Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

301.

What Is The Use Of Shadow Copies?

Answer»

The Shadow COPIES can be used for:

The Shadow Copies can be used for:

302.

What Are Shadow Copies For Shared Folders?

Answer»

Shadow Copies for Shared FOLDERS are point-in-time copies of files that are located on shared resources, such as a file SERVER. Users can view shared files and folders as they existed at POINTS of time in the PAST by USING Shadow Copies for Shared Folders.

Shadow Copies for Shared Folders are point-in-time copies of files that are located on shared resources, such as a file server. Users can view shared files and folders as they existed at points of time in the past by using Shadow Copies for Shared Folders.

303.

What Is The Role Of Dfs Replication?

Answer»

DFS Replication keeps the FOLDERS synchronized between SERVERS across network connections. It replaces the File Replication Service as the replication engine for DFS Namespaces, as well as for replicating the AD DS SYSVOL folder in DOMAINS that use the Windows Server 2008 domain functional LEVEL.

DFS Replication keeps the folders synchronized between servers across network connections. It replaces the File Replication Service as the replication engine for DFS Namespaces, as well as for replicating the AD DS SYSVOL folder in domains that use the Windows Server 2008 domain functional level.

304.

What Is The Role Of Dfs Namespaces?

Answer»

DFS Namespaces enable GROUPING of shared FOLDERS located on DIFFERENT servers into ONE or more logically structured namespaces.

DFS Namespaces enable grouping of shared folders located on different servers into one or more logically structured namespaces.

305.

What Technologies Are Used In Dfs?

Answer»

The two TECHNOLOGIES used in DFS are DFS NAMESPACES and DFS Replication.

The two technologies used in DFS are DFS Namespaces and DFS Replication.

306.

What Is Distributed File System Or Network File System (dfs/nfs)?

Answer»

DFS/NFS is any FILE system that ALLOWS access to MULTIPLE users on multiple machines to share FILES and storage resources.

DFS/NFS is any file system that allows access to multiple users on multiple machines to share files and storage resources.

307.

What Is Internet Scsi (iscsi)?

Answer»

iSCSI is an industry standard that enables transmission of Small Computer SYSTEM Interface (SCSI) block COMMANDS over the existing Internet Protocol (IP) network by using the TCP/IP protocol. It PROVIDES the POSSIBILITY of delivering both messaging traffic and block-based STORAGE over existing IP networks, without installing a separate and expensive Fibre Channel network.

iSCSI is an industry standard that enables transmission of Small Computer System Interface (SCSI) block commands over the existing Internet Protocol (IP) network by using the TCP/IP protocol. It provides the possibility of delivering both messaging traffic and block-based storage over existing IP networks, without installing a separate and expensive Fibre Channel network.

308.

What Is Primary And Extended Partition?

Answer»

PRIMARY partition is an active partition where the hardware looks for boot FILES to start the operating system. EXTENDED partition is created from whatever FREE SPACE remains on the disk after creating the primary partition.

Primary partition is an active partition where the hardware looks for boot files to start the operating system. Extended partition is created from whatever free space remains on the disk after creating the primary partition.

309.

What Is Software Assurance (sa)?

Answer»

Software Assurance (SA) is a way for Volume Licensing customers to KEEP up to date with the LATEST and most innovative Microsoft PRODUCTS. Customers acquire the right to install any new release of a PRODUCT covered in the agreement during the term of the coverage.

Software Assurance (SA) is a way for Volume Licensing customers to keep up to date with the latest and most innovative Microsoft products. Customers acquire the right to install any new release of a product covered in the agreement during the term of the coverage.

310.

What Is Volume Licensing?

Answer»

When you acquire licenses from Microsoft and its partners in certain quantities or volumes, they offer discounts from their retail product PRICES. Volume LICENSING programs offer companies of all sizes an economical way to buy and manage MULTIPLE software licenses for as few as FIVE DESKTOPS.

When you acquire licenses from Microsoft and its partners in certain quantities or volumes, they offer discounts from their retail product prices. Volume Licensing programs offer companies of all sizes an economical way to buy and manage multiple software licenses for as few as five desktops.

311.

