Professional Documents
Culture Documents
Rajesh - Windows Interview Questions - 1
Rajesh - Windows Interview Questions - 1
3. What is Kerberos? Which version is currently used by Windows? How does Kerberos work?
A) Kerberos is the user authentication used in Win2000 and Win2003 Active Directory servers
Kerberos version is 5.0. Port is: 88. It’s more secure and encrypted than NTLM (NT authentication)
Kerberos makes use of a trusted third party, termed a Key Distribution Center (KDC), which consists
of two logically separate parts: an Authentication Server (AS) and a Ticket Granting Server (TGS).
Kerberos works on the basis of "tickets" which serve to prove the identity of users.
The KDC maintains a database of secret keys; each entity on the network – whether a client or a
server – shares a secret key known only to itself and to the KDC. Knowledge of this key serves to
prove an entity's identity. For communication between two entities, the KDC generates a session
key which they can use to secure their interactions.
Domain Naming Master: Adding / Changing / Deleting any Domain in a forest it takes care
Schema Master: It maintains structure of the Active Directory in a forest.
RID Master: It assigns RID and SID to the newly created object like Users and computers. If RID
master is down (u can create security objects upto RID pools are available in DCs) else u can’t
create any object one its down
PDC emulator: It works as a PDC to any NT BDCs in your environment. It works as Time Server (to
maintain same time in your network). It works to change the passwords, lockout, etc.
Infrastructure Master: This works when we are renaming any group member ship object this role
takes care.
8. What is forest?
A) It is a collection of trees. Tree is nothing but collection of domains which is having same name
space. Domain contains domain controllers.
Forest — Tree — Domain.
9. What is Active Directory?
A) Active Directory is a network-based object store and service that locates and manages resources,
and makes these resources available to authorized users and groups. An underlying principle of the
Active Directory is that everything is considered an object—people, servers, workstations, printers,
documents, and devices. Each object has certain attributes and its own security access control list
(ACL).
10.Where are the Windows NT Primary Domain Controller (PDC) and its Backup Domain Controller
(BDC) in Server 2003?
A) The Active Directory replaces them. Now all domain controllers share a multimaster peer-to-peer
read and write relationship that hosts copies of the Active Directory.
11.How long does it take for security changes to be replicated among the domain controllers?
A) Security-related modifications are replicated within a site immediately. These changes include
account and individual user lockout policies, changes to password policies, changes to computer
account passwords, and modifications to the Local Security Authority (LSA).
20.Which is the command used to remove active directory from a domain controller?
A) “dcpromo” in command prompt to add/remove active directory but first ADC should be removed
before DC if we want to remove DC first then check this server is last domain controller in domain.
Removing Active Directory:
1. If we want to remove Active Directory then we will use command……DCPROMO
2. If some one deleted parent domain and we want to remove from child domain then we will use
command… DCPROMO /FORCEREMOVAL
Note: - One should not remove parent domain first. He should start from bottom means child
domain and after that its parent and so on.
21.What is trust?
A) To allow users in one domain to access resources in another, AD uses trust. Trust is automatically
produced when domains are created. The forest sets the default boundaries of trust, not the
domain, and implicit trust is automatic. As well as two-way transitive trust, AD trusts can be
shortcut (joins two domains in different trees, transitive, one- or two-way), forest (transitive, one- or
two-way), realm (transitive or nontransitive, one- or two-way), or external (nontransitive, one- or
two-way) in order to connect to other forests or non-AD domains. AD uses the Kerberos V5 protocol,
although NTLM is also supported and web clients use SSL/TLS.
22. What is the file that’s responsible for keep all Active Directory database?
A) NTDS.DIT. default size : 40 MB
23.What snap-in administrative tools are available for Active Directory?
A) Active Directory Domains and Trusts Manager, Active Directory Sites and Services Manager, Active
Directory Users and Group Manager, Active Directory Replication (optional, available from the
Resource Kit), Active Directory Schema Manager (optional, available from adminpak)
33.What is paging?
A) If a program references a memory location within a virtual page that is not available, the hardware
generates a page fault. When this occurs, the memory management hardware invokes an operating
system routine that loads the required page from auxiliary storage (e.g., a paging file on disk) and
turns on the flag that indicates the page is available. The hardware then adds the offset denoted by
the low-order bits in the address register to the start location of the physical page, accesses the
requested memory location, and returns control to the application that originally tried to access the
memory. This process takes place transparently to the application addressing the memory. This
scheme is called paging.
35.How do the permissions work in Windows 2000? What permissions does folder inherit from the
parent?
A) When you combine NTFS permissions based on users and their group memberships, the
least restrictive permissions take precedence. However, explicit Deny entries always override Allow
entries.
