Monday, 4 February 2013

Features Removed from the Exchange 2010

Any new product have improvement with its older version and some of features are removed to provide better design, like wise in Exchange server 2010 the below features are removed or no longer available.


1. LCR (Local Continuous replication) and SCC (Single Copy Clusters) are no more available in Exchange 2010, you can use Database Availability Groups (DAG), using this feature you can easily provide high availability, disaster recovery, and backup solution for messaging environment

2. Even CCR (Cluster continuous Replication) and SCR (Standby Continuous Replication) has been removed or combined and presented a new feature call Database Availability Groups (DAG)

3. There is no Storage group in Exchange 2010, all Mailbox databases is managed in origination level not in server level

4. Mail box can only be created from the Exchange console, not like the earlier versions you can’t use Active Directory User and Computer for creation user mail box in Exchange 2010

5. Exchange tasks are only be done through EMC (Exchange management console)

6. You can’t install Exchange 2010 on Windows 2003 and the earlier versions

7. Routing group connector (already removed on Exchange 2007) for some scenarios it’s required for co-existing with older mailing system or older exchange versions

Interview questions!!

Windows Questions and Answers:
1 :: What is the Difference between Windows 2003 standard Enterprise, Premium, Data center and Web Edition?
WEB EDITION:

To position windows server 2003 more competitively against other web servers, Microsoft has released a
stripped-down-yet-impressive edition of windows server 2003 designed specially for web services. the feature set and licensing allows customers easy deployment of web pages, web sites, web applications and web services.
Web Edition supports 2GB of RAM and a two-way symmetric multiprocessor(SMP). It provides unlimited anonymous web connections but only 10 inbound server message block(SMB) connections, which should be more than enough for content
publishing. The server cannot be an internet gateway, DHCP or fax server. Although you can remotely administer the server with Remote Desktop, the server can not be a terminal
server in the traditional sense. The server can belong to a domain, but cannot be a domain controller. The included version of the microsoft SQL server database Engine can support as many as 25 concurrent connections.
2 :: How do you recover an object in Active Directory, which is accidentally deleted by you, with no backup?
Using ntdsutil.exe command,we can restored the AD objects.
3 :: What is the Logical / Physical Structures of the AD Environment?
physical structure:
Forest, Site, Domain, DC

logical structure:
Schema partition, configuration partition, domain
partition and application partition
4 :: How to change the windows xp product key if wrongly installed with other product key but you have original
product key? What you will do to Make your os as Genuine?
Some third party software are available for this function or reinstall this system
5 :: If 512mb Ram is there what will be the minimum and maximum Virtual memory for the system?
To workout the total virtual memory (page file) required for windows XP you should take the amount of ram in the system and + 25% (512MB + 25% (128MB) = 640MB total virtual memory. by setting both the min and max to 640MB you can increase the performances of the operating system.
Windows Questions and Answers:

6 :: Ntfldr.exe is missing in win xp os what will you do?
Boot from windows xp cd and go to recovery console mode
give the administrator password
c:windows>
prompt will come
come out from windows with the help of command
c:windows>cd ..
c:>

go to cd prompt d:
d:>cd i386
d:i386>copy ntldr c: enter

d:i386>copy ntdetect.com c: enter

restart u r computer

problem fix
7 :: What is LDAP?
LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to look up information from a server.
8 :: What is the SYSVOL folder?
The Sysvol folder on a Windows domain controller is used to replicate file-based data among domain controllers. Because junctions are used within the Sysvol folder structure, Windows NT file system (NTFS) version 5.0 is required on domain controllers throughout a Windows distributed file system (DFS) forest.
9 :: What are application partitions? When do we use them?
Application Directory Partition is a partition space in Active Directory which an application can use to store that application specific data. This partition is then replicated only to some specific
domain controllers.

The application directory partition can contain any type of data except security principles (users, computers, groups).
10 :: What is the KCC?
With in a Site, a Windows server 2003 service known as the KCC automatically generates a topology for replication among the domain controllers in the domain using a ring structure.Th Kcc is a built in process that runs on all domain controllers.

The KCC analyzes the replication topology within a site every 15 minute to ensure that it still works. If you add or remove a domain controller from the network or a site, the KCC reconfigures the topology to relect the change.
Windows Questions and Answers:

11 :: What is tombstone lifetime attribute?
The number of days before a deleted object is removed from the directory services. This assists in removing objects from replicated servers and preventing restores from reintroducing a deleted object. This value is in the Directory Service object in the configuration NIC

by default 2000 (60 days)
12 :: How do we Backup Active Directory?
Backing up Active Directory is essential to maintain an Active Directory database. You can back up Active Directory by using the Graphical User Interface (GUI) and command-line tools that the Windows Server 2003 family provides.

You frequently backup the system state data on domain controllers so that you can restore the most current data. By establishing a regular backup schedule, you have a better chance of recovering data when necessary.

