+995 579 004507

System Administrator

 
System Administrator
A competent
easy adaptable
in line with company procedures
timely manner to ensure the organization can operate smoothly
skills from both technical and non-technical perspective.
problem-solving capabilities
interpersonal skills
 
 
 
windows server is an operating system that uses a centralized computer that provides specific functions, 
predetermined rules for users and computers connected to a network.
 
windows domain is centrlized location for users accounts, computers, printers and security features as part of database controlled by a domain controller
 
Dns stands for Domain Name System and it's mostly used to intepret Domain names in to numeric ip address. DNS uses port 53 TCP or UDP.
 
DNS pefrorms two types of queries; iterative and recursive.
 
Active directory is A service Windows server OS, Active Directoty is used for users and computers autehtication whithin a Domain.
it can also enforce security polices and install software to computers connected to a domain.
 
Active Directory database located in the % SystemRoot%\ntds folder an file name is NTDS.DIT;
 
Active Directory can be backed up by using NTBACKup tool that comes with 2003 server.
with 2008 server a command prompt is used to perform backup: type "wbadmin start systemstatebackup -backuptarget:e:"
 
Garbage collectionis a process designed to free space inside Active Directory. This is performed by defaul every 12 hours (defrag).
 
(SYSVOL folder) System Volume folder is a directory that houses a copy of domain files found on a local hard drive within Domain Controller.
this data is shared for purpose of replication across domain; for example user logon scripts and Windows Group policy.
 
Stands for Redundant Array of independent Disks and is used to provide data redundancy (mirroring) accross multiple
hard disks. It can also be utilized to improve read/write performance across the server by using striping configuration. 
for example RAID 1; two or more disks with identical data sored (redundancy). 
RAID0; two or more disks, data distributed evently to improve performance (no redundancy).
 
To test network connectivity ping and ipconfig commands are used.
 
----------------------------------------------------------------------------
 
1. In the context of the Registry, how do you define “tattooing”?
 
“Tattooing” the registry suggests that customers can change and view the preference of the customers that are not placed away in the preserved prescribed Registry portions. Irrespective of the assembly approach is evacuated or changed, the preference of the client will currently be kept in the registry.
 
2. What is an Active Directory?
 
Active Directory is an organization of the inventory in a library to gather objects such as computers, customer profiles, etc. It effectively controls the framework through Domain Controllers that are available at many zones with the database of the Active Directory. A section of the limits fuse dynamic association with numerous land zones, check of computers and customers in the space offered by windows, using the Domain Controller to copy Active Directory. In accumulation to that these lines will be returned to every Domain Controllers.
 
3. Distinguish between a computer process and a thread.
 
Computer Process
 
In computing, a process is a computer program case that is performed repeatedly by a computer, that can run numerous programs on computer at the same time.
 
Thread
 
A thread comprises the many executable programs that collaborate as a solitary process. For instance, a thread might send a notification error to the customer; an alternative might contract with the signals of error although the third thread may perform the primary action.
 
4. What do you know about authorizing DHCP Servers in Active Directory?
 
In case, a DHCP server is to function in an Active Directory domain (and the domain controller is not used to running it) it should first be approved to Active directory.
 
5. What Is Group Policy?
 
Group Policy is a Microsoft Windows NT feature that is also a family of OS that manages the work setting of computer accounts and user accounts. Group Policy offers the central configuration management and of OS, users’ settings, and applications in an Active Directory setting.       
 
6. List flexible single master operations (FSMO) roles by Windows Server?
 
Following are some of the roles of FSMO:
 
Infrastructure Master
Schema Master
PDC
RID Master
Domain Naming Master
 
7. What do you understand by domains, forests and trees?
 
The rational units of any organization of Active Directory are usually called tree, domain, and forest. Various articles in the procedure of a rational section join accompanying: customers, computers, devices, etc. that share an analogous active database registry that is normally known as a “domain”.
 
A tree is an assortment of domains in the Active Directory that starts at one root and branches out into child domains, peripheral. This might similarly comprise an adjoining namespace linked in a transitive order.
 
The domains collection is often known as “forest” that shares general logical structure, inventory, registry pattern and registry setup. It typifies the limits of security for groups, clients, and devices for example computers.
 
