KEMBAR78
DL2 Interview Questions | PDF | Domain Name System | Ip Address
0% found this document useful (0 votes)
745 views20 pages

DL2 Interview Questions

1. Active Directory provides identity management for network environments, allowing administrators to centrally manage users, computers, and other resources. 2. DNS resolves names to IP addresses and vice versa, using records like A records and MX records. It allows computers and websites to be accessed by name instead of hard-to-remember numbers. 3. DHCP automatically assigns IP addresses to devices on a network, simplifying address management through use of scopes and superscopes.

Uploaded by

pratik sarvankar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
745 views20 pages

DL2 Interview Questions

1. Active Directory provides identity management for network environments, allowing administrators to centrally manage users, computers, and other resources. 2. DNS resolves names to IP addresses and vice versa, using records like A records and MX records. It allows computers and websites to be accessed by name instead of hard-to-remember numbers. 3. DHCP automatically assigns IP addresses to devices on a network, simplifying address management through use of scopes and superscopes.

Uploaded by

pratik sarvankar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Desktop Support Interview Questions

Interview Questions
=================

A) Tell me something about yourself.


Tell about your eductaion, place you belong to, some struggle in life which shows that you have
positive attitude and will to fight the odds.

1) What is Active Directory?


A central component of the Windows platform, Active Directory directory service provides the means
to manage the identities and relationships that make up network environments. For example we can
create, manage and administor users, computers and printers in the network from active directory.

2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS?
What are A records and mx records?
DNS is domain naming service and is used for resolving names to IP address and IP addresses to
names. The computer understands only numbers while we can easily remember names. So to make
it easier for us what we do is we assign names to computers and websites. When we use these
names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes
our request.

Forward lookup: Converting names to IP address is called forward lookup.

Reverse lookup: Resolving IP address to names is called reverse lookup.

'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in
DNS with the help of which DNS can find out the IP address of a name.

'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the
network. This record is also found in DNS.

3) What id DHCP? Why it is used? What are scopes and super scopes?
DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of
PCs in a network environment. This makes the IP management very easy.
Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion
range which a client can use to communicate with the other PCs in the network.
Superscope: When we combine two or more scopes together its called super scope.

4) What are the types of LAN cables used? What is a cross cable?
Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed
and "CAT 6" can support 1Gbps of speed.Cross cable: Its used to connect same type of devices
without using a switch/hub so that they can communicate.

5) What is the difference between a normal LAN cable and cross cable? What could be the
maximum length of the LAN cable?
The way the paired wires are connected to the connector (RJ45) is different in cross cable and
normal LAN cable. The theoritical length is 100 meters but after 80 meters you may see drop in
speed.
6) What would you use to connect two computers without using switches?
Cross cable.

7) What is IPCONFIG command? Why it is used?


IPCONFIG command is used to display the IP information assigned to a computer. Fromthe output
we can find out the IP address, DNS IP address, gateway IP address assigned to that computer.

8) What is APIPA IP address? Or what IP address is assigned to the computer when the
DHCP server is not available?
When DHCP server is not available the Windows client computer assignes an automatic IP address
to itself so that it can communicate with the network cmputers. This ip address is called APIPA. ITs
in the range of 169.254.X.X. APIPA stands for Automatic private IP addressing.

9) What is a DOMAIN? What is the difference between a domain and a workgroup?


Domain is created when we install Active Directory. ITs a security boundary which is used to
manage computers inside the boundary.
Domain can be used to centrally administor computers and we can govern them using commo
policies called group policies. We can't do the same with workgroup.

10) Do you know how to configure outlook 2000 and outlook 2003 for a user?
Please visit the link below to find out how to configure outlook 2000 and outlook
2003.http://www.it.cmich.edu/quickguides/qg_outlook2003_server.asp

11) What is a PST file and what is the difference between a PST file and OST file? What file is
used by outlook express?
PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when
we use outlook in cached exchanged mode. Outlook express useds odb file.

12) What is BSOD? What do you do when you get blue screen in a computer? How do you
troubleshoot it?
BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the
windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer
is "LAst known good configuration". If this doesn't work than boot the computer in safe mode. If it
boots up than the problemis with one of the devices or drivers.

