types of DNS Zones.
Ques.8:-Explain different type of DNS zones?
Ans.:- The DNS server is the primary source for information about this zone, Server 2008 supports three
type of zones.
1. Primary Zone: - It stores the master copy of zone data in a local file or in AD DS. It stores the
information in text file and this file can be edited by an administrator.
2. Secondary Zone: - A secondary zone is merely a copy of a primary zone that is hosted on another
server; it cannot be stored in AD DS.
3. Stub zone: - A stub zone is a copy of a zone that contains only those resource records necessary to
identify the authoritative Domain Name System (DNS) servers for that zone. A stub zone is used to
resolve names between separate DNS namespaces. This type of resolution may be necessary when a
corporate merger requires that the DNS servers for two separate DNS namespaces resolve names for
clients in both namespaces.
Ques.9:- How many records in DNS server?
Ans.:-Through records DNS Server perform name resolution process. Many type of records’ in DNS
server some commonly used records are






Host A & AAAA
Alias
MX
PTR
SRV
SOA Etc.
Ques.10:- What is WINS server?
Ans.:-WINS stands for Windows Internet Name Service It is similar DNS, who is use for resolved
computer name (NetBIOS) to the IP address and IP to NetBIOS name locally.
Ques.11:- What is DHCP?
Ans.:-DHCP stands for Dynamic Host Configuration Protocol which is used to assign automatic IP
address to DHCP client s.
Ques.12:- What is Dora process in DHCP and how it works?
Ans.:-DHCP provide IP addresses through DORA process, the working of DORA are following
1) Client makes a UDP Broadcast to the server with a DHCP Discover, or Discover packet.
2) DHCP offers to the client.
The server sends a DHCP Offer including other configuration parameters (DHCP Options) for the client
per the server configuration file
3) In response to the offer Client requests the server.
The client replies DHCP Request, uncast to the server, requesting the offered address.
4) The server sends DHCP Ack acknowledging the request which is the clients final permission to take
the address as offered. Before sending the ack the server double checks that the offered address is still
available, that the parameters match the clients request and (if so) marks the address taken.
Ques.13:- How to configure domain controller?
Ans.:- Clik StartRun Type dcpromo.exe command  Click the next button Click next button
again Select Create a new domain in a new forest Type the forest root domain name (Example
jetking.com)Select the Forest Functional Level from (Windows Server 2008) Click the next
button Click the next button Click the yes button  Click the next button again Click the next
button Enter directory services restore mode Admin passwordClick next button Click next button
Then reboot the PC.
Ques.14:- How to install DNS?
Ans.:- Click Start Administrative tool  Server ManagerRight click the Role node and select the
Add Roles options from context menuClick the next button  Select the DNS Server from Roles list
Click the next
Click next button againClick next buttonOnce role installation
process finish click the close button
Ques.15:-What is child domain?
Ans.:- In DNS hierarchy, a child domain called as sub domain which is the portion of a larger domain
name and is a subordinate domain of the root domain, A DNS hierarchy contains the root domain which
is divided in to child domain. A child domain must contain the root domain namespace for example the
root domain name is Jetking.com then the child domain name is child.Jetking.com, Child domain is a
part of root domain tree therefore its shares the same AD schema and configuration information.
16. What is Schema?
Ans : It represents the logical structure of AD.
17. What is Global Catalog?
Ans : It contains data related to the objects of own domain controllers and other domain controller with
in forest.
18. What is Site Link Bridges?
Ans: Site Link Bridge is an AD object that represents a set of site links through which the domain
controllers communicate with each other.
19. What is use of Bridgehead Server?
Ans: Bridgehead Server is used to receive and replicate data between sites .
20. What do you mean by Intersite Replication?
Ans: Replication that occurs between two sites is known as intersite replication.
21. What is use of Active Directory Service?
Ans: Active Directory Service is used to store all the information required to manage the use of the AD
objects, such as users, groups and computers.
22. What is use of CSVDE command?
Ans: The CSVDE command is used to import or export information from a .csv file to the AD database to
create new objects and modify or delete existing objects.
23. What is use of Dsadd command?
Ans: The Dsadd command is used to add a single computer, contact, group, user, or an OU.
24. What is use of LDIFDE command?
Ans: The LDIFDE command is used to import and export the AD information.
25. What are types of Group?
Ans: Security & Distribution
26. What is VPN?
Ans: VPN is virtual network of computers that uses a public telecommunication infrastructure and
provides a user with secure remote access to the network resources.