What Is The Difference Between A Device Cal And A User Cal?

Answer»

A Windows SERVER Device CAL permits one device to ACCESS or use the server SOFTWARE; whereas, a Windows Server USER CAL permits one user irrespective of a device to access or use the server software.

A Windows Server Device CAL permits one device to access or use the server software; whereas, a Windows Server User CAL permits one user irrespective of a device to access or use the server software.

312.

Is Windows Server 2008 A Prerequisite For Windows Server 2008 R2?

Answer»

No, WINDOWS Server 2008 or Windows Server 2003 R2 can be UPGRADED to Windows Server 2008 R2.

No, Windows Server 2008 or Windows Server 2003 R2 can be upgraded to Windows Server 2008 R2.

313.

Explain The Difference Between Windows Server 2008 R2 License And Windows Server 2008 Cal?

Answer»

The WINDOWS Server 2008 CAL grants the right to a device or user to ACCESS the server software; whereas, the Windows Server 2008 R2 LICENSE GIVES the license holder the right to create, copy, store, and RUN the server software.

The Windows Server 2008 CAL grants the right to a device or user to access the server software; whereas, the Windows Server 2008 R2 license gives the license holder the right to create, copy, store, and run the server software.

314.

What Is File Classification Infrastructure (fci)?

Answer»

FCI provides a built-in solution to CLASSIFY and manage files to users and help them to save time and money. Administrators can AUTOMATICALLY classify files based on content and location, generate reports, and schedule file management TASKS to manage DATA.

FCI provides a built-in solution to classify and manage files to users and help them to save time and money. Administrators can automatically classify files based on content and location, generate reports, and schedule file management tasks to manage data.

315.

What Is The Function Of Hyper-v Processor Compatibility Mode For Live Migration?

Answer»

Hyper-V Processor Compatibility Mode allows LIVE migration across different CPU versions WITHIN the same processor family, such as Intel Core 2 to Intel Pentium 4 or AMD Opteron to AMD Athlon. It also ENABLES migration across a BROADER range of SERVER host hardware.

Hyper-V Processor Compatibility Mode allows live migration across different CPU versions within the same processor family, such as Intel Core 2 to Intel Pentium 4 or AMD Opteron to AMD Athlon. It also enables migration across a broader range of server host hardware.

316.

What Is The Role Of Live Migration In Windows 2008 R2?

Answer»

LIVE migration enables CUSTOMERS to move virtual machines from one host to ANOTHER with no perceivable downtime. It facilitates hardware MAINTENANCE, and upgrades manual FAILOVER and the consolidation of workloads on fewer servers.

Live migration enables customers to move virtual machines from one host to another with no perceivable downtime. It facilitates hardware maintenance, and upgrades manual failover and the consolidation of workloads on fewer servers.

317.

What Is Netsh?

Answer»

Netsh is a command-line scripting utility that is used to display or modify the network configuration of a COMPUTER that is CURRENTLY RUNNING. Both remote computers and LOCAL computers can be configured by using the netsh command. Netsh also provides a scripting feature that allows you to RUN a group of commands in batch mode against a specified computer.

Netsh is a command-line scripting utility that is used to display or modify the network configuration of a computer that is currently running. Both remote computers and local computers can be configured by using the netsh command. Netsh also provides a scripting feature that allows you to run a group of commands in batch mode against a specified computer.

318.

What Is The Role Of Ndf, Network Tracing, And Netsh Trace?

Answer»

NDF, NETWORK TRACING, and NETSH Trace integrate the Network Diagnostics Framework with Network Tracing and a new Netsh context, Netsh Trace, to SIMPLIFY and consolidate network CONNECTIVITY troubleshooting processes.

NDF, Network Tracing, and Netsh Trace integrate the Network Diagnostics Framework with Network Tracing and a new Netsh context, Netsh Trace, to simplify and consolidate network connectivity troubleshooting processes.

319.

What Is The Role Of Multiple Active Firewall Profiles?

Answer»

Multiple active firewall profiles ENABLE the firewall rules most appropriate for each NETWORK adapter BASED on the network to which it is connected.

