22
Cognizant interview Questions Active Directory Upgrading windows 2003 to windows 2008. Monitoring and Checking SCOM (System Center Operation manager) Aerts System Center Operations Manager  (SCOM) is a cross-platform data center management system for operating systems and  hypervisors . It uses a single interface that shows state, health and performance information of computer systems. It also provides alerts generated according to some availability, performance, configuration or security situation being identified. It works with Microsoft Windows erver and !ni"-based hosts. !nowedge on windows C"ster A# $os %ot &SMO $oes (&eat"re in 2008) Acti'e #irectory Certiicate Ser'ices t pro'ides c"stomi*ed ser'ices or creating and managing p"+ic key certiicates "sed in sotware sec"rity systems. Acti'e #irectory #omain Ser'ices t stores the inormation a+o"t "sers, comp"ters and other de'ices on the network. A##S heps administrators sec"rey manage this inormation and aciitates reso"rce sharing and coa+oration +-w "sers.  Acti'e #irectory &ederation Ser'ices. t pro'ides we+singesingon technoogy to a"thenticate a "ser to access m"tipe we+ appications +y "sing a singe "ser acco"nt. A#&S accompishes this +y sec"rey ederating or sharing "ser identities and access rights. Acti'e #irectory /ightweight #irectory Ser'ices. t pro'ide storage or appication speciic data, or directory ena+ed appications that do not re"ire the inrastr"ct"re o A##S. M"tipe interaces o A# /#S can e1ist on a singe ser'er, each o which can ha'e its own schema.  Acti'e #irectory $ights Management Ser'ices. t heps yo" to protect inormation rom "na"thori*ed "se. A# $MS esta+ishes the identity o "sers and pro'ides a"thori*ed "sers with icenses or protected inormation. #ierence etween A# 2003 2008 4. 2008 i s the com+ina tion o 'is ta and windo ws ser 'er 2003r2.

Cognizant Interview Questions

Embed Size (px)

Citation preview

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 1/22

Cognizant interview Questions Active Directory

• Upgrading windows 2003 to windows 2008.

• Monitoring and Checking SCOM (System Center Operation manager) AertsSystem Center Operations Manager  (SCOM) is a cross-platform data center managementsystem for operating systems and hypervisors. It uses a single interface that shows state, healthand performance information of computer systems. It also provides alerts generated accordingto some availability, performance, configuration or security situation being identified. It workswith Microsoft Windows erver and !ni"-based hosts.

• !nowedge on windows C"ster 

• A# $os %ot &SMO $oes (&eat"re in 2008)

Acti'e #irectory Certiicate Ser'ices

t pro'ides c"stomi*ed ser'ices or creating and managing p"+ic key certiicates "sed insotware sec"rity systems.

Acti'e #irectory #omain Ser'icest stores the inormation a+o"t "sers, comp"ters and other de'ices on the network. A##S heps

administrators sec"rey manage this inormation and aciitates reso"rce sharing andcoa+oration +-w "sers. 

Acti'e #irectory &ederation Ser'ices.

t pro'ides we+singesingon technoogy to a"thenticate a "ser to access m"tipe we+appications +y "sing a singe "ser acco"nt. A#&S accompishes this +y sec"rey ederating or

sharing "ser identities and access rights.

Acti'e #irectory /ightweight #irectory Ser'ices.

t pro'ide storage or appication speciic data, or directory ena+ed appications that do not

re"ire the inrastr"ct"re o A##S. M"tipe interaces o A# /#S can e1ist on a singe ser'er,

each o which can ha'e its own schema. Acti'e #irectory $ights Management Ser'ices.

t heps yo" to protect inormation rom "na"thori*ed "se. A# $MS esta+ishes the identity o

"sers and pro'ides a"thori*ed "sers with icenses or protected inormation.

#ierence etween A# 2003 2008

4. 2008 is the com+ination o 'ista and windows ser'er 2003r2.

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 2/22

2. $O#C one new domain controer introd"ced in it. ($ead Ony #omain Controer).

3. 5#S (5indows #epoyment Ser'ice) instead o $S in 2003 ser'er.

6. Shadow copy or each and e'ery oders.

7. oot se"ence is changed.

. nstaation is 32 +it where as 2003 it is 4 and 32, that9s why instaation o 2008 is

aster.

:. Ser'ices are known as roe in it.

8. ;ro"p poicy editor is a separate option in ads.

<. =he main dierence +etween 2003 and 2008 is >irt"ai*ation and Management.

40. 2008 has more in+"it components and "pdated third party dri'ers Microsot introd"ced

new eat"re ?yper>, 5indows 2008 introd"ces ?yper>, +"t ony on 6+it 'ersions.