27. What is NAP?
Ans: It allows network administrators to specify one or more policies that define the condition to permit
the access to the network.
28. Which are different VPN technologies support to Windows Vista, Windows 7 and Windows Server
2008?
Ans: Point-to-Point Tunneling Protocol, Layer 2 Tunneling Protocol, Secure Socket Tunneling Protocol.
29. What are types of replication?
Ans: Intrasite & Intersite replication.
30. What are types of Operation Masters?
Ans: The schema master, domain naming master, RID master, PDC emulator master, and the
infrastructure master.
31. What is use of Computer Account?
Ans: Computer Account is used to identify a computer in a domain. It also used to force domain
permissions and group policies.
32. What are the pre-requisites to add computers to a domain?
Ans: The computer object must exist & need to specify the permissions that who can join a computer
with the same name in the domain.
33. What are the steps on client computer to add computers to a domain?
Ans: Log on to the client computer as an administrator
Right-click the Computer option in the start menu.
Select Property from the context menu.
Change setting in the computer name, domain, and workgroup setting group.
Select Domain radio button
Provide name of domain
Click OK.
34. What is use of Windows Power Shell?
Ans: Windows Power Shell is a command-line shell and scripting language that helps IT professionals to
easily create new user, groups, or computer.
35. What is Subnet?
Ans: Subnet is the smallest unit of network defined with a unique Internet Protocol address range. It
also defined as a logical IP block which is connected to other IP block through network devices such
as,swithches and routers.
Windows 2008 server Part III
1. Describe & Explore Group Policy Objects?
Ans: Group policy objects stores information related to group policy setting, which can be used or
implemented on users or computers in the network.GPO affects the user and computers located in sites,
domains and different Organization.
2. What is Domain-based GPO?
Ans: GPO available in the AD domain are Known as domain based GPO's.
Domain based GPO's created by default,
1.Default Domain Policy-Policies are linked to the AD Domain. It affects all the users, computers, and
domain controllers in Domain.
2.Default domain Controller Policy-Policies linked to the Domain Controller OU in the Domain. Policy
setting in this policy affect the Domain controllers in the current OU only.
3.How to Configure Group Policy settings?
Ans:Group Policy managed with help of Group Policy Management Editor(GPME).
Following Nodes are used to configure Policy settings.
1. Computer configuration
2.User Configuration.
Both these nodes contains Sub-Nodes,
A.Policy
B.Preferences
A.Policy:Software settings,Windows Settings and Administrative template settings.
B.Preference Node contains Windows and Control panel settings.
4.What is Group Policy Scope?
Ans: The process of linking GPO's to the AD Objects, like sites, domains and other Organizational
units(OU's) is known as scoping of group policy.
5.What is Authentication?
Ans:When a user logs on a network or standalone computer he or she has to provide user name and password
for identification.
6.What is Account Lockout Policy?
Ans:Account lockout policy locks an account in a domain when user tries to logon with incorrect user name
and password beyond the number of time specified in the lockout policy.
7.What is Fine-Grained Policy?
Ans:Administrative accounts have high privilege and authority to change object in AD .These accounts
provided additional security policies which overrides policies defined in Domain password and account
lockout policy.
8.What is Password Setting Objects?
Ans:The fine-grained policies are defined with help of separate class of objects in AD that maintain
settings for fine-grained policies. These objects are called Password Setting Objects.
Password setting Objects cannot be applied directly to an OU. If apply on users of an OU must be create
global security group of users of OU and then apply PSOs.
9.Explain RODC?
Ans:Read only domain Controller introduced in windows server 2008 to solve problem related to speed,
security, and integrity in an enterprise. Domain controller is Read only. It contains all attributes of the
objects in domain except sensitive attributes like password’s as example when the users in branch office
logs on in domain, RODC accepts user credentials and transfer it to domain controller in corporate office
for authentication.
10.What is Audit Policy?
Ans:It is a set of configuration, Network administrator to record activities and changes made due to those
activities which performed in the network.
OR
It provides complete information about the activities performed on the Network resources and changes
made in the attributes of network objects.
11.What is Windows Management Instrumentation?
Ans:Windows Management Instrumentation is management infrastructure Technology used to filter GPO.
12.How to Implement WMI Filters?
Ans:WMI base queries are used to filter the computers on Basis of RAM, Processor Speed, Disk capacity,
IP Address, Operating System version and service pack level.
13.Which type of the software need to install on the computers in the network to create software
deployment group policy?
Ans:.msi file of the software need to install on computers in network to create software deployment group policy.