13) What is RIS? What is Imaging/ghosting?


RIS stands for remote installation services. You save the installed image on a windows server and
then we use RIS to install the configured on in the new hardware. We can use it to deploy both
server and client OS.
Imaging or ghosting also does the same job of capturing an installed image and then install it on a
new hardware when there is a need. We go for RIS or iamging/ghosting because installing OS
everytime using a CD can be a very time consuming task. So to save that time we can go for
RIS/Ghosting/imaging.

14) What is VPN and how to configure it?


VPN stands for Virtual private network. VPN is used to connect to the corporate network to access
the resources like mail and files in the LAN. VPN can be configured using the stepsmentioned in the
KB: http://support.microsoft.com/kb/305550

15) Your computer slowly drops out of network. A reboot of the computer fixes the problem.
What to do to resolve this issue?
Update the network card driver.

16) Your system is infected with Virus? How to recover the data?
Install another system. Install the OS with the latets patches, Antivirus with latest updates. Connect
the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD.
Once done copy the files to the new system.

17) How to join a system to the domain? What type of user can add a system to the domain?
Please visit the article below and read "Adding the Workstation to the
Domain"http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/directory/
activedirectory/stepbystep/domxppro.mspx

18) What is the difference between a switch and a hub?


Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.

19) What is a router? Why we use it?


Router is a switch which uses routing protocols to process and send the traffic. It also receives the
traffic and sends it across but it uses the routing protocols to do so.

20) What are manageable and non manageable switches?


Switches which can be administered are called manageable switches. For example we can create
VLAN for on such switch. On no manageable switches we can't do so.
1) What is Active Directory?

A central component of the Windows platform, Active Directory directory service provides the means
to manage the identities and relationships that make up network environments. For example we can
create, manage and administor users, computers and printers in the network from active directory.

2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS?
What are A records and mx records?

DNS is domain naming service and is used for resolving names to IP address and IP addresses to
names. The computer understands only numbers while we can easily remember names. So to make
it easier for us what we do is we assign names to computers and websites. When we use these
names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes
our request.
Forward lookup: Converting names to IP address is called forward lookup.
Reverse lookup: Resolving IP address to names is called reverse lookup.
'A' record: Its called host record and it has the mapping of a name to IP address. This is the record
in DNS with the help of which DNS can find out the IP address of a name.
'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the
network. This record is also found in DNS.

To gain in depth knowledge on DNS please download, extract and watch the videos available here.

3) What is DHCP? Why it is used? What are scopes and super scopes?

DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of
PCs in a network environment. This makes the IP management very easy.
Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion
range which a client can use to communicate with the other PCs in the network.
Superscope: When we combine two or more scopes together its called super scope.

4) What are the types of LAN cables used? What is a cross cable?
Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed
and "CAT 6" can support 1Gbps of speed.
Cross cable: Its used to connect same type of devices without using a switch/hub so that they can
communicate.

5) What is the difference between a normal LAN cable and cross cable? What could be the
maximum length of the LAN cable?

The way the paired wires are connected to the connector (RJ45) is different in cross cable and
normal LAN cable.
The theoritical length is 100 meters but after 80 meters you may see drop in speed due to loss of
signal.
6) What would you use to connect two computers without using switches? Cross cable. 7)
What is IPCONFIG command? Why it is used?

IPCONFIG command is used to display the IP information assigned to a computer. Fromthe output
we can find out the IP address, DNS IP address, gateway IP address assigned to that computer.

8) What is APIPA IP address? Or what IP address is assigned to the computer when the
DHCP server is not available?

When DHCP server is not available the Windows client computer assignes an automatic IP address
to itself so that it can communicate with the network cmputers. This ip address is called APIPA. ITs
in the range of 169.254.X.X.
APIPA stands for Automatic private IP addressing. Its in the range of 169.254.X.X.

9) What is a DOMAIN? What is the difference between a domain and a workgroup?

Domain is created when we install Active Directory. It's a security boundary which is used to manage
computers inside the boundary. Domain can be used to centrally administor computers and we can
govern them using common policies called group policies.
We can't do the same with workgroup.

