Vous êtes sur la page 1sur 6

Questions and Ans:

1. Describe how the DHCP lease is obtained. It’s a four-step process consisting of (a)
IP request, (b) IP offer, © IP selection and (d) acknowledgement.

DHCP Server leases the IP addresses to the clients as follows:

DORA
D (Discover) : DHCP Client sends a broadcast packets to identify the dhcp
server, this packet will contain the source MAC.
O (Offer) : Once the packet is received by the DHCP server, the server will send
the packet containing Source IP and Source MAC.
R (Request) : Client will now contact the DHCP server directly and request for
the IP address.
A (Acknowledge) : DHCP server will send an ack packet which contains the IP
address.

2. I can’t seem to access the Internet, don’t have any access to the corporate
network and on ipconfig my address is 169.254.*.*. What happened? The 169.254.*.*
netmask is assigned to Windows machines running 98/2000/XP if the DHCP server is not
available. The name for the technology is APIPA (Automatic Private Internet Protocol
Addressing).
3. We’ve installed a new Windows-based DHCP server, however, the users do
not seem to be getting DHCP leases off of it. The server must be authorized first with the
Active Directory.
4. How can you force the client to give up the dhcp lease if you have access to the
client PC? ipconfig /release
5. What authentication options do Windows 2000 Servers have for remote
clients? PAP, SPAP, CHAP, MS-CHAP and EAP.
6. What are the networking protocol options for the Windows clients if for some
reason you do not want to use TCP/IP? NWLink (Novell), NetBEUI, AppleTalk (Apple).
7. What is data link layer in the OSI reference model responsible for? Data link
layer is located above the physical layer, but below the network layer. Taking raw data
bits and packaging them into frames. The network layer will be responsible for addressing the
frames, while the physical layer is reponsible for retrieving and sending raw data bits.
8. What is binding order? The order by which the network protocols are used for client-
server communications. The most frequently used protocols should be at the top.
9. How do cryptography-based keys ensure the validity of data transferred
across the network? Each IP packet is assigned a checksum, so if the checksums do not match
on both receiving and transmitting ends, the data was modified or corrupted.
10. Should we deploy IPSEC-based security or certificate-based security? They are
really two different technologies. IPSec secures the TCP/IP communication and protects the
integrity of the packets. Certificate-based security ensures the validity of authenticated clients and
servers.
11. What is LMHOSTS file? It’s a file stored on a host machine that is used to resolve
NetBIOS to specific IP addresses.
12. What’s the difference between forward lookup and reverse lookup in DNS?
Forward lookup is name-to-address, the reverse lookup is address-to-name.
13. How can you recover a file encrypted using EFS? Use the domain recovery agent.

Questions:

1. Why was it that you left the last job that you were at?
2. What do you think your top 3 strengths are?
3. What is most important to you in a job?
4. Major difference between FAT and NTFS on a local machine?
5. How many passwords by default are remembered in an active directory?
6. What is a C name record (in DNS)?
7. What is a LM host file used for?
8. Can you name the FSMO roles in active directory?
9. What tolls would you use to gage the effect of group policy before using any tools?
10. Explain Active Directory sites and services and linked cost routing?
11. When would you use circular logging and exchange?
12. Exhange related question - as an echange admin if someone asked you how to determine if
mail was delivered or not which tool would you use?
13. Can you explain how you configurated SMS.
14. Rate yourself in 3 different areas (1-5, 5 is expert)
15. What is Active Directory?
16. What is LDAP?
17. Can you connect Active Directory to other 3rd-party Directory Services? Name a few options.
18. Where is the AD database held? What other folders are related to AD?
19. What is the SYSVOL folder?
20. Name the AD NCs and replication issues for each NC
21. What are application partitions? When do I use them
22. How do you create a new application partition
23. How do you view replication properties for AD partitions and DCs?
24. What is the Global Catalog?

A global catalog server is a domain controller it is a master searchable


database that contains information about every object in every domain in a
forest. The global catalog contains a complete replica of all objects in Active
Directory for its host domain, and contains a partial replica of all objects in Active
Directory for every other domain in the forest. It have two important functions:

• Provides group membership information during logon and authentication


• Helps users locate resources in Active Directory

25. How do you view all the GCs in the forest?


26. Why not make all DCs in a large forest as GCs?
27. Trying to look at the Schema, how can I do that?
28. What are the Support Tools? Why do I need them?
29. What is LDP? What is REPLMON? What is ADSIEDIT? What is NETDOM? What is REPADMIN?
30. What are sites? What are they used for?
31. What’s the difference between a site link’s schedule and interval?
32. What is the KCC?
33. What is the ISTG? Who has that role by default?
34. What are the requirements for installing AD on a new server?
35. What can you do to promote a server to DC if you’re in a remote location with slow WAN link?
36. How can you forcibly remove AD from a server, and what do you do later? • Can I get user
passwords from the AD database?
37. What tool would I use to try to grab security related packets from the wire?
38. Name some OU design considerations.
39. What is tombstone lifetime attribute?
40. What do you do to install a new Windows 2003 DC in a Windows 2000 AD?
41. What do you do to install a new Windows 2003 R2 DC in a Windows 2003 AD?
42. How would you find all users that have not logged on since last month?
43. What are the DS* commands?
44. What’s the difference between LDIFDE and CSVDE? Usage considerations?
45. What are the FSMO roles? Who has them by default? What happens when each one fails?
46. What FSMO placement considerations do you know of?
47. I want to look at the RID allocation table for a DC. What do I do?
48. What’s the difference between transferring a FSMO role and seizing one? Which one should you
NOT seize? Why?
49. How do you configure a “stand-by operation master†ン for any of the roles?
50. How do you backup AD?
51. How do you restore AD?
52. How do you change the DS Restore admin password?
53. Why can’t you restore a DC that was backed up 4 months ago?
54. What are GPOs?
55. What is the order in which GPOs are applied?
56. Name a few benefits of using GPMC.
57. What are the GPC and the GPT? Where can I find them?
58. What are GPO links? What special things can I do to them?
59. What can I do to prevent inheritance from above?
60. How can I override blocking of inheritance?
61. How can you determine what GPO was and was not applied for a user? Name a few ways to do that.
62. A user claims he did not receive a GPO, yet his user and computer accounts are in the right OU, and
everyone else there gets the GPO. What will you look for?
63. Name a few differences in Vista GPOs
64. Name some GPO settings in the computer and user parts.
65. What are administrative templates?
66. What’s the difference between software publishing and assigning?
67. Can I deploy non-MSI software with GPO?
68. You want to standardize the desktop environments (wallpaper, My Documents, Start menu,
printers etc.) on the computers in one department. How would you do that?
69. What is Active Directory?
70. What is LDAP?
71. Can you connect Active Directory to other 3rd-party Directory Services? Name a few options.
72. Where is the AD database held? What other folders are related to AD?
73. What is the SYSVOL folder?
74. Name the AD NCs and replication issues for each NC
75. What are application partitions? When do I use them
76. How do you create a new application partition
77. How do you view replication properties for AD partitions and DCs?
78. How do you view all the GCs in the forest?
79. Why not make all DCs in a large forest as GCs?
80. Trying to look at the Schema, how can I do that?
81. What are the Support Tools? Why do I need them?
82. What is LDP? What is REPLMON? What is ADSIEDIT? What is NETDOM? What is REPADMIN?
83. What are sites? What are they used for?
84. What’s the difference between a site link’s schedule and interval?
85. What is the KCC?
86. What is the ISTG? Who has that role by default?
87. What are the requirements for installing AD on a new server?
88. What can you do to promote a server to DC if you’re in a remote location with slow WAN link?
89. How can you forcibly remove AD from a server, and what do you do later? • Can I get user
passwords from the AD database?
90. What tool would I use to try to grab security related packets from the wire?
91. Name some OU design considerations.
92. What is tombstone lifetime attribute?
93. What do you do to install a new Windows 2003 DC in a Windows 2000 AD?
94. What do you do to install a new Windows 2003 R2 DC in a Windows 2003 AD?
95. How would you find all users that have not logged on since last month?
96. What are the DS* commands?
97. What’s the difference between LDIFDE and CSVDE? Usage considerations?
98. What are the FSMO roles? Who has them by default? What happens when each one fails?
99. What FSMO placement considerations do you know of?
100.I want to look at the RID allocation table for a DC. What do I do?
101. What’s the difference between transferring a FSMO role and seizing one? Which one should you
NOT seize? Why?
102. How do you configure a “stand-by operation master†ン for any of the roles?
103. How do you backup AD?
104. How do you restore AD?
105. How do you change the DS Restore admin password?
106. Why can’t you restore a DC that was backed up 4 months ago?
107. What are GPOs?
108.What is the order in which GPOs are applied?
109. Name a few benefits of using GPMC.
110. What are the GPC and the GPT? Where can I find them?
111. What are GPO links? What special things can I do to them?
112. What can I do to prevent inheritance from above?
113. How can I override blocking of inheritance?
114. How can you determine what GPO was and was not applied for a user? Name a few ways to do that.
115. A user claims he did not receive a GPO, yet his user and computer accounts are in the right OU, and
everyone else there gets the GPO. What will you look for?
116. Name a few differences in Vista GPOs
117. Name some GPO settings in the computer and user parts.
118. What are administrative templates?
119. What’s the difference between software publishing and assigning?
120. Can I deploy non-MSI software with GPO?
121. You want to standardize the desktop environments (wallpaper, My Documents, Start menu,
printers etc.) on the computers in one department. How would you do that?
122. What is Active Directory schema?
123. What are the domain functional level in Windows Server 2003?
124. What are the forest functional level in Windows Server 2003?
125. How we can raise domain functional & forest functional level in Windows Server 2003?
126. Which is the deafult protocol used in directory services?
127. What is IPv6?

Internet Protocol version 6 (IPv6) is a network layer IP standard used by


electronic devices to exchange data across a packet-switched internetwork. It
follows IPv4 as the second version of the Internet Protocol to be formally adopted
for general use. ip v6 it is a 128 bit size address. This is total 8 octants each
octant size is 16 bits separated with “:”, it is in hexa decimal format. These 3
types:

unicast address

multicast address
anycast address

128.
129. What is the default domain functional level in Windows Server 2003?
130. What are the physical & logical components of ADS
131. In which domain functional level, we can rename domain name?
132. What is multimaster replication?
133. What is a site?
134. Which is the command used to remove active directory from a domain controler?
135. How we can create console, which contain schema?
136. What is trust?
137. What is the file that’s responsible for keep all Active Directory database?
138.

Vous aimerez peut-être aussi