Multiple active firewall profiles enable the firewall rules most appropriate for each network adapter based on the network to which it is connected.

320.

What Is The Role Of Mobile Broadband Device Support?

Answer»

MOBILE broadband device support PROVIDES a driver-based model for DEVICES that are USED to access a mobile broadband NETWORK.

Mobile broadband device support provides a driver-based model for devices that are used to access a mobile broadband network.

321.

What Is The Role Of Url-based Qos?

Answer»

URL-based QoS ENABLES administrators to assign a priority level to traffic based on the UNIFORM Resource LOCATOR (URL) from which the traffic ORIGINATES.

URL-based QoS enables administrators to assign a priority level to traffic based on the Uniform Resource Locator (URL) from which the traffic originates.

322.

What Is The Role Of Branchcache?

Answer»

BranchCache enables updated content from FILE and Web servers on a Wide Area Network (WAN) to be cached on computers at a local BRANCH office, IMPROVING APPLICATION response time and reducing WAN traffic.

BranchCache enables updated content from file and Web servers on a Wide Area Network (WAN) to be cached on computers at a local branch office, improving application response time and reducing WAN traffic.

323.

What Is The Role Of Vpn Reconnect?

Answer»

VPN Reconnect automatically re-establishes a VPN CONNECTION as soon as Internet CONNECTIVITY is restored, saving users from re-entering their CREDENTIALS and recreating the VPN connection.

VPN Reconnect automatically re-establishes a VPN connection as soon as Internet connectivity is restored, saving users from re-entering their credentials and recreating the VPN connection.

324.

What Is The Role Of Directaccess?

Answer»

DIRECTACCESS enables USERS to access an enterprise NETWORK without the extra step of initiating a Virtual PRIVATE Network (VPN) CONNECTION.

DirectAccess enables users to access an enterprise network without the extra step of initiating a Virtual Private Network (VPN) connection.

325.

What Are The Different Service Packs Available For Windows 2003 And Windows 2008?

Answer»

For both Windows 2003 and Windows 2008, AVAILABLE SERVICE packs are SP1 and SP2.

For both Windows 2003 and Windows 2008, available service packs are SP1 and SP2.

326.

What Are The New Networking Features In Windows 2008 R2?

Answer»

Following are the new networking features in Windows 2008 R2:

  •  DirectAccess.
  •  VPN RECONNECT.
  •  BranchCache.
  •  URL-based Quality of Service (QoS).
  •  Mobile BROADBAND device SUPPORT.
  •  Multiple active firewall PROFILES.
  •  NDF, Network Tracing, and Netsh Trace.

Following are the new networking features in Windows 2008 R2:

327.

What Do You Mean By Client And Server?

Answer»

Client and server are two DIFFERENT MACHINES (physical or VIRTUAL) connected in such a manner that WHENEVER a client posts some request to a server, the server provides an appropriate RESPONSE to the client.

Client and server are two different machines (physical or virtual) connected in such a manner that whenever a client posts some request to a server, the server provides an appropriate response to the client.

328.

What Is Device Driver?

Answer»

Device driver is a SOFTWARE COMPONENT that provides an interface between the hardware of a COMPUTER and its operating system. Hardware, such as keyboards, controllers, and graphics CARDS, requires device drivers so that the operating system can detect the devices and handle them effectively and EFFICIENTLY.

Device driver is a software component that provides an interface between the hardware of a computer and its operating system. Hardware, such as keyboards, controllers, and graphics cards, requires device drivers so that the operating system can detect the devices and handle them effectively and efficiently.

329.

How Does A Plug And Play Device Automate The Hardware Installation Process?

Answer»

When a PLUG and PLAY device is connected to the computer, a new hardware is DETECTED by the computer and it searches for the driver, which is then installed, and configures the hardware to USE the system RESOURCES.

When a Plug and Play device is connected to the computer, a new hardware is detected by the computer and it searches for the driver, which is then installed, and configures the hardware to use the system resources.

330.

What Is Direct Memory Access (dma)?

Answer»

DMA is a FEATURE of computers and microprocessors that allows disk drive controllers, graphics cards, network cards, and sound cards within the computer to access SYSTEM MEMORY for reading and/or writing INDEPENDENTLY of the Central Processing Unit (CPU).