44. n windows Ser'er 2008 'ersion, Microsot introd"cing new eat"res and technoogies,

some o which were not a'aia+e in windows ser'er 2003 with ser'ice pack 4 (S@4),that wi hep to red"ce the power cons"mption o ser'er and cient operating systems,

minimi*e en'ironmenta +yprod"cts, and increase ser'er eiciency.

42. Microsot windows ser'er 2008 has +een designed with energy eiciency in mind, to

 pro'ide c"stomers with ready and con'enient access to a n"m+er o new power sa'ingeat"res.

43. Many eat"res are "pdated as sec"rity, S and $O#C. % sec"rity it is ena+e

o"t+o"nd irewa as we as in+o"nd, S : reease, $ead Ony #omain Controers.

46. >irt"ai*ation.

47. Ser'er Core pro'ides the minim"m instaation re"ired to carry o"t a speciic roe, s"chas or a #?C@, #%S, or @rint ser'er.

4. etter Sec"rity.

4:. nhanced termina ser'ices.

48. %etwork Access @rotection.

4<. @ower She.

20. itocker.

• ditions a'aia+e in 2003 2008

• Windows erver #$$%

• Windows Web erver #$$%

• Windows erver #$$% tandard &dition (Microsoft Windows ' .$.$$# ervice *ack #)

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 3/22

• Windows erver #$$% &nterprise &dition (Microsoft Windows ' .$.$$+ ervice *ack

+)

• Windows erver #$$% atacenter &dition

• Windows torage erver #$$%

• Windows mall usiness erver  #$$% (codenamed /ougar) for  small businesses

• Windows &ssential usiness erver #$$% (codenamed /entro) for medium-si0ed

businesses1+2

• Windows erver #$$% for Itanium-based ystems

• Windows 3*/ erver #$$% 4 for high *erformance supercomputers

• Windows erver 5oundation #$$%

• Windows erver #$$6

• mall usiness erver for first server installations (up to # processors)

• Web &dition for basic Web surfing (up to # processors)

• tandard &dition for smaller server applications that don7t re8uire clustering (up to 9

processors)

• &nterprise &dition for larger server applications, and clustering (up to % processors)

• atacenter &dition for mainframe like servers (up to +#% processors)

• torage erver  for 'etwork :ttached torage evices (;.#.6<=$)

• &SMO $oe =ranser ($o Sei*e, $o =ranser) There are 5 types of FSMO Roles, They are

Schema Master. The schema master is responsible for processing the updates to the AD schema.Once the schema master updates the AD schema, these changes are replicated toall the D!s in the domain.

Domain "aming Master.

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 4/22

#t maintains the name spaces of the domain controllers on the domain.

$D %mulator.#t maintains the synchroni&ation of Time, pass'ord changes, authentication failures.

R#D Master.

#t is responsible for assigning the pools of R#D!s to other D on the domain.

#nfrastructure Master.(hen an ob)ect in a domain referenced to another ob)ect in a di*erent domain,acti+e directory represents the reference by the -#D lobally -ni/ue #denti0er1and S#D Security #denti0er1 and the D" of the acti+e directory ob)ect beingreferenced. First T'o roles are applicable in entire forest and remaining three roles areapplicable in entire domain le+el.

http233msdn.microsoft.com3en4us3library3cc6756.asp8

• Steps +y Steps to impement A#

• @atch "pdating or a A# ser'ers ( 3 Months once)

• ack"p =ypes There are 0+e types of bac9upsDaily :ac9up#ncremental :ac9upopy :ac9up"ormal :ac9up

Di*erential :ac9up

• Managing the sec"rity gro"ps "sing AC/.

• Monitor the ser'er heath "sing s"pport toos (#C diag, %et diag).

#C diag  This command4line tool analy&es the state of domain controllers in a forest or

enterprise and reports any problems to assist in troubleshooting. As an end4user reporting

program, Dcdiag encapsulates detailed 9no'ledge of ho' to identify abnormal beha+ior in

the system. Dcdiag displays command output at the command line.

Dcdiag consists of a frame'or9 for e8ecuting tests and a series of tests to +erify di*erent

functional areas of the system. This frame'or9 selects 'hich domain controllers are tested

according to scope directi+es from the user, such as enterprise, site, or single ser+er.

"et diag2 This command4line diagnostic tool helps to isolate net'or9ing and connecti+ity

problems by performing a series of tests to determine the state of your net'or9 client.

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 5/22

 These tests and the 9ey net'or9 status information they e8pose gi+e net'or9 administrators

and suppor

t personnel a more direct means of identifying and isolating net'or9 problems. Moreo+er,

because this tool does not re/uire parameters or s'itches to be speci0ed, support personnel

and net'or9 administrators can focus on analy&ing the output rather than on training usersho' to use the tool.

