Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

How Will You Clone A Vm In An Esxi Without Vcenter?

Answer»

2.

Explain Traverse Folder?

Answer»

Allows or denies moving through a restricted folder to reach files and folders beneath the restricted folder in the folder hierarchy. 

Traverse folder takes EFFECT only when the group or USER is not granted the "Bypass traverse checking user" right in the Group POLICY snap-in. This PERMISSION does not automatically allow running PROGRAM files.

Allows or denies moving through a restricted folder to reach files and folders beneath the restricted folder in the folder hierarchy. 

Traverse folder takes effect only when the group or user is not granted the "Bypass traverse checking user" right in the Group Policy snap-in. This permission does not automatically allow running program files.

3.

Explain About Global Catalog?

Answer»

Global Catalog

  • Global catalog (GC) is a role handled by domain controllers in an Active directory model. 
  • The global catalog stores a full copy of all OBJECTS in the directory for its HOST domain and a partial copy of all objects for all other DOMAINS in the forest. 
  • ‘Partial copy’ refers to the set of attributes that are most used for searching every object in every domain.
  • All domain controllers can be promoted as a GC. 
  • GC helps in faster search of AD objects.
  • The replicas that are replicated to the global catalog also include the access permissions for each object and attribute. 
  • If you are searching for an object that you do not have permission to access, you do not see the object in the list of search RESULTS. Users can find only objects to which they are allowed access.
  • Global catalog server clients depend on DNS to provide the IP address of global catalog servers. DNS is required to advertise global catalog servers for domain controller location.
  • By default, FIRST DC of in a forest will be a global catalog server

Global Catalog

4.

Explain About Raid?

Answer»
  • Redundant Array of Independent disks
  • A CATEGORY of disk drives that uses 2 or more drives in a COMBINATION for redundancy and performance
  • Most common RAIDS: RAID 0(Striped), RAID 1(Mirroring), RAID 5

5.

Explain About Backup Types?

Answer»

Backup types:

  • FULL backup - Will take the backup of all selected FILES and reset the archive bit
  • Copy backup - Will take the backup of all selected files but does not reset the archive bit
  • Incremental backup - Will take the backup of files whose archive BITS are set and resets it after backup
  • Differential backup - Will take the backup of files whose archive bits are set but does not reset it after backup 

Backup types:

6.

What Is Vsan?

Answer»

It is a hypervisor-converged storage solution built by aggregating the local storage ATTACHED to the ESXI hosts MANAGED by a vCenter. 

It is a hypervisor-converged storage solution built by aggregating the local storage attached to the ESXi hosts managed by a vCenter. 

7.

Recommended Iscsi Configuration?

Answer»

A SEPARATE VSWITCH, and a separate network other than VMtraffic network for ISCSI traffic. Dedicated physical NICs should be CONNECTED to vSwitch configured for iSCSI traffic.

A separate vSwitch, and a separate network other than VMtraffic network for iSCSI traffic. Dedicated physical NICs should be connected to vSwitch configured for iSCSI traffic.

8.

What Is Iscsi Port Binding ?

Answer»

PORT BINDING is used in iSCSI when multiple VMKERNEL ports for iSCSI reside in the same broadcast domain and IP subnet, to allow multiple paths to an iSCSI array that BROADCASTS a single IP address.

Port binding is used in iSCSI when multiple VMkernel ports for iSCSI reside in the same broadcast domain and IP subnet, to allow multiple paths to an iSCSI array that broadcasts a single IP address.

9.

Iscsi Port Binding Considerations ?

Answer»
  • Array Target ISCSI ports must reside in the same broadcast domain and IP subnet as the VMkernel port.
  • All VMkernel ports used for iSCSI CONNECTIVITY must reside in the same broadcast domain and IP subnet.
  • All VMkernel ports used for iSCSI connectivity must reside in the same vSwitch.
  • Currently, port BINDING does not support network routing.

10.