To ensure a good backup includes at least the system state data and contents of the system disk, you must be aware of the tombstone lifetime. By default, the tombstone is 60 days. Any backup older than 60 days is not a good backup. Plan to backup at least two domain controllers in each domain, one of at least one backup to enable an authoritative restore of the data when necessary.
13 :: How do we restore AD?
You can’t restore Active Directory (AD) to a domain controller (DC) while the Directory Service (DS) is running. To restore AD, perform the following steps.

Reboot the computer.

The computer will boot into a special safe mode and won’t start the DS. Be aware that during this time the machine won’t act as a DC and won’t perform functions such as authentication.

1. Start NT Backup.
2. Select the Restore tab.
3. Select the backup media, and select System State.
4. Click Start Restore.
5. Click OK in the confirmation dialog box.

After you restore the backup, reboot the computer and start in normal mode to use the restored information. The computer might hang after the restore completes; I’ve experienced a 30-minute wait on some machines.
14 :: What are GPOs?
Group Policy gives you administrative control over users and computers in your network. By using Group Policy, you can define the state of a user's work environment once, and then rely on Windows Server 2003 to continually force the Group Policy settings that you apply across an entire organization or to specific groups of users and computers.
15 :: What is the order in which GPOs are applied?
Group Policy settings are processed in the following order:

1:- Local Group Policy object-each computer has exactly one Group Policy object that is stored locally. This processes for both computer and user Group Policy processing.

2:- Site-Any GPOs that have been linked to the site that the computer belongs to are processed next. Processing is in the order that is specified by the administrator, on the Linked Group Policy Objects tab for the site in Group Policy Management Console (GPMC). The GPO with the lowest link order is processed last, and therefore has the highest precedence.

3:- Domain-processing of multiple domain-linked GPOs is in the order specified by the administrator, on the Linked Group Policy Objects tab for the domain in GPMC. The GPO with the lowest link order is processed last, and therefore has the highest precedence.

4:- Organizational units-GPOs that are linked to the organizational unit that is highest in the Active Directory hierarchy are processed first, then GPOs that are linked to its child organizational unit, and so on. Finally, the GPOs that are linked to the organizational unit that contains the user or computer are processed.
Windows Questions and Answers:

16 :: Name a few benefits of using GPMC?
Microsoft released the Group Policy Management Console (GPMC) years ago, which is an amazing innovation in Group Policy management. The tool provides control over Group Policy in the following manner:

► Easy administration of all GPOs across the entire Active Directory Forest
► View of all GPOs in one single list
► Reporting of GPO settings, security, filters, delegation, etc.
► Control of GPO inheritance with Block Inheritance, Enforce, and Security Filtering
► Delegation model
► Backup and restore of GPOs
► Migration of GPOs across different domains and forests

With all of these benefits, there are still negatives in using the GPMC alone. Granted, the GPMC is needed and should be used by everyone for what it is ideal for. However, it does fall a bit short when you want to protect the GPOs from the following:

► Role based delegation of GPO management
► Being edited in production, potentially causing damage to desktops and servers
► Forgetting to back up a GPO after it has been modified
► Change management of each modification to every GPO
17 :: What are the GPC and the GPT? Where can I find them?
GPOs store group policy settings in two locations: a Group Policy container (GPC) (preferred) and a Group Policy template (GPT). The GPC is an Active Directory object that stores version information, status information, and other policy information (for example, application objects).

The GPT is used for file-based data and stores software policy, script, and deployment information. The GPT is located on the system volume folder of the domain controller. A GPO can be associated with one or more Active Directory containers, such as a site, domain, or organizational unit. Multiple containers can be associated with the same GPO, and a single container can have more than one associated GPO.
18 :: What are GPO links? What special things can I do to them?
To apply the settings of a GPO to the users and computers of a domain, site, or OU, you need to add a link to that GPO. You can add one or more GPO links to each domain, site, or OU by using GPMC. Keep in mind that creating and linking GPOs is a sensitive privilege that should be delegated only to administrators who are trusted and understand Group Policy.
19 :: What are administrative templates?
The GPO settings is divided between the Computer settings and the User settings. In both parts of the GPO you can clearly see a large section called Administrative Templates.

Administrative Templates are a large repository of registry-based changes (in fact, over 1300 individual settings) that can be found in any GPO on Windows 2000, Windows XP, and Windows Server 2003.

By using the Administrative Template sections of the GPO you can deploy modifications to machine (called HKEY_LOCAL_MACHINE in the registry) and user (called HKEY_CURRENT_USER in the registry) portions of the Registry of computers that are influenced by the GPO.
20 :: Name the AD NCs and replication issues for each NC?
Name the AD NCs and replication issues for each NC

*Schema NC, *Configuration NC, * Domain NC

Schema NC This NC is replicated to every other domain controller in the forest. It contains information about the Active Directory schema, which in turn defines the different object classes and attributes within Active Directory.

Configuration NC Also replicated to every other DC in the forest, this NC contains forest-wide configuration information pertaining to the physical layout of Active Directory, as well as information about display specifiers and forest-wide Active Directory quotas.