10) Do you know how to configure outlook 2000 and outlook 2003 for a user?

Please visit the link below to find out how to configure outlook 2000 and outlook
2003.http://www.it.cmich.edu/quickguides/qg_outlook2003_server.asp

11) What is a PST file and what is the difference between a PST file and OST file? What file is
used by outlook express?

PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when
we use outlook in cached exchanged mode. Outlook express useds odb file.

12) What is BSOD? What do you do when you get blue screen in a computer? How do you
troubleshoot it?

BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the
windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer
is "LAst known good configuration". If this doesn't work than boot the computer in safe mode. If it
boots up than the problemis with one of the devices or drivers.

13) What is RIS? What is Imaging/ghosting?

RIS stands for remote installation services. You save the installed image on a windows server and
then we use RIS to install the configured on in the new hardware. We can use it to deploy both
server and client OS. Imaging or ghosting also does the same job of capturing an installed image
and then install it on a new hardware when there is a need. We go for RIS or iamging/ghosting
because installing OS everytime using a CD can be a very time consuming task. So to save that
time we can go for RIS/Ghosting/imaging.

14) What is VPN and how to configure it?

VPN stands for Virtual private network. VPN is used to connect to the corporate network to access
the resources like mail and files in the LAN. VPN can be configured using the stepsmentioned in the
KB: http://support.microsoft.com/kb/305550

15) Your computer slowly drops out of network. A reboot of the computer fixes the problem.
What to do to resolve this issue?

Update the network card driver.

16) Your system is infected with Virus? How to recover the data?

Install another system. Insall the OS with the lates pathces, Antivirus with latest updates. Connect
the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD.
Once done copy the files to the new system.

17) How to join a system to the domain? What type of user can add a system to the domain?

Please visit the article below and read "Adding the Workstation to the Domain"
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/directory/
activedirectory/stepbystep/domxppro.mspx

18) What is the difference between a switch and a hub?


Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.

19) What is a router? Why we use it?


Router is a switch which uses routing protocols to process and send the traffic. It also receives the
traffic and sends it across but it uses the routing protocols to do so.

20) What are manageable and non manageable switches?


Switches which can be administered are calledmanageable switches. For example we can create
VLAN for on such switch. On no manageable swiches we can't do so.

1. What is NIC?
A network card, network adapter or NIC (network interface controller) is a piece of computer
hardware designed to allow computers to communicate over a computer network
2. What is USB?

Universal Serial Bus (USB) is a serial bus standard to interface devices. Devices like Modem,
Mouse, Keyboard etc can be connected.

3. Dialup vs. Broadband

A broadband connection (ADSL) provides high-speed Internet access over a standard phone line.
The advantage of a broadband connection over a standard dialup service, is that Broadband is
considerably faster, and is "always-on", meaning that once you"re logged on, your PC is online until
the PC is turned off again.

Broadband offer high-speed Internet access and allows telephone calls and a permanent Internet
connection to share a single phone line simultaneously whereas in Dialup connection either Internet
connection or telephone call can made at given time.

4. LAN and WAN

A local area network is a computer network covering a small geographic area, like a home, office, or
group of buildings

Wide Area Network (WAN) is a computer network that covers a broad area (i.e., any network whose
communications links cross metropolitan, regional, or national boundaries). Or, less formally, a
network that uses routers and public communications links

5. Microsoft Access

Microsoft Office Access, previously known as Microsoft Access, is a relational database


management system from Microsoft.

6. What is RAS?

Remote Access Services (RAS) refers to any combination of hardware and software to enable the
remote access to tools or information that typically reside on a network of IT devices.

7. Difference between Client Mail and Web Mail?

Email clients download your emails onto your computer. Using a specialized email program such as
Outlook Express or Apple Mail has the advantage of giving you complete control over your email;
every email you receive is placed on your computer and you can keep as many large file
attachments as you want.
Checking your email through our webmail is similar to using Hotmail or Yahoo! Mail. You never
actually copy your messages to your computer; in fact, you are looking at them through your web
browser on somebody else"s computer. When you are not online, you are not able to see your email.

