8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 1/22
Cognizant interview Questions Active Directory
• Upgrading windows 2003 to windows 2008.
• Monitoring and Checking SCOM (System Center Operation manager) AertsSystem Center Operations Manager (SCOM) is a cross-platform data center managementsystem for operating systems and hypervisors. It uses a single interface that shows state, healthand performance information of computer systems. It also provides alerts generated accordingto some availability, performance, configuration or security situation being identified. It workswith Microsoft Windows erver and !ni"-based hosts.
• !nowedge on windows C"ster
• A# $os %ot &SMO $oes (&eat"re in 2008)
Acti'e #irectory Certiicate Ser'ices
t pro'ides c"stomi*ed ser'ices or creating and managing p"+ic key certiicates "sed insotware sec"rity systems.
Acti'e #irectory #omain Ser'icest stores the inormation a+o"t "sers, comp"ters and other de'ices on the network. A##S heps
administrators sec"rey manage this inormation and aciitates reso"rce sharing andcoa+oration +-w "sers.
Acti'e #irectory &ederation Ser'ices.
t pro'ides we+singesingon technoogy to a"thenticate a "ser to access m"tipe we+appications +y "sing a singe "ser acco"nt. A#&S accompishes this +y sec"rey ederating or
sharing "ser identities and access rights.
Acti'e #irectory /ightweight #irectory Ser'ices.
t pro'ide storage or appication speciic data, or directory ena+ed appications that do not
re"ire the inrastr"ct"re o A##S. M"tipe interaces o A# /#S can e1ist on a singe ser'er,
each o which can ha'e its own schema. Acti'e #irectory $ights Management Ser'ices.
t heps yo" to protect inormation rom "na"thori*ed "se. A# $MS esta+ishes the identity o
"sers and pro'ides a"thori*ed "sers with icenses or protected inormation.
#ierence etween A# 2003 2008
4. 2008 is the com+ination o 'ista and windows ser'er 2003r2.
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 2/22
2. $O#C one new domain controer introd"ced in it. ($ead Ony #omain Controer).
3. 5#S (5indows #epoyment Ser'ice) instead o $S in 2003 ser'er.
6. Shadow copy or each and e'ery oders.
7. oot se"ence is changed.
. nstaation is 32 +it where as 2003 it is 4 and 32, that9s why instaation o 2008 is
aster.
:. Ser'ices are known as roe in it.
8. ;ro"p poicy editor is a separate option in ads.
<. =he main dierence +etween 2003 and 2008 is >irt"ai*ation and Management.
40. 2008 has more in+"it components and "pdated third party dri'ers Microsot introd"ced
new eat"re ?yper>, 5indows 2008 introd"ces ?yper>, +"t ony on 6+it 'ersions.
44. n windows Ser'er 2008 'ersion, Microsot introd"cing new eat"res and technoogies,
some o which were not a'aia+e in windows ser'er 2003 with ser'ice pack 4 (S@4),that wi hep to red"ce the power cons"mption o ser'er and cient operating systems,
minimi*e en'ironmenta +yprod"cts, and increase ser'er eiciency.
42. Microsot windows ser'er 2008 has +een designed with energy eiciency in mind, to
pro'ide c"stomers with ready and con'enient access to a n"m+er o new power sa'ingeat"res.
43. Many eat"res are "pdated as sec"rity, S and $O#C. % sec"rity it is ena+e
o"t+o"nd irewa as we as in+o"nd, S : reease, $ead Ony #omain Controers.
46. >irt"ai*ation.
47. Ser'er Core pro'ides the minim"m instaation re"ired to carry o"t a speciic roe, s"chas or a #?C@, #%S, or @rint ser'er.
4. etter Sec"rity.
4:. nhanced termina ser'ices.
48. %etwork Access @rotection.
4<. @ower She.
20. itocker.
