Mcitp interview questions and answers pdf

Wednesday, May 15, 2019 admin Comments(0)

Mcitp interview questions and answers on advance and basic Mcitp with questions and answers as PDF for free at The Biggest ebook library in the world. Mcitp Administrator Interview Questions And jinzihao.info The set of MCSA interview questions here ensures that you offer a perfect answer to the interview. mcitp interview questions and pdf. TOP ACTIVE DIRECTORY Interview Questions and Answers PDF - Download as PDF File .pdf),. Text File .txt) or.

Language: English, Spanish, German
Country: Haiti
Genre: Religion
Pages: 121
Published (Last): 01.06.2016
ISBN: 275-5-46282-718-3
ePub File Size: 20.83 MB
PDF File Size: 14.64 MB
Distribution: Free* [*Regsitration Required]
Downloads: 31106
Uploaded by: ELEONORE

M.C.I.T.P Interview Questions - Free download as Word Doc .doc /.docx), PDF TOP ACTIVE DIRECTORY Interview Questions and Answers PDF basic mcitp interview questions and answers | Get Read & Download Ebook basic mcitp interview questions and answers as PDF for free at The Biggest ebook. WINDOWS ADMIN INTERVIEW QUESTIONS. 1. WINDOWS ADMINISTRATION QUESTIONS. 1. DHCP Interview Question Answers.

When a DC creates a security principal object such as a user or group. Active directory is a domain controller which is use to authenticate and administrate the group of computer, user, server etc. More From Shaik Ashwaq Javed. What do you do with secure sign-ons in an organization with many roaming users? Thank you so much admin for providing such an incredible information. If the wizard fails to locate a DC, it performs debugging and reports what caused the failure and how to fix the problem. Now Microsoft is big so it has offices in Europe and Asia.

Dynamic Storage Terms A volume is a storage unit made from free space on one or more disks. It can be a single region on a disk or consist of multiple. A RAID-5 volume cannot be mirrored or extended. A striped volume cannot be mirrored or extended and is not fault-tolerant. A mirrored volume cannot be extended. A spanned volume cannot be mirrored and is not fault-tolerant.

MCITP: Windows Admin Interview Questions

It can be formatted with a file system and assigned a drive letter. If one of the disks fails. All of the data on one volume is copied to another disk to provide data redundancy. A simple volume can be extended within the same disk or onto additional disks.

A mirrored volume RAID-1 is a fault-tolerant volume whose data is duplicated on two physical disks. The system volume can be. The data on this type of volume is allocated alternately and evenly to each of the physical disks. A striped volume RAID-0 is a volume whose data is interleaved across two or more physical disks. A simple volume uses free space from a single disk.

Volumes on dynamic disks can have any of the following layouts: You can extend a spanned volume onto a maximum of 32 disks. Directory Services Changes. Fine-Grained Password Policies—AD DS in Windows Server now provides the capability to create different password and account lockout policies for different sets of users in a domain.

Page 6. The boot volume can be. This is a quote from Microsoft themselves basically the domain controller info stored in files like your group policy stuff is replicated through this folder structure. Because junctions are used within the Sysvol folder structure. Directory Services Replication. The enhancements provide more granular auditing capabilities through four new auditing categories: Directory Services Access.

The Sysvol folder on a Windows domain controller is used to replicate file-based data among domain controllers. Active Directory Domain Services in Windows Server provides a number of enhancements over previous versions. PSOs can be applied to both users and groups.

The KCC creates separate replication topologies depending on whether replication is occurring within a site intrasite or between sites intersite. In addition. The restartable AD DS service reduces the time required to perform certain maintenance and restore operations.

Repadmin can be used to manually create the replication topology although in normal practice this should not be necessary. Administrators can use Repadmin to view the replication topology sometimes referred to as RepsFrom and RepsTool as seen from the perspective of each domain controller.

RODCs are covered in more detail in Chapter 6. It is used for batch management of trusts. The KCC also dynamically adjusts the topology to accommodate new domain Page 7. The AD DS database mounting eliminates the need to restore multiple backups to compare the AD data that they contain and provides the capability to examine any change made to data stored in AD DS.

Replication Diagnostics Tool This command-line tool assists administrators in diagnosing replication problems between Windows domain controllers. Now Microsoft has a server named server1 in that domain. Say you have the domain Microsoft. A site allows administrators to configure Active Directory access and replication topology to take advantage of the physical network.

So its FQDN is server1. Name some OU design considerations? OU design requires balancing requirements for delegating administrative rights — independent of Group Policy needs — and the need to scope the application of Group Policy.

The following OU design recommendations address delegation and scope issues: Page 8. Now Microsoft is big so it has offices in Europe and Asia. Their FQDN would then look like this: If you add an additional domain server and name it server2. How do you view replication properties for AD? By using Active Directory Replication Monitor. So they make child domains for them and their FQDN would look like this: Active Directory provides support for different types of groups and group scopes. If it is having an intranet address a gateway is needed as a router or firewall to communicate with internet.