• Steps to Check A# Ser'er ?eath Check"p

Is it best recommended to do the following test once a month and keep the log files for trend analysisas well. To make thing easier I’ve provided the necessary urls of individual commands pointing to theTechNet so you can get more compressive details,

Dcdiag.exe /v >> c!temp!pre"dcdiag.t#tThis is a must and will always tell you if there is trouble with your $%s and/or services associated with

it

Netdiag.exe /v >> c!temp!pre"Netdiag.t#t

This will let us know if there are issues with the networking components on the $%. This along with thepost test also is a &uick easy way to ensure the patches installed is really installed '(ust check the topof the log)

Repadmin /showreps >> c!temp!pre"rep"partners.t#t

This shows all the replication and if it was successful or not. *ust be aware that +lobal %atalogs willhave more info here than a normal domain controller.

repadmin /replsum /errorsonly >> c!temp!pre"repadmin"err.t#t

This is the one that always takes forever but will let you know who you are having issues replicatingwith.

part from that -icrosoft offers another tool called -0T"$irvc.e#e. 1ou can run this tool in thedc’s and it’ll run most of the above mention commands and provide you the output into log files. 2eryhandy I would say. 1ou can download it from here.

3opefully this helps you when you troubleshoot your domain controllers but by no way is this allencompassing list of things to do. These are the standard steps normally I take but I would love to hearwhat you all do as well.

• ;ro"p @oicies (#i etween ;ro"p @oicies in 2003 2008) A#M

tempate in 2003 A#MB =empete in 2008

Group Policy is a feature of the Microsoft Windows ' family of  operating systems that control the workingenvironment of user accounts and computer accounts. >roup *olicy provides the centrali0ed management andconfiguration of operating systems, applications, and users7 settings in an  Active Directory  environment.

• 5hat is %=#S Uti too

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 6/22

"tdsutil.e8e is a command4line tool for accessing and managing a (indo'sActi+e Directory AD1 database. Microsoft recommends that "tdsutil only beused by e8perienced administrators and re/uires that the tool be used froman ele+ated command prompt. Start 3 ommand $rompt 3 Run asadministrator1

• A# O+Dect restore thro"gh Active Directory Tombstones.

Tombstone:

When Active Directory deletes an object from the directory, it does not physically removethe object from the database. Instead, Active Directory marks the object as deleted by

setting the object’s is Deleted attribute to T!", stripping most of the attributes from theobject, renaming the object, and then moving the object to a special container in the

object’s naming conte#t $%&' named CN=Deleted Objects. The object, no( calleda tombstone, is invisible to normal directory operations.

)bviously, objects don’t remain in the &%*Deleted )bjects container forever. The

default tombstone lifetime is + days for forests initially built using Windo(s- and

Windo(s /erver 0, and 12 days for forests that (ere initially built (ith Windo(s /erver

0 /31. 4ou can change the tombstone lifetime by setting the tombstone5ifetime

attribute of the &%*Directory /ervice,&%*Windo(s %T, &%*/ervices,&%*&onfiguration,

D&* object.

"very 1 hours, each domain controller starts a garbage collection process. $This can be

changed by setting a ne( value for the garbage&oll3eriod attribute of the &%*Directory

/ervice,&%*Windo(s %T, &%*/ervices,&%*&onfiguration,D&* object.' This garbage

collection scans all of the tombstones on the D& and physically deletes any that are older

than the tombstone lifetime.

The Deleted Objects container is hidden and can not be vie(ed by using Active Directory

!sers and &omputers and AD/I"DIT.6/&. 7ut you can useLDP.EXE.

8or e#ample, in this documentation, I delete an account (ith

distinguished%ame9 CN=Jenn !ates"O#=$ar%eting"DC=$icros&ip"DC=com.

That account (ill be stored in Deleted )bjects container in the form9

CN=Jenn !ates'DEL:c(f)*f+,-(f+-)c/-0(+*-d1ad1ee2a(d+"CN=Deleted

Objects"DC=$icros&ip"DC=com

and (ith the attribute isDeleted is set T3#E.

To restore the user account, you have to use 5D3.":" to modify the properties of the

deleted objects.

httpE--dani3r.wordpress.com-200<-0-22-restoredeetedo+Dectsinacti'edirectorydata+ase

"singtom+stonereanimationdpe1e-

• A# O+Dect restore thro"gh A"thoritati'e %on A"thoritati'e restore

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 7/22

• #ea"t @ath o A# #ata+ase and name o that A# #ata+ase ie

#ea"t path o A# #ata+ase CEF5indowsFsystem32F%=#S

 %ame o the A# #ata+ase &ie is %=#S.#=

• 5hat is SGS>O/

 The sys;O< folder stores the ser+er=s copy of the domain=s public 0les. Thecontents such as group policy, users etc of the sys+ol folder are replicated toall domain controllers in the domain. The sys+ol folder must be located on an"TFS +olume.