• ditions a'aia+e in 2003 2008
• Windows erver #$$%
• Windows Web erver #$$%
• Windows erver #$$% tandard &dition (Microsoft Windows ' .$.$$# ervice *ack #)
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 3/22
• Windows erver #$$% &nterprise &dition (Microsoft Windows ' .$.$$+ ervice *ack
+)
• Windows erver #$$% atacenter &dition
• Windows torage erver #$$%
• Windows mall usiness erver #$$% (codenamed /ougar) for small businesses
• Windows &ssential usiness erver #$$% (codenamed /entro) for medium-si0ed
businesses1+2
• Windows erver #$$% for Itanium-based ystems
• Windows 3*/ erver #$$% 4 for high *erformance supercomputers
• Windows erver 5oundation #$$%
• Windows erver #$$6
• mall usiness erver for first server installations (up to # processors)
• Web &dition for basic Web surfing (up to # processors)
• tandard &dition for smaller server applications that don7t re8uire clustering (up to 9
processors)
• &nterprise &dition for larger server applications, and clustering (up to % processors)
• atacenter &dition for mainframe like servers (up to +#% processors)
• torage erver for 'etwork :ttached torage evices (;.#.6<=$)
• &SMO $oe =ranser ($o Sei*e, $o =ranser) There are 5 types of FSMO Roles, They are
Schema Master. The schema master is responsible for processing the updates to the AD schema.Once the schema master updates the AD schema, these changes are replicated toall the D!s in the domain.
Domain "aming Master.
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 4/22
#t maintains the name spaces of the domain controllers on the domain.
$D %mulator.#t maintains the synchroni&ation of Time, pass'ord changes, authentication failures.
R#D Master.
#t is responsible for assigning the pools of R#D!s to other D on the domain.
#nfrastructure Master.(hen an ob)ect in a domain referenced to another ob)ect in a di*erent domain,acti+e directory represents the reference by the -#D lobally -ni/ue #denti0er1and S#D Security #denti0er1 and the D" of the acti+e directory ob)ect beingreferenced. First T'o roles are applicable in entire forest and remaining three roles areapplicable in entire domain le+el.
http233msdn.microsoft.com3en4us3library3cc6756.asp8
• Steps +y Steps to impement A#
• @atch "pdating or a A# ser'ers ( 3 Months once)
• ack"p =ypes There are 0+e types of bac9upsDaily :ac9up#ncremental :ac9upopy :ac9up"ormal :ac9up
Di*erential :ac9up
• Managing the sec"rity gro"ps "sing AC/.
• Monitor the ser'er heath "sing s"pport toos (#C diag, %et diag).
#C diag This command4line tool analy&es the state of domain controllers in a forest or
enterprise and reports any problems to assist in troubleshooting. As an end4user reporting
program, Dcdiag encapsulates detailed 9no'ledge of ho' to identify abnormal beha+ior in
the system. Dcdiag displays command output at the command line.
Dcdiag consists of a frame'or9 for e8ecuting tests and a series of tests to +erify di*erent
functional areas of the system. This frame'or9 selects 'hich domain controllers are tested
according to scope directi+es from the user, such as enterprise, site, or single ser+er.
"et diag2 This command4line diagnostic tool helps to isolate net'or9ing and connecti+ity
problems by performing a series of tests to determine the state of your net'or9 client.
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 5/22
These tests and the 9ey net'or9 status information they e8pose gi+e net'or9 administrators
and suppor
t personnel a more direct means of identifying and isolating net'or9 problems. Moreo+er,
because this tool does not re/uire parameters or s'itches to be speci0ed, support personnel
and net'or9 administrators can focus on analy&ing the output rather than on training usersho' to use the tool.
• Steps to Check A# Ser'er ?eath Check"p
Is it best recommended to do the following test once a month and keep the log files for trend analysisas well. To make thing easier I’ve provided the necessary urls of individual commands pointing to theTechNet so you can get more compressive details,
Dcdiag.exe /v >> c!temp!pre"dcdiag.t#tThis is a must and will always tell you if there is trouble with your $%s and/or services associated with
it
Netdiag.exe /v >> c!temp!pre"Netdiag.t#t
This will let us know if there are issues with the networking components on the $%. This along with thepost test also is a &uick easy way to ensure the patches installed is really installed '(ust check the topof the log)
Repadmin /showreps >> c!temp!pre"rep"partners.t#t
This shows all the replication and if it was successful or not. *ust be aware that +lobal %atalogs willhave more info here than a normal domain controller.
repadmin /replsum /errorsonly >> c!temp!pre"repadmin"err.t#t
This is the one that always takes forever but will let you know who you are having issues replicatingwith.
part from that -icrosoft offers another tool called -0T"$irvc.e#e. 1ou can run this tool in thedc’s and it’ll run most of the above mention commands and provide you the output into log files. 2eryhandy I would say. 1ou can download it from here.
3opefully this helps you when you troubleshoot your domain controllers but by no way is this allencompassing list of things to do. These are the standard steps normally I take but I would love to hearwhat you all do as well.
