InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Mention What Is The Difference Between Domain Admin Groups And Enterprise Admins Group In Ad? |
|
Answer» Enterprise Admin GROUP : Domain Admin Group : Enterprise Admin Group : Domain Admin Group : |
|
| 2. |
What Is Ntds.dit Schema Table? |
|
Answer» The types of objects that can be created in the ACTIVE Directory, relationships between them, and the attributes on each type of OBJECT. This table is fairly STATIC and much smaller than the DATA table. The types of objects that can be created in the Active Directory, relationships between them, and the attributes on each type of object. This table is fairly static and much smaller than the data table. |
|
| 3. |
What Is Ntds.dit? |
|
Answer» This is the AD DATABASE and stores all AD OBJECTS. DEFAULT location is SystemRoot%ntdsNTDS.DIT. This is the AD database and stores all AD objects. Default location is SystemRoot%ntdsNTDS.DIT. |
|
| 4. |
How Will You Verify Whether The Ad Installation Is Proper With Srv Resource Records? |
|
Answer» VERIFY SRV RESOURCE Records: After AD is installed, the DC will register SRV records in DNS when it restarts. We can CHECK this using DNS MMC or nslookup COMMAND. Verify SRV Resource Records: After AD is installed, the DC will register SRV records in DNS when it restarts. We can check this using DNS MMC or nslookup command. |
|
| 5. |
What Is Lightweight Directory Access Protocol? |
|
Answer» LDAP is the directory service protocol that is used to QUERY and update AD. LDAP naming PATHS are used to ACCESS AD objects and include the following:
LDAP is the directory service protocol that is used to query and update AD. LDAP naming paths are used to access AD objects and include the following: |
|
| 6. |
What Is Domain Information In Active Directory? |
|
Answer» OBJECT information for a domain. Replicates to all DCS within a domain. The object portion BECOMES part of GC. The attribute VALUES only replicates within the domain. Object information for a domain. Replicates to all DCs within a domain. The object portion becomes part of GC. The attribute values only replicates within the domain. |
|
| 7. |
Define Res1.log And Res2.log? |
|
Answer» This is RESERVED TRANSACTION LOG files of 20 MB (10 MB each) which PROVIDES the transaction log files enough room to shutdown if the other spaces are being used. This is reserved transaction log files of 20 MB (10 MB each) which provides the transaction log files enough room to shutdown if the other spaces are being used. |
|
| 8. |
What Is Ads Database Garbage Collection Process? |
|
Answer» Garbage Collection is a PROCESS that is designed to free space WITHIN the Active DIRECTORY database. This process runs independently on every DC with a default LIFETIME interval of 12 HOURS. Garbage Collection is a process that is designed to free space within the Active Directory database. This process runs independently on every DC with a default lifetime interval of 12 hours. |
|
| 9. |
What Is Online Defragmentation In Active Directory? |
|
Answer» Online Defragmentation method that RUNS as part of the GARBAGE collection process. The only advantage to this method is that the SERVER does not need to be taken offline for it to RUN. However, this method does not shrink the Active Directory database file (Ntds.dit). Online Defragmentation method that runs as part of the garbage collection process. The only advantage to this method is that the server does not need to be taken offline for it to run. However, this method does not shrink the Active Directory database file (Ntds.dit). |
|
| 10. |
What Is Schema Information In Active Directory? |
|
Answer» Definitional details about objects and ATTRIBUTES that one CAN store in the AD. Replicates to all DCS. Static in NATURE. Definitional details about objects and attributes that one CAN store in the AD. Replicates to all DCs. Static in nature. |
|
| 11. |
What Is The Kcc (knowledge Consistency Checker)? |
|
Answer» The KCC generates and MAINTAINS the REPLICATION topology for replication within sites and between sites. KCC runs EVERY 15 minutes. The KCC generates and maintains the replication topology for replication within sites and between sites. KCC runs every 15 minutes. |
|
| 12. |
How To Transfer Fsmo Roles? |
|
Answer» ntdsutil - type roles - connections - CONNECT servername - q - type transfer ROLE - at the fsmo MAINTENANCE prompt - type trasfer rid master ntdsutil - type roles - connections - connect servername - q - type transfer role - at the fsmo maintenance prompt - type trasfer rid master |
|
| 13. |
How To Seize Fsmo Roles? |
|
Answer» ntdsutil - type roles - connections - CONNECT servername - Q - type seize role - at the fsmo maintenance prompt - type seize RID MASTER ntdsutil - type roles - connections - connect servername - q - type seize role - at the fsmo maintenance prompt - type seize rid master |