8. What is Group Policy Objects (GPO) and list different kinds of GPO?
 
The setting that controls the client records the workplace, and also computer records, are called Group Policy Object (GPO). This help is describing the programming establishment, security alternatives, upkeep choices and library-based arrangements, folder redirection choices and content choices. There are usually 2 categories of GPO:
 
Local GPO: These are put away on close devices.
 
Nonlocal GPO: These are available on Active Directory and are put away on a domain controller.
 
9. Can we link third-party Directory service to an Active Directory?
 
Yes, why not, it is possible to link third-party directory services to Active Directory with by using different versions of Microsoft. dirXML or LDAP can be used to link Active Directory to other retailers.
 
10. What commands you will use to check TCP/IP configurations?
 
The 2 most often used check TCP/IP configurations commands are:
 
Ipconfig: To check the IP setup of the computer, we can use the command Ipconfig and additionally it can be very well applied to reestablish the IP address of the users if it is specified by a DHCP server.
 
Ping: To check the link among the computer in use and the other computers, we can use the Ping command.
 
11. What do you know about working of IntelliMirror?
 
IntelliMirror supports to settle settings of desktop, stored files and applications for users especially the one who move among workstations and works offline.
 
12. How you can install an app MSI file when the is not available?
 
To install the application without using the MSI file, the Software Installer. ZAP text file can be used in its place.
 
What is the domain controller’s basic function?
 
The domain controller function is to verify customers to many networks and bring a set of objects that involved the Active Directory.
 
13. What is the goal of installing local DNS servers?
 
A local DNS server offers the local mapping of fully competent domains to IP addresses. To resolve requests concerning the domains on network, local DNS servers can offer record data to distant DNS servers.
 
14. What’s new in Windows Server 2019?
 
It is the latest window server version that uses the shortened LTSC or long-term servicing channel. Some of the most dominant features if the new windows server 2019 are:
 
Support for Kubernetes
Storage Space Direct
Storage Replica
Improved Windows Defender
Windows Subsystem for Linux
Other GUI new features from Win10 version 1809
Storage Migration Service
System Insights
 
15. What is Windows Server’s default user interface?
 
Windows PowerShell is said to be the default user interface and command-Line Shell made by Microsoft. The main goal of the PowerShell is to systematize administrative tasks that work both remote and local windows machines. .NET Framework is used to build PowerShell.
 
16. What is INODE?
 
The file’s metadata are kept by INODE holds; INODE is said to be a unique pointer to a disk block. You can also say that it is a unique number owed to a file in UNIX-like Operating system.
 
17. Explain what is RAID in Windows Server?
 
For storing the same data at a different place RAID or Redundant Array of Independent Disks strategy is used. It is a strategy for building fault tolerance and increase storage capacity. On separate drives it allows you to combine one or more volumes so that they are accessed by a single drive letter
 
18. What Are the System Administrator Roles?
 
The System Administrator role varies in the organization. The 2 key System Admin tasks are Supporting, Installing and maintaining computers & servers.
 
Install patches & OS Updates
Access user’s administration
Creating and Restoring system backups
Access control
Review system logs access administration
Planning Disaster recovery
Comply with password needs
System audit logging
 
19. Can you name Different Version of Windows Server?
 
The version of windows servers till now are:
 
Windows Server 2003 (2003)
Windows Server 2003 R2 (2005)
Windows Server 2008 (2008)
Windows Server 2008 R2 (2009)
Windows Server 2012 (2012)
Windows Server 2012 R2 (2013)
Windows Server 2016 (2016)
 
20. What is the global catalog?
 
The Global Catalog is a kind of database that comprises all of the data relating to objects in Active Directory environment domains.
 
21. Explain the difference between local, universal and global groups?
 
Domain local groups allocate access approvals to international groups of domains for local resources of the domain. Global groups offer access to other trusted domains’ resources. The Universal groups grant access to all trusted domains resources.
 
22. Can Active Directory Partitions Be Restored?
 
We can authoritatively restore the objects from domain and configuration partition. Authoritative restores of schema-naming are not supported here.
 
23. Explain different types of active directory partitions.
 
Configuration Partition– it is a partition that stores all the data of Active Directory. The data comprises site-link, Site, subnet etc. This partition copies all domain controllers that are available in the Forest.
 
Application Partition– it stores the information of applications in Active Directory. For examples DomainDNSZones and ForestDNSZones.
 
Schema Partition–It stores all the information of the objects and their qualities; it copies to other domain controllers in the Forest
 
Domain Partitions– it stores the domain information that includes a computer, user, printer, group, etc. It also copies to all domain controllers in the domain.
 