• ;ro"p @oicies (#i etween ;ro"p @oicies in 2003 2008) A#M
tempate in 2003 A#MB =empete in 2008
Group Policy is a feature of the Microsoft Windows ' family of operating systems that control the workingenvironment of user accounts and computer accounts. >roup *olicy provides the centrali0ed management andconfiguration of operating systems, applications, and users7 settings in an Active Directory environment.
• 5hat is %=#S Uti too
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 6/22
"tdsutil.e8e is a command4line tool for accessing and managing a (indo'sActi+e Directory AD1 database. Microsoft recommends that "tdsutil only beused by e8perienced administrators and re/uires that the tool be used froman ele+ated command prompt. Start 3 ommand $rompt 3 Run asadministrator1
• A# O+Dect restore thro"gh Active Directory Tombstones.
Tombstone:
When Active Directory deletes an object from the directory, it does not physically removethe object from the database. Instead, Active Directory marks the object as deleted by
setting the object’s is Deleted attribute to T!", stripping most of the attributes from theobject, renaming the object, and then moving the object to a special container in the
object’s naming conte#t $%&' named CN=Deleted Objects. The object, no( calleda tombstone, is invisible to normal directory operations.
)bviously, objects don’t remain in the &%*Deleted )bjects container forever. The
default tombstone lifetime is + days for forests initially built using Windo(s- and
Windo(s /erver 0, and 12 days for forests that (ere initially built (ith Windo(s /erver
0 /31. 4ou can change the tombstone lifetime by setting the tombstone5ifetime
attribute of the &%*Directory /ervice,&%*Windo(s %T, &%*/ervices,&%*&onfiguration,
D&* object.
"very 1 hours, each domain controller starts a garbage collection process. $This can be
changed by setting a ne( value for the garbage&oll3eriod attribute of the &%*Directory
/ervice,&%*Windo(s %T, &%*/ervices,&%*&onfiguration,D&* object.' This garbage
collection scans all of the tombstones on the D& and physically deletes any that are older
than the tombstone lifetime.
The Deleted Objects container is hidden and can not be vie(ed by using Active Directory
!sers and &omputers and AD/I"DIT.6/&. 7ut you can useLDP.EXE.
8or e#ample, in this documentation, I delete an account (ith
distinguished%ame9 CN=Jenn !ates"O#=$ar%eting"DC=$icros&ip"DC=com.
That account (ill be stored in Deleted )bjects container in the form9
CN=Jenn !ates'DEL:c(f)*f+,-(f+-)c/-0(+*-d1ad1ee2a(d+"CN=Deleted
Objects"DC=$icros&ip"DC=com
and (ith the attribute isDeleted is set T3#E.
To restore the user account, you have to use 5D3.":" to modify the properties of the
deleted objects.
httpE--dani3r.wordpress.com-200<-0-22-restoredeetedo+Dectsinacti'edirectorydata+ase
"singtom+stonereanimationdpe1e-
• A# O+Dect restore thro"gh A"thoritati'e %on A"thoritati'e restore
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 7/22
• #ea"t @ath o A# #ata+ase and name o that A# #ata+ase ie
#ea"t path o A# #ata+ase CEF5indowsFsystem32F%=#S
%ame o the A# #ata+ase &ie is %=#S.#=
• 5hat is SGS>O/
The sys;O< folder stores the ser+er=s copy of the domain=s public 0les. Thecontents such as group policy, users etc of the sys+ol folder are replicated toall domain controllers in the domain. The sys+ol folder must be located on an"TFS +olume.
Or1
:ll active directory data base security related information store in ?@ABfolder and its only created on '5 partition.
• #ea"t SGS>O/ pathCEF5indowsFSGS>O/
• 5hat is ;o+a Cataoghe global catalog is a distributed data repository that contains a searchable, partialrepresentation of every obCect in every domain in a multidomain :ctive irectory forest. heglobal catalog is stored on domain controllers that have been designated as global catalogservers and is distributed through multimaster replication. earches that are directed to the
global catalog are faster because they do not involve referrals to different domain controllers.
• 5hat is &orest prep
&orest @rep
&orestprep is Microsot 1change Ser'er 2003 "tiity "se to prepare or Acti'e
#irectory or Microsot 1change Ser'er 2003 instaation +y "pdating schema and
conig"ring partition in Acti'e #irectory.