8. RAM and ROM

random access memory, a type of computer memory that can be accessed randomly; that is, any
byte of memory can be accessed without touching the preceding bytes. RAM is the most common
type of memory found in computers and other devices, such as printers.

Pronounced rahm, acronym for read-only memory, computer memory on which data has been
prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only be
read. Unlike main memory (RAM), ROM retains its contents even when the computer is turned off.
ROM is referred to as being nonvolatile, whereas RAM is volatile.

9. Spamguard

Spam Guard is an Outlook add-in that filters email that arrives in your inbox. If the sender of any
message cannot be identified then the message is moved into a spam quarantine folder. Messages
deposited in the spam quarantine folder can be inspected and either deleted or approved at your
leisure.

10. Firewall and Antivirus


A system designed to prevent unauthorized access to or from a private network. Firewalls can be
implemented in both hardware and software, or a combination of both. Firewalls are frequently used
to prevent unauthorized Internet users from accessing private networks connected to the Internet,
especially intranets. All messages entering or leaving the intranet pass through the firewall, which
examines each message and blocks those that do not meet the specified security criteria.

Antivirus is a software program which helps protect a computer against being infected by a virus.

11. DNS

Short for Domain Name System (or Service or Server), an Internet service that translates domain
names into IP addresses. Because domain names are alphabetic, they"re easier to remember. The
Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a
DNS service must translate the name into the corresponding IP address. For example, the domain
name www.example.com might translate to 198.105.232.4.
12. IPConfig

IPConfig is a command line tool used to control the network connections on Windows NT/2000/XP
machines. There are three main commands: "all", "release", and "renew". IPConfig displays all
current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol
(DHCP) and Domain Name System (DNS) settings. Used without parameters, IPConfig displays the
IP address, subnet mask, and default gateway for all adapters.

13. Trace route

Trace route is the program that shows you the route over the network between two systems, listing
all the intermediate routers a connection must pass through to get to its destination. It can help you
determine why your connections to a given server might be poor, and can often help you figure out
where exactly the problem is. It also shows you how systems are connected to each other, letting
you see how your ISP connects to the Internet as well as how the target system is connected.

Please find the technical questions:

1) What is IP Address ?

2) What are the layers of network ?

3) What are the different types of network ?

4) What is networking ?

5) What is the difference between OSI and TCP/IP Model ?

6) What is TCP/IP ?

7) What is HTTP?

8) What is Protocol ?

9) What is communication medium ?

10) What is PORT ?

11) What is SOCKET ?

12) What is the difference between PORT and SOCKET?

13) What is wireless networking ?


14) What is topology ?

15) What are the different types of topology ?

16) What is the size of IP Address?

17) What is FTP ?

18) What is SMTP ?

19) What are the different types of protocol ?

20) What is Dial-Up connection ?

21) What is Broad Band Connection?

22) What is the difference between Dial-up and broad band connection?

23) What IEEE standard for wireless networking?

Ans: 802.11g

24) What is IEEE standard ?

Ans: Institute of electrical and electronic engineer.They develop standard for networking
Windows Desktop Support Interview Questions

Q. What is an operating system?


A. Operating system works as an interpreter between computer Hardware and application. Operation
system works as a user
interface.

Q. Types of Operating systems?


A. There are two types of operating systems
1. SOS: Simple Operating System as for example- Windows 95,98, ME
2. NOS: Network Operating System as for example- Windows NT, 2000, 2003.

Q. What is server?
A. Server are computer that provides the services. As for Example:-
1. DNS Server
2. WINS Server
3. DHCP Server
4. RAS Server
5. VPN Server

Q. What is RAS Server?


A. RAS stands for Remote Access Server. It is basically use for mobile user in the network. This server
provides the access
connectivity for mobile user. In this way all of the mobile users are connected to server through telephone
line. This server also
provides the connectivity between two more offices in the network.

Q. What is VPN Server?


A. VPN Stands for Virtual Private Network. It is basically use for mobile user in the network. This server
provides the remote
access connectivity for mobile user. In this way all of the mobile users are connected to server through
internet. This server also
provides the connectivity between two or more office in the network. VPN is cost effective (No Costly).