14.Write methods of Deploying softwares
Ans: A.Published
B.Assigned
C.Advanced
15.What is System state data?
Ans:System state data comprises the components on which the windows server 2008 Operating System (OS) for various ta
It contains
1.AD
2.Boot Files
3.COM+ Class Registration database
4.Registry
5.Sysvol Directory.
16.How to take full server Backup by using wbadmin command?
Ans:wbadmin Start SystemStateBackup -backuptarget:(Any free Drive.) e.g:D
17.How to perform Restoring in AD environment?
Ans:Performing DSRM(Directory Services Restore Mode) Restore data in AD Environment.
18.Which precaution need to take when restoring system state Data?
Ans:Need to ensure that AD services are stopped because full access to system files and AD data store
is required.
19.What is Offline Maintenance?
Ans:These are System maintenance activities that performed when users are not using services
provided by a Server.
20.Which type of Backup should you perform when you want to save data that has changed
since the last full backup?
Ans:Incremental Backup.
21. What is the function of the Task Manager Tool ?
ANS : The main function of task manager is to monitor the applications and the tasks running in
the windows operating system. It provides information to users and administrator who is using the PC &
shows the application process, CPU usage, performance, networking, users and finally services. With the
help of this task manager you can end the running program or task which is extremely complicated to end,
switch to another task, although you can open new task, you can check the usage of CPU, it portrays the
user who is using the pc at the moment and finally, you can shut down the pc as well.
22. What is the function of the MMC Tool in Windows 2008 server?
ANS : MMC stands for Microsoft Management console , it is used to enables in creating, saving and
opening administrative tools.
23. What is the function of the Dcdiag Tool in Windows 2008 server?
ANS : Dcdiag is used to enables in analyzing the state of domain controllers in a forest or enterprise and
also assits in troubleshooting by reporting any problems.
24. What is the function of the Netdom Tool in Windows 2008 server?
ANS : Netdom is used to enables batch management of trusts, connecting computers to domains and
validating trusts and secure channels.
25. What is the function of the Event viewer Tool in Windows 2008 server?
ANS : Event viewer is used to enables in monitoring events recorded in event logs.
26. What is Paging file in Windows 2008 server?
ANS : The paging file (Pagefile.sys) is a hidden file on your computer`s hard disk. By Default Windows
Stores the paging file on the boot partition i.e. the partition that contains the operating system and its
supported files. The default paging file size is equal to 1.5 times the total RAM.
27. What is Memory Dump in Windows 2008 server?
ANS : In the situation of malfunction of Windows server 2008 the operating system dumps the content of
the system memory to the file therefore while deciding the storage requirement you should also consider
this file. The maximum size of which is amount of memory installed in the computer plus one megabyte.
28. What is SAN?
ANS : SAN refers to the separate network that helps you to attach remote storage device to the servers
and SAN stands for storage area network.
29. What is NAS?
ANS : NAS refers to the data storage technology which allows you to store the data on a network storage
location and provides data accessibility to multiple client.
30. What is Log Files?
ANS : Log files refers to the Event track on the system.
31. How many free disk space do you require to create shadow copy?
ANS : 300 MB minimum and maximum size can be set to all the space that is available on the specified
volume.
32. What is Firewall?
ANS : A firewall helps to protect your computer from accessed by unauthorized users or malicious
program.
33. What are advantages of Antivirus software?
ANS : Checking for malicious code and any unauthorized access,
Blocking any suspicious network activity,
Implimenting backup of server at regular intervals and checking logs at regular intervals.
34. What is WSUS in windows 2008 server?
ANS : WSUS forms a useful Platform, where the updates are downloaded and distributed centrally.
35. What is Bit locker in windows 2008 server?
ANS : Bit locker is a feature available in Windows 2008 server which protect data on a drive that has
been stolen or that can be accessed offline by bypassing file permissions.
36. What is rootkit?
ANS : Rootkit is a software that helps a hacker to access a computer without the knowledge of
administrator.
37. What is Diskpart?
Ans :Diskpart is a command line utility which is used to create, convert and delete the partition and
volume.
38. What is the Ntdsutil Tool in Windows 2008 server?
ANS : Ntdsutil is used to enables managing AD, Single Master Operations, and removing metadata.
39. What is the Terminal services in Windows 2008 server?
ANS : Terminal services is used to enables in remote access and management of computers.
40. What is the Regedit in Windows 2008 server?
ANS : Regedit is used to enables in viewing and altering registry setting.
Download