37.If I rename an account, what must I do to make sure the renamed account has the same
permissions as the original one?
B) Nothing, it’s all maintained automatically.
45.I had some NTFS volumes under my Windows NT installation. What happened to NTFS after Win 2k
installation?
A) It got upgraded to NTFS 5.
46.How do you convert a drive from FAT/FAT32 to NTFS from the command line?
A) convert c: /fs:ntfs
47.Explain APIPA.
A) Auto Private IP Addressing (APIPA) takes effect on Windows 2000 Professional computers if no
DHCP server can be contacted. APIPA assigns the computer an IP address within the range of
169.254.0.0 through 169.254.255.254 with a subnet mask of 255.255.0.0.
49.I can’t seem to access the Internet, don’t have any access to the corporate network and on ipconfig
my address is 169.254.*.*. What happened?
A) The 169.254.*.* netmask is assigned to Windows machines running 98/2000/XP if the DHCP server
is not available. The name for the technology is APIPA (Automatic Private Internet Protocol
Addressing).
50.We’ve installed a new Windows-based DHCP server, however, the users do not seem to be getting
DHCP leases off of it.
A) The server must be authorized first with the Active Directory.
51. How can you force the client to give up the DHCP lease if you have access to the client PC?
A) ipconfig /release
52.What authentication options do Windows 2000 Servers have for remote clients?
A) PAP, SPAP, CHAP, MS-CHAP and EAP.
53.What are the networking protocol options for the Windows clients if for some reason you do not
want to use TCP/IP?
A) NWLink (Novell), NetBEUI, AppleTalk (Apple).
54.What is data link layer in the OSI reference model responsible for?
A) Data link layer is located above the physical layer, but below the network layer. Taking raw data
bits and packaging them into frames. The network layer will be responsible for addressing the
frames, while the physical layer is responsible for retrieving and sending raw data bits.
59.What’s the difference between forward lookup and reverse lookup in DNS?
A) Forward lookup is name-to-address; the reverse lookup is address-to-name.
60.How can you recover a file encrypted using EFS?
A) Use the domain recovery agent.
61.What is IPv6?
A) Internet Protocol version 6 (IPv6) is a network layer IP standard used by electronic devices to
exchange data across a packet-switched internetwork. It follows IPv4 as the second version of the
Internet Protocol to be formally adopted for general use. It is a 128 bit size address. Here we can
see total 8 octets each octet size is 16 bits.
63.What is RSoP?
A) Resultant Set of Policy (RSoP) is provided to make policy modification and trouble shooting easier.
RSoP is the query object it has two modes:
1. Logging mode: Polls existing policies and the reports the result of the query.
2. Planning mode: The questions ask about the planned policy and the report the result of the
query.
67.If I delete a user and then create a new account with the same username and password, would the
SID and permissions stay the same?
A) No. If you delete a user account and attempt to recreate it with the same user name and password,
the SID will be different.
68.What do you do with secure sign-ons in an organization with many roaming users?
A) Credential Management feature of Windows Server 2003 provides a consistent single sign-on
experience for users. This can be useful for roaming users who move between computer systems.
The Credential Management feature provides a secure store of user credentials that includes
passwords and X.509 certificates.
69.Anything special you should do when adding a user that has a Mac?
A) “Save password as encrypted clear text” must be selected on User Properties Account Tab Options,
since the Macs only store their passwords that way.
72.Where are the settings for all the users stored on a given machine?
A) \Document and Settings\All Users
76.If you uninstall Windows Server 2003, which operating systems can you revert to?
A) Win ME, Win 98, 2000, XP. Note, however, that you cannot upgrade from ME and 98 to Windows
Server 2003.
83.What is LSDOU?
A) Its group policy inheritance model, where the policies are applied to Local machines, Sites, Domains
and Organizational Units.
92.You need to automatically install an app, but MSI file is not available. What do you do?
A) A .zap text file can be used to add applications using the Software Installer, rather than the
Windows Installer.
94.What can be restricted on Windows Server 2003 that wasn’t there in previous products?
A) Group Policy in Windows Server 2003 determines a users right to modify network and dial-up TCP/IP
properties. Users may be selectively restricted from modifying their IP address and other network
configuration parameters.
96.Where is secedit?
A) It’s now gpupdate.
97.You want to create a new group policy but do not wish to inherit.
A) Make sure you check Block inheritance among the options when creating the policy.
98.What is “tattooing” the Registry?
A) The user can view and modify user preferences that are not stored in maintained portions of the
Registry. If the group policy is removed or changed, the user preference will persist in the Registry.