Or1

 :ll active directory data base security related information store in ?@ABfolder and its only created on '5 partition.

• #ea"t SGS>O/ pathCEF5indowsFSGS>O/

• 5hat is ;o+a Cataoghe global catalog is a distributed data repository that contains a searchable, partialrepresentation of every obCect in every domain in a multidomain :ctive irectory forest. heglobal catalog is stored on domain controllers that have been designated as global catalogservers and is distributed through multimaster replication. earches that are directed to the

global catalog are faster because they do not involve referrals to different domain controllers.

• 5hat is &orest prep

&orest @rep

&orestprep is Microsot 1change Ser'er 2003 "tiity "se to prepare or Acti'e

#irectory or Microsot 1change Ser'er 2003 instaation +y "pdating schema and

conig"ring partition in Acti'e #irectory.

• 5hat is #omain @rep#omain @rep

#omain prep is Microsot 1change Ser'er 2003 "tiity which is "se or Acti'e

#irectory domain partition or Microsot 1change Ser'er 2003 instaation

• Command to check repication etween A# Ser'ers

$epadmin

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 8/22

5hat is ;@O

?ow ;@ wi appy (;@ ?ierarchy)

/S#O (oca Site #omain OU /e'e)

5hat is $o+o Copy

AnsE $OO Copy

#ri'e to #ri'e

 

ro+ocopy #EF EF -e -sec -rE4 -wE4 -ogEcEFtempF1ch#ata+ase.og -eta

ro+ocopy /EF MEF -e -sec -rE4 -wE4 -ogEcEFtempF1chog.og -eta

 

5hat is #%S

5hat is #?C@

?ow to Conig"re #?C@

3=ime Sync iss"e etween A# Ser'ers

• &ie Ser'er 

• #&SE #istri+"ted ie system consists o two technoogies

•  #&S %amespaceE #&S namespaces ena+e yo" to gro"p shared oders

ocated on dierent ser'ers in to one or more ogicay str"ct"red

namespaces.#&S namespace can correspond to m"tipe shared

oders on m"tipe ser'ers. =his str"ct"re can pro'ide a"t

toerance and the a+iity to a"tomaticay connect "sers to oca

shared oders, when a'aia+e.

• #&S $epicationE#&S repication is a m"timaster repication engine that

ena+es yo" to synchroni*e oders on m"tipe ser'ers across oca or wide area

network connections. 

• A# Sites Ser'ices

• A# #omains tr"st

AD Site Replication :et'een #ntersite > #ntra Site 1? 'or9s for #nter Site > :ridge head for intra Site

• A# #&S (asics on #istri+"ted ie system)

 

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 9/22

Windows:

 

Ser'er Une1pected re+oot

=ro"+e shooting steps or Ser'er Une1pected re+oot

#"mp &ie Conig"ration

Anay*ing #"mp rror 

Steps to "id new ser'er and yet to impement A#C in this ser'er 

5hat is $A#

t is a techni"e that com+ines m"tipe disk dri'es in to a ogica "nit set and

 pro'ides protection, perormance, or +oth.

$A# Conig"ration $A# 0, $A#4 $A# 7

$A# 0E $A# 0 "sers data striping techni"es, where data is striped across a thedisks with in a $A# set. =hereore it "tii*es the " storage capacity o $A#

Set. =o read data a the stripes are p"t +ack together +y the controer. 5hen the

n"m+er o dri'es in the $A# set increases, perormance impro'es +eca"se more

data can +e read or write sim"taneo"sy. $A# 0 is a good option or appications

that need high -O thro"ghp"t. ?owe'er, these appications re"ire high

a'aia+iity d"ring dri'e ai"res, $A# 0 does not pro'ide protection and

a'aia+iity.

$A# 4E $A# 4 is +ased on the mirroring techni"e. n this $A# conig"ration,

data is mirrored to pro'ide a"t toerance. A $A# 4 set consists o two disk dri'es and e'ery write is written to +oth disks. =he mirroring is transparent to the

host. #"ring disk ai"re, the impact on data reco'ery in $A# 4 is the ast among

a $A# impementations. =his is +eca"se the $A# controer "ses the mirror 

dri'e or data reco'ery. $A#4 is s"ita+e or appications that re"ire high

a'aia+iity and is no constraint.

