Académique Documents
Professionnel Documents
Culture Documents
3. Ntldr checks the Boot.ini file to find the operating system(s) and to create the
boot menu.
4. After the operating system is selected, Ntldr will run Ntdetect.com which will make
the hardware list.
5. Ntldr will load Ntoskrnl.exe which is the kernel of the operating system.
6. The operating system will start the graphical interface.
7. Ntoskrnl.exe loads Smss.exe which is the Session Manager.
8. The user logs on.
2) What is difference between OST and PST? What is the default storage for a
PST?
Microsoft Outlook stores these items in a personal-storage-table (.pst) or off-
line-storage-table (.ost) files that are located on the local computer. Most
commonly, the .pst files are used to store archived items and the .ost files to
maintain off-line availability of the items.
SMTP Port No 25
POP3 Port No 110
IMAP4 Port No 143
HTTP Port No 80
HTTPS(SSL) Port No 443
FTP Port No 21
AD Port No 445
DHCP Port No 67
DNS Port No 53
Telnet Port No 23
RDP Port No 3389
PING
Ping is one of the most commonly used and known commands. Ping allows a user
to ping another network IP address. This can help determine if the network is able
to communicate with the network.
NBTSTAT
The nbtstat MS-DOS utility that displays protocol statistics and current TCP/IP
connections using NBT.
NET
The net command is available in MS-DOS / Windows and is used to set, view and
determine network settings.
NETSTAT
The netstat command is used to display the TCP/IP network protocol statistics and
information.
NSLOOKUP
The nslookup MS-DOS utility that enables a user to do a reverse lookup on an IP
address of a domain or host on a network.
ROUTE
The route MS-DOS utility enables computers to view and modify the computer's
route table.
TRACERT / TRACEROUTE
The tracert command in MS-DOS / Windows or the traceroute command in
Unix / Linux and variants is another commonly used network command to help
determine network related issues or slowdowns. Using this command you can
view a listing of how a network packet travels through the network and where it
may fail or slow down. Using this information you can determine the computer,
router, switch or other network device possibly causing your network issues.
WHOIS
The whois command available in Unix / Linux variants helps allow a user to
identify a domain name. This command provides information about a domain
name much like the WHOIS on network solutions. In some cases the domain
information will be provided from Network Solutions.
WINIPCFG
The winipcfg command available in Windows allows a user to display network
and network adapter information. Here, a user can find such information as an IP
address, Subnet Mask, Gateway, etc...
Sample Interview Questions
DESKTOP
3) What is an Event Viewer? Name the three logs in the event viewer?
Event Viewer, a component of Microsoft's Windows NT line of operating
systems, lets administrators and users view the event logs on a local or remote
machine.
Applications and operating system components can make use of this
centralized log service to report events that have taken place, such as a
failure to start a component or complete an action. The system defines three
log sources:
"System"
"Application"
"Security"
The Event Viewer uses event IDs to define the uniquely identifiable events
that a Windows computer can encounter. For example, when a user's
authentication fails, the system may generate Event ID 672.
Windows 2000 also replaced NT4's Event Viewer with a Microsoft Management
Console (MMC) snap-in.
Note Network drives are mapped by using letters starting from the letter Z.
This is the default drive letter for the first mapped drive you create. However,
you can select another letter if you want to use a letter other than Z.
6. Click Finish.
Both users must be present at their respective PCs and must agree to
establish a connection.
11) What are all the essential equipments that one requires to gain access to
internet? Explain EVERYTHING (doesn’t matter if you think it is obvious…make sure
you mention all of them).
Computer
Ethernet card
Modem/ADSL Router or Modem
ISP account
DHCP client messages are sent to off-net servers by DHCP relay agents, which
are often a part of an IP router. The DHCP relay agent records the subnet from
which the message was received in the DHCP message header for use by the
DHCP server.
A DHCP lease is the amount of time that the DHCP server grants to the DHCP
client permission to use a particular IP address. A typical server allows its
administrator to set the lease time.
DHCP discovery
The client broadcasts messages on the physical subnet to discover available DHCP
servers. Network administrators can configure a local router to forward DHCP
packets to a DHCP server from a different subnet. This client-implementation creates
a User Datagram Protocol (UDP) packet with the broadcast destination of
255.255.255.255 or the specific subnet broadcast address.
A DHCP client can also request its last-known IP address (in the example below,
192.168.1.100). If the client remains connected to a network for which this IP is
valid, the server might grant the request. Otherwise, it depends whether the server
is set up as authoritative or not. An authoritative server will deny the request,
making the client ask for a new IP immediately. A non-authoritative server simply
Sample Interview Questions
The Domain Name System (DNS Port No 53) is a hierarchical naming system for
computers, services, or any resource connected to the Internet or a private network.
DNS provides name registration and name to address resolution capabilities.
DNS uses a client/server model in which the DNS server maintains a static database
of domain names mapped to IP addresses. The DNS client, known as the resolver,
performs queries against the DNS servers. The bottom line DNS resolves domain
names to IP address using these steps
Step 1
A client (or “resolver”) passes its request to its local name server. For example, the
URL term www.idgbooks.com typed into Internet Explorer is passed to the DNS
server identified in the client TCP/IP configuration. This DNS server is known as the
local name server.
Step 2
If, as often happens, the local name server is unable to resolve the request, other
name servers are queried so that the resolver may be satisfied.
Step 3
If all else fails, the request is passed to more and more, higher-level name servers
until the query resolution process starts with far-right term (for instance, com) or at
the top of the DNS tree with root name servers
18) What do you think is the best PC configuration (for a Laptop) available in the
market? Consider you have at least 70,000 rupees in your hand?
20) What is TCP and RDP, DOMAIN and OU, DOMAIN CONTROLLER and
GLOBAL CATALOG?