24. What is a Proxy Server?
 
It is a computer that is actually a doorway between a local network (such as all computers in one organization or in a building) and a larger-scale system such as the Internet. Proxy servers offer increased security and performance. In most of the cases, they monitor employees using outside resources.
 
25. What is WINS server?
 
Windows Internet Name Service (WINS) servers map the IP addresses to NetBIOS names. This lets employers access resources by name of the computer rather than the IP address. To keep a check on the IP addresses and names of other computers network, this computer can be configured as a WINS server.
 
We may not able to connect to a remote network through its NetBIOS name, in case you are not using WINS in a network,
 
26. Define Dora Procedure & its usage.
 
Discover, request, Offer and acknowledgement. it is used to automatically allocate an IP address to systems of the client.
 
27. In which order the GPOs are applied?
 
We can apply the GPO is an order of
 
Local Group Policy object site,
Domain and
organizational units.
 
28. Can you state a few benefits of GPMC?
 
One of the major benefits of GPMC is its easy management of all GPOs diagonally the whole Active Directory Forest View of GPOs in one list. We can do the GPOs backup and restore, Immigration of GPOs across many forest and domains.
 
29. How you will do the backup for Group policy?
 
For back up, one single GPO, right-click the GPO and then click Back Up.
For backup, all GPOs in the domain, right-click Group Policy Objects and click Back Up All.
 
30. What is the group nesting?
 
When we add one group as an element of another group is known as ‘group nesting’. It also helps in easy management and reduced traffic replication.
 
31. What is Domain control?
 
A domain controller is a server that manages the security requests from other servers and computers in the Windows Server domain. There are two kinds of the domain controller that is a backup domain controller and a primary domain controller. The primary domain controller emphasis on services of the domain to avoid the system possibility of a crash or slowing down because of the overtasking from handling other security requests and functionality. If the primary domain controller goes down, a backup domain controller is promoted and become the primary domain controller to preserve the server systems working appropriately.
 
32. What is tree?
 
A tree is actually a collection of domains in the Active Directory that starts at one root and branches out into child domains, peripheral. This can similarly comprise an adjoining namespace linked in a transitive order. An Active Directory forest is an assortment of Active Directory trees, just like a real-world forest.
 
Conclusion
 
This article contains a fine collection of windows server interview questions and answers. You can get help from these server administrator interview questions provided in this article to prepare for your interview.
 
You can also share with us some interview server questions and answers that you have been asked by interviewer, in the comments section.
 

SYSTEM ADMINISTRATOR VOL.2

Q.What is the purpose of having AD?
Answer: Active directory is a directory service that identifies all resources on a network and makes that information available to users and services. The Main purpose of AD is to control and authenticate network resources.
 
Q.Explain about sysvol folder?
Answer: The sysvol folder stores the server's copy of the domain's public files. The contents such as group policy, users, and groups of the sysvol folder are replicated to all domain controllers in the domain. The sysvol folder must be located on an NTFS volume.
 