Domain NC This NC is replicated to every other DC within a single Active Directory domain. This is the NC that contains the most commonly-accessed Active Directory data: the actual users, groups, computers, and other objects that reside within a particular ADD.
21 :: What is MUTEX?
A mutual exclusion object, or MUTEX, is an object created for use in computer programs. The essential function of MUTEX is to make it possible for a multiple program thread to make use of a single resource. Generally, the functionality of mutual exclusion objects is to allow this use of a single resource by creating an environment where the access to the resource is continually passed back and forth between the various aspects of the program.
22 :: What is the difference between a computer process and thread?
A single process can have multiple threads that share global data and address space with other threads running in the same process, and therefore can operate on the same data set easily. Processes do not share address space and a different mechanism must be used if they are to share data.

If we consider running a word processing program to be a process, then the auto-save and spell check features that occur in the background are different threads of that process which are all operating on the same data set (your document).

process:
In computing, a process is an instance of a computer program that is being sequentially executed[1] by a computer system that has the ability to run several computer programs concurrently.

Thread:
A single process may contain several executable programs (threads) that work together as a coherent whole. One thread might, for example, handle error signals, another might send a message about the error to the user, while a third thread is executing the actual task of the...
23 :: What is INODE?
INODE is a pointer to a block on the disk and it is unique.
Inode is an unique number. Inode holds metadata of files.
24 :: Explain the working of Virtual Memory?
Virtual memory like as a temporary storage area.It consists of page table.In this pages are divided into frames.It is a continuous memory allocation.It is also called logical memory.
25 :: How does Windows NT supports Multitasking?
Preemptive multitask

Windows Questions and Answers:

26 :: What is Semaphore?
A hardware or software flag.
In multitasking systems, a semaphore is a variable with a value that indicates the status of a common resource.
Its used to lock the resource that is being used.
A process needing the resource checks the semaphore to determine the resource's status
and then decides how to proceed.
27 :: Recovery from Deadlock?
Process Termination:
->Abort all deadlocked processes.
->Abort one process at a time until the deadlock cycle is eliminated.
->In which order should we choose to abort?
Priority of the process.
How long process has computed, and how much longer to completion.
Resources the process has used.
Resources process needs to complete.
How many processes will need to be terminated?
Is process interactive or batch?
Resource Preemption:
->Selecting a victim ? minimize cost.
->Rollback ? return to some safe state, restart process for that state.
->Starvation ? same process may always be picked as victim, include number of rollback in cost factor.
28 :: What is multi tasking, multi programming, multi threading?
Multi programming:
Multiprogramming is the technique of running several programs at a time using timesharing.
It allows a computer to do several things at the same time. Multiprogramming creates logical parallelism.
The concept of multiprogramming is that the operating system keeps several jobs in memory simultaneously. The operating system selects a job from the job pool and starts executing a job, when that job needs to wait for any i/o operations the CPU is switched to another job. So the main idea here is that the CPU is never idle.

Multi tasking:
Multitasking is the logical extension of multiprogramming .The concept of multitasking is quite similar to multiprogramming but difference is that the switching
between jobs occurs so frequently that the users can interact with each program while it is running. This concept is also known as time-sharing systems. A time-shared operating system uses CPU scheduling and multiprogramming to provide each user with a small portion of time-shared system.

Multi threading:
An application typically is implemented as a separate process with several threads of control. In some situations a single application may be required to perform several similar tasks for example a web server accepts client requests for web pages, images, sound, and so forth.
29 :: Differentiate between RAM and ROM?
Semiconductor memories are of two types: RAM (random access memory) and ROM (read only memory).
RAM is a read/write memory. Information can be written into and read from a RAM. It is volatile memory.
It stores information so long as power supply is on.
ROM is permanent type memory. Its contents are not lost when power supply goes off. the user cannot write into a ROM.Its contents are decided by the manufacturer and written at the time of manufacture. Programmable ROMs are also available. They are called PROMs.
30 :: Binding of Instructions and Data to Memory?
Address binding of instructions and data to memory addresses can happen at three different stages
Compile time: If memory location known a priori, absolute code can be generated; must recompile code if starting location changes.
Load time: Must generate relocatable code if memory location is not known at compile time.
Execution time: Binding delayed until run time if the process can be moved during its execution from one memory segment to another. Need hardware support for address maps (e.g., base and limit registers).
Multistep Processing of a User Program

Windows Questions and Answers:

31 :: Why paging is used?
Paging is solution to external fragmentation problem which is to permit the logical address space of a process to be noncontiguous, thus allowing a process to be allocating physical memory wherever the latter is available.
32 :: What is a Safe State and its use in deadlock avoidance?
When a process requests an available resource, system must decide if immediate allocation leaves the system in a safe state
->System is in safe state if there exists a safe sequence of all processes.
->Sequence <P1, P2? Pn> is safe if for each Pi, the resources that Pi can still request can be satisfied by currently available resources + resources held by all the Pj, with j<I.
If Pi resource needs are not immediately available, then Pi can wait until all Pj have finished.
When Pj is finished, Pi can obtain needed resources, execute, return allocated resources, and terminate.
When Pi terminates, Pi+1 can obtain its needed resources, and so on.
->Deadlock Avoidance ?ensure that a system will never enter an unsafe state.
33 :: Explain the difference between microkernel and macro kernel?
Micro-Kernel: A micro-kernel is a minimal operating system that performs only the essential functions of an operating system. All other operating system functions are performed by system processes.
Monolithic: A monolithic operating system is one where all operating system code is in a single executable image and all operating system code runs in system mode.
34 :: Differentiate between Compiler and Interpreter?
An interpreter reads one instruction at a time and carries out the actions implied by that instruction. It does not perform any translation. But a compiler translates the entire instructions.
35 :: What is the relation between process system time, process waiting time , and process CPU time?
Process system time (turn around time) = process cpu time + process waiting time
How can you determine what GPO was and was not applied for a user? Name a few ways to do that.

A user claims he did not receive a GPO, yet his user and computer accounts are in the right OU, and everyone else there gets the GPO. What will you look for?
Name a few differences in Vista GPOs
Name some GPO settings in the computer and user parts.
What are administrative templates?
What’s the difference between software publishing and assigning?
Can I deploy non-MSI software with GPO?
You want to standardize the desktop environments (wallpaper, My Documents, Start menu, printers etc.) on the computers in one department. How would you do that?

What is the SYSVOL folder?
The sysVOL folder stores the server’s copy of the domain’s public files. The contents such as group policy, users etc of the sysvol folder are replicated to all domain controllers in the domain.
The sysvol folder must be located on an NTFS volume.

Que.: What is Active Directory?
Ans. Active Directory is a Meta Data. Active Directory is a data base which store a data base like your user information, computer information and also other network object info. It has capabilities to manage and administor the complite Network which connect with AD.
Que.: What is the Global Catalog?
Ans.: Global Catalog is a server which maintains the information about multiple domain with trust relationship agreement..
Que: What is Active Directory?
Ans: Active Directory directory service is an extensible and scalable directory service that enables you to manage network resources efficiently.
Q01: What is Active Directory?
Ans:Active Directory is directory service that stores information about objects on a network and makes this information available to users and network administrators.
Active Directory gives network users access to permitted resources anywhere on the network using a single logon process.
It provides network administrators with an intuitive, hierarchical view of the network and a single point of administration
3for all network objects.
Q; What is active directory?
Ans: active directory is a domain controller which is use to authenticate and administrate the group of computer,user,server etc. remotely. all the policies and security will be applicable on the client machine which one is join the domain.and all this policies and security is defined in active directory.
Q2: What is LDAP?
Ans2: LDAP(light weight directory accerss protocol) is an internet protocol which Email and other services is used to look up information from the server.
Q 18: What is KCC ?
Ans 18: KCC ( knowledge consistency checker ) is used to generate replication topology for inter site replication and for intrasite replication.with in a site replication traffic is done via remote procedure calls over ip, while between site it is done through either RPC or SMTP.

Q 10: What is Global Catalog Server ?
Ans 10 : Global Catalog Server is basically a container where you put the same type of member ,computer etc and applied the policies and security on the catalog server in place of individual user or computer.
Q; What is active directory?
active directory is a domain controller which is use to authenticate and administrate the group of computer,user,server etc. remotely. all the policies and security will be applicable on the client machine which one is join the domain.and all this policies and security is defined in active directory.
Q 10 : what is Global catalog server GC?
Ans : i m sorry i was given wrong ans of this question above but now im giving the exact ans of this question, and th ans which iwas given previously is the ans of Organisatinal Unit not of GC….. and the ans is
The global catalog is a distributed data repository that contains a searchable, partial representation of every object in every domain in a multidomain Active Directory forest. The global catalog is stored on domain controllers that have been designated as global catalog servers and is distributed through multimaster replication. Searches that are directed to the global catalog are faster because they do not involve referrals to different domain controllers.
Q 4: Where is the AD database held? What other folders are related to AD?
A 4: The AD data base is store in NTDS.DIT.
Q 5 :  What is the SYSVOL folder?
A 5; The sysVOL folder stores the server’s copy of the domain’s public files. The contents such as group policy, users etc of the sysvol folder are replicated to all domain controllers in the domain.
Q 19: What is the ISTG? Who has that role by default?
A 19: Windows 2000 Domain controllers each create Active Directory Replication connection objects representing inbound replication from intra-site replication partners. For inter-site replication, one domain controller per site has the responsibility of evaluating the inter-site replication topology and creating Active Directory Replication Connection objects for appropriate bridgehead servers within its site. The domain controller in each site that owns this role is referred to as the Inter-Site Topology Generator (ISTG).
Q :15 What is LDP? What is REPLMON? What is ADSIEDIT? What is NETDOM? What is REPADMIN?