$A# 7E $A# 7 is a 'ersatie $A# impementation. t is simiar to $A# 6

 +eca"se it "ses striping. =he dri'es are aso independenty accessi+e. =he

dierence +etween $A# 6 and $A# 7 is parity ocation. n $A# 6 @arity is

written to a dedicated dri'e, create a write +otteneck or the parity disk. n $A# 7

 parity is distri+"ted across a disks to o'ercome the write +otteneck o a dedicated parity disk.

5hat is /O

Defnition - What does Integrated Lights-Out (iLO) mean?

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 10/22

Integrated Lights-Out (iLO) is a remote server management processor, embedded on the system

boards of HP ProLiant and Blade servers, that allows controlling and monitoring of HP servers from

a remote location. HP iLO management is a powerful tool that provides multiple ways to configure,

update, monitor, and run servers remotely.

The embedded iLO management card has its own network connection and IP address to which

server administrators can connect via Domain Name System (DNS)/Dynamic Host Configuration

Protocol (DHCP) or through a separate dedicated management network. iLO provides a remote

Web-based console, which can be used to administer the server remotely. The iLO port is an

Ethernet port, which can be enabled through the ROM-Based Setup Utility (RBSU).

Techopedia explains Integrated Lights-Out (iLO)

iLO comes preconfigured with proLiant servers of the 300 series and above. A default iLO user

account and password is included. iLO can be configured through several ways including:

• Browser-based configuration.

• iLO RBSU accessed using the F8 key during power-on self-test (POST).

• Remote scripted configuration.

• Local on-line and local scripted setup.

The iLO management tool allows a user to perform the following actions on the server remotely:

• Power on and power off the server.

• Restart the server.

• Monitor the server, regardless of the state of the server’s operating system.

• Measure power usage.

• Apply patches, firmware updates, and critical virus updates through virtual media and virtual

folders.

• Access system event logs and the HP Integrated Management Log.

HP 100 series servers include the Lights-Out 100 Remote Management Option with limited features.

  H̀P iLO has now been replaced by Integrated Lights-Out Advanced (known as iLO2 and iLO3). The

latest releases of HP Integrated Lights-Out 2 (iLO2) and Lights-Out 3 (iLO3) have simplified the

server setup process and enabled remote power and thermal optimization. As of Aug 2011, the

current firmware versions of iLO 2 and iLO 3 are 2.07 and 1.26, respectively.

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 11/22

(hat is lobal atalog@

%+ery domain controller in a forest stores three full 'ritable directory partitions2 a domain

directory partition, a schema directory partition, and a con0guration directory partition. A

lobal atalog is a domain controller that stores these 'ritable directory partitions, as 'ell

as a partial, read4only copy of all other domain directory partitions in the forest. The

additional directory partitions are partial because, although they collecti+ely contain e+ery

ob)ect in the directory, only a limited set of speci0c attributes are included for each ob)ect.

 The lobal atalog is built automatically by the Acti+e Directory replication system.

All of the directory partitions on a lobal atalog ser+er, 'hether full or partial partitions,

are stored in a single directory database "tds.dit1 on that ser+er. There is no separate

storage area for lobal atalog attributesB they are treated as additional information in the

domain controller directory database.

(hen a ne' domain is added to the forest, the information about the ne' domain is stored

in the con0guration directory partition, 'hich reaches the lobal atalog ser+er and all

domain controllers1 through replication of forest4'ide information. (hen a ne' lobal

atalog ser+er is designated, this information is also stored in the con0guration directory

partition and replicated to all domain controllers in the forest.

A lobal atalog contains #nformation about ob)ects from

all domains in an Acti+e Directory forest.

http233'''.petri.co.il3ma9e4'indo's4ser+er4C4domain4

controller4a4global4catalog.htm

(hat are the di*erent roup Scopes and di*erent group types@

roup scopes are 6 types they are Domain local group scope, lobal group

scope, and -ni+ersal group scope

roup types are t'o types they are security group, distribution group.

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 12/22

Domain <ocal roup scope2 -se this group to grant permissions to domain

resources that are located in the same domain in 'hich the domain local

group 'as created. Domain local groups can e8ist in all mi8ed, nati+e and

interim functional le+el of domains and forests.

lobal roup scope2 -sers 'ith similar functions can be grouped under

global scope and can be gi+en permission to access a resource a+ailable in

local or another domain in the same forest. Simply global groups can be use

to grant permissions to gain access to resources that are located in any

domain but in a single forest as their memberships are limited.

