You are on page 1of 5

http://www.techinterviews.com/?

p=224#more-224

What are the required components of Windows Server 2003 for installing Exchange
2003? - ASP.NET, SMTP, NNTP, W3SVC

1. What must be done to an AD forest before Exchange can be deployed? - Setup


/forestprep
2. What Exchange process is responsible for communication with AD? - DSACCESS
3. What 3 types of domain controller does Exchange access? - Normal Domain
Controller, Global Catalog, Configuration Domain Controller
4. What connector type would you use to connect to the Internet, and what are the two
methods of sending mail over that connector? - SMTP Connector: Forward to smart
host or use DNS to route to each address
5. How would you optimise Exchange 2003 memory usage on a Windows Server 2003
server with more than 1Gb of memory? - Add /3Gb switch to boot.ini
6. What would a rise in remote queue length generally indicate? - This means mail is
not being sent to other servers. This can be explained by outages or performance issues
with the network or remote servers.
7. What would a rise in the Local Delivery queue generally mean? - This indicates a
performance issue or outage on the local server. Reasons could be slowness in consulting
AD, slowness in handing messages off to local delivery or SMTP delivery. It could also
be databases being dismounted or a lack of disk space.
8. What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP and
Global Catalog? - SMTP – 25, POP3 – 110, IMAP4 – 143, RPC – 135, LDAP – 389,
Global Catalog - 3268
9. Name the process names for the following: System Attendant? – MAD.EXE,
Information Store – STORE.EXE, SMTP/POP/IMAP/OWA – INETINFO.EXE
10. What is the maximum amount of databases that can be hosted on Exchange 2003
Enterprise? - 20 databases. 4 SGs x 5 DBs.
11. What are the disadvantages of circular logging? - In the event of a corrupt database,
data can only be restored to the last backup.

1. What is Active Directory schema?


2. What are the domain functional level in Windows Server 2003?
3. What are the forest functional level in Windows Server 2003?
4. What is global catalog server?
5. How we can raise domain functional & forest functional level in Windows Server
2003?
6. Which is the deafult protocol used in directory services?
7. What is IPv6?
8. What is the default domain functional level in Windows Server 2003?
9. What are the physical & logical components of ADS
10. In which domain functional level, we can rename domain name?
11. What is multimaster replication?
12. What is a site?
13. Which is the command used to remove active directory from a domain controler?
14. How we can create console, which contain schema?
15. What is trust?
16. What is the file that’s responsible for keep all Active Directory database?
17. What is a default gateway? - The exit-point from one network and entry-way
into another network, often the router of the network.
18. How do you set a default route on an IOS Cisco router? - ip route 0.0.0.0
0.0.0.0 x.x.x.x [where x.x.x.x represents the destination address]
19. What is the difference between a domain local group and a global group? -
Domain local groups grant permissions to objects within the domain in which the
reside. Global groups contain grant permissions tree or forest wide for any objects
within the Active Directory.
20. What is LDAP used for? - LDAP is a set of protocol used for providing access to
information directories.
21. What tool have you used to create and analyze packet captures? - Network
Monitor in Win2K / Win2K3, Ethereal in Linux, OptiView Series II (by Fluke
Networks).
22. How does HSRP work?
23. What is the significance of the IP address 255.255.255.255? - The limited
broadcast address is utilized when an IP node must perform a one-to-everyone
delivery on the local network but the network ID is unknown.
24. What is DHCP? How we configure DHCP?
25. What are the ways to configure DNS & Zones?
26. What are the types of backup? Explain each?
27. What are Levels of RAID 0, 1, 5? Which one is better & why?
28. What are FMSO Roles? List them.
29. Describe the lease process of the DHCP server.
30. Disaster Recovery Plan?
31. What is scope & super scope?
32. Differences between Win 2000 Server & Advanced Server?
33. Logical Diagram of Active Directory? What is the difference between child
domain & additional domain server?
34. FTP, NNTP, SMTP, KERBEROS, DNS, DHCP, POP3 port numbers?
35. What is Kerberos? Which version is currently used by Windows? How does
Kerberos work?
36. Distribution List?
37. GAL, Routing Group, Stm files, Eseutil & ininteg - what are they used for?
38. What is MIME & MAPI?
39. List the services of Exchange Server 2000?
40. How would you recover Exchange server when the log file is corrupted?
41. What is Active Directory schema?
42. What are the domain functional level in Windows Server 2003?
43. What are the forest functional level in Windows Server 2003?
44. What is global catalog server?
45. How we can raise domain functional & forest functional level in Windows Server
2003?
46. Which is the deafult protocol used in directory services?
47. What is IPv6?
48. What is the default domain functional level in Windows Server 2003?
49. What are the physical & logical components of ADS
50. In which domain functional level, we can rename domain name?
51. What is multimaster replication?
52. What is a site?
53. Which is the command used to remove active directory from a domain controler?
54. How we can create console, which contain schema?
55. What is trust?
56. What is the file that’s responsible for keep all Active Directory database?
57. Distribution List?
58. GAL, Routing Group, Stm files, Eseutil & ininteg - what are they used for?
59. What is MIME & MAPI?
60. List the services of Exchange Server 2000?
61. How would you recover Exchange server when the log file is corrupted?
62. What is a level 0 backup?
63. What is an incremental backup?
64. What steps are required to perform a bare-metal recovery?
65. Name key files or directories on a UNIX system that should always be backed up.
66. Name key files or directories on a Windows system that should always be backed
up.
67. What is RAID 0?
68. What is RAID 0+1? Why is it better than 0?
69. What is RAID-5?
70. Why would you NOT want to encapsulate a root directory with Veritas?
71. What is concatenation?
72. What is striping?
73. What is a spindle?

