Interview Question

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

1. What do forest, trees, and domain mean?

A domain is a logical group of network objects like computers, users, and devices with the same
active directory database. A tree is a collection of domains within a Microsoft active directory
network in which each domain has exactly one parent, leading to a hierarchical tree structure. A
forest is a group of active directory trees.

2. According to you, why backing up an active directory is important, and how


can you back up an active directory?
To maintain the proper health of the AD database, the backup of an active directory is important.
Windows Server 2003: In this, you can backup the active directory using the NTBACKUP tool that
is inbuilt with windows server 2003, or we can also use any 3rd party tool that will support this
feature.
Windows server 2008: There is no option to back up the system state data through the normal
backup utility. Here we need to use the command line to backup the active directory.
• Step 1 – Open the command prompt by clicking on start, typing “cmd,” and then hitting the
enter button.
• Step 2 – In the command prompt, type “wbadmin start systemstatebackup –
backuptarget;e:” and then press the enter button.
• Step 3 – Input “y” and press the enter button to start the backup process.
When the backup is finished, you will get a message that the backup is completed if it has not been
completed properly, you need to troubleshoot.

3.. What is a domain controller?


A domain controller (DC ) is a windows-based computer system that is used for storing user
account data in a central database. The system administrator allows or denies users access to system
resources, such as printers, documents, folders, network locations, etc.

4. What do you know about proxy servers?


It acts as the gateway between a local network (e.g., computers in a company) and a large-scale
network (for ex: the internet). By using this server, there is an increase in performance and security
as it can be used to prevent employees from browsing inappropriate and distracting sites.

5. What do you know about Windows deployment services?


The name itself suggests that it is used to deploy the windows operating system (i.e., there is no
need to install each operating system directly from CD or DVD. Some tools are used for managing
the server.
• Windows deployment services MMC
• Windows PowerShell cmdlets for WDS
• WDSUTIL command-line tool

6. What is the difference between a workgroup and a domain?


In a workgroup, a particular system has a collection of systems having their own rules and local
users’ logins. Whereas in the domain, the centralized authentication server, which is a collection of
systems, tells what the rules are. Workgroups are like P2P networks, whereas domains are like
standard client/server relationships.

7. Can you tell the difference between the domain admin groups and the
Enterprise admin groups in the ad (active directory )?
Domain admin groups: The members of the domain admin group have complete control of the
domain.
Enterprise admin group: The members of the enterprise admin group have complete control of the
domains in the forest.

8. What do you know about HTTPS, and what port does it use?
The HTTPS uses the SSL certificates to confirm that the server you are connecting to is the one it
says. The HTTPS traffic goes over TCP port 443.

9. What can you tell us about TCP?


TCP/IP is not a protocol but is a member of the IP protocol suite. The TCP refers to Transmission
Control Protocol and is a massively used protocol (for ex: HTTP, FTP & SSH). One of the benefits
of TCP is that it establishes the connection on both ends before any data starts to flow. It is also
used to sync up the data flow as if a case arrives when the packets arrive out of order, so the
receiving system should be able to figure out what the puzzle of packets is supposed to look like.

9. What do you know about UDP?


We can call the UDP the twin of the TCP. The UDP stands for User Datagram Protocol. The UDP
doesn’t care if somebody is listening on the other end or not, and it is called the connectionless
protocol. Whereas, when we talk about the TCP, it makes everybody stay on the same page. The
transmission speed on a UDP is faster than the transmission speed of TCP. The TCP always needs
confirmation from the other side that the message is received or not. On the other side, the UDP is
like a television broadcast in which the transmitter doesn’t care or know about the person on the
other end.

10.What is the role of a system administrator?

The sysadmin’s responsibilities include ensuring that system hardware, software, and related
procedures adhere to organizational values and that the system’s availability, performance, and
security are continuously maintained. In larger organizations, system administrators typically work
in teams responsible for different areas of the network, such as storage, security, or email.
What’s new in Windows Server 2019?
It is the latest Windows server version that uses the shortened LTSC or long-term servicing channel.
Some of the most dominant features of the new windows server 2019 are:
• Support for Kubernetes
• Storage Space Direct
• Storage Replica
• Improved Windows Defender
• Windows Subsystem for Linux
• Other GUI new features from Win10 version 1809
• Storage Migration Service
• System Insights

What Are the System Administrator Roles?


The System Administrator role varies in the organization. The 2 key System Admin tasks are
Supporting, Installing, and maintaining computers & servers.
• Install patches & OS Updates
• Access user’s administration
• Creating and Restoring system backups
• Access control
• Review system logs access administration
• Planning Disaster recovery
• Comply with password needs
• System audit logging

Can you name Different Version of Windows Server?


The version of windows servers till now are:
• Windows Server 2003 (2003)
• Windows Server 2003 R2 (2005)
• Windows Server 2008 (2008)
• Windows Server 2008 R2 (2009)
• Windows Server 2012 (2012)
• Windows Server 2012 R2 (2013)
• Windows Server 2016 (2016)

Define Dora Procedure & its usage.