-ni+ersal group Scope2 These groups are precisely used for email distribution

and can be granted access to resources in all trusted domain as these groups

can only be used as a security principal in a 'indo's CCC nati+e or 'indo'sser+er CC6 domain functional le+el domain. -ni+ersal group memberships

are not limited li9e global groups. All domain user accounts and groups can

be a member of uni+ersal group.

roup types2 Security and Distribution

Security group2 -se security groups to grant permission to gain access to

resources. Sending an email message to a group sends the message to all

group members. Therefore security groups share the capabilities ofdistributed groups.

Distributed roups2 Distributed roups are used for sending e4mail messages

to groups of users. $ermissions cannot grant to security groups.

Forest Functional Levels

Windows Server 2003 supports three forest functional levels:

• Windows 2000 Native --Required while any Windows Server 2000

domain controllers remain in your forest. Supports domain controllers

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 13/22

running Windows NT 4.0, Windows 2000 server, and Windows Server

2003.

• Windows Server 2003 Interim --A special functional level only

implemented during NT 4.0 to Windows 2003 upgrades.

• Windows Server 2003 --All DCs in the forest must be running

Windows Server 2003, and all domains in the forest must be at the

Windows 2003 Domain functional level before you can raise your forest

functional level to Windows Server 2003.

Windows Server 2008 supports threeforest functional levels:

• Windows 2000 Native --Supports Windows 2000, Windows Server

2003, and Windows Server 2008 domain controllers.

• Windows Server 2003 --Allows for a mix of Windows Server 2003 and

Windows Server 2008 functional level domains.

• Windows Server 2008 --Ensures all domain controllers in the forest

are running Windows Server 2008 and all domains have been raised to the

Windows Server 2008 domain functional level.

Note:

To install Exchange Server 2010, the Active Directory forest functional level

MUST be Windows Server 2003 or higher.

Windows 2000 Native and Windows Server 2003 Interim modes are NOT

supported.

Domain Functional Levels

Windows Server 2003 supports fourdomain functional levels:

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 14/22

• Windows 2000 Mixed --Allows Windows Server 2003 domain

controllers to interoperate with other domain controllers running Windows

Server 2003, Windows 2000 Server, and Windows NT 4.0.

• Windows 2000 Native --Allows domain controllers running WindowsServer 2003 to interact with domain controllers running either Windows

Server 2003 or Windows 2000 Server.

• Windows Server 2003 Interim --Supports only domain controllers

running Windows Server 2003 and Windows NT 4.0.

• Windows Server 2003 --Supports only Windows Server 2003 domain

controllers.

Windows Server 2008 supports three domain functional levels:

• Windows 2000 Native --Allows domain controllers running Windows

Server 2008 to interact with domain controllers running either Windows

Server 2008, Windows Server 2003, or Windows 2000 Server.

• Windows Server 2003 --Supports an environment comprised of a

mixture of Windows Server 2003 and Windows Server 2008 domain

controllers.

• Windows Server 2008 --Only available after all domain controllers in a

domain are running Windows Server 2008.

(hat is ;4Motion@

@Mware VMotion enables the live migration of running virtual machines from one

physical server to another with 0ero downtime, continuous service availability, and

complete transaction integrity. It is transparent to users.

@Mware what files make up a virtual machineD

xtensi !ile "ame Description

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 15/22

on

.log E+mname.log

or

+m'are.log

 This is the 0le that 9eeps a logof 9ey ;M'are (or9stationacti+ity. This 0le can be useful in

troubleshooting if you encounterproblems. This 0le is stored inthe directory that holds thecon0guration .+m81 0le of the+irtual machine.

.nvram E+mname.n+ram

or

n+ram

 This is the 0le that stores thestate of the +irtual machine=s:#OS.

vmdk E+mname.+md9 This is a +irtual dis9 0le, 'hichstores the contents of the +irtualmachine=s hard dis9 dri+e.

A +irtual dis9 is made up of one ormore.+md9 0les. #f you ha+especi0ed that the +irtual dis9should be split into : chun9s,the number of .+md9 0les depends

on the si&e of the +irtual dis9. Asdata is added to a +irtual dis9,the .+md9 0les gro' in si&e, to ama8imum of : each. #f youspecify that all space should beallocated 'hen you create the dis9,these 0les start at the ma8imumsi&e and do not gro'.1 Almost all of a .+md9 0le=s content is the +irtualmachine=s data, 'ith a smallportion allotted to +irtual machine

o+erhead.#f the +irtual machine is connecteddirectly to a physical dis9, ratherthan to a +irtual dis9,the .+md9 0le stores informationabout the partitions the +irtualmachine is allo'ed to access.%arlier ;M'are products used thee8tension.ds9 for +irtual dis9 0les.