• 5hat is #omain @rep#omain @rep
#omain prep is Microsot 1change Ser'er 2003 "tiity which is "se or Acti'e
#irectory domain partition or Microsot 1change Ser'er 2003 instaation
• Command to check repication etween A# Ser'ers
$epadmin
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 8/22
5hat is ;@O
?ow ;@ wi appy (;@ ?ierarchy)
/S#O (oca Site #omain OU /e'e)
5hat is $o+o Copy
AnsE $OO Copy
#ri'e to #ri'e
ro+ocopy #EF EF -e -sec -rE4 -wE4 -ogEcEFtempF1ch#ata+ase.og -eta
ro+ocopy /EF MEF -e -sec -rE4 -wE4 -ogEcEFtempF1chog.og -eta
5hat is #%S
5hat is #?C@
?ow to Conig"re #?C@
3=ime Sync iss"e etween A# Ser'ers
• &ie Ser'er
• #&SE #istri+"ted ie system consists o two technoogies
• #&S %amespaceE #&S namespaces ena+e yo" to gro"p shared oders
ocated on dierent ser'ers in to one or more ogicay str"ct"red
namespaces.#&S namespace can correspond to m"tipe shared
oders on m"tipe ser'ers. =his str"ct"re can pro'ide a"t
toerance and the a+iity to a"tomaticay connect "sers to oca
shared oders, when a'aia+e.
• #&S $epicationE#&S repication is a m"timaster repication engine that
ena+es yo" to synchroni*e oders on m"tipe ser'ers across oca or wide area
network connections.
• A# Sites Ser'ices
• A# #omains tr"st
AD Site Replication :et'een #ntersite > #ntra Site 1? 'or9s for #nter Site > :ridge head for intra Site
• A# #&S (asics on #istri+"ted ie system)
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 9/22
Windows:
Ser'er Une1pected re+oot
=ro"+e shooting steps or Ser'er Une1pected re+oot
#"mp &ie Conig"ration
Anay*ing #"mp rror
Steps to "id new ser'er and yet to impement A#C in this ser'er
5hat is $A#
t is a techni"e that com+ines m"tipe disk dri'es in to a ogica "nit set and
pro'ides protection, perormance, or +oth.
$A# Conig"ration $A# 0, $A#4 $A# 7
$A# 0E $A# 0 "sers data striping techni"es, where data is striped across a thedisks with in a $A# set. =hereore it "tii*es the " storage capacity o $A#
Set. =o read data a the stripes are p"t +ack together +y the controer. 5hen the
n"m+er o dri'es in the $A# set increases, perormance impro'es +eca"se more
data can +e read or write sim"taneo"sy. $A# 0 is a good option or appications
that need high -O thro"ghp"t. ?owe'er, these appications re"ire high
a'aia+iity d"ring dri'e ai"res, $A# 0 does not pro'ide protection and
a'aia+iity.
$A# 4E $A# 4 is +ased on the mirroring techni"e. n this $A# conig"ration,
data is mirrored to pro'ide a"t toerance. A $A# 4 set consists o two disk dri'es and e'ery write is written to +oth disks. =he mirroring is transparent to the
host. #"ring disk ai"re, the impact on data reco'ery in $A# 4 is the ast among
a $A# impementations. =his is +eca"se the $A# controer "ses the mirror
dri'e or data reco'ery. $A#4 is s"ita+e or appications that re"ire high
a'aia+iity and is no constraint.
$A# 7E $A# 7 is a 'ersatie $A# impementation. t is simiar to $A# 6
+eca"se it "ses striping. =he dri'es are aso independenty accessi+e. =he
dierence +etween $A# 6 and $A# 7 is parity ocation. n $A# 6 @arity is
written to a dedicated dri'e, create a write +otteneck or the parity disk. n $A# 7
parity is distri+"ted across a disks to o'ercome the write +otteneck o a dedicated parity disk.
5hat is /O
Defnition - What does Integrated Lights-Out (iLO) mean?
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 10/22
Integrated Lights-Out (iLO) is a remote server management processor, embedded on the system
boards of HP ProLiant and Blade servers, that allows controlling and monitoring of HP servers from
a remote location. HP iLO management is a powerful tool that provides multiple ways to configure,
update, monitor, and run servers remotely.
The embedded iLO management card has its own network connection and IP address to which
server administrators can connect via Domain Name System (DNS)/Dynamic Host Configuration
Protocol (DHCP) or through a separate dedicated management network. iLO provides a remote
Web-based console, which can be used to administer the server remotely. The iLO port is an
Ethernet port, which can be enabled through the ROM-Based Setup Utility (RBSU).