Can a workstation computer be configured to browse the Internet and yet NOT have a default gateway? If we are using public ip address.

You cannot grant permissions to security groups. The group type determines the type of task that you manage with the group. Use Security groups for granting permissions to gain access to resources. When security permissions are set for a group in the Access Control List on a resource.

The group scope determines whether the group can have members from multiple domains or a single domain. Even though security groups have all the capabilities of distribution groups.

If an authorized Page 9. To avoid problems in the network causing by mis-configured DHCP servers. What are Active Directory Groups?

Answers mcitp pdf interview questions and

Groups are containers that contain user and computer objects within them as members. All domain groups are created on a domain controller. Domain Groups enable centralized administration in a domain. In a domain. Therefore security groups share the capabilities of distribution groups. As a result. What is CIDR? Sending an e-mail message to a group sends the message to all members of the group.

Distribution groups are used for sending e-main messages to groups of users. Intra-site replication can be done between the domain controllers in the same site. Page Both the cases we need to create DFS root Which appears like a shared folder for end users and DFS links A logical link which is Pointing to the server where the folder is physically shared The maximum number of DFS roots per server is 1.

The maximum numbers of DFS root replicas are We cannot provide redundancy for standalone DFS in case of failure. Protocols using for Replication. The maximum number of DFS roots per domain is unlimited. Flag for inappropriate content. Related titles. Windows Server Interview Questions and Answers. System Administrator interview questions and answers.

Jump to Page. Search inside document. It is really nice. Information security is the set of processes that maintain the confidentiality, integrity and availability of business data in its various forms. Indian Cyber Army has been dedicated in fighting cyber crime, striving to maintain law and order in cyberspace so as to ensure that everyone remains digitally safe.

Read more: Indian Cyber Army implements a blend of academic learning and practical sessions to give the candidate optimum exposure. Ethical hacking training , Ethical hacking course. Describe how the DHCP lease is obtained. What happened? The The server must be authorized first with the Active Directory.

How can you force the client to give up the dhcp lease if you have access to the client PC? What authentication options do Windows Servers have for remote clients? What is data link layer in the OSI reference model responsible for? Data link layer is located above the physical layer, but below the network layer.

Taking raw data bits and packaging them into frames. The network layer will be responsible for addressing the frames, while the physical layer is responsible for retrieving and sending raw data bits. What is binding order?

The order by which the network protocols are used for client-server communications.

M.C.I.T.P Interview Questions

The most frequently used protocols should be at the top. How do cryptography-based keys ensure the validity of data transferred across the network? Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.

They are really two different technologies. Certificate-based security ensures the validity of authenticated clients and servers. Forward lookup is name-to-address; the reverse lookup is address-to-name. How can you recover a file encrypted using EFS? Use the domain recovery agent. This came in the mail from the reader who recently went through a job interview process. How would you remotely administer IIS? What is RAID? What is it used for? Explain hidden shares.

Administrative shares are usually created automatically for the root of each drive letter. They do not display in the network browse list. How do the permissions work in Windows ? What permissions does folder inherit from the parent? When you combine NTFS permissions based on users and their group memberships, the least restrictive permissions take precedence. However, explicit Deny entries always override Allow entries. You can either compress it or encrypt it, but not both.

If I rename an account, what must I do to make sure the renamed account has the same permissions as the original one? What are the accessibility features in Windows ? You can only see it if a fax had been installed. What do I need to ensure before deploying an application via a Group Policy?

How do you configure mandatory profiles? Rename ntuser. It got upgraded to NTFS 5. How does Internet Connection Sharing work on Windows ? What is Active Directory? What is LDAP? Can you connect Active Directory to other 3rd-party Directory Services? Name a few options. Where is the AD database held? What other folders are related to AD? What are application partitions? When do I use them. How do you create a new application partition. How do you view replication properties for AD partitions and DCs?

What is the Global Catalog? How do you view all the GCs in the forest? Why not make all DCs in a large forest as GCs? Trying to look at the Schema, how can I do that? What are the Support Tools? Why do I need them? What is LDP? What are sites? What are they used for? What is the KCC? What is the ISTG? Who has that role by default? What are the requirements for installing AD on a new server? How can you forcibly remove AD from a server, and what do you do later?

What tool would I use to try to grab security related packets from the wire?

Name some OU design considerations. What is tombstone lifetime attribute? How would you find all users that have not logged on since last month? Usage considerations? What are the FSMO roles? Who has them by default? What happens when each one fails?

What FSMO placement considerations do you know of? What do I do? Which one should you NOT seize? How do you backup AD? How do you restore AD? How do you change the DS Restore admin password? What are GPOs? What is the order in which GPOs are applied? Name a few benefits of using GPMC. Where can I find them? What are GPO links? What special things can I do to them? What can I do to prevent inheritance from above? How can I override blocking of inheritance?

How can you determine what GPO was and was not applied for a user? Name a few ways to do that. What will you look for? Name a few differences in Vista GPOs. Name some GPO settings in the computer and user parts. What are administrative templates? You want to standardize the desktop environments wallpaper, My Documents, Start menu, printers etc.