Discover, request, Offer, and acknowledgment. it is used to automatically allocate an IP address to
the systems of the client.

Explain the difference between firewall and antivirus?


Both firewall and antivirus are security tools designed to save your system. A firewall is a low-level
network security system. It is designed to protect your system and network. It covers both public
and private networks from security warnings.
On the other hand, antivirus is a software program designed to protect your system from hackers,
viruses, spyware, etc.

Define the term Hyper-v?


Hyper-V is Microsoft’s virtualization tool. It is used to create different multiple virtual machines on
a single physical server. It also minimizes the cost of hardware and increases efficiency.

Define the term Hyper-v?


Hyper-V is Microsoft’s virtualization tool. It is used to create different multiple virtual machines on
a single physical server. It also minimizes the cost of hardware and increases efficiency.

Explain what the Bit Locker is?


Bit-Locker is an encryption security feature available that will encrypt everything on the drive that
Windows is installed upon. Right-click and choose Turn on BitLocker from the context menu to
encrypt a whole drive.

What is WDS, and how does it work?


A WDS expands a wireless network through different access points. A wireless base station attaches
to the Internet. It has wired and wireless clients and sends its wireless signal to an access point that
functions as a wireless repeater.

What is the significant difference between NTFS and FAT on a local server?
FAT (File Allocation Table) and FAT32 provide security for local users, while NTFS (New
Technology File System) gives protection for domain users and local users. NTFS gives file-level
security, which is not possible through FAT32.

What do you understand by Forest?


Forest includes multiple Domains trees. The Domain trees in a forest do not produce an abutting
namespace despite share a simple schema and (GC) global catalog.

22. Explain OU.


OU stands for Organizational Units, which is the subpart in the Active Directory. In this section, we
can set various inputs including computers, groups, users, and other organizational factors. Every
domain in any directory can generate its own authority of organizational units.

45. Explain the basic function of domain controller.


The domain controller function seems to verify consumers to many networks and make a set of
objects that included the Active Directory.
3. Explain Dora Procedure & its regulation.
DORA stands for Discover, request, Offer and acknowledgement. Further, it is practiced to allocate
an IP address to systems of the client automatically.

8. What is the network topology?


Network topology is a physical layout of the network, connecting the different nodes using the
links. It depicts the connectivity between the computers, devices, cables, etc.

3. Describe the TCP/IP Reference Model


It is a compressed version of the OSI model with only 4 layers. It was developed by the US
Department of Defence (DoD) in the 1980s. The name of this model is based on 2 standard
protocols used i.e. TCP (Transmission Control Protocol) and IP (Internet Protocol).

. Differentiate OSI Reference Model with TCP/IP Reference Model

OSI Reference Model TCP/IP Reference Model


7 layered architecture 4 layered architecture
Fixed boundaries and functionality for each Flexible architecture with no strict boundaries
layer between layers
Low Reliability High Reliability
Vertical Layer Approach Horizontal Layer Approach

2. What is the UDP protocol?


UDP is the User Datagram Protocol and is based on Datagrams. Mainly, it is used for multicasting
and broadcasting. Its functionality is almost the same as TCP/IP Protocol except for the three ways
of handshaking and error checking. It uses a simple transmission without any hand-shaking which
makes it less reliable.

1. What is the TCP protocol?


TCP or TCP/IP is the Transmission Control Protocol/Internet Protocol. It is a set of rules that
decides how a computer connects to the Internet and how to transmit the data over the network. It
creates a virtual network when more than one computer is connected to the network and uses the
three ways handshake model to establish the connection which makes it more reliable.

4. What is the ICMP protocol?


ICMP is the Internet Control Message Protocol. It is a network layer protocol used for error
handling. It is mainly used by network devices like routers for diagnosing the network connection
issues and crucial for error reporting and testing if the data is reaching the preferred destination in
time. It uses port 7 by default.
. What is the FTP protocol?
FTP is a File Transfer Protocol. It is an application layer protocol used to transfer files and data
reliably and efficiently between hosts. It can also be used to download files from remote servers to
your computer. It uses port 27 by default.

12. What is the difference between the ipconfig and the ifconfig?
ipconfig ifconfig
Internet Protocol Configuration Interface Configuration
Command used in Microsoft operating
Command used in MAC, Linux, UNIX operating
systems to view and configure network
systems to view and configure network interfaces
interfaces

14. What are Unicasting, Anycasting, Multicasting and Broadcasting?


• Unicasting: If the message is sent to a single node from the source then it is known as
unicasting. This is commonly used in networks to establish a new connection.
• Anycasting: If the message is sent to any of the nodes from the source then it is known as
anycasting. It is mainly used to get the content from any of the servers in the Content
Delivery System.
• Multicasting: If the message is sent to a subset of nodes from the source then it is known as
multicasting. Used to send the same data to multiple receivers.
• Broadcasting: If the message is sent to all the nodes in a network from a source then it is
known as broadcasting. DHCP and ARP in the local network use broadcasting.

2. What is the reason for using virtual machines instead of original hardware?
VM or Virtual machines allow us to operate multiple operating systems simultaneously from the
same piece of hardware. Without virtualization, operating multiple systems like Windows and Linux
would require two separate physical units. So it reduces the requirement to invest in additional units
by splitting up a physical server into multiple servers.