1. Describe how the DHCP lease is obtained. It’s a four-step process consisting of
(a) IP request, (b) IP offer, © IP selection and (d) acknowledgement.
2. I can’t seem to access the Internet, don’t have any access to the corporate
network and on ipconfig my address is 169.254.*.*. What happened? The
169.254.*.* netmask is assigned to Windows machines running 98/2000/XP if the
DHCP server is not available. The name for the technology is APIPA (Automatic
Private Internet Protocol Addressing).
3. We’ve installed a new Windows-based DHCP server, however, the users do
not seem to be getting DHCP leases off of it. The server must be authorized first
with the Active Directory.
4. How can you force the client to give up the dhcp lease if you have access to
the client PC? ipconfig /release
5. What authentication options do Windows 2000 Servers have for remote
clients? PAP, SPAP, CHAP, MS-CHAP and EAP.
6. What are the networking protocol options for the Windows clients if for some
reason you do not want to use TCP/IP? NWLink (Novell), NetBEUI,
AppleTalk (Apple).
7. What is data link layer in the OSI reference model responsible for? Data link
layer is located above the physical layer, but below the network layer. Taking
raw data bits and packaging them into frames. The network layer will be
responsible for addressing the frames, while the physical layer is reponsible for
retrieving and sending raw data bits.
8. What is binding order? The order by which the network protocols are used for
client-server communications. The most frequently used protocols should be at
the top.
9. How do cryptography-based keys ensure the validity of data transferred
across the network? Each IP packet is assigned a checksum, so if the checksums
do not match on both receiving and transmitting ends, the data was modified or
corrupted.
10. Should we deploy IPSEC-based security or certificate-based security? They
are really two different technologies. IPSec secures the TCP/IP communication
and protects the integrity of the packets. Certificate-based security ensures the
validity of authenticated clients and servers.
11. What is LMHOSTS file? It’s a file stored on a host machine that is used to
resolve NetBIOS to specific IP addresses.
12. What’s the difference between forward lookup and reverse lookup in DNS?
Forward lookup is name-to-address, the reverse lookup is address-to-name.
13. How can you recover a file encrypted using EFS? Use the domain recovery
agent.

1. What are types of kernel objects?

Several types of kernel objects, such as access token objects, event objects, file objects,
file-mapping objects, I/O completion port objects, job objects, mailslot objects, mutex
objects, pipe objects, process objects, semaphore objects, thread objects, and waitable
timer objects.

2. What is a kernel object?

Each kernel object is simply a memory block allocated by the kernel and is accessible
only by the kernel. This memory block is a data structure whose members maintain
information about the object. Some members (security descriptor, usage count, and so on)
are the same across all object types, but most are specific to a particular object type. For
example, a process object has a process ID, a base priority, and an exit code, whereas a
file object has a byte offset, a sharing mode, and an open mode.

3. User can access these kernel objects structures?


Kernel object data structures are accessible only by the kernel

You might also like