A 15 : LDP : Label Distribution Protocol (LDP) is often used to establish MPLS LSPs when traffic engineering is not required. It establishes LSPs that follow the existing IP routing, and is particularly well suited for establishing a full mesh of LSPs between all of the routers on the network.
Replmon : Replmon displays information about Active Directory Replication.
ADSIEDIT :ADSIEdit is a Microsoft Management Console (MMC) snap-in that acts as a low-level editor for Active Directory. It is a Graphical User Interface (GUI) tool. Network administrators can use it for common administrative tasks such as adding, deleting, and moving objects with a directory service. The attributes for each object can be edited or deleted by using this tool. ADSIEdit uses the ADSI application programming interfaces (APIs) to access Active Directory. The following are the required files for using this tool: ADSIEDIT.DLL
ADSIEDIT.MSCNETDOM : NETDOM is a command-line tool that allows management of Windows domains and trust relationships. It is used for batch management of trusts, joining computers to domains, verifying trusts, and secure channels.
REPADMIN :
This command-line tool assists administrators in diagnosing replication problems between Windows domain controllers.Administrators can use Repadmin to view the replication topology (sometimes referred to as RepsFrom and RepsTo) as seen from the perspective of each domain controller. In addition, Repadmin can be used to manually create the replication topology (although in normal practice this should not be necessary), to force replication events between domain controllers, and to view both the replication metadata and up-to-dateness vectors.
Q 36: how to take backup of AD ?
A 36 : for taking backup of active directory you have to do this :
first go to START -> PROGRAM ->ACCESORIES -> SYSTEM TOOLS -> BACKUP
when the backup screen is flash then take the backup of SYSTEM STATE it will take the backup of all the necessary information about the syatem including AD backup , DNS ETC.
Q 37 : how to restore the AD  ?
a 37 : For ths do the same as above in the question 36 but in place of backup you select the restore option and restore the system state .
Q 19: What is the ISTG? Who has that role by default?
A 19: Inter-Site Topology Generator(istg)  is responsible for managing the inbound replication connection objects for all bridgehead servers in the site in which it is located. This domain controller is known as the Inter-Site Topology Generator (ISTG). The domain controller holding this role may not necessarily also be a bridgehead server.
Q 29 :What are the DS* commands
A 29 : You really are spoilt for choice when it comes to scripting tools for creating Active Directory objects.  In addition to CSVDE, LDIFDE and VBScript, we now have the following DS commands: the da family built in utility DSmod - modify Active Directory attributesDSrm - to delete Active Directory objectsDSmove - to relocate objectsDSadd - create new accountsDSquery - to find objects that match your query attributesDSget - list the properties of an object
Q 30 :What’s the difference between LDIFDE and CSVDE? Usage considerations?
A 30 : CSVDE is a command that can be used to import and export objects to and from the AD into a CSV-formatted file. A CSV (Comma Separated Value) file is a file easily readable in Excel. I will not go to length into this powerful command, but I will show you some basic samples of how to import a large number of users into your AD. Of course, as with the DSADD command, CSVDE can do more than just import users. Consult your help file for more info.
Like CSVDE, LDIFDE is a command that can be used to import and export objects to and from the AD into a LDIF-formatted file. A LDIF (LDAP Data Interchange Format) file is a file easily readable in any text editor, however it is not readable in programs like Excel. The major difference between CSVDE and LDIFDE (besides the file format) is the fact that LDIFDE can be used to edit and delete existing AD objects (not just users), while CSVDE can only import and export objects.
Q 25 : What is tombstone lifetime attribute?
A 25 : The number of days before a deleted object is removed from the directory services. This assists in removing objects from replicated servers and preventing restores from reintroducing a deleted object. This value is in the Directory Service object in the configuration NIC.
You want to standardize the desktop environments (wallpaper, My Documents, Start menu, printers etc.) on the computers in one department. How would you do that? How it is possibal
 (20)What are the requirements for installing AD on a new server?
Ans:1)The Domain structure2)The Domain Name3)storage location of the database and log file4)Location of the shared system volume folder5)DNS config Methode6)DNS configuration

7. What are application partitions? When do I use them.
Ans: AN application diretcory partition is a directory partition that is replicated only to specific domain controller.Only domain controller running windows Server 2003 can host a replica of application directory partition.
Using an application directory partition provides redundany,availabiltiy or fault tolerance by replicating data to specific domain controller pr any set of domain controllers anywhere in the forest
Q:You want to standardize the desktop environments (wallpaper, My Documents, Start menu, printers etc.) on the computers in one department. How would you do that? How it is possibal.
Ans:Login on client as Domain Admin user change whatever you need add printers etc go to system-User profiles copy this user profile to any location by select Everyone in permitted to use after copy change ntuser.dat to ntuser.man and assgin this path under user profile
Q. 8. How do you create a new application partition
ANS:
Use the DnsCmd command to create an application directory partition. To do this, use the following syntax:
DnsCmd ServerName /CreateDirectoryPartition FQDN of partition
Global catalog provides a central repository of domain information for the forest by storing partial replicas of all domain directory partitions. These partial replicas are distributed by multimaster replication to all global catalog servers in a forest.