Recommended Iscsi Configuration Of A 6 Nic Infrastructure ? (answer Changes As Per The Infrastructure Requirements)

Answer»
  • 2 NICs for VM traffic
  • 2 NICs for iSCSI traffic
  • 1 NIC for vMotion
  • 1 NIC for management network
  • Post conversion steps in P2V
  • Adjust the virtual hardware settings as required
  • Remove non present device drivers
  • Remove all unnecessary devices such as serial ports, USB CONTROLLERS, floppy DRIVES etc..
  • INSTALL VMware tools

11.

What Are Standby Nics?

Answer»

These adapters will only become Active if the defined Active adapters have failed.

These adapters will only become Active if the defined Active adapters have failed.

12.

Which Esxtop Metric Will You Use To Confirm Latency Issue Of Storage ?

Answer»

ESXTOP --> d --> DAVG

esxtop --> d --> DAVG

13.

Why Can’t You Restore A Dc That Was Backed Up 4 Months Ago?

Answer»

The reason is 'Tombstoning' . If a DOMAIN controller was RESTORED from a backup that was older than the tombstone lifetime, then the domain controller might CONTAIN deleted objects, and because the tombstones are deleted from the replica, the DELETION event does not replicate into the restored domain controller. This is why Backup does not allow you to restore DATA from a backup that is older than the tombstone lifetime.

The reason is 'Tombstoning' . If a domain controller was restored from a backup that was older than the tombstone lifetime, then the domain controller might contain deleted objects, and because the tombstones are deleted from the replica, the deletion event does not replicate into the restored domain controller. This is why Backup does not allow you to restore data from a backup that is older than the tombstone lifetime.

14.

I Want To Look At The Rid Allocation Table For A Dc. What Do I Do?

Answer»

Dcdiag.exe /TEST:RidManager /V | find /i "AVAILABLE RID Pool for the DOMAIN"

Dcdiag.exe /TEST:RidManager /v | find /i "Available RID Pool for the Domain"

15.

Can You Connect Active Directory To Other 3rd-party Directory Services? Name A Few Options.

Answer»

16.

Can You Explain Netlogon Services ?

Answer»

The NETLOGON services help the CLIENT servers to CONNECT to the DOMAIN

The Netlogon services help the client servers to connect to the Domain

17.

How To Migrate Ad Location To Another ? (from C:ad To D:ad)

Answer»
  • FIRST, stop the Active Directory DOMAIN Services
  • Open Command Prompt with Admin privilege
  • Run ntdsutil tool
  • In the ntdsutil prompt, type Activate INSTANCE ntds
  • Then type files
  • In the next prompt (FILE maintenance), type move db to D:AD
  • Once the database is moved, move the logs USING the command move logs to D:AD
  • Once completed, start the Active Directory Domain Services

18.

What Is Urgent Replication In Ad ?

Answer»

Normally, a change in a DC (say DC1) is notified to its replication partner(say DC2) after 15 seconds. Once the change is notified, DC2 makes the change in its database. DC2 then notifies its replication partner after ANOTHER 15 seconds. If it's a multi-site setup, the 15 seconds delay WOULD cost a big delay for the FINAL recipient DC. Suppose if the change was an 'Account Lock Out', this big delay will be a pain. Here comes Urgent notification. Urgent notification bypasses the change notification delay and processes the change immediately across all DCs.

Normally, a change in a DC (say DC1) is notified to its replication partner(say DC2) after 15 seconds. Once the change is notified, DC2 makes the change in its database. DC2 then notifies its replication partner after another 15 seconds. If it's a multi-site setup, the 15 seconds delay would cost a big delay for the final recipient DC. Suppose if the change was an 'Account Lock Out', this big delay will be a pain. Here comes Urgent notification. Urgent notification bypasses the change notification delay and processes the change immediately across all DCs.

19.

What Is The Schema Version Of Windows 2008 R2 ?