How would you do that? Active Directory is a Meta Data. Active Directory is a data base which stores a data base like your user information, computer information and also other network object info. It has capabilities to manage and administer the complete Network which connect with AD. Global Catalog is a server which maintains the information about multiple domains with trust relationship agreement. Active Directory service is an extensible and scalable directory service that enables you to manage network resources efficiently.

Active Directory is directory service that stores information about objects on a network and makes this information available to users and network administrators. Active Directory gives network users access to permitted resources anywhere on the network using a single logon process.

It provides network administrators with an intuitive, hierarchical view of the network and a single point of administration 3for all network objects. Q; What is active directory? All the policies and security will be applicable on the client machine which one is join the domain. And all this policies and security is defined in active directory. LDAP light weight directory access protocol is an internet protocol which Email and other services is used to look up information from the server.

What is KCC? Ans KCC knowledge consistency checker is used to generate replication topology for inter site replication and for intrasite replication. With in site replication traffic are done via remote procedure calls over ip, while between sites it is done through either RPC or SMTP. What is Global Catalog Server? The global catalog is a distributed data repository that contains a searchable, partial representation of every object in every domain in a multidomain Active Directory forest.

The global catalog is stored on domain controllers that have been designated as global catalog servers and is distributed through multimaster replication. Searches that are directed to the global catalog are faster because they do not involve referrals to different domain controllers.

Active directory is a domain controller which is use to authenticate and administrate the group of computer, user, server etc. DIT file. The contents such as group policy, users etc of the sysvol folder are replicated to all domain controllers in the domain. Windows Domain controllers each create Active Directory Replication connection objects representing inbound replication from intra-site replication partners.

For inter-site replication, one domain controller per site has the responsibility of evaluating the inter-site replication topology and creating Active Directory Replication Connection objects for appropriate bridgehead servers within its site. It establishes LSPs that follow the existing IP routing, and is particularly well suited for establishing a full mesh of LSPs between all of the routers on the network. Replmon displays information about Active Directory Replication.

Network administrators can use it for common administrative tasks such as adding, deleting, and moving objects with a directory service. The attributes for each object can be edited or deleted by using this tool. The following are the required files for using this tool: It is used for batch management of trusts, joining computers to domains, verifying trusts, and secure channels.

This command-line tool assists administrators in diagnosing replication problems between Windows domain controllers. Administrators can use Repadmin to view the replication topology sometimes referred to as RepsFrom and RepsTo as seen from the perspective of each domain controller.

In addition, Repadmin can be used to manually create the replication topology although in normal practice this should not be necessary , to force replication events between domain controllers, and to view both the replication metadata and up-to-datedness vectors.

How to take the backup of AD?

Answers mcitp and pdf questions interview

For this do the same as above in the question 36 but in place of backup you select the restore option and restore the system state. The domain controller holding this role may not necessarily also is a bridgehead server. You really are spoilt for choice when it comes to scripting tools for creating Active Directory objects. I will not go to length into this powerful command, but I will show you some basic samples of how to import a large number of users into your AD.

Consult your help file for more info. The number of days before a deleted object is removed from the directory services. This assists in removing objects from replicated servers and preventing restores from reintroducing a deleted object. How it is possibal. AN application diretcory partition is a directory partition that is replicated only to specific domain controller. Only domain controller running windows Server can host a replica of application directory partition. Using an application directory partition provides redundany,availabiltiy or fault tolerance by replicating data to specific domain controller pr any set of domain controllers anywhere in the forest.

Login on client as Domain Admin user change whatever you need add printers etc go to system-User profiles copy this user profile to any location by select Everyone in permitted to use after copy change ntuser.

Use the DnsCmd command to create an application directory partition. To do this, use the following syntax: Global catalog provides a central repository of domain information for the forest by storing partial replicas of all domain directory partitions. These partial replicas are distributed by multimaster replication to all global catalog servers in a forest.

Its also used in universal global membership. The output will include the text DSA Options: Trying to look at the Schema, how can I do that.

The network layer will be responsible for addressing the frames, while the physical layer is reponsible for retrieving and sending raw data bits. Forward lookup is name-to-address, the reverse lookup is address-to-name. How do you double-boot a Win server box? The Boot. To change the Boot. When an application that ran on an earlier legacy version of Windows cannot be loaded during the setup function or if it later malfunctions, you must run the compatibility mode function.

If you uninstall Windows Server , which operating systems can you revert to?

Note, however, that you cannot upgrade from ME and 98 to Windows Server How do you get to Internet Firewall settings? What are the Windows Server keyboard shortcuts? Winkey opens or closes the Start menu. Active Directory is a network-based object store and service that locates and manages resources, and makes these resources available to authorized users and groups.

An underlying principle of the Active Directory is that everything is considered an object—people, servers, workstations, printers, documents, and devices.

Each object has certain attributes and its own security access control list ACL.