How do you view all the GCs in the forest?
Ans
C:\>repadmin /showreps
domain_controller
where domain_controller is the DC you want to query to determine whether it’s a GC. The output will include the text DSA Options: IS_GC if the DC is a GC. . . .
Trying to look at the Schema, how can I do that
Ans:
type “adsiedit.msc” in run or command prompt
Q. Can you connect Active Directory to other 3rd-party Directory Services? Name a few options.
Ans. Yes, you can use dirXML or LDAP to connect to other directories
In Novell you can use E-directory
Q 38 :How do you change the DS Restore admin password ?
Ans 38: A. In Windows 2000 Server, you used to have to boot the computer whose password you wanted to change in Directory Restore mode, then use either the Microsoft Management Console (MMC) Local User and Groups snap-in or the command
net user administrator *
to change the Administrator password. Win2K Server Service Pack 2 (SP2) introduced the Setpwd utility, which lets you reset the Directory Service Restore Mode password without having to reboot the computer. (Microsoft refreshed Setpwd in SP4 to improve the utility’s scripting options.)
In Windows Server 2003, you use the Ntdsutil utility to modify the Directory Service Restore Mode Administrator password. To do so, follow these steps:
1. Start Ntdsutil (click Start, Run; enter cmd.exe; then enter ntdsutil.exe).
2. Start the Directory Service Restore Mode Administrator password-reset utility by entering the argument “set dsrm password” at the ntdsutil prompt:
ntdsutil: set dsrm password
3. Run the Reset Password command, passing the name of the server on which to change the password, or use the null argument to specify the local machine. For example, to reset the password on server thanos, enter the following argument at the Reset DSRM Administrator Password prompt:
Reset DSRM Administrator Password: reset password on server thanos
To reset the password on the local machine, specify null as the server name:
Reset DSRM Administrator Password: reset password on server null
4. You’ll be prompted twice to enter the new password. You’ll see the following messages:
5. Please type password for DS Restore Mode Administrator Account:
6. Please confirm new password:
Password has been set successfully.
7. Exit the password-reset utility by typing “quit” at the following prompts:
8. Reset DSRM Administrator Password: quit
ntdsutil: quit
Q.40: What are Group Policy objects (GPOs)?
A.40: Group Policy objects, other than the local Group Policy object, are virtual objects. The policy setting information of a GPO is actually stored in two locations: the Group Policy container and the Group Policy template. The Group Policy container is an Active Directory container that stores GPO properties, including information on version, GPO status, and a list of components that have settings in the GPO. The Group Policy template is a folder structure within the file system that stores Administrative Template-based policies, security settings, script files, and information regarding applications that are available for Group Policy Software Installation. The Group Policy template is located in the system volume folder (Sysvol) in the \Policies subfolder for its domain.
Q 41 :What is the order in which GPOs are applied ?
A 41: Group Policy settings are processed in the following order:
1.
Local Group Policy object—Each computer has exactly one Group Policy object that is stored locally. This processes for both computer and user Group Policy processing.
2.
Site—Any GPOs that have been linked to the site that the computer belongs to are processed next. Processing is in the order that is specified by the administrator, on the Linked Group Policy Objects tab for the site in Group Policy Management Console (GPMC). The GPO with the lowest link order is processed last, and therefore has the highest precedence.
3.
Domain—Processing of multiple domain-linked GPOs is in the order specified by the administrator, on the Linked Group Policy Objects tab for the domain in GPMC. The GPO with the lowest link order is processed last, and therefore has the highest precedence.
4.
Organizational units—GPOs that are linked to the organizational unit that is highest in the Active Directory hierarchy are processed first, then GPOs that are linked to its child organizational unit, and so on. Finally, the GPOs that are linked to the organizational unit that contains the user or computer are processed.
At the level of each organizational unit in the Active Directory hierarchy, one, many, or no GPOs can be linked. If several GPOs are linked to an organizational unit, their processing is in the order that is specified by the administrator, on the Linked Group Policy Objects tab for the organizational unit in GPMC. The GPO with the lowest link order is processed last, and therefore has the highest precedence.
This order means that the local GPO is processed first, and GPOs that are linked to the organizational unit of which the computer or user is a direct member are processed last, which overwrites settings in the earlier GPOs if there are conflicts. (If there are no conflicts, then the earlier and later settings are merely aggregated.)
What is LDAP?
Lightweight Directory Access Protocol
This article will tell you how to add your first Windows 2003 DC to an existing Windows 2000 domain. This article is particularly useful if you have Windows 2000 servers that will be replaced by new hardware running Windows Server 2003.
The first step is to install Windows 2003 on your new DC. This is a straighforward process, so we aren’t going to discuss that here.
Because significant changes have been made to the Active Directory schema in Windows 2003, we need to make our Windows 2000 Active Directory compatible with the new version. If you already have Windows 2003 DCs running with Windows 2000 DCs, then you can skip down to the part about DNS.
Before you attempt this step, you should make sure that you have service pack 4 installed on your Windows 2000 DC. Next, make sure that you are logged in as a user that is a member of the Schema Admin and Enterprise Admin groups. Next, insert the Windows 2003 Server installation CD into the Windows 2000 Server. Bring up a command line and change directories to the I386 directory on the installation CD. At the command prompt, type:
Code :
adprep /forestprep
After running this command, make sure that the updates have been replicated to all existing Windows 2000 DCs in the forest.
Next, we need to run the following command:
Code :
adprep /domainprep
The above command must be run on the Infrastructure Master of the domain by someone who is a member of the Domain Admins group.
Once this is complete, we move back to the Windows 2003 Server. Click ’start’ then ‘run” - type in dcpromo and click OK. During the ensuing wizard, make sure that you select that you are adding this DC to an existing domain.
After this process is complete, the server will reboot. When it comes back online, check and make sure that the AD database has been replicated to your new server.
Next, you will want to check and make sure that DNS was installed on your new server. If not, go to the control panel, click on ‘Add or Remove Programs’, and click the ‘Add/Remove Windows Components’ button. In the Windows Components screen, click on ‘Networking Services’ and click the details button. In the new window check ‘Domain Name System (DNS)’ and then click the OK button. Click ‘Next’ in the Windows Components screen. This will install DNS and the server will reboot. After reboot, pull up the DNS Management window and make sure that your DNS settings have replicated from the Windows 2000 Server. You will need to re-enter any forwarders or other properties you had set up, but the DNS records should replicate on their own.
The next 2 items, global catalog and FSMO roles, are important if you plan on decomissioning your Windows 2000 server(s). If this is the case, you need to transfer the global catalog from the old server to the new one.
First, let’s create a global catalog on our new server. Here are the steps:
1. On the domain controller where you want the new global catalog, start the Active Directory Sites and Services snap-in. To start the snap-in, click ‘Start’, point to ‘Programs’, point to ‘Administrative Tools’, and then click ‘Active Directory Sites and Services’.
2. In the console tree, double-click ‘Sites’, and then double-click ’sitename’.
3. Double-click ‘Servers’, click your domain controller, right-click ‘NTDS Settings’, and then click ‘Properties’.
4. On the General tab, click to select the Global catalog check box to assign the role of global catalog to this server.
5. Restart the domain controller.
Make sure you allow sufficient time for the account and the schema information to replicate to the new global catalog server before you remove the global catalog from the original DC or take the DC offline.
After this is complete, you will want to transfer or seize the FSMO roles for your new server. For instructions, read Using Ntdsutil.exe to transfer or seize FSMO roles to a domain controller.
After this step is complete, we can now run DCPROMO on the Windows 2000 Servers in order to demote them. Once this is complete, copy over any files you need to your new server and you should have successfully replaced your Windows 2000 server(s) with a new Windows 2003 server(s
Global Catalyst is the one where the authentication happens, by default primary domain controller is Global Catalyst, we can add global catalyst to improve the Netwrk Performance
What is Active Directory?
Its a Directory Service which stores and manages the information of Objects(User,computer,printer shared folder etc)
What are the requirements for installing AD on a new server?
Win2K3 CD
DNS
Static IP
You want to standardize the desktop environments (wallpaper, My Documents, Start menu, printers etc.) on the computers in one department. How would you do that?
go to Start->programs->Administrative tools->Active Directory Users and Computers
Right Click on Domain->click on preoperties
On New windows Click on Group Policy
Select Default Policy->click on Edit
on group Policy console
go to User Configuration->Administrative Template->Start menu and Taskbar
Select each property you want to modify and do the same