DMA is a feature of computers and microprocessors that allows disk drive controllers, graphics cards, network cards, and sound cards within the computer to access system memory for reading and/or writing independently of the Central Processing Unit (CPU).

331.

What Is Input /output (i/o) Port Address Used For?

Answer»

I/O PORTS are those sections of memory that the hardware DEVICES USE to communicate with the operating system. When a microprocessor receives an IRQ, the operating system checks the I/O port address to get the details of the hardware DEVICE that has triggered the COMMUNICATION.

I/O ports are those sections of memory that the hardware devices use to communicate with the operating system. When a microprocessor receives an IRQ, the operating system checks the I/O port address to get the details of the hardware device that has triggered the communication.

332.

What Is Interrupt Request Line (irq) Used For?

Answer»

IRQs are hardware LINES over which hardware devices send the INTERRUPT signals to the MICROPROCESSOR.

IRQs are hardware lines over which hardware devices send the interrupt signals to the microprocessor.

333.

Name The Tool Used To Monitor And Assess System Performance And Reliability.

Answer»

Windows Reliability and PERFORMANCE Monitor is the tool used to monitor and ASSESS system performance and reliability. It provides a graphical INTERFACE for customizing performance data collection and Event Trace SESSIONS.

Windows Reliability and Performance Monitor is the tool used to monitor and assess system performance and reliability. It provides a graphical interface for customizing performance data collection and Event Trace sessions.

334.

Which Service Helps In Setting Up New Computers By Using A Network-based Installation?

Answer»

Windows Deployment SERVICE helps in SETTING up NEW computers by using a network-based INSTALLATION.

Windows Deployment Service helps in setting up new computers by using a network-based installation.

335.

What Is Windows Powershell?

Answer»

Windows PowerShell is a command-line shell and SCRIPTING language to achieve greater productivity and make control system administration EASY. It ACCELERATES automation of system administration tasks and improves organization's ABILITY to address the unique system-management problems in SERVER environment.

Windows PowerShell is a command-line shell and scripting language to achieve greater productivity and make control system administration easy. It accelerates automation of system administration tasks and improves organization's ability to address the unique system-management problems in server environment.

336.

What Is The Role Of Server Manager In Windows Server 2008 R2?

Answer»

SERVER Manager helps administrators through the process of INSTALLING, configuring, and managing server roles and features that are part of Windows Server 2008 R2. It PROVIDES a single location for administrators to change the server's system properties and INSTALL or REMOVE roles or features.

Server Manager helps administrators through the process of installing, configuring, and managing server roles and features that are part of Windows Server 2008 R2. It provides a single location for administrators to change the server's system properties and install or remove roles or features.

337.

Which Component Connects To The Remote Source Of Data, Downloads The File, And Passes It Back To Windows?

Answer»

Redirector has the knowledge on how to connect to the remote source of DATA, download the file, and PASS it back to WINDOWS, which in turn PASSES it back to the user or the program.

Redirector has the knowledge on how to connect to the remote source of data, download the file, and pass it back to Windows, which in turn passes it back to the user or the program.

338.

What Do You Mean By Unbinding The Protocol?

Answer»

Unbinding the protocol prevents a network INTERFACE adapter from USING one of the INSTALLED protocol modules on the COMPUTER.

Unbinding the protocol prevents a network interface adapter from using one of the installed protocol modules on the computer.

339.

Which Component Makes It Possible To Use Multiple Protocols On Computer?

Answer»

Transport DRIVER INTERFACE makes it possible to USE multiple PROTOCOLS on computer.

Transport Driver Interface makes it possible to use multiple protocols on computer.

340.

Can You Uninstall Ipv6 In Windows 2008?

Answer»

No, IPV6 cannot be uninstalled in WINDOWS 2008; HOWEVER, it can be disabled.

No, IPv6 cannot be uninstalled in Windows 2008; however, it can be disabled.

341.

What Is The Role Of Explicit Congestion Notification (ecn)?