Techopedia explains Integrated Lights-Out (iLO)
iLO comes preconfigured with proLiant servers of the 300 series and above. A default iLO user
account and password is included. iLO can be configured through several ways including:
• Browser-based configuration.
• iLO RBSU accessed using the F8 key during power-on self-test (POST).
• Remote scripted configuration.
• Local on-line and local scripted setup.
The iLO management tool allows a user to perform the following actions on the server remotely:
• Power on and power off the server.
• Restart the server.
• Monitor the server, regardless of the state of the server’s operating system.
• Measure power usage.
• Apply patches, firmware updates, and critical virus updates through virtual media and virtual
folders.
• Access system event logs and the HP Integrated Management Log.
HP 100 series servers include the Lights-Out 100 Remote Management Option with limited features.
H̀P iLO has now been replaced by Integrated Lights-Out Advanced (known as iLO2 and iLO3). The
latest releases of HP Integrated Lights-Out 2 (iLO2) and Lights-Out 3 (iLO3) have simplified the
server setup process and enabled remote power and thermal optimization. As of Aug 2011, the
current firmware versions of iLO 2 and iLO 3 are 2.07 and 1.26, respectively.
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 11/22
(hat is lobal atalog@
%+ery domain controller in a forest stores three full 'ritable directory partitions2 a domain
directory partition, a schema directory partition, and a con0guration directory partition. A
lobal atalog is a domain controller that stores these 'ritable directory partitions, as 'ell
as a partial, read4only copy of all other domain directory partitions in the forest. The
additional directory partitions are partial because, although they collecti+ely contain e+ery
ob)ect in the directory, only a limited set of speci0c attributes are included for each ob)ect.
The lobal atalog is built automatically by the Acti+e Directory replication system.
All of the directory partitions on a lobal atalog ser+er, 'hether full or partial partitions,
are stored in a single directory database "tds.dit1 on that ser+er. There is no separate
storage area for lobal atalog attributesB they are treated as additional information in the
domain controller directory database.
(hen a ne' domain is added to the forest, the information about the ne' domain is stored
in the con0guration directory partition, 'hich reaches the lobal atalog ser+er and all
domain controllers1 through replication of forest4'ide information. (hen a ne' lobal
atalog ser+er is designated, this information is also stored in the con0guration directory
partition and replicated to all domain controllers in the forest.
A lobal atalog contains #nformation about ob)ects from
all domains in an Acti+e Directory forest.
http233'''.petri.co.il3ma9e4'indo's4ser+er4C4domain4
controller4a4global4catalog.htm
(hat are the di*erent roup Scopes and di*erent group types@
roup scopes are 6 types they are Domain local group scope, lobal group
scope, and -ni+ersal group scope
roup types are t'o types they are security group, distribution group.
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 12/22
Domain <ocal roup scope2 -se this group to grant permissions to domain
resources that are located in the same domain in 'hich the domain local
group 'as created. Domain local groups can e8ist in all mi8ed, nati+e and
interim functional le+el of domains and forests.
lobal roup scope2 -sers 'ith similar functions can be grouped under
global scope and can be gi+en permission to access a resource a+ailable in
local or another domain in the same forest. Simply global groups can be use
to grant permissions to gain access to resources that are located in any
domain but in a single forest as their memberships are limited.
-ni+ersal group Scope2 These groups are precisely used for email distribution
and can be granted access to resources in all trusted domain as these groups
can only be used as a security principal in a 'indo's CCC nati+e or 'indo'sser+er CC6 domain functional le+el domain. -ni+ersal group memberships
are not limited li9e global groups. All domain user accounts and groups can
be a member of uni+ersal group.
roup types2 Security and Distribution
Security group2 -se security groups to grant permission to gain access to
resources. Sending an email message to a group sends the message to all
group members. Therefore security groups share the capabilities ofdistributed groups.
Distributed roups2 Distributed roups are used for sending e4mail messages
to groups of users. $ermissions cannot grant to security groups.
Forest Functional Levels
Windows Server 2003 supports three forest functional levels:
• Windows 2000 Native --Required while any Windows Server 2000
domain controllers remain in your forest. Supports domain controllers
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 13/22
running Windows NT 4.0, Windows 2000 server, and Windows Server
2003.