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 16/22

Edis9name4EGGG.+md9 This is a redo4log 0le, createdautomatically 'hen a +irtualmachine has one or moresnapshots. This 0le stores changesmade to a +irtual dis9 'hile the

+irtual machine is running. Theremay be more than one such 0le. The GGG indicates a uni/ue suH8added automatically by ;M'are(or9station to a+oid duplicate 0lenames.

.+mem Euuid.+mem The +irtual machine=s paging 0le,'hich bac9s up the guest mainmemory on the host 0le system. This 0le e8ists only 'hen the

+irtual machine is running, or if the+irtual machine has crashed.

EsnapshotInameIandInumber

%ach snapshot of a +irtualmachine that is po'ered onhas an associated .vmem 0le,'hich contains the guest=smain memory, sa+ed as partof the snapshot.

.vmsd E+mname.+msd This is a centrali&ed 0le for storinginformation and metadata aboutsnapshots.

.vmsn E+mname4Snapshot.+msn This is the snapshot state 0le,'hich stores the running state of a+irtual machine at the time youta9e that snapshot

E+mname4SnapshotEGGG.+msn

 This is the 0le 'hich stores thestate of a snapshot

.vmss E+mname.+mss This is the suspended state 0le,'hich stores the state of asuspended +irtual machine

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 17/22

.Some earlier ;M'are productsused the e8tension .std forsuspended state 0les

.vmtm E+mname.+mtm This is the con0guration 0lecontaining team data.

.vmx E+mname.+m8 This is the primary con0guration0le, 'hich stores settings chosen inthe "e' ;irtual Machine (i&ard or+irtual machine settings editor. #fyou created the +irtual machineunder an earlier +ersion of ;M'are(or9station on a <inu8 host, this

0le may ha+e a .cfg e8tension.vmxf E+mname.+m8f This is a supplemental

con0guration 0le for +irtualmachines that are in a team. "otethat the .vmxf 0le remains if a+irtual machine is remo+ed fromthe team.

Main di*erence bet'een authoritati+e and non

authoritati+e restore@

"on-Authoritative 2 "on4Authoritati+e method 'ill restore an acti+edirectory to the ser+er in 'hich the restore is being done and 'ill thenrecei+e all of the recent updates from its replication partners in thedomain.

Authoritative 2 Authoritati+e method restores the D directory to the

state that it 'as in 'hen the bac9up 'as made, then o+er'rites all theother D=s to match the restored D.

(hat is a host 0le in 'indo's 73J3C, and 'here

can it 0nd@

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 18/22

A host 0le in 'indo's is used to map host names to ip addresses.

 The host 0le is located deep do'n in the 'indo's folder

c2K'indo'sKsystem6Kdri+ersKetc1

#t is basically a plain te8t 0le and the si&e of the original defaulthosts 0le is around JL bytes.

o' to acti+ate telnet in 'indo's 7@

ontrol panel 444programs and features 444turn 'indo's features

on or o*444select telnet client or1

Open add or remo+e programsapp'i&.cpl1 4 turn 'indo'sfeatures on or o*444select telnet client

(hat is ost and pst outloo9 0les@

 :bout Outlook ata Files (.pst and .ost) here are two types of Outlook ata Files used

by Outlook. :n Outlook ata File (.pst) is used for most accounts. If you are using a Microsoft

&"change account, your items are usually delivered to and saved on the mail server.

A 4 Affline torage able

* 4 *ersonal torage able

The max. OST/PST file sie !iffers !epen!ing on the "ersion of Outlook

Autlook #$$# 4 #>

Autlook #$$6 4 #$>

Autlook #$$< 4 #$>

Autlook #$+$ E #$+6 4 ;$>

#y !efault the OST file is store! in user$s profile ha"ing follo%ing path

/FG!sersG!ser *rofileG:ppataGBocalGMicrosoftGAutlookG

What is the main functionality of chkdsk?

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 19/22

Best Answer: A utility program in Windows that looks for lost clusters on the hard disk. It also reports the

command line utility in Windows. Running Chkdsk with the /f parameter (chkdsk /f) reclaims the lost

clusters and turns them into .CHK files, which can generally be discarded. Running without the /f reports

the current condition of the disk without "f"ixing anything.

#ow to recover data a$ter %lue screen on death?

A problem has been detected and 'indo's has been shutdo'n to pre+ent

damage to your computer.

#f the problem is the 0rst time you ha+e seen this stop error screen,

Restart your computer, if this screen appears again, follo' these steps.

hec9 to ma9e sure any hard'are or soft'are is properly installed.

#f this is a ne' installation as9 your soft'are or hard'are manufacturer for

any 'indo's updates u might need.

#f problem continue, disable or remo+e any ne'ly installed hard'are or

soft'are. Disable :#OS memory options such as caching or shado'ing. #f u

need to use safe mode to remo+e or disable components, restart ur

computer, press FJ to select ad+anced start up options, and then select safe

mode.