Answer»

When routers become congested, the incoming packets fill the buffer, which in turn begins dropping packets. In such a case, ECN for TCP/IP provides a way for routers to inform TCP PEERS that their buffers are filling due to the congestion in a network and force them to slow their transmission of DATA to HELP prevent packet losses.

When routers become congested, the incoming packets fill the buffer, which in turn begins dropping packets. In such a case, ECN for TCP/IP provides a way for routers to inform TCP peers that their buffers are filling due to the congestion in a network and force them to slow their transmission of data to help prevent packet losses.

342.

What Is Next Generation Tcp/ip Stack?

Answer»

Next GENERATION TCP/IP stack is a new implementation of Transmission CONTROL Protocol/Internet Protocol (TCP/IP) FUNCTIONALITY for Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) to meet the connectivity and performance needs of today's NETWORKING environments and technologies. The features of the Next Generation TCP/IP stack include support for dual IP layer architecture for IPv6 and strong host model. In addition, it provides new packet filtering Application Programming Interfaces (APIs) and mechanisms for protocol stack offload.

Next Generation TCP/IP stack is a new implementation of Transmission Control Protocol/Internet Protocol (TCP/IP) functionality for Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) to meet the connectivity and performance needs of today's networking environments and technologies. The features of the Next Generation TCP/IP stack include support for dual IP layer architecture for IPv6 and strong host model. In addition, it provides new packet filtering Application Programming Interfaces (APIs) and mechanisms for protocol stack offload.

343.

Which Lowest Level Device Can Be Used To Filter The Network Traffic; Thereby, Reducing Communication Load?

Answer»

Bridges can be USED to filter TRAFFIC and reduce COMMUNICATION LOAD.

Bridges can be used to filter traffic and reduce communication load.

344.

Which Device Is Used To Divide A Network Into Logical Subnets?

Answer»

Router is used to DIVIDE a NETWORK into LOGICAL SUBNETS.

Router is used to divide a network into logical subnets.

345.

Define Gateways.

Answer»

GATEWAYS are TRANSLATORS COMPRISED of HARDWARE and SOFTWARE. Often they are dedicated servers with some kind gateway software installed.

Gateways are translators comprised of hardware and software. Often they are dedicated servers with some kind gateway software installed.

346.

What Is The Role Of Gateways?

Answer»

Gateways TRANSLATE information between different network architectures or network data formats. For EXAMPLE, it can translate TCP/IP to AppleTalk so that the computers SUPPORTING TCP/IP can COMMUNICATE with the Apple BRAND computers.

Gateways translate information between different network architectures or network data formats. For example, it can translate TCP/IP to AppleTalk so that the computers supporting TCP/IP can communicate with the Apple brand computers.

347.

What Layer Does Brouters Work On?

Answer»

Brouters work on both the NETWORK LAYER and the data link layer of the OSI MODEL. It WORKS on the network layer for routable protocols and on the data link layer for non-routabie protocols.

Brouters work on both the network layer and the data link layer of the OSI model. It works on the network layer for routable protocols and on the data link layer for non-routabie protocols.

348.

What Is The Difference Between Static Router And Dynamic Router?

Answer»

STATIC router is configured MANUALLY; WHEREAS, dynamic router uses the dynamic routing algorithm to route the PACKETS.

Static router is configured manually; whereas, dynamic router uses the dynamic routing algorithm to route the packets.

349.

What Layer Does A Router Works On?

Answer»

A router WORKS on the NETWORK LAYER of the OSI model.

A router works on the network layer of the OSI model.

350.

What Is The Role Of Router?

Answer»

A router routes the packets between two networks. It READS the INFORMATION in each packet to determine where it is going. If the packet is destined for an immediate network to which it has access, then it strips the outer packet, readdresses the packet to the proper Ethernet address, and transmits it on that network. If the packet is destined for ANOTHER network, then it re-packages the outer packet and SENDS it to the NEXT router.

A router routes the packets between two networks. It reads the information in each packet to determine where it is going. If the packet is destined for an immediate network to which it has access, then it strips the outer packet, readdresses the packet to the proper Ethernet address, and transmits it on that network. If the packet is destined for another network, then it re-packages the outer packet and sends it to the next router.