Q. What is IAS Server?


A. IAS stands for Internet Authentication Services. IAS server is also known as RADIUS Server. IAS
Server provides the
centralized management of multiple RAS & VPN Server in the Network. On this Server Remote Access
Policy and Remote Access
logging options are available.

Q. FAT/NTFS?
A. there is major difference are available between FAT and NTFS file systems Such as:
FAT:
• FAT Stands for File Allocation Table
• There are three categories in FAT file system.
 FAT
 FAT-16
 FAT-32
• In FAT Not up to folder level security is available
• Compression option is not available
• Encryption Option is not available
• Disk Quota Option is not available
• FAT supported by all of the Microsoft Based Operating Systems.
NTFS:
• NTFS stands for New Technology File Systems
• There are three categories in NTFS file systems
 NTFS 4.0- NT Operating Systems
 NTFS 5.0- 2000 Operating Systems
 NTFS 6.0- 2003 Operating Systems
• In NTFS up to File level security is available
• Compression option is available
• Encryption option is available
• Disk Quota Option is available
• NTFS supported by only limited Microsoft Based Operating System

Q. What is the difference between Windows NT/2000/2003?


A. There is many differences are available between Windows NT, 2000 and 2003 O/S, such as NT:
• There is no active directory
• There is no tree/forest hierarchical structure is available
• There is no site relationship
• There is no parent domain and child domain concepts are available in the network/
• NT support NTFS 4.0 file system
• NT support NTLM version 2 LAN Authentication Protocol
• In NT by default no trust relationship are configured
• In NT we will use System Policy
• In NT specific Client site Operation system is available i.e. NT Workstation 4.0 Edition
• In NT we will use Exchange 5.5 Server
• In NT we can create only one way trust relationship inside the network
2000:
• There is Active Directory
• Tree/Forest Hierarchical Structure are available
• There is Site Relationship is available
• There is parent domain and child domain concept are available
• 2000 Support NTFS 5.0 file system
• 2000 Support Kerberos version 5.0 authentication protocol
• In 2000 by default Two-way Trust Relationship are configured
• In 2000 we will use Group Policy
• 2000 support maximum 32 Processor and 64 GB Ram
• In 2000 Specific client site operating system is available i.e. 2000 Professional
• In 2000 we will use Exchange 2000 server
• In 2000 no stub zone is available in DNS
• In 2000 Resultant Setup Policy is not available
• In 2000 GPMC is not available
• In 2000 Conditional forwarding option is not available
• In 2000 Effective Permission option is not available
• In 2000 only some Administrative Command Line Tools are available
• Active Directory saved query option is not available
• Shadow copy Option is not available in windows 2000 Operating System
• ASR Option is not available in Windows 2000 operating System
• In Windows 2000 we can create Maximum 1 DFS Root on a single DFS Server in the network.
• In 2000 we can create two way trust relationship inside the network
2003:
• There is Active Directory
• Tree/Forest Hierarchical Structure are available
• There is site relationship is available
• There is parent domain and child domain concept are available
• 2003 support NTFS 6.0 File system
• 2003 support Kerberos 5.0 Authentication Protocol
• In 2003 we will use group policy
• 2003 support maximum 64 Processor and 64 GB RAM
• In 2003 no specific client site Operating System is available you can use either windows 2000
Professional either Windows
XP Professional in the network
• In 2003 we will use Exchange 2003 Server
• In 2003 Stub Zone is available in DNS
• In 2003 GPMC is available
• In 2003 Resultant Setup Policy is available
• In 2003 Conditional Forwarding option is available
• In 2003 Effective Permission option is available
• Active Directory Saved Query option is available
• Shadow Copy option is available in Windows 2003 Operating System
• ASR Option is available in Windows 2003 Operating System
• In Windows 2003, we can create more than 1 DFS Root on A single DFS Server in the Network
• In 2003 we can create two way Trust Relationship inside the network

Q. What is tree?
A. A group of domain is called tree and sharing a contiguous Name Space.

Q. What is forest?
A. A group of tree is called forest and does not sharing a contiguous name space but sharing a common
configuration (Schema).

