This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Explain About Srv, Mx And Cname Records? |
Answer»
|
|
| 2. |
Where Dns File Stored And Database Of Dna? |
|
Answer» %SYSTEMROOT%WINDOWS System32 DNS. %SYSTEMROOT%Windows System32 DNS. |
|
| 3. |
What Is The Group Policy? |
|
Answer» It is WAY to provide the desirable predefined ENVIRONMENT to all USERS in an Active Directory environment and it is centrally MANAGEABLE. It is way to provide the desirable predefined environment to all users in an Active Directory environment and it is centrally manageable. |
|
| 4. |
What Is The Use Of Relay Agent? |
|
Answer» A router DROPS the DHCP packet as its a broadcast packet. When we enable the relay AGENT option on the router it then lets the DHCP Broadcast PACKETS pass through. HENCE the relay agent helps in sending it over to the DESTINED subnet. A router drops the DHCP packet as its a broadcast packet. When we enable the relay agent option on the router it then lets the DHCP Broadcast packets pass through. Hence the relay agent helps in sending it over to the destined subnet. |
|
| 5. |
If We Have Two Different Subnets Then How Do I Configure It In Single Dhcp Server? |
|
Answer» TWO DIFFERENT SCOPES are CREATED for two SUBNETS. Two different scopes are created for two subnets. |
|
| 6. |
Why Do We Need Two Or More Subnets? |
|
Answer» To SEGMENT or restrict/localize ONE type of TRAFFIC to one segment or SUBNET of the network. To segment or restrict/localize one type of traffic to one segment or subnet of the network. |
|
| 7. |
How To Reserve Ip Address? |
|
Answer» We can assign a particular IP ADDRESS to the MAC address of a MACHINE USING IP reservation in DHCP. We can assign a particular IP address to the MAC address of a machine using IP reservation in DHCP. |
|
| 8. |
How To Take A Backup Of Group Policy? |
|
Answer» We can use GPMC (Group Policy MANAGEMENT CONSOLE), RIGHT CLICK on the GPO and select backup and take backup on destination folder We can use GPMC (Group Policy Management Console), right click on the GPO and select backup and take backup on destination folder |
|
| 9. |
What Are The Two Modes A Terminal Server Works In? |
|
Answer» USER MODE and APPLICATION mode. User mode and application mode. |
|
| 10. |
What Is Use Of Kerberos Protocol? |
|
Answer» Kerberos PROTOCOL is an authentication protocol. When we LOGIN in an ACTIVE Directory ENVIRONMENT its the protocol that is used to authenticate us. Kerberos protocol is an authentication protocol. When we login in an Active Directory environment its the protocol that is used to authenticate us. |
|
| 11. |
What Is The Version Kerberos Protocol? |
|
Answer» We are using Kerberos V 5.0. |
|
| 12. |
What Are Raid Levels? |
|
Answer» MAIN RAID LEVELS are RAID-0, RAID-1, RAID-5 and RAID-10. Main RAID levels are RAID-0, RAID-1, RAID-5 and RAID-10. |
|
| 13. |
Which Raid You Will Recommend And Why? |
|
Answer» RAID-1 for O.S - mirroring. RAID-5 for DATA PARTITION- STRIPE SET with parity. RAID-1 for O.S - mirroring. RAID-5 for DATA partition- Stripe set with parity. |
|
| 14. |
What Are The Different Raid1 And Raid 5? |
|
Answer» RAID-1: In RAID-1 two hard disk are there and the data on ONE is MIRRORED to another. So even if one FAILS other one is there with the same data for service continuity. RAID-5: We can use minimum three hard disk and maximum depend UPON RAID controller card, Data written on disk in stripes with distributed parity set. RAID-1: In RAID-1 two hard disk are there and the data on one is mirrored to another. So even if one fails other one is there with the same data for service continuity. RAID-5: We can use minimum three hard disk and maximum depend upon RAID controller card, Data written on disk in stripes with distributed parity set. |
|
| 15. |
What Is Disk Striping? |
|
Answer» DISK striping is the TECHNIQUE of spreading data over multiple disks. The data to be stored is divided into blocks and spread across several partitions on various HARD disk. Disk striping is used with or WITHOUT equivalence. Disk striping helps in improving the performance of the disk. Disk striping is the technique of spreading data over multiple disks. The data to be stored is divided into blocks and spread across several partitions on various hard disk. Disk striping is used with or without equivalence. Disk striping helps in improving the performance of the disk. |
|
| 16. |
What Are The Backup Types? |
Answer»
|
|
| 17. |
Which Type Backup Reset Archive Bits? |
|
Answer» The bit which has check MARK on the folder whose BACKUP has been DONE USING normal backup method. The bit which has check mark on the folder whose backup has been done using normal backup method. |
|
| 18. |
What Are Records Available In Dns? |
|
Answer» ADDRESS RECORDS, HOST Records, MX Records, and CNAME records. Address records, Host Records, MX Records, and CNAME records. |
|
| 19. |
What Are Types Of Dns And Zones? |
Answer»
|
|
| 20. |
What Is The Dns? |
|
Answer» Domain Naming SYSTEM: Used to resolve the host NAME (FQDN) name to IP ADDRESS and Vice Versa Domain Naming System: Used to resolve the host name (FQDN) name to IP Address and Vice Versa |