102. What’s the major difference between FAT and NTFS on a local machine?
A) FAT and FAT32 provide no security over locally logged-on users. Only native NTFS provides
extensive permission control on both remote and local files.
104. Explan the List Folder Contents permission on the folder in NTFS.
A) Same as Read & Execute, but not inherited by files within a folder. However, newly created
subfolders will inherit this permission.
105. I have a file to which the user has access, but he has no folder permission to read it. Can he
access it?
A) It is possible for a user to navigate to a file for which he does not have folder permission. This
involves simply knowing the path of the file object. Even if the user can’t drill down the file/folder
tree using My Computer, he can still gain access to the file using the Universal Naming Convention
(UNC). The best way to start would be to type the full path of a file into Run… window.
106. For a user in several groups, are Allow permissions restrictive or permissive?
A) Permissive, if at least one group has Allow permission for the file/folder, user will have the same
permission.
107. For a user in several groups, are Deny permissions restrictive or permissive?
A) Restrictive, if at least one group has Deny permission for the file/folder, user will be denied access,
regardless of other group permissions.
109. What’s the difference between standalone and fault-tolerant DFS (Distributed File System)
installations?
A) The standalone server stores the Dfs directory tree structure or topology locally. Thus, if a shared
folder is inaccessible or if the Dfs root server is down, users are left with no link to the shared
resources. A fault-tolerant root node stores the Dfs topology in the Active Directory, which is
replicated to other domain controllers. Thus, redundant root nodes may include multiple
connections to the same data residing in different shared folders.
110. We’re using the DFS fault-tolerant installation, but cannot access it from a Win98 box.
A) Use the UNC path, not client, only 2000 and 2003 clients can access Server 2003 fault-tolerant
shares.
111. Where exactly do fault-tolerant DFS shares store information in Active Directory?
A) In Partition Knowledge Table, which is then replicated to other domain controllers.
112. Can you use Start->Search with DFS shares?
A) Yes.
114. I run Microsoft Cluster Server and cannot install fault-tolerant DFS.
A) Yeah, you can’t. Install a standalone one.
116. How does Windows 2003 Server try to prevent a middle-man attack on encrypted line?
A) Time stamp is attached to the initial client request, encrypted with the shared key.
118. What third-party certificate exchange protocols are used by Windows 2003 Server?
A) Windows Server 2003 uses the industry standard PKCS-10 certificate request and PKCS-7 certificate
response to exchange CA certificates with third-party certificate authorities.
120. If hashing is one-way function and Windows Server uses hashing for storing passwords, how is it
possible to attack the password lists, specifically the ones using NTLMv1?
A) A cracker would launch a dictionary attack by hashing every imaginable term used for password
and then compare the hashes.
121. What’s the difference between guest accounts in Server 2003 and other editions?
A) More restrictive in Windows Server 2003.
122. How many passwords by default are remembered when you check “Enforce Password History
Remembered”?
A) User’s last 6 passwords.
123. What is presentation layer responsible for in the OSI model?
A) The presentation layer establishes the data format prior to passing it along to the network
application’s interface. TCP/IP networks perform this task at the application layer.
126. What’s the difference between the basic disk and dynamic disk?
A) The basic type contains partitions, extended partitions, logical drivers, and an assortment of static
volumes; the dynamic type does not use partitions but dynamically manages volumes and provides
advanced storage options
130. Describe the process of clustering with Windows 2003 Server when a new node is added.
A) As a node goes online, it searches for other nodes to join by polling the designated internal
network. In this way, all nodes are notified of the new node’s existence. If other nodes cannot be
found on a preexisting cluster, the new node takes control of the quorum resources residing on the
shared disk that contains state and configuration data.
131. What applications are not capable of performing in Windows 2003 Server clusters?
A) The ones written exclusively for NetBEUI and IPX.
134. You need to change and admin password on a clustered Windows box, but that requires rebooting
the cluster, doesn’t it?
A) No, it doesn’t. In 2003 environment you can do that via cluster.exe utility which does not require
rebooting the entire cluster.
135. Which add-on package for Windows 2003 Server would you use to monitor the installed software
and license compliance?
A) SMS (System Management Server).