What are the required components of Windows Server 2003 for installing Exchange 2003? - ASP.NET, SMTP, NNTP, W3SVC
What must be done to an AD forest before Exchange can be deployed? - Setup /forestprep
What Exchange process is responsible for communication with AD? - DSACCESS
What 3 types of domain controller does Exchange access? - Normal Domain Controller, Global Catalog, Configuration Domain Controller
What connector type would you use to connect to the Internet, and what are the two methods of sending mail over that connector? - SMTP Connector: Forward to smart host or use DNS to route to each address
How would you optimise Exchange 2003 memory usage on a Windows Server 2003 server with more than 1Gb of memory? - Add /3Gb switch to boot.ini
What would a rise in remote queue length generally indicate? - This means mail is not being sent to other servers. This can be explained by outages or performance issues with the network or remote servers.
What would a rise in the Local Delivery queue generally mean? - This indicates a performance issue or outage on the local server. Reasons could be slowness in consulting AD,      slowness in handing messages off to local delivery or SMTP delivery. It could also be databases being dismounted or a lack of disk space.
What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP and Global Catalog? - SMTP – 25, POP3 – 110, IMAP4 – 143, RPC – 135, LDAP – 389, Global Catalog - 3268
Name the process names for the following: System Attendant? – MAD.EXE, Information Store – STORE.EXE, SMTP/POP/IMAP/OWA – INETINFO.EXE
What is the maximum amount of databases that can be hosted on Exchange 2003 Enterprise? - 20 databases. 4 SGs x 5 DBs.
What are the disadvantages of circular logging? - In the event of a corrupt database, data can only be restored to the last backup.
19 Responses to “Windows sysadmin interview questions”
1) How windows server will configure?
Tell them that you have 400 pc based network, and you configure a Active Directory domain on windows servers to centralize administration tasks.
1) How windows server will configure?
Its depends on the role of the server. If you installing Active Directory, you have to run DCPROMO on commond prompt, and followed instructions.
Over all its depends on the role.
Simply you can say– there is an option in windows “Manage Server” once you follow the instructions it will guide you to configure your server.
2) How many types of servers?
If they are concern with Hardware server, tell them the hardware configuration and vendor of the server.
If they are asking about the types of windows server, tell them Standard, enterprise, or Small business server etc.
start > Run > Cmd >
Type
net send Computername type ur msg