• Windows Server 2003 Interim --A special functional level only
implemented during NT 4.0 to Windows 2003 upgrades.
• Windows Server 2003 --All DCs in the forest must be running
Windows Server 2003, and all domains in the forest must be at the
Windows 2003 Domain functional level before you can raise your forest
functional level to Windows Server 2003.
Windows Server 2008 supports threeforest functional levels:
• Windows 2000 Native --Supports Windows 2000, Windows Server
2003, and Windows Server 2008 domain controllers.
• Windows Server 2003 --Allows for a mix of Windows Server 2003 and
Windows Server 2008 functional level domains.
• Windows Server 2008 --Ensures all domain controllers in the forest
are running Windows Server 2008 and all domains have been raised to the
Windows Server 2008 domain functional level.
Note:
To install Exchange Server 2010, the Active Directory forest functional level
MUST be Windows Server 2003 or higher.
Windows 2000 Native and Windows Server 2003 Interim modes are NOT
supported.
Domain Functional Levels
Windows Server 2003 supports fourdomain functional levels:
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 14/22
• Windows 2000 Mixed --Allows Windows Server 2003 domain
controllers to interoperate with other domain controllers running Windows
Server 2003, Windows 2000 Server, and Windows NT 4.0.
• Windows 2000 Native --Allows domain controllers running WindowsServer 2003 to interact with domain controllers running either Windows
Server 2003 or Windows 2000 Server.
• Windows Server 2003 Interim --Supports only domain controllers
running Windows Server 2003 and Windows NT 4.0.
• Windows Server 2003 --Supports only Windows Server 2003 domain
controllers.
Windows Server 2008 supports three domain functional levels:
• Windows 2000 Native --Allows domain controllers running Windows
Server 2008 to interact with domain controllers running either Windows
Server 2008, Windows Server 2003, or Windows 2000 Server.
• Windows Server 2003 --Supports an environment comprised of a
mixture of Windows Server 2003 and Windows Server 2008 domain
controllers.
• Windows Server 2008 --Only available after all domain controllers in a
domain are running Windows Server 2008.
(hat is ;4Motion@
@Mware VMotion enables the live migration of running virtual machines from one
physical server to another with 0ero downtime, continuous service availability, and
complete transaction integrity. It is transparent to users.
@Mware what files make up a virtual machineD
xtensi !ile "ame Description
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 15/22
on
.log E+mname.log
or
+m'are.log
This is the 0le that 9eeps a logof 9ey ;M'are (or9stationacti+ity. This 0le can be useful in
troubleshooting if you encounterproblems. This 0le is stored inthe directory that holds thecon0guration .+m81 0le of the+irtual machine.
.nvram E+mname.n+ram
or
n+ram
This is the 0le that stores thestate of the +irtual machine=s:#OS.
vmdk E+mname.+md9 This is a +irtual dis9 0le, 'hichstores the contents of the +irtualmachine=s hard dis9 dri+e.
A +irtual dis9 is made up of one ormore.+md9 0les. #f you ha+especi0ed that the +irtual dis9should be split into : chun9s,the number of .+md9 0les depends
on the si&e of the +irtual dis9. Asdata is added to a +irtual dis9,the .+md9 0les gro' in si&e, to ama8imum of : each. #f youspecify that all space should beallocated 'hen you create the dis9,these 0les start at the ma8imumsi&e and do not gro'.1 Almost all of a .+md9 0le=s content is the +irtualmachine=s data, 'ith a smallportion allotted to +irtual machine
o+erhead.#f the +irtual machine is connecteddirectly to a physical dis9, ratherthan to a +irtual dis9,the .+md9 0le stores informationabout the partitions the +irtualmachine is allo'ed to access.%arlier ;M'are products used thee8tension.ds9 for +irtual dis9 0les.
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 16/22
Edis9name4EGGG.+md9 This is a redo4log 0le, createdautomatically 'hen a +irtualmachine has one or moresnapshots. This 0le stores changesmade to a +irtual dis9 'hile the
+irtual machine is running. Theremay be more than one such 0le. The GGG indicates a uni/ue suH8added automatically by ;M'are(or9station to a+oid duplicate 0lenames.
.+mem Euuid.+mem The +irtual machine=s paging 0le,'hich bac9s up the guest mainmemory on the host 0le system. This 0le e8ists only 'hen the
+irtual machine is running, or if the+irtual machine has crashed.