|
| 21. |
What Is The Difference Between The Two Types Of Replication I.e. Intrasite And Intersite? |
|
Answer» INTERSITE REPLICATION is for replication with in the SITE and Intra-site replication is for the replication between the SITES. Intersite replication is for replication with in the site and Intra-site replication is for the replication between the sites. |
|
| 22. |
What Is Default Time For Replication? |
|
Answer» KCC (KNOWLEDGE Consistency Checker) is the ALGORITHM and the two protocols used are RPC over IP and SMTP over IP. They replicate in EVERY 15 min. KCC (Knowledge Consistency Checker) is the algorithm and the two protocols used are RPC over IP and SMTP over IP. They replicate in every 15 min. |
|
| 23. |
What Are The Protocols Used In Replication? |
|
Answer» RPC and SMTP. PREDOMINANTLY RPC is used. SMTP is not used as its not recommended for replication of Domain Partition. Replication CONFLICT is MANAGED using a method described here. Read the full article several times and you would be happy that you got to KNOW something very important. RPC and SMTP. Predominantly RPC is used. SMTP is not used as its not recommended for replication of Domain Partition. Replication conflict is managed using a method described here. Read the full article several times and you would be happy that you got to know something very important. |
|
| 24. |
What Are The Two Types Of Replication? |
|
Answer» Inter-site REPLICATION, Intra-site replication. Inter-site replication, Intra-site replication. |
|
| 25. |
What Is The Use Of Dfs? |
|
Answer» Distributed File System, It is used for the fault tolerance because it MAKES the duplicate COPY of every DFS root. Not only that the domain login process as well uses DFS to find out the NEAREST DC to login. Distributed File System, It is used for the fault tolerance because it makes the duplicate copy of every DFS root. Not only that the domain login process as well uses DFS to find out the nearest DC to login. |
|
| 26. |
Do You Know About Frs? |
|
Answer» File REPLICATION Services. EXAMPLE: Replication of SYSVOL folder. File Replication Services. Example: Replication of SYSVOL folder. |
|
| 27. |
What Are Difference Between Tcp And Udp Protocol? |
|
Answer» TCP is a CONNECTION ORIENTED PROTOCOL while UDP is not a connection oriented protocol. TCP is a connection oriented protocol while UDP is not a connection oriented protocol. |
|
| 28. |
Which Layer Of Osi Model Does The Router Works In? |
|
Answer» ONE LAYER THREE (NETWORK layer) One layer Three (Network layer) |
|
| 29. |
What Kind Of Privilege Is Required To Transfer Fsmo Roles? |
|
Answer» logged-on USER should be a member of the Enterprise Administrators group to TRANSFER Schema master or Domain naming master ROLES, or a member of the Domain Administrators group of the domain where the PDC emulator, RID master and the Infrastructure master roles are being TRANSFERRED. logged-on user should be a member of the Enterprise Administrators group to transfer Schema master or Domain naming master roles, or a member of the Domain Administrators group of the domain where the PDC emulator, RID master and the Infrastructure master roles are being transferred. |
|
| 30. |
Command For Removing Active Directory? |
|
Answer» dcpromo /forceremoval dcpromo /forceremoval |
|
| 31. |
Write Down The Command Line To Seize All The Fsmo Roles To A Server? |
Answer»
|
|
| 32. |
What Is The Rid Pool? |
|
Answer» RID Master provides the RID (RELATIVE Identifier) pool to Domain controller of the Domain. When an object is create in a domain, a Unique SID (SECURITY ID) is ASSIGNED to it which consisting of a RID (Unique ID) and a SID (COMMON ID for all Object), A RID pool contain 500 RIDs. RID Master provides the RID (Relative Identifier) pool to Domain controller of the Domain. When an object is create in a domain, a Unique SID (Security ID) is assigned to it which consisting of a RID (Unique ID) and a SID (Common ID for all Object), A RID pool contain 500 RIDs. |
|
| 33. |
What Are The Fsmo Roles And It Gets Down What Will Impact? |
| Answer» | |
| 34. |
How To Configure Global Catalog Server? |
|
Answer» Go to Active directory SITE and services and expand till your desire SERVER’s NTDS settings and then right click; PROPERTY and check mark the Global catalog check BOX. Go to Active directory site and services and expand till your desire server’s NTDS settings and then right click; property and check mark the Global catalog check box. |
|
| 35. |
How To Transfer Global Catalog To Another Domain? |
|
Answer» We can not transfer the GLOBAL CATALOG; we can only REMOVE the global catalog from ONE server and ENABLE other server as a global catalog. We can not transfer the global catalog; we can only remove the global catalog from one server and enable other server as a global catalog. |
|
| 36. |
How To Check Ad Configured Properly? |
|
Answer» Check NTDS and SYSVOL shared FOLDER at %systemroot%WINDOWS. Check NTDS and SYSVOL shared folder at %systemroot%windows. |
|