Data recovery a$ter %lue screen o$ death

=he dreaded +"e screen o death is oten a transitory e'ent and is i1ed +y re+ooting.

Sometimes tho"gh it can +e more serio"s and can pre'ent the system re+ooting. t is

not common or this error to ca"se data oss, +"t i1ing the pro+em can sometimes

in'o'e ha'ing to repair or reoad the operating system. =o pre'ent any oss o data,

this is the correct stage to ens"re yo" ha'e a 'aid +ack"p o yo"r data. =he oowing

steps can +e carried o"t. As it is normay ony the system dri'e ca"sing the pro+emthen this is the ony one we wi concentrate on. Cn5 $eco'ery sotware (downoad

here) wi ena+e data to +e reco'ered +eore the system is repaired, e'en rom a 'ery

damaged or corr"pted disk.

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 20/22

&tage '

$emo'e the system dri'e and set it "p as a sa'e dri'e on a dierent @C. t is

oten easiest to "se a US caddy to do this. yo" are H"cky9 the dri'e wi

dispay as a ogica dri'e, and a data ies can +e copied o and stored in a

sae ocation. the dri'e does not dispay as a ogica dri'e, or the operating

system s"ggests that it sho"d +e reormatted, the proceed with stage 2

&tage (

As a+o'e, set the dri'e "p as a sa'e dri'e, eg in a US caddy, and oad Cn5

$eco'ery on to the host @C. ns"re that the host @C has ade"ate space or the

data to +e reco'ered. Start Cn5 $eco'er and on the irst screen seect the

Haied9 dri'e and then press the icon o the dri'e which wi start initia anaysis

o the dri'e. A "e screen is not normay ca"sed +y maDor hardware ai"re so

one wo"d e1pect the irst physica test to work. =he second test does some

 +asic 'eriication o key sectors on the dri'e. these pass, then it is worth

 proceeding with the wi*ard to do a " reco'ery. ?owe'er, i the disk is "

and ony certain ies are re"ired, at this point it may +e +etter to go to the

main program and do a man"a reco'ery aowing or ie seection. =he ie

iter can +e "sed to seect or skip certain ies.

5hen reco'ering a system disk there wi +e a mi1 o appication ies and data

ies. Atho"gh +oth types o ies can +e reco'ered it is oten impossi+e to D"st

copy the appications +ack and e1pect them to work. =his is d"e to registry

settings +eing re"ired. @"t simpy, it is easiest to reinsta appications, and

add +ack "ser data. =he other reason not to reco'er appication and systems

ies is that one may +e corr"pted and co"d +e reason or the +"e screen o

death.

&tage )

Once a "ser data has +een reco'ered and stored saey it is time to try and take

care o the +"e screen pro+em. #epending on operating system it may +e

 possi+e to re+oot in SaeMode or "se the Microsot $eco'ery consoe. &"rther

options inc"ding doing a repair reoad retaining a data and settings. this

ais, then a " reoad wi +e necessary which wi remo'e a ogica paths to

e1isting data. At this point it is essentia to know that a data is saey stored

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 21/22

esewhere. %, i this stage is done witho"t reco'ering the data irst, typicay

Cn5 $eco'ery can sti reco'er the "ser ies

Difference between FAT & NTFS FileSystems

FAT File system

• It provides no security if the user logs in locally. The file and folder level

security permission does not exist.

It supports only 8 characters long file name.

• It is suitable for a partition disks that is less than 500 MB.

• Partition and file size can be up to 4 GB.

• It supports no file compression.

• Disk can get fragmented thus slowing down the access.

• It is not very reliable since it does not support bad cluster mapping.

NTFS File system

• It provides security for both local and remote users. The security is

provided to the level of files and folders.

• It supports 255 characters long file name.

• It is suitable for partition that is greater than 500 MB.

• Partition size can be up to 16 Exabyte.

• It supports file compression.

• It provides lesser possibility of fragmentation.

• It is highly reliable since it supports bad cluster mapping and transaction

logging.

 

What is DNS & WINS

8/20/2019 Cognizant Interview Questions

http://slidepdf.com/reader/full/cognizant-interview-questions 22/22

 #%S is a #omain %aming System, which reso'es ?ost names to @

addresses. t "ses"y "aiied domain names. #%S is a nternet standard

"sed to reso'e host names

5%S is a 5indows nternet %ame Ser'ice, which reso'es %et+ios names

to @Address. =his is proprietary or 5indows

Types of DNS Servers

 @rimary #%S

Secondary #%S

Acti'e #irectory ntegrated #%S

&orwarder Caching ony #%S