Q.Differentiate between NTFS & FAT.
Answer: NTFS is the current file system used by Windows. It offers features like security permissions (to limit other users' access to folders), quotas (so one user can't fill up the disk), shadowing (backing up) and many other features that help Windows. FAT32 is the older Microsoft filesystem, primarily used by the Windows 9X line and Window could be installed on a FAT32 parition up to XP. In comparision, FAT32 offers none of what was mentioned above, and also has a maximum FILE (not folder) size of 4GB, which is kind of small these days, especially in regards to HD video.
Q.Explain Functions of Active Directory?
Answer: AD enables centralization in a domain environment. The Main purpose of AD is to control and authenticate network resources.
Q.What is the name of AD database?
Answer: AD database is NTDS.DIT
Q.What is loop back.
Answer: Loopback address is 127.0.0.1, An address that sends outgoing signals back to the same computer for testing.  
Q.What is Proxy Server.
Answer: A proxy server is a computer that acts as a gateway between a local network (e.g., all the computers at one company or in one building) and a larger-scale network such as the Internet. Proxy servers provide increased performance and security. In some cases, they monitor employees' use of outside resources.
Q.Differentiate between FIREWALL/ANTIVIRUS.
Answer: Antivirus: The prime job of an anivirus is protect your system from computer viruses. Your computer may be standalone or part of network or connected to Internet you need an antivirus program. It actively monitors when you are using your system for any virus threat from different sources. if it found one it tries to clean or quarantine the virus ultimately keeping your system and data safe. Firewall: Firewall is in other hand a program which protects your system from outsider/intruder/hacker attacks. These attacks may not be virus type. In some cases hackers can take control of your system remotely and steal your data or important information from system. If your system is directly connected to internet or a large network than you can install a software firewall in your PC to protect your self from unauthorized access. Firewall is available either in software or in hardware form. For a single PC you may need a software firewall while a large corporate implements hardware firewall to protect all of their systems from such attacks.
Q.Differentiate between Frond end & Back End Server. Backend server:
Answer: A back end server is a computer resource that has not been exposed to the internet. In this regard the computing resource does not directly interact with the internet user. It can also be described as a server whose main function is to store and retrieve email messages. Frontend server: A frontend server is a computer resources that has exposed to the internet.
Q.What is APIPA.
Answer: Stands for Automatic Private IP Addressing APIPA is a DHCP fail over mechanism for local networks. With APIPA, DHCP clients can obtain IP addresses when DHCP servers are non-functional. APIPA exists in all modern versions of Windows except Windows NT. When a DHCP server fails, APIPA allocates IP addresses in the private range 169.254.0.1 to 169.254.255.254.
Q.How Release and renew IP address from Command prompt.
Answer: Ipconfig / release ipconfig / renew
Q.What is wins server.
Answer: Windows Internet Name Service (WINS) servers dynamically map IP addresses to computer names (NetBIOS names). This allows users to access resources by computer name instead of by IP address. If you want this computer to keep track of the names and IP addresses of other computers in your network, configure this computer as a WINS server. If you do not use WINS in such a network, you cannot connect to a remote network resource by using its NetBIOS name.
Q.What is the Windows Registry.
Answer: The Windows Registry, usually referred to as "the registry," is a collection of databases of configuration settings in Microsoft Windows operating systems.
Q.System Volume Information (SVI) Folder.
Answer: Windows XP includes a folder named System Volume Information on the root of each drive that remains hidden from view even when you choose to show system files. It remains hidden because it is not a normally hidden folder you can say it is a Super Hidden Folder. Windows does not shows Super Hidden Folders even when you select "Show Hidden Files."
Q.What is MBR.
Answer: Short form Master Boot Record, a small program that is executed when a computer boots up. Typically, the MBR resides on the first sector of the hard disk. The program begins the boot process by looking up the partition table to determine which partition to use for booting
Q.What is Bit Locker
. Answer: BitLocker is an encryption feature available in Ultimate and Enterprise versions of Windows 7 and Vista, To encrypt an entire drive, simply right-click on the drive and select Turn on BitLocker from the context menu.
Q.Difference b/w sata and IDE.
Answer: IDE and SATA are different types of interfaces to connect storage devices (like hard drives) to a computer's system bus. SATA stands for Serial Advanced Technology Attachment (or Serial ATA) and IDE is also called Parallel ATA or PATA. SATA is the newer standard and SATA drives are faster than PATA (IDE) drives. For many years ATA provided the most common and the least expensive interface for this application. But by the beginning of 2007, SATA had largely replaced IDE in all new systems.
Q.Main Difference Between Windows server 2008 and 2012
Answer: 1).New Server Manager: Create, Manage Server Groups 2).Hyper-V Replication : The Hyper-V Replica feature allows you to replicate a virtual machine from one location to another with Hyper-V and a network connection—and  Without any shared storage required. This is a big deal in the Microsoft world for disaster recovery, high availability and more. VMware does this, too, but the vendor charges new licensees extra for the capability. 3) Expanded PowerShell Capabilities 4)IIS 8.0 and IIS 7 in 2008 5)Hyper-V 3.0 6)PowerShell 3.0
Q.How Long My Computer Has Been Running? Get to Know My Computer’s Uptime.
Answer:  Start Task manager,and select Performance tab . In performance tab we can see system up time Method 2: By typinag systeminfo in command prompt we can find out up time of your server In system boot time.