Answer»
  • Windows 2003 R2 - 31
  • Windows 2008 - 44
  • Windows 2008 R2 - 47
  • Windows 2012 - 56
  • Windows 2012 R2 - 69

20.

What’s The Number Of Permitted Unsuccessful Logons For Administrator Account?

Answer»

UNLIMITED - Only for ADMINISTRATOR, not for OTHERS in ADMINISTRATORS GROUP

Unlimited - Only for Administrator, not for others in Administrators group

21.

Difference Between Everyone And Authenticated Users?

Answer»
  • Authenticated USERS - Include all Users and COMPUTERS whose IDENTITIES have been authenticated.
  • Everyone - For Windows 2003 and above, 'Everyone' INCLUDES all Authenticated Users including Guest accounts. Before Windows 2003, 'Everyone' includes all Authenticated Users , Guest accounts and Anonymous account.

22.

How Many Passwords By Default Are Remembered When You Check “enforce Password History Remembered”?

Answer»

24

24

23.

What Is An Ip Helper Address Feature And Why Is It Required In A Dhcp Environment ?

Answer»
  • IP helper-address HELPS to implement DHCP relay AGENT in Cisco routers
  • This is configured at the network interface of the router CONTAINING the DHCP client
  • The IP helper-address intercepts the DHCP DISCOVER message from the client and unicasts it to the DHCP server after adding 'Option 82'.
  • With the help of Option 82, the DHCP server identifies the client network and assigns an IP from that network.

24.

What Is Frs And Dfs-r ?

Answer»
  • FILE Replication SERVICE (FRS), INTRODUCED in Windows 2000 server to replicate DFS and Sysvol folder in DC. FRS is no longer used in new versions.
  • Distributed File System Replication (DFS-R), introduced in Windows 2008R2, CAME out as a REPLACEMENT to FRS for replicating DFS and Sysvol.

25.

What Is Group Policy Preference ?

Answer»

Group POLICY preference is a set of new settings that were released with Windows 2008, that allows IT administrators to do anything they want to configure in a CORPORATE ENVIRONMENT.

Group policy preference is a set of new settings that were released with Windows 2008, that allows IT administrators to do anything they want to configure in a corporate environment.

26.

What Is The Use Of Ldp.exe?

Answer»

This is a PART of WINDOWS Support tools which helps US to MAKE any LDAP searches against the Active Directory

This is a part of Windows Support tools which helps us to make any LDAP searches against the Active Directory

27.

How To Replace A Failed Raid Controller ?

Answer»

This depends on the TYPE of controller USED. If you are using MODERN RAID controllers and are trying to replace with the same model, then the RAID should work WITHOUT any issues as the RAID configuration or metadata is stored in the disk array. But you should ENSURE that you are using the same model from vendor or a model which is compatible with the failed controller.

This depends on the type of controller used. If you are using modern RAID controllers and are trying to replace with the same model, then the RAID should work without any issues as the RAID configuration or metadata is stored in the disk array. But you should ensure that you are using the same model from vendor or a model which is compatible with the failed controller.

28.

What Is The Difference Between Raid 1 And Raid 5 ?

Answer»
  •  RAID 1 - MIRRORING - This RAID configuration gives you maximum redundancy as the same data is written into two disks at a TIME. But this solution will be costly as you ALWAYS need to have disks double of what you actually require. MINIMUM 2 disks required.
  • RAID 5 - This RAID is the most popular RAID configuration. This works on the PARITY principle. Minimum 3 disks required. Even if one disk fail, the data of the failed disk can be calculated from the parity stored in the other 2 disks.

29.

In Raid 5, Which Activity Is Faster - Read Or Write ?

Answer»

30.

Can We Setup An Ad Site Without A Dc ?

Answer»

YES..

Yes..

31.

What Is Das ? How Is It Connected To The Server ?