3. Who is a desktop support engineer?


Desktop support engineers are primarily IT professionals that address information technology (IT)-
related problems for businesses or individuals. They are responsible for helping businesses and
people with server or rack problems and installing, patching, updating, diagnosing and addressing
security issues with this equipment. They may also help with server and security issues that affect
organizations and in setting up and maintaining laptops.

14) Explain about VPN server?


VPN means Virtual Private Network. It is a private communications network often used by
companies or organizations to communicate confidentially over a public network. This is used by
the mobile users in the network.
19) What is a group?
A Group is a collection of user accounts. It provides a simplified administration in the network.

19) What is a group?


A Group is a collection of user accounts. It provides a simplified administration in the network.

37) What is the packet?


A packet is a logical grouping of information that comprises a header which contains user data and
location information.

43) What is the difference between server OS and desktop OS?


Server OS gives centralized administration for users, shared resources and security while desktop
OS offers access to only local administration.

45) What is BSOD? How do you troubleshoot it?


BSOD stands for the Blue Screen Of Death. When there is some fault in OS or hardware, then
Windows can’t run the program and gives a blue screen with a code. To resolve this problem the
best way is to reboot the system. If it doesn’t work than boot the system in the safe mode.

48) What is the SMTP server or POP server?


POP stands for post office protocol. It is used for mail receiving purpose in the network.
SMTP stands for simple mail transfer protocol. It is basically used for sending and receiving the
mail.

50) What is “Bootloader”?


Bootloader facilitates the loading of the operating system on the system. It enables the booting
process and gives the OS option to the users while starting the system.

. What do you mean by "Safe Mode"?


Windows has a feature called Safe Mode that may be used to scan the OS and clean it of any
adware. It is also used to configure applications and troubleshoot driver issues. In contrast to normal
mode, it enables you to run diagnostics and uninstall unwanted apps from the OS.

6. How can I boot my computer into safe mode?


There are two methods for starting a system in safe mode. Close any open programs and restart the
computer. Press F8 several times as the OS begins to boot. This will open a popup with the option
to start in safe mode along with several other booting options.
The run command can also be used to complete the task. To invoke the Run command,
simultaneously press the Windows key and R. Enter MSConfig into the window after typing it. The
safe boot options will be displayed in a window. Restart the machine after selecting the basic
setting. Your computer will boot up in safe mode.

13. What exactly are a desktop support engineer's responsibilities?


The following are some of the primary duties of a desktop support engineer:
• Perfectly installing the OS.
• preserving every installed OS.
• updating each of them and installing new software.
• Sync up distant desktops.
• Use antivirus software to scan the OS to guard against virus threats routinely.
• managing the backup and recovery processes in their entirety.
• routinely maintaining and optimizing the OS.

16. Can Hard Disk be changed to Dynamic? If yes, how?


Yes. Launch the Run window after logging in with the administrator account. In it, type the
diskmgmt.msc command. A new window will open up after you hit enter. To switch to the Dynamic
hard disc option, right-click the Basic hard disc option.

22. What is the best technique to connect to the client from the server when it is in
a different place?
It is possible to connect to the client from a different location than the server using the MSTSC
command or Remote Desktop Connection. You can use another person's computer as if you were
sitting right next to it, but you need to either know the distant computer's IP address or be on the
same network.
Start the Run Window and enter the command mstsc /v: COMPUTER /f, where V stands for the
remote computer and f stands for full screen. Next, click.
You can alternatively type mstsc and press Input to launch the Remote Desktop dialogue box, where
you can enter the computer's name or IP address to log in.

25. What is the NTLDR Error?


This error frequently happens when the computer tries to boot from a flash drive or hard drive that
isn't a bootable source. This error can occasionally also be brought on by corrupt files, loose IDE
connectors, obsolete BIOS, corrupt hard drives, and issues with OS upgrades.
36. Can 50 PCs with the same configuration have the same OS installed?
Yes, you can use the Windows Deployment Service to accomplish this. WDS enables users to
complete a network-based Windows OS installation. It lessens the expense and difficulty of
performing manual OS installations on several computers.
With WDS, you won't need any physical support like Windows DVDs or USB drives to format any
number of new computers—just plug in the Ethernet.

37. What is the role of a desktop support engineer?


The role of Desktop Support Engineer mainly involves resolving computer systems and software
issues. They also assist in the updation, installation, troubleshooting, and maintenance of systems.

38. What skills are required for a Desktop Support Engineer?


A successful Desktop Support Engineer possesses a good combination of technical and
interpersonal skills. Some worthwhile skills may include:
• Knowledge of software and hardware.
• Proficiency in software support tools.
• Knowledge of troubleshooting, ethernet, and IP configuration of networks.
• Customer service best practices.

Q: What do you mean by NTLDR Error?


A: NTLDR is known as the Network Loader. It helps in loading the operating system. If any system
is showing “NTLDR is missing” then you need to copy the NTLDR file from operating system CD.

You might also like