Q.Event viewer in Windows server
Control panel - Administrative tools - Computer Management - event Viewer Three types events Error. Warning. Information.
Q.
Manage Multiple, Remote Servers with Server Manager. Answer: Server Manager is a management console in Windows Server® 2012 R2 Preview and Windows Server® 2012 that helps IT professionals provision and manage both local and remote Windows-based servers from their desktops, without requiring either physical access to servers, or the need to enable Remote Desktop protocol (RDP) connections to each server. Although Server Manager is available in Windows Server 2008 R2 and Windows Server 2008, Server Manager was updated in Windows Server 2012, to support remote, multi-server management, and help increase the number of servers an administrator can manage.
Q.What happens when we type URL in browser
? Answer: First the computer looks up the destination host. If it exists in local DNS cache, it uses that information. Otherwise, DNS querying is performed until the IP address is found. Then, your browser opens a TCP connection to the destination host and sends the request according to HTTP 1.1 (or might use HTTP 1.0, but normal browsers don't do it any more). The server looks up the required resource (if it exists) and responds using HTTP protocol, sends the data to the client (=your browser) The browser then uses HTML parser to re-create document structure which is later presented to you on screen. If it finds references to external resources, such as pictures, css files, javascript files, these are is delivered the same way as the HTML document itself.
Q.How DHCP work?
Answer: DHCP Stands for Dynamic host configuration protocol. DHCP is a protocol used for automatic configuration IP address in client computers connected to IP networks. DHCP operates on a client server model in four phases. Discover: A client broadcasts DHCP Discover message when it comes alive on the network. Offer: When a DHCP server receives the DHCP Discover message from the client, it reserves an I P address for the client and sends a DHCP Offer message to the client offering the reserved IP address. Request: The client receives the DHCP offer message and broadcasts a DHCP request message to show its consent to accept the offered IP address. Acknowledge: When the DHCP server receives the DHCP Request message from the client, it sends a DHCP Ack packet to the client. At this point the IP configuration process is complete.
Q.What is DHCP Scope?
Answer: A range of IP address that the DHCP server can assign to clients that are on one subnet .
Q.What protocol and port does DHCP use ?
Answer: UDP protocol and 67 port in client and 68 port in server.
Q.What is a DHCP lease ?
Answer: A DHCP lease is the amount of time that the DHCP server grants to the DHCP client permission to use a particular IP address. A typical server allows its administrator to set the lease time.
Q.Can DHCP support statically defined addresses
. Answer:  Yes.
Q.Define Dora Process & why it is used.
Answer: Discover, Offer, request and acknowledgement. it is used to assign ip address automatically to client systems.
Q.What is Authorizing DHCP Servers in Active Directory.
Answer: If a DHCP server is to operate within an Active Directory domain (and is not running on a domain controller) it must first be authorized to Active directory. Windows Admin Interview Questions              Windows Admin Training
Q.H
ow to Backup and Restore DHCP in Windows Server 2008 Answer: In Windows Server 2008, backup of DHCP database and settings has gotten simpler. You may want to backup your DHCP server from time to time to prepare for disaster recovery scenarios or when migrating DHCP server role to a new hardware. Backup DHCP Server 1).Open Server Manager > DHCP role 2).Right click server name, choose Backup.. 3).Choose a location for backup, click OK Restore DHCP Server 1).Open Server Manager > DHCP role 2).Right Click server name, choose Restore 3).Choose the location of the backup, click OK 4).Restart the DHCP Service DHCP Databse location: C:\WINDOWS\System32\DHCP directory
Q.Define DNS .
Answer: Domain Name System, DNS is an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. Two types of lookup in DNS. Forward lookup : it converts Domain name to ip address. Reverse lookup: it converts ip address to Domain name. Three types of zone. Primary zone secandary zone and stub zone.
Q.what is the port no of DNS.
Answer: UDP and port number - 53
Q.
What is NSlookup. Answer: Nslookup.exe is a command-line administrative tool for testing and troubleshooting DNS servers. This tool is installed along with the TCP/IP protocol through Control Panel. MS-DOS utility that enables a user to look up an IP address of a domain or host on a network.
Q.What is LDAP? Why it is used.
Answer: LDAP is the Lightweight Directory Access Protocol. Its an active directory protocal ,Basically, it's a protocol used to access data from a database
Q.What is Active Directory? Why it used.
Answer: Active Directory is a Directory Service created by Microsoft. It is included with most Windows Server operating systems. Active Directory is primarily used to store directory objects like users and groups and computers printers. Using Active Directory brings a number of advantages to your network, Centralized user account management Centralized policy management (group policy) Better security management
Q.What Is Group Policy.
Answer:Group Policy is a feature of the Microsoft Windows NT family of operating systems that control the working environment of user accounts and computer accounts. Group Policy provides the centralized management and configuration of operating systems, applications, and users' settings in an Active Directory environment.
Q.W
hat is the order in which GPOs are applied . Answer: Local Group Policy object site , Domain and organizational units.
Q.What is the difference between software publishing and
assigning. Answer:  Assign Users : The software application is advertised when the user logs on. It is installed when the user clicks on the software application icon via the start menu, or accesses a file that has been associated with the software application. Assign Computers :The software application is advertised and installed when it is safe to do so, s uch as when the computer is next restarted. Publish to users : The software application does not appear on the start menu or desktop. This means the user may not know that the software is available. The software application is made available via the Add/Remove Programs option in control panel, or by clicking on a file that has been associated with the application. Published applications do not reinstall themselves in the event of accidental deletion, and it is not possible to publish to computers.