Answer»

DAS is Direct Attached Storage. DAS is available with many VENDORS. When a SERVER has exhausted all its storage resource, we can connect a DAS SOLUTION to it. DAS can be connected to a server using SAS cable.

DAS is Direct Attached Storage. DAS is available with many vendors. When a server has exhausted all its storage resource, we can connect a DAS solution to it. DAS can be connected to a server using SAS cable.

32.

How Is An Iscsi Device Connected To A Server ?

Answer»

An ISCSI DEVICE can be CONNECTED USING the iqn number.

An iscsi device can be connected using the iqn number.

33.

How Can I Add New Hdd Space To An Existing Drive ?

Answer»

CONVERT the DRIVE from BASIC to DYNAMIC

Convert the drive from Basic to Dynamic

34.

What Happens When A Standalone Host Is Taken Into Maintenance Mode ?

Answer»

The ACTIVITY will WAIT until all VMS are SHUTDOWN.

The activity will wait until all VMs are shutdown.

35.

What If All Gc In The Environment Are Down ?

Answer»
  • GC is required for multi DOMAIN forests - In a single domain infrastructure, the DCs will not contact the GC for authenticating. But in multi domain infrastructure, GC is required for AUTHENTICATION.
  • Universal GROUP Membership EVALUATION - Universal Group Membership which exists in a multi domain forests works only with GC.
  • UPN resolution - The users cannot login to the domain using the username abc@example.com

36.

How To Update Dell Server Bios ?

Answer»

Dell provides the update in DIFFERENT file formats. ONE for Windows , one for linux...If it is a VMWARE server, then download the Non-Packaged exe format from Dell website and COPY it to a DOS bootable USB DRIVE. Shutdown the server and boot from USB drive and execute the file.

Dell provides the update in different file formats. One for Windows , one for linux...If it is a VMware server, then download the Non-Packaged exe format from Dell website and copy it to a DOS bootable USB drive. Shutdown the server and boot from USB drive and execute the file.

37.

Dset Stands For?

Answer»

Dell SERVER E-Support Tool (DSET) provides the ABILITY to collect hardware, storage and operating system information from Dell PowerEdge server.

Dell Server E-Support Tool (DSET) provides the ability to collect hardware, storage and operating system information from Dell PowerEdge server.

38.

How To Upgrade Esxi 5.1 To Esxi 5.5 ?

Answer»

39.

What Is Default Time After Which The Dhcp Client Assigns Itself An Apipa ?

Answer»

The CLIENT waits for 60 seconds before which it assigns automatic private IP ADDRESS

The client waits for 60 seconds before which it assigns automatic private ip address

40.

Which Networking Features Are Recommended While Using Iscsi Traffic?

Answer»

41.

What Is The Port Used For Vcenter?

Answer»

80,443,902

80,443,902

42.

What Is 'no Access' Role?

Answer»

 Users ASSIGNED with the 'No Access' ROLE for an object, cannot VIEW or change the object in any WAY

 Users assigned with the 'No Access' role for an object, cannot view or change the object in any way

43.

When Is A Swap File Created?

Answer»

When the GUEST OS is FIRST INSTALLED in the VM

When the guest OS is first installed in the VM

44.

The Active Directory Group, Where The Members Will Be Esxi Administrators By Default?

Answer»

ESX ADMINS

ESX Admins

45.

Which Is The Command Used In Esxi To Manage And Retrieve Information From Virtual Machines ?

Answer»

vmware-cmd

vmware-cmd

46.

Which Is The Command Used In Esxi To View Live Performance Data?

Answer»

esxtop

esxtop

47.

What Is The Log File Location Of Vmware Host?

Answer»

varlogvmware

varlogvmware

48.

What Is The Port Used For Vmotion?

Answer»

8000

8000

49.

Command Line Tool Used In Esxi To Manage Virtual Disk Files?

Answer»

vmkfstools

vmkfstools

50.

Can You Map A Single Physical Nic To Multiple Virtual Switches ?

Answer»

No

No