Q. Difference between D.C. and A.D.C.?


A. D.C. stands for Domain Controller and A.D.C. stands for Additional Domain Controller. A.D.C. is a
backup of D.C. Only one
different is available between D.C. and A.D.C. i.e. – Operation master Role. On D.C. all of five Operation
Master Roles are
available-
1. Schema Master
2. Domain Naming Master
3. RID Master
4. PDC Emulator
5. Infrastructure Master
But on A.D.C. only Three Operation Master Role are Available:
1. RID Master
2. PDC Emulator
3. Infrastructure Master

Q. What is the benefit of Child Domain?


A. There are many benefits of Child Domain Such As:
1. Security Boundary
2. Administrative Overhead Low
3. Network Traffic Low
Q. What is Group?
A. Group is a collection of user account. It provides the simplified administration in the network.

Q. What is OU?
A. OU stands for Organizational Unit. On OU we define group Policy in the network. Group policy is
basically assigned on active
directory container i.e. Site, domain, OU. When ever we want some users then we put that user in the OU
and assign the
appropriate Group Policy on that OU.

Q. What is Group Policy?


A. Group Policy provides the stream line access to all of the users in the network. Group policy is
basically assigned on active
directory container i.e. Site, Domain and O.U. When ever we want some users in the network do not use
shut down the system,
do not use run command, do not use Control Panel, then we put that user in the OU and assign the
appropriate Group Policy on
that OU.

Q. Difference between permission, rights and policy?


A. Permission: permission is basically assigned on network resources as for example – file, folder, share
folder, printer.
Right: Right is basically assign to users and groups.
Policy: Policy is basically assigned on active directory container i.e. – Site, Domain, OU.

Q What is ISA Server?


A. ISA stands for Internet Security Acceleration. ISA server provides the internet connectivity for all of the
users in network ISA
Server also works as proxy Server in the network. With the help of ISA Server Administrator can filtering a
client request for a
specific web site in the network.

Q. What is Default Gateway?


A. Default Gateway is the IP address of router in the network. When ever any clients want to go to
another network that query will
forward to default gateway.

Q. What is site?
A. A site is a geographical area where all of the domains are available. Site manages the replication traffic
between two or more
different sites in the network.

Q. What is Operation Master Role?


A. Operation Master Role is available on Domain Controller in the Network. There are five types of
operation master roles:-
1. Schema master
2. Domain Naming Master
3. RID Master
4. PDC Emulator
5. Infrastructure Master

Q. Difference between Mixed Mode and Native Mode?


A. There are two types of domain mode:
1. Mixed Mode: In this mode NT, win 2000 and win 2003 D.C. are available.
2. Native Mode: there are two types of native mode.
i. Win 2000 Native Mode: In this mode win 2000 and win 2003 DC are available.
ii. Win 2003 Native mode: in this mode only win 2003 DC are available.

Q. What is SCSI?
A. SCSI stands for Small Computer System Interface. In SCSI the rate of data transmission is fast. SCSI
Hard Disk Speed R.P.M.
is fast in SCSI Data Transmission speed is 320 MBPS in the Network. In SCSI Controller We can connect
Maximum 15 Physical
Devices in the System.

Q. What are A-Host Record and PTR Record?


A. A record is also called host record. This record is basically created in forward lookup Zone
PTR record is also called a Pointer record. This record is basically created in reverse lookup Zone

Q. What is reservation?
A. Reservation is basically used in DHCP Server. When Ever we want this computer is always received
this IP address from DHCP
Server in the network, in the network, in that case we create a reservation in DHCP Server of that
particular computer in the
network.

Q. IP Address Range/Classes?
A. There are two types of IP address:-
1. Class Full IP Address
2. Class Less IP Address
Class Full IP Address – There are five classes:
1. Class A - 0 - 126(127 is reserved for Loop back)
2. Class B - 128 – 191
3. Class C - 192 – 223
4. Class D - 224 - 239
5. Class E - 240 – 255

Q. Difference between Hardware Router & Software Router?


A. Hardware Router: Hardware Router is a dedicated Router. It’s having a lot of feature such as Security,
dedicated routing in
the networking. As for Example Cisco Router.
Software Router: Software Router is not a dedicated router. It provides the different services also such as
DNS Server, DHCP
Server i.e. Windows Based Router.