EsnapshotInameIandInumber
%ach snapshot of a +irtualmachine that is po'ered onhas an associated .vmem 0le,'hich contains the guest=smain memory, sa+ed as partof the snapshot.
.vmsd E+mname.+msd This is a centrali&ed 0le for storinginformation and metadata aboutsnapshots.
.vmsn E+mname4Snapshot.+msn This is the snapshot state 0le,'hich stores the running state of a+irtual machine at the time youta9e that snapshot
E+mname4SnapshotEGGG.+msn
This is the 0le 'hich stores thestate of a snapshot
.vmss E+mname.+mss This is the suspended state 0le,'hich stores the state of asuspended +irtual machine
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 17/22
.Some earlier ;M'are productsused the e8tension .std forsuspended state 0les
.vmtm E+mname.+mtm This is the con0guration 0lecontaining team data.
.vmx E+mname.+m8 This is the primary con0guration0le, 'hich stores settings chosen inthe "e' ;irtual Machine (i&ard or+irtual machine settings editor. #fyou created the +irtual machineunder an earlier +ersion of ;M'are(or9station on a <inu8 host, this
0le may ha+e a .cfg e8tension.vmxf E+mname.+m8f This is a supplemental
con0guration 0le for +irtualmachines that are in a team. "otethat the .vmxf 0le remains if a+irtual machine is remo+ed fromthe team.
Main di*erence bet'een authoritati+e and non
authoritati+e restore@
"on-Authoritative 2 "on4Authoritati+e method 'ill restore an acti+edirectory to the ser+er in 'hich the restore is being done and 'ill thenrecei+e all of the recent updates from its replication partners in thedomain.
Authoritative 2 Authoritati+e method restores the D directory to the
state that it 'as in 'hen the bac9up 'as made, then o+er'rites all theother D=s to match the restored D.
(hat is a host 0le in 'indo's 73J3C, and 'here
can it 0nd@
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 18/22
A host 0le in 'indo's is used to map host names to ip addresses.
The host 0le is located deep do'n in the 'indo's folder
c2K'indo'sKsystem6Kdri+ersKetc1
#t is basically a plain te8t 0le and the si&e of the original defaulthosts 0le is around JL bytes.
o' to acti+ate telnet in 'indo's 7@
ontrol panel 444programs and features 444turn 'indo's features
on or o*444select telnet client or1
Open add or remo+e programsapp'i&.cpl1 4 turn 'indo'sfeatures on or o*444select telnet client
(hat is ost and pst outloo9 0les@
:bout Outlook ata Files (.pst and .ost) here are two types of Outlook ata Files used
by Outlook. :n Outlook ata File (.pst) is used for most accounts. If you are using a Microsoft
&"change account, your items are usually delivered to and saved on the mail server.
A 4 Affline torage able
* 4 *ersonal torage able
The max. OST/PST file sie !iffers !epen!ing on the "ersion of Outlook
Autlook #$$# 4 #>
Autlook #$$6 4 #$>
Autlook #$$< 4 #$>
Autlook #$+$ E #$+6 4 ;$>
#y !efault the OST file is store! in user$s profile ha"ing follo%ing path
/FG!sersG!ser *rofileG:ppataGBocalGMicrosoftGAutlookG
What is the main functionality of chkdsk?
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 19/22
Best Answer: A utility program in Windows that looks for lost clusters on the hard disk. It also reports the
command line utility in Windows. Running Chkdsk with the /f parameter (chkdsk /f) reclaims the lost
clusters and turns them into .CHK files, which can generally be discarded. Running without the /f reports
the current condition of the disk without "f"ixing anything.
#ow to recover data a$ter %lue screen on death?
A problem has been detected and 'indo's has been shutdo'n to pre+ent
damage to your computer.
#f the problem is the 0rst time you ha+e seen this stop error screen,
Restart your computer, if this screen appears again, follo' these steps.
hec9 to ma9e sure any hard'are or soft'are is properly installed.
#f this is a ne' installation as9 your soft'are or hard'are manufacturer for
any 'indo's updates u might need.
#f problem continue, disable or remo+e any ne'ly installed hard'are or
soft'are. Disable :#OS memory options such as caching or shado'ing. #f u
need to use safe mode to remo+e or disable components, restart ur
computer, press FJ to select ad+anced start up options, and then select safe
mode.
Data recovery a$ter %lue screen o$ death
=he dreaded +"e screen o death is oten a transitory e'ent and is i1ed +y re+ooting.