Windows Interview questions for L2



Technical Round:
Tell me about yourself:
Start with the present like working for <company> handling XXX Domains and totally X-yrs of experience and studied at X-college, X-school and home-town and about family details.
Day to Day Activity:-
Windows:
1. Server Down
2. RAID issues and Array Battery Issues
3. Processor Memory Utilization (performance issues)
4. Paging Issues.
5. Disk Space Issues.
6. VSS Issues
7. HDD, CPU FAN & Ram Failure Issues.
8. Cluster Issues
9. Folder Sharing and Permission Issues.
10.   DFU Issues ( Tell that if u r able to answer)

VMware:
1. VM Creation , Deletion and Modification (adding N/W, HDD)
2. Cloning & Template Creation
3. Disk Expansion (VM Level and Datastore Level)
4. RDM Mapping
5. VMotion (Host Level and Storage Level)
6. P2V Migration

General:
1. Daily & Weekly Call log Report
2. Analyzing Report on Monthly Basis
Technical Questions:
Windows:
1.       How to resolve RAID Array Battery Issues.
2.       If 2 HDD’s failed on RAID-5 how you will restore the Data.
3.       What is the solution you will give for Cluster Node Down issue?
4.       What is the recommendation for replication between 5 DC’s in Chennai and 5DC’s in Noida.
5.       What is difference between Partition and Volume?
6.       How to extend C – Drive?
7.       Where you will check System FAN failure and RAID array Failure?
8.       How you will check CPU performance by using “Perfmon”?
9.       How to set counters in “resource Monitor” for the particular application
10.   What is the recommendation to form a cluster environment?
11.   What are the components used for replication in between DC’s?
12.   What is the use of “FRS” and “RPC”?
13.   I am able to take the remote session but I am unable to logon to the system, what is the solution
14.   I want to run particular .EXE on all the servers by using “Batch” file without Group policy
15.   How resolve dump issue, where the file will be located and what are the tools will be used to analyze the dump file.
16.   How many types of Dump file is there? What is the difference between them?
17.   What are will be backed up when perform “System state” backup?
18.   What is location of “NTDS” and “Minidump” file?
19.   How to restore the entire DC from Backup and how to backup & restore only NTDS folder.
20.   What is the difference between Primary, Secondary and Stub Zone.
21.   What are all the records are there in DNS and what is the use. Is really required Reverse lookup Zone in an environment.
22.   How to Extend C Drive
23.   Domain A user able to resolve query from Domain B but domain B user not able to resolve DNS query from Domain A, what is the issue and how to resolve that?
24.    What is Intersite replication and Intrasite replication, how it will happen?
25.   What is Failover and NLB clustering?
26.   Backup team said that VSS are not able to bakup what is the issue?
27.   What is the difference between GPMC and RSOP?

VMware:
1.       How to extend Datastore?
2.       What are all the editions are there and what is the difference?
3.       What is the difference between Clone and Template?
4.       How to perform NIC Team in the ESX level and VM level?
5.       Where to Check Available LUN’s and if LUN is not visible what you will do?
6.       I have 2TB capacity of datastore, it’s almost got full, what you will do?
7.       What is RDM and how to MAP that?
8.       What are the things required to do the VMotion?
9.       What is standard and distributed Vswitch?
10.   What are all the port groups are there in Vswitch
11.   IF the VM is not able to perform the VMotion what will be the issue?

General:
1.  What is the recent or critical issue you have faced in your environment?
2.  What are Incident Management and Critical Management?
3.  What is process if you wanted to perform any changed on the environment?
4. What you will do if client is not approved for any change request?

HR:
1.       Why you are moving from <company> to here?
2.       What you will expect after we gave an opportunity here?
3.       What you will be after 5 years in your carrier?

Communication:
1.       Tell me about yourself.
2.       Where you are residing and how many members are there in your family?
3.       What you will do in your weekends or free time?
4.       What is your hobby and explain about that?
5.       Explain about recently seen movie or about your college days and memorable moments in your college?