Q. Difference between Hardware Firewall and Software Firewall?


A. Hardware Firewall: It is a dedicated firewall. A lots of security features are available on hardware based
firewall. As for
Example- Cisco Pix Firewall.
Software Firewall: It is a dedicated firewall. It provides the normal security in the network- Check Point.

Q. What is Domain Controller?


A. D.C. stands for Domain Controller. It provides the centralized management of entire domain in the
network. When ever we will
install active directory database on a server side operating system, then after that system becomes a
D.C. Domain controller
manages all security related interaction between users and computers in the network.

Q. What is B Router?
A. B Router stands for Bridge
Router. We can say this is a layer three bridge that provides the communication between two or
more different network ID.

Q. What is a Bridge?
A. Bridge is a layer 2 network device that provides the communication within the same network ID. In
bridge maximum 16 ports
are available.

Q. Difference between Gateway and Router?


A. Router works on same network architecture but Gateway works on different network architecture.

Q. What is POP Server/SMTP Server?


A. POP Stands for Post Office Protocol. It is basically use for mail receiving purpose in the network.
SMTP Stands for Simple Mail Transfer Protocol. It is basically use for sending a mail as well as receiving
a mail in the network.

Q. What is the function of Ping Command?


A. Ping provides to check the Physical IP Connectivity between two or more devices in the network. Ping
sends an ICMP request
from source Computer to destination computer and destination computer sends an ICMP reply.

Q. What are Broadcasting, Multicasting and unicasting?


A. Broadcasting – one to all
Multicasting - one to many not all
Unicasting - One to One.

Q. What is Group Nesting?


A. When we add two or more Groups within a Single Group. It is called Group Nesting.

Q. What is FIXMBR?
A. FIXMBR Repair the Master boot record of the Partition Boot Sector.

Q. What is FIXBOOT?
A. FIXBOOT write a new partition boot sector on to the system partition.

Q. What is SID?
A. SID stands for Security Identifier. Every object has a unique ID, it is called SID.

Q. What is RADIUS Server?


A. RADIUS Stands for Remote Authentication Dial-in User Service, RADIUS Server Provides the
Centralized Management of
Multiple RAS & VPN Server in the network. On this Server Remote Access Policy and Remote Access
Logging Options are available.

Q. What is Trusting Domain?


A. In Trusting Domain Resources are available.

Q. What is Trusted Domain?


A. In Trusted Domain User Account’s are available.
Q. What is Microsoft Exchange Server?
A. Microsoft Exchange Server is Software that provides the services such as sending & receiving the
Mail.

Q. What is Printer?
A. Printer is a Software that Governing the print Device. There are two types of Printer:
1. Local Printer
Chatting is a Real Time Conversation between two or more people in the network.
2. Network Printer

Q. What is Directory Services restore mode?


A. When our Active Directory Database is not working properly, then we restart the domain Controller and
press f8 key. Then after
Selecting the Directory services restore mode and then after restoring the active directory database from
the last backup.

Q. What is Normal Backup?


A. Just like a normal backup by default Backup.

Q. What is incremental backup?


A. In incremental backup only incremental parts are backup not full backup.

Q. What is differential backup?


A. In differential backup, we take full backup after the normal backup.

Q. What is packet?
A. A packet is a logical grouping of information that includes a header which contains location information
and user data.

Q. What is forwarder?
A. It is basically use in DNS Server. When client query to the DNS Server. In that case if the DNS is
having a best results then
DNS Server give the best result. To the client computer in the network otherwise DNS
Windows Topics on http://www2.isupportyou.net

Q) What is Active Directory?


A central component of the Windows platform, Active Directory directory service provides the means to
manage the identities and relationships that make up network environments. For example we can create,
manage and administrator users, computers and printers in the network from active directory.