|
| 14. |
How To View All The Gcs In The Forest? |
|
Answer» repadmin.exe /options * and USE IS_GC for CURRENT domain options. repadmin.exe /options * and use IS_GC for current domain options. |
|
| 15. |
Define Edb.log? |
|
Answer» This is the transaction log file (10 MB). When EDB.LOG is full, it is renamed to EDBnnnn.log. Where nnnn is the INCREASING NUMBER STARTING from 1. This is the transaction log file (10 MB). When EDB.LOG is full, it is renamed to EDBnnnn.log. Where nnnn is the increasing number starting from 1. |
|
| 16. |
Define Edb.chk? |
|
Answer» This is the checkpoint file used to track the data not yet WRITTEN to database file. This indicates the starting point from which data is to be recovered from the log file, in CASE of FAILURE. This is the checkpoint file used to track the data not yet written to database file. This indicates the starting point from which data is to be recovered from the log file, in case of failure. |
|
| 17. |
What Are The Advantages Of Active Directory Sites? |
|
Answer» Active Directory Sites and SERVICES allow you to specify site information. Active Directory USES this information to determine how BEST to use available network RESOURCES. Active Directory Sites and Services allow you to specify site information. Active Directory uses this information to determine how best to use available network resources. |
|
| 18. |
Describe The Infrastructure Fsmo Role? |
|
Answer» When an OBJECT in one domain is REFERENCED by another object in another domain, it REPRESENTS the reference by the GUID, the SID (for references to security principals), and the DN of the object being referenced. The infrastructure FSMO role holder is the DC responsible for updating an object's SID and distinguished NAME in a cross-domain object reference. When an object in one domain is referenced by another object in another domain, it represents the reference by the GUID, the SID (for references to security principals), and the DN of the object being referenced. The infrastructure FSMO role holder is the DC responsible for updating an object's SID and distinguished name in a cross-domain object reference. |
|
| 19. |
How To Find Fsmo Roles? |
|
Answer» NETDOM QUERY fsmo OR Replmon.exe Netdom query fsmo OR Replmon.exe |
|
| 20. |
What Is Replmon? |
|
Answer» REPLMON is the FIRST tool you should use when troubleshooting Active DIRECTORY replication ISSUES Replmon is the first tool you should use when troubleshooting Active Directory replication issues |
|
| 21. |
Define The Schema Master Failure? |
|
Answer» Temporary loss of the schema operations master will be visible only if we are trying to modify the schema or install an APPLICATION that modifies the schema during installation. A DC WHOSE schema master ROLE has been seized must never be brought BACK ONLINE. Temporary loss of the schema operations master will be visible only if we are trying to modify the schema or install an application that modifies the schema during installation. A DC whose schema master role has been seized must never be brought back online. |
|
| 22. |
What Is Kerberos V5 Authentication Process? |
|
Answer» Kerberos V5 is the primary security protocol for authentication WITHIN a domain. The Kerberos V5 protocol verifies both the IDENTITY of the USER and network services. This DUAL verification is KNOWN as mutual authentication. Kerberos V5 is the primary security protocol for authentication within a domain. The Kerberos V5 protocol verifies both the identity of the user and network services. This dual verification is known as mutual authentication. |
|
| 23. |
What Is Adsiedit? |
|
Answer» ADSI EDIT is an LDAP editor for managing objects in Active Directory. This Active Directory tool lets you view objects and attributes that are not exposed in the Active Directory Management CONSOLE. ADSI Edit is an LDAP editor for managing objects in Active Directory. This Active Directory tool lets you view objects and attributes that are not exposed in the Active Directory Management Console. |
|
| 24. |
Do You Know How Kerberos V5 Works? |
|
Answer» The Kerberos V5 authentication mechanism issues TICKETS (A set of identification DATA for a security principle, issued by a DC for purposes of user authentication. Two forms of tickets in Windows 2000 are ticket-granting tickets (TGTs) and service tickets) for accessing network services. These tickets contain encrypted data, including an encrypted PASSWORD, which confirms the user's IDENTITY to the REQUESTED service. The Kerberos V5 authentication mechanism issues tickets (A set of identification data for a security principle, issued by a DC for purposes of user authentication. Two forms of tickets in Windows 2000 are ticket-granting tickets (TGTs) and service tickets) for accessing network services. These tickets contain encrypted data, including an encrypted password, which confirms the user's identity to the requested service. |