Q.C
an I deploy non-MSI software with GPO. Answer:  Create the file in .zap extension.
Q.Name some GPO settings in the computer and user parts.
Answer: Computer Configuration, User ConfigurationName
Q.N
ame a few benefits of using GPMC. Answer: Easy administration of all GPOs across the entire Active Directory Forest View of all GPOs in one single list Backup and restore of GPOs Migration of GPOs across different domains and forest.
Q.How frequently is the client policy refreshed ?
Answer: 90 minutes give or take.
Q.Where are group policies stored ?
Answer:  C:\Windows\System32\GroupPolicy.
Q.How to Do G
roup policy backup Answer: To backup a single GPO, right-click the GPO, and then click Back Up. To backup all GPOs in the domain, right-click Group Policy Objects and click Back Up All.
Q.Define DSRM Mode?
Directory Services Restore Mode (DSRM) is a special boot mode for repairing or recovering Active Directory. It is used to log on to the computer when Active Directory has failed or needs to be restored. To manually boot in Directory Services Restore Mode, press the F8 key repeatedly. Do this immediately after BIOS POST screen, before the Windows logo appears. (Timing can be tricky; if the Windows logo appears you waited too long.) A text menu menu will appear. Use the up/down arrow keys to select Directory Services Restore Mode or DS Restore Mode. Then press the Enter key.
Q.W
here is the AD database held? What other folders are related to AD? Answer:  The AD data base is stored in c:\windows\ntds\NTDS.DIT .
Q.How you ever Installed AD?
Answer: To Install Microsoft Active Directory: Ensure that you log on to the computer with an administrator account to perform installation. Click electing Start > Administration Tools >Server manager > Configure your Server. In the Welcome page, click Next. In the Operating system compatibility panel, click Next. On the Domain Controller Type panel, select Domain controller for a new domain and click Next. On the Create New Domain panel, select Domain in a new forest and click Next. On the New Domain Name panel, enter the DNS suffix for your new Active Directory. This name will be used during Tivoli Provisioning Manager installation, so make a note of it. Click Next. On the NetBIOS Domain Name panel, enter theNetBIOS name of the domain. The first part of the DNS name is usually sufficient. Click Next. On the Database and Logs panel, select the desired folders for the Database and Logs.C:\Windows\NTDS is the default. Click Next. On the Shared System Volume panel, enter a valid directory for the system volume.C:\Windows\Sysvol is the default. Click Next to continue. If you configured DNS successfully, the Permissions setting panel is displayed. Select Permissions compatible only with Windows 2000 or Windows Server 2003. Click Next. On the Directory Services Restore Mode Administrator Password panel, enter a valid password to be used when running the Directory Services in Restore Mode. Click Next Verify the settings and Click Next to begin the Active Directory configuration. The server will be rebooted as part of the process.
Q.W
hat is the use of SYSVOL folder? Answer: All active directory data base security related information store in SYSVOL folder and it’s only created on NTFS partition.
Q.What is global catalog?
Answer: The Global Catalog is a database that contains all of the information pertaining to objects within all domains in the Active Directory environment
Q.What is the difference between local, global and universal groups
Answer: Domain local groups assign access permissions to global domain groups for local domain resources. Global groups provide access to resources in other trusted domains. Universal groups grant access to resoures in all trusted domains.
Q.What is group nesting.
Answer: Adding one group as a member of another group is called 'group nesting'. This will help for easy administration and reduced replication traffic
Q.What is Domain control?
Answer: A domain controller (DC) is a server that handles all the security requests from other computers and servers within the Windows Server domain there was a primary domain controller and a backup domain controller. The primary DC focused on domain services only to avoid the possibility of a system slow down or crash due to overtasking from managing other functionality and security requests. In the event of a primary DC going down, a backup DC could be promoted and become the primary DC to keep the rest of the server systems functioning correctly
Q.What is domain?
Answer: A domain is a set of network resources (applications, printers, and so forth) for a group of users. The user needs only to log in to the domain to gain access to the resources, which may be located on a number of different servers in the network. The ‘domain’ is simply your computer address not to confuse with an URL. A domain address might look something like 211.170.469.
Q.W
hat is Forest? Answer: collection of one or more Active Directory domains that share a common schema, configuration, and global catalog.
Q.
What is global catalog. Answer:  The Active Directory Global Catalog is the central storage of information about objects in an Active Directory forest. A Global Catalog is created automatically on the first domain controller in the first domain in the forest. The Domain Controller which is hosting the Global Catalog is known as a Global catalog server.
Q.W
hat is tree. Answer:  An Active Directory tree is a collection of Active Directory domains that begins at a single root and branches out into peripheral, child domains. Domains in an Active Directory tree share the same namespace. An Active Directory forest is a collection of Active Directory trees, similar to a real world forest. Catalog Server.
Q.What is site.
Answer: A Site object in Active Directory represents a geographic location that hosts networks.
Q.Flexable Single Master Operation Roles (FSMO)
Answer: The 5 FSMO server role
 