Q) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS? What are A
records and mx records?
DNS is domain naming service and is used for resolving names to IP address and IP addresses to
names. The computer understands only numbers while we can easily remember names. So to make it
easier for us what we do is we assign names to computers and websites. When we use these names
(Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request.

Forward lookup: Converting names to IP address is called forward lookup.

Reverse lookup: Resolving IP address to names is called reverse lookup.

'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in
DNS with the help of which DNS can find out the IP address of a name.

'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the
network. This record is also found in DNS.

Q) What id DHCP? Why it is used? What are scopes and super scopes?

DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a
network environment. This makes the IP management very easy.

Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range
which a client can use to communicate with the other PCs in the network.

Superscope: When we combine two or more scopes together its called super scope.

Q) What are the types of LAN cables used? What is a cross cable?
Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and
"CAT 6" can support 1Gbps of speed.

Cross cable: Its used to connect same type of devices without using a switch/hub so that they can
communicate.

Q) What is the difference between a normal LAN cable and cross cable? What could be the maximum
length of the LAN cable?
The way the paired wires are connected to the connector (RJ45) is different
in cross cable and normal LAN cable.
The theoretical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal.

Q) What would you use to connect two computers without using switches?
Cross cable.

Q) What is IPCONFIG command? Why it is used?


IPCONFIG command is used to display the IP information assigned to a computer. From the output we
can find out the IP address, DNS IP address, gateway IP address assigned to that computer.

Q) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is
not available?
When DHCP server is not available the Windows client computer assigns an automatic IP address to
itself so that it can communicate with the network computers. This ip address is called APIPA. ITs in the
range of 169.254.X.X.
APIPA stands for Automatic private IP addressing. Its in the range of 169.254.X.X.

Q) What is a DOMAIN? What is the difference between a domain and a workgroup?


Domain is created when we install Active Directory. It's a security boundary which is used to manage
computers inside the boundary. Domain can be used to centrally administrator computers and we can
govern them using common policies called group policies.
We can't do the same with workgroup.

Q) Do you know how to configure outlook 2000 and outlook 2003 for a user?
Please visit the link below to find out how to configure outlook 2000 and outlook 2003. IT: Help Desk:
Quick Guide: Configuring Outlook 2003 for Exchange Server

Q) What is a PST file and what is the difference between a PST file and OST file? What file is used by
outlook express?
PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use
outlook in cached exchanged mode. Outlook express used odb file.

Q) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot
it?
BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows
OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is "Last known
good configuration".
If this doesn't work than boot the computer in safe mode. If it boots up than the problems with one of the
devices or drivers.

Q) What is RIS? What is Imaging/ghosting?


RIS stands for remote installation services. You save the installed image on a windows server and then
we use RIS to install the configured on in the new hardware. We can use it to deploy both server and
client OS. Imaging or ghosting also does the same job of capturing an installed image and then install it
on a new hardware when there is a need. We go for RIS or imaging/ghosting because installing OS every
time using a CD can be a very time consuming task. So to save that time we can go for
RIS/Ghosting/imaging.
Q) What is VPN and how to configure it?
VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the
resources like mail and files in the LAN. VPN can be configured using the steps mentioned in the KB:
How to configure a VPN connection to your corporate network in Windows XP Professional

Q) Your computer slowly drops out of network. A reboot of the computer


fixes the problem. What to do to resolve this issue?
Update the network card driver.

Q) Your system is infected with Virus? How to recover the data?


Install another system. Install the OS with the lates patches, Antivirus with latest updates. Connect the
infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once
done copy the files to the new system.

Q) How to join a system to the domain? What type of user can add a system to the domain?
Please visit the article below and read "Adding the Workstation to the Domain"
http://www.microsoft.com/technet/pro...003/technologi /directory/

Q) What is the difference between a switch and a hub?


Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.

Q) What is a router? Why we use it?


Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic
and sends it across but it uses the routing protocols to do so.

Q) What are manageable and non manageable switches?


Switches which can be administered are called manageable switches. For example we can create VLAN
for on such switch. On no manageable switches we can't do so.

You might also like