|
| 25. |
What Is Netdom? |
|
Answer» NETDOM is a command-line TOOL that ALLOWS management of Windows domains and TRUST RELATIONSHIPS NETDOM is a command-line tool that allows management of Windows domains and trust relationships |
|
| 26. |
Define Attribute Value? |
|
Answer» An object's attribute is SET CONCURRENTLY to one value at one master, and another value at a SECOND master. An object's attribute is set concurrently to one value at one master, and another value at a second master. |
|
| 27. |
Define Lsdou? |
|
Answer» It’s group policy inheritance model, where the policies are applied to Local MACHINES, SITES, DOMAINS and ORGANIZATIONAL UNITS It’s group policy inheritance model, where the policies are applied to Local machines, Sites, Domains and Organizational Units |
|
| 28. |
Do You Know What Is The "." Zone In My Forward Lookup Zone? |
|
Answer» This setting designates the Windows 2000 DNS server to be a ROOT HINT server and is usually deleted. If you do not delete this setting, you may not be able to perform EXTERNAL NAME resolution to the root hint SERVERS on the Internet. This setting designates the Windows 2000 DNS server to be a root hint server and is usually deleted. If you do not delete this setting, you may not be able to perform external name resolution to the root hint servers on the Internet. |
|
| 29. |
Explain What Is The Difference Between Local, Global And Universal Groups? |
|
Answer» Domain local groups assign ACCESS PERMISSIONS to global domain groups for local domain resources. Global groups PROVIDE access to resources in other TRUSTED domains. Universal groups grant access to resources in all trusted domains. Domain local groups assign access permissions to global domain groups for local domain resources. Global groups provide access to resources in other trusted domains. Universal groups grant access to resources in all trusted domains. |
|
| 30. |
Tell Me What If My Windows 2000 Or Windows Server 2003 Dns Server Is Behind A Proxy Server Or Firewall? |
|
Answer» If you are ABLE to query the ISP's DNS SERVERS from behind the PROXY server or firewall, Windows 2000 and Windows Server 2003 DNS server is able to query the ROOT hint servers. UDP and TCP Port 53 should be open on the proxy server or firewall. If you are able to query the ISP's DNS servers from behind the proxy server or firewall, Windows 2000 and Windows Server 2003 DNS server is able to query the root hint servers. UDP and TCP Port 53 should be open on the proxy server or firewall. |
|
| 31. |
Abbreviate Gpt And Gpc? |
|
Answer» GPT : GROUP POLICY template. GPT : Group policy template. |
|
| 32. |
Tell Me What Should I Do If The Dc Points To Itself For Dns, But The Srv Records Still Do Not Appear In The Zone? |
|
Answer» Check for a disjointed NAMESPACE, and then RUN Netdiag.exe /FIX. You must install Support Tools from the WINDOWS 2000 Server CD-ROM to run Netdiag.exe. Check for a disjointed namespace, and then run Netdiag.exe /fix. You must install Support Tools from the Windows 2000 Server CD-ROM to run Netdiag.exe. |
|
| 33. |
Where Is Gpt Stored? |
|
Answer» %SystemRoot%SYSVOLsysvoldomainnamePoliciesGUID %SystemRoot%SYSVOLsysvoldomainnamePoliciesGUID |
|
| 34. |
How Do I Set Up Dns For Other Dcs In The Domain That Are Running Dns? |
|
Answer» For each additional DC that is RUNNING DNS, the preferred DNS SETTING is the parent DNS server (first DC in the domain), and the ALTERNATE DNS setting is the actual IP address of network interface. For each additional DC that is running DNS, the preferred DNS setting is the parent DNS server (first DC in the domain), and the alternate DNS setting is the actual IP address of network interface. |
|
| 35. |
What Is The List Folder Contents Permission On The Folder In Ntfs? |
|
Answer» Same as Read & Execute, but not INHERITED by files WITHIN a folder. However, newly created SUBFOLDERS will INHERIT this PERMISSION. Same as Read & Execute, but not inherited by files within a folder. However, newly created subfolders will inherit this permission. |
|
| 36. |
Can You Connect Active Directory To Other 3rd-party Directory Services? Name A Few Options? |
|
Answer» Yes you can Connect Active Directory to other 3rd -party Directory Services such as DICTIONARIES used by SAP, Domino etc with the HELP of MIIS (MICROSOFT Identity Integration Server). Yes you can Connect Active Directory to other 3rd -party Directory Services such as dictionaries used by SAP, Domino etc with the help of MIIS (Microsoft Identity Integration Server). |