Web Standard
Requirement Enterprise Edition Datacenter Edition
Edition Edition
133 MHz for x86- 400 MHz for x86-
Minimum CPU based computers based computers
133 MHz 133 MHz
Speed 733 MHz for Itanium- 733 MHz for Itanium-
based computers* based computers*
Recommended CPU
550 MHz 550 MHz 733 MHz 733 MHz
Speed
Minimum RAM 128 MB 128 MB 128 MB 512 MB
Recommended
256 MB 256 MB 256 MB 1 GB
Minimum RAM
64 GB for x86-based 128G for x86-based
computers computers
Maximum RAM 2 GB 4 GB
2 TB for x64 and 2 TB for x64 and ia64
ia64 computers computers
Minimum 2-way
Multiprocessor capable machine
Up to 2 Up to 4 Up to 8
Support required
Maximum 64
1.2 GB for
1.2 GB for
Network 1.2 GB for Network 1.2 GB for Network
Disk Space Network Install
Install Install Install
Required 2.9 GB for CD
2.9 GB for 2.9 GB for CD Install 2.9 GB for CD Install
Install
CD Install
Web Edition
• Designed to be used primarily as an IIS 6.0 Web server.
• Used mainly for building and hosting Web applications, Web pages, and XML Web Services.
• Does not require Client Access Licenses and Terminal Server mode is not included. However,
Remote Desktop for Administration is available.
• Supports a maximum of 4 processors with support for a maximum of 2GB of RAM.
• Only version of Windows Server 2003 that DOES NOT includes Client Number limitation upon
Windows update services as it does not require Client Access Licenses.
• Cannot act as a domain controller
Standard Edition
• Aimed towards small to medium sized businesses.
• Supports file and printer sharing, secure Internet connectivity, and allows centralized desktop
application deployment.
• Can run on up to 4 processors with up to 4 GB RAM.
• 64-bit versions are also available for the x86-64 architecture (AMD64 and Intel64, called collectively
x64 by Microsoft).
• The 64-bit version is capable of addressing up to 32 GB of RAM.
• 64-bit version supports Non-Uniform Memory Access (NUMA), something the 32-bit version does not
do.
Enterprise Edition
• A full-function server operating system aimed towards medium to large businesses.
• Supports up to 8 processors and can support up to 32 GB of memory with addition of the PAE
parameter in the initialization file.
• Provides enterprise-class features such as eight-node clustering using Microsoft Cluster Server
(MSCS) software.
• Enterprise Edition also comes in 64-bit versions for the Itanium and x64 architectures.
• The 64-bit version is capable of addressing up to 1 Terabyte (1024 GB) of RAM.
• Both 32-bit and 64-bit versions support Non-Uniform Memory Access (NUMA).
• Also provides the ability to hot-add supported hardware.
DataCenter Edition
• Aimed for infrastructures demanding high security and reliability.
• Windows Server 2003 is available for x86 32-bit, Itanium, and x64 processors.
• Supports a minimum of 8 processors and a maximum of 64 processors & memory up to 512GB. [ *
When run on 32-bit architecture Limited to 32 processors & limits memory addressability to 64GB.]
• Windows Server 2003, Datacenter Edition, also allows limiting processor and memory usage on a
per-application basis.
• Supports Non-Uniform Memory Access.
• Supports 8-node clustering.
• Better support for Storage Area Networks (SAN).
Small Business Server
• Designed keeping the below goals in mind primarily for Small Businesses:
– Provide small businesses with connectivity for collaboration, communication, and mobility.
– Provide simplicity in installation, management, and use.
– Provide flexible deployment features that benefit both small-business customers and
technology providers.
• To better meet the variation in a larger population of small businesses, Windows Small Business
Server 2003 is available in two editions, Standard and Premium.
• Standard Edition is ideal for first-server customers who are looking to leverage the benefits of
server technology in their network, or for customers migrating from a stand-alone server to an
integrated technology platform.
• Premium Edition is ideal for small businesses with more demanding IT needs, such as data-
intensive line-of-business applications, or for customers with more stringent monitoring and
management of Internet services and connectivity.
138. Are there any differences between 32-bit, x64, and 64-bit versions of Windows Server 2003?
A)
Versions 32-bit x86 64-bit x64 64-bit Itanium
Data Center Up to 32-way, 64 GB Up to 64-way, 1 TB Up to 64-way, 1 TB
Edition RAM RAM RAM
Enterprise Up to 8-way, 32 GB Up to 8-way, 1 TB Up to 8-way, 1 TB
Edition RAM RAM RAM
Up to 4-way, 4 GB Up to 4-way, 32 GB
Standard Edition n/a
RAM RAM
Up to 2-way, 2 GB
Web Edition n/a n/a
RAM
Symmetric Multiprocessing (SMP) support
SMP: The Windows Server 2003 Family supports single or multiple CPUs that conform to the SMP
standard. Using SMP, the operating system can run threads on any available processor, which makes it
possible for applications to use multiple processors when additional processing power is required to
increase the capability of a system. New features include SMP locking performance, improved registry
performance, and increased Terminal Server sessions.