  Schema Master Forest Level One per forest
 
 
  Domain Naming Forest Level One per forest
  Master
 
 
 
  PDC Emulator Domain Level One per domain
 
 
  RID Master Domain Level One per domain
 
 
  Infrastructure Master Domain Level One per domain
 
 
Q.Cmmand to Add client to Domain
Answer:  NETDOM /Domain:MYDOMAIN /user:adminuser /password:apassword MEMBER MYCOMPUTER /JOINDOMAIN
Q.S
etting File Permissions on a Folder Using Group Policy Answer: The setting is located under Computer Configuration, Windows Settings, Security Settings, File System. Here's the procedure: Go to the location in the Group Policy listed above. Right-click File System. Click Add File. In the "Add a file or folder" window, select the folder (or file) for which you want the permissions to be set, and click OK. In the security box that pops up, you can add a user or a group that needs permission to the folder.
Q.Define virtualization.
Answer: Hyper-V virtualization will provide an environment in which we can run multiple operating systems at the same time on one physical computer, by running each operating system in its own virtual machine.
Q.What are the benefits of virtualization ?
Answer: Reduce the number of physical servers Reduce the infrastructure needed for your data center
Q.What is a Hypervisor.
Answer: You can think of a Hypervisor as the kernel or the core of a virtualization platform. The Hypervisor is also called the Virtual Machine Monitor. The Hypervisor has access to the physical host hardware.
Q.What are a host, guest, and virtual machine.
Answer: A host system (host operating system) would be the primary & first installed operating system. If you are using a bare metal Virtualization platform like Hyper-V or ESX, there really isn’t a host operating system besides the Hypervisor. If you are using a Type-2 Hypervisor like VMware Server or Virtual Server, the host operating system is whatever operating system those applications are installed into. A guest system (guest operating system) is a virtual guest or virtual machine (VM) that is installed under the host operating system. The guests are the VMs that you run in your virtualization platform. Some admins also call the host & guest the parent and child.
Q.How to create Hyper v Snap shot:
Answer: Just select the Virtual machine in Hyper-V Manager and select Snapshot from the Actions pane. The status of the virtual machine will change to “Taking Snapshot” and show the progress of the action using a percentage value File extension = .avhd Virtual Machine files The first thing to know is what files are used to create a virtual machine: .XML files These files contain the virtual machine configuration details. There is one of these for each virtual machine and each snapshot of a virtual machine. They are always named with the GUID used to internally identify the virtual machine or snapshot in question. .BIN files This file contains the memory of a virtual machine or snapshot that is in a saved state. .VSV files This file contains the saved state from the devices associated with the virtual machine. .VHD files These are the virtual hard disk files for the virtual machine .AVHD files These are the differencing disk files used for virtual machine snapshots contact for more on Windows Admin Online Training