|
| 37. |
What Hidden Shares Exist On Windows Server 2003 Installation? |
|
Answer» Admin$, Drive$, IPC$, NETLOGON, PRINT$ and SYSVOL. Admin$, Drive$, IPC$, NETLOGON, print$ and SYSVOL. |
|
| 38. |
Explain What Is Infrastructure Master? |
|
Answer» Infrastructure MASTER is ACCOUNTABLE for UPDATING information about the user and group and GLOBAL catalogue. Infrastructure Master is accountable for updating information about the user and group and global catalogue. |
|
| 39. |
What Is The Number Of Permitted Unsuccessful Log Ons On Administrator Account? |
|
Answer» Unlimited. REMEMBER, THOUGH, that it’s the Administrator ACCOUNT, not any account that’s part of the Administrators GROUP. Unlimited. Remember, though, that it’s the Administrator account, not any account that’s part of the Administrators group. |
|
| 40. |
Mention What Are The Components Of Ad? |
|
Answer» COMPONENTS of AD includes Components of AD includes |
|
| 41. |
Explain What Are Rodcs? And What Are The Major Benefits Of Using Rodcs? |
|
Answer» Read only DOMAIN Controller, organizations can easily deploy a domain controller in LOCATIONS where PHYSICAL security cannot be GUARANTEED. Read only Domain Controller, organizations can easily deploy a domain controller in locations where physical security cannot be guaranteed. |
|
| 42. |
Explain What Is Rid Master? |
|
Answer» RID MASTER stands for Relative Identifier for assigning UNIQUE IDS to the object created in AD. RID master stands for Relative Identifier for assigning unique IDs to the object created in AD. |
|
| 43. |
What Is New In Windows Server 2008 Active Directory Domain Services? |
|
Answer» AD Domain SERVICES auditing, Fine-Grained PASSWORD POLICIES,Read-Only Domain Controllers,Restartable Active Directory Domain Services AD Domain Services auditing, Fine-Grained Password Policies,Read-Only Domain Controllers,Restartable Active Directory Domain Services |
|
| 44. |
Explain What Is A Child Dc? |
|
Answer» CDC or CHILD DC is a SUB domain controller under root domain controller which share name SPACE CDC or child DC is a sub domain controller under root domain controller which share name space |
|
| 45. |
What Is Dns Scavenging? |
|
Answer» SCAVENGING will HELP you clean up old UNUSED RECORDS in DNS. Scavenging will help you clean up old unused records in DNS. |
|
| 46. |
Explain What Is Active Directory Schema? |
|
Answer» SCHEMA is an active directory COMPONENT describes all the attributes and objects that the directory SERVICE USES to store data. Schema is an active directory component describes all the attributes and objects that the directory service uses to store data. |
|
| 47. |
Why We Need Netlogon? |
|
Answer» Maintains a SECURE channel between this COMPUTER and the domain CONTROLLER for authenticating USERS and services. If this service is STOPPED, the computer may not authenticate users and services, and the domain controller cannot register DNS records." Maintains a secure channel between this computer and the domain controller for authenticating users and services. If this service is stopped, the computer may not authenticate users and services, and the domain controller cannot register DNS records." |
|
| 48. |
Mention What Is Tombstone Lifetime? |
|
Answer» Tombstone lifetime in an Active DIRECTORY determines how long a deleted object is RETAINED in Active Directory. The deleted OBJECTS in Active Directory is STORED in a special object REFERRED as TOMBSTONE. Usually, windows will use a 60- day tombstone lifetime if time is not set in the forest configuration. Tombstone lifetime in an Active Directory determines how long a deleted object is retained in Active Directory. The deleted objects in Active Directory is stored in a special object referred as TOMBSTONE. Usually, windows will use a 60- day tombstone lifetime if time is not set in the forest configuration. |
|
| 49. |
What Is Domain Controller? |
|
Answer» In an ACTIVE directory FOREST, the DOMAIN controller is a server that contains a writable copy of the Active Directory Database participates in Active directory REPLICATION and controls ACCESS to network resource. In an Active directory forest, the domain controller is a server that contains a writable copy of the Active Directory Database participates in Active directory replication and controls access to network resource. |
|
| 50. |
Mention What Are Lingering Objects? |
|
Answer» LINGERING OBJECTS can EXISTS if a domain CONTROLLER does not replicate for an interval of TIME that is longer than the tombstone lifetime (TSL). Lingering objects can exists if a domain controller does not replicate for an interval of time that is longer than the tombstone lifetime (TSL). |
|