Sometimes tho"gh it can +e more serio"s and can pre'ent the system re+ooting. t is
not common or this error to ca"se data oss, +"t i1ing the pro+em can sometimes
in'o'e ha'ing to repair or reoad the operating system. =o pre'ent any oss o data,
this is the correct stage to ens"re yo" ha'e a 'aid +ack"p o yo"r data. =he oowing
steps can +e carried o"t. As it is normay ony the system dri'e ca"sing the pro+emthen this is the ony one we wi concentrate on. Cn5 $eco'ery sotware (downoad
here) wi ena+e data to +e reco'ered +eore the system is repaired, e'en rom a 'ery
damaged or corr"pted disk.
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 20/22
&tage '
$emo'e the system dri'e and set it "p as a sa'e dri'e on a dierent @C. t is
oten easiest to "se a US caddy to do this. yo" are H"cky9 the dri'e wi
dispay as a ogica dri'e, and a data ies can +e copied o and stored in a
sae ocation. the dri'e does not dispay as a ogica dri'e, or the operating
system s"ggests that it sho"d +e reormatted, the proceed with stage 2
&tage (
As a+o'e, set the dri'e "p as a sa'e dri'e, eg in a US caddy, and oad Cn5
$eco'ery on to the host @C. ns"re that the host @C has ade"ate space or the
data to +e reco'ered. Start Cn5 $eco'er and on the irst screen seect the
Haied9 dri'e and then press the icon o the dri'e which wi start initia anaysis
o the dri'e. A "e screen is not normay ca"sed +y maDor hardware ai"re so
one wo"d e1pect the irst physica test to work. =he second test does some
+asic 'eriication o key sectors on the dri'e. these pass, then it is worth
proceeding with the wi*ard to do a " reco'ery. ?owe'er, i the disk is "
and ony certain ies are re"ired, at this point it may +e +etter to go to the
main program and do a man"a reco'ery aowing or ie seection. =he ie
iter can +e "sed to seect or skip certain ies.
5hen reco'ering a system disk there wi +e a mi1 o appication ies and data
ies. Atho"gh +oth types o ies can +e reco'ered it is oten impossi+e to D"st
copy the appications +ack and e1pect them to work. =his is d"e to registry
settings +eing re"ired. @"t simpy, it is easiest to reinsta appications, and
add +ack "ser data. =he other reason not to reco'er appication and systems
ies is that one may +e corr"pted and co"d +e reason or the +"e screen o
death.
&tage )
Once a "ser data has +een reco'ered and stored saey it is time to try and take
care o the +"e screen pro+em. #epending on operating system it may +e
possi+e to re+oot in SaeMode or "se the Microsot $eco'ery consoe. &"rther
options inc"ding doing a repair reoad retaining a data and settings. this
ais, then a " reoad wi +e necessary which wi remo'e a ogica paths to
e1isting data. At this point it is essentia to know that a data is saey stored
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 21/22
esewhere. %, i this stage is done witho"t reco'ering the data irst, typicay
Cn5 $eco'ery can sti reco'er the "ser ies
Difference between FAT & NTFS FileSystems
FAT File system
• It provides no security if the user logs in locally. The file and folder level
security permission does not exist.
•
It supports only 8 characters long file name.
• It is suitable for a partition disks that is less than 500 MB.
• Partition and file size can be up to 4 GB.
• It supports no file compression.
• Disk can get fragmented thus slowing down the access.
• It is not very reliable since it does not support bad cluster mapping.
NTFS File system
• It provides security for both local and remote users. The security is
provided to the level of files and folders.
• It supports 255 characters long file name.
• It is suitable for partition that is greater than 500 MB.
• Partition size can be up to 16 Exabyte.
• It supports file compression.
• It provides lesser possibility of fragmentation.
• It is highly reliable since it supports bad cluster mapping and transaction
logging.
What is DNS & WINS
8/20/2019 Cognizant Interview Questions
http://slidepdf.com/reader/full/cognizant-interview-questions 22/22
#%S is a #omain %aming System, which reso'es ?ost names to @
addresses. t "ses"y "aiied domain names. #%S is a nternet standard
"sed to reso'e host names
5%S is a 5indows nternet %ame Ser'ice, which reso'es %et+ios names
to @Address. =his is proprietary or 5indows
Types of DNS Servers
@rimary #%S
Secondary #%S
Acti'e #irectory ntegrated #%S
&orwarder Caching ony #%S