Ineterview FAQs for windows server

download Ineterview FAQs for windows server

of 28

Transcript of Ineterview FAQs for windows server

  • 8/14/2019 Ineterview FAQs for windows server

    1/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    Windows Server 2003 Active Directory andSecurity questions

    Whats the difference between local, global and universal groups? Domain local groupsassign access permissions to global domain groups for local domain resources. Global groups provide access to resources in other trusted domains. Universal groups grant access to resourcesin all trusted domains.

    I am trying to create a new universal user group. Why cant I? Universal groups areallowed only in native-mode Windows Server 2003 environments. Native mode requires that alldomain controllers be promoted to Windows Server 2003 Active Directory.

    What is LSDOU? Its group policy inheritance model, where the policies are applied toLocal machines,Sites, Domains andO rganizationalUnits.

    Why doesnt LSDOU work under Windows NT? If the NTConfig.pol file exist, it has thehighest priority among the numerous policies.

    Where are group policies stored? %SystemRoot%System32\GroupPolicy

    What is GPT and GPC? Group policy template and group policy container. Where is GPT stored? %SystemRoot%\SYSVOL\sysvol\domainname\Policies\GUID You change the group policies, and now the computer and user settings are in conflict.

    Which one has the highest priority? The computer settings take priority. You want to set up remote installation procedure, but do not want the user to gain

    access over it. What do you do? gponame> User Configuration> Windows Settings>Remote Installation Services> Choice Options is your friend.

    Whats contained in administrative template conf.adm? Microsoft NetMeeting policies How can you restrict running certain applications on a machine? Via group policy,

    security settings for the group, then Software Restriction Policies. You need to automatically install an app, but MSI file is not available. What do you do?

    A .zap text file can be used to add applications using the Software Installer, rather than theWindows Installer.

    Whats the difference between Software Installer and Windows Installer? The former has fewer privileges and will probably require user intervention. Plus, it uses .zap files.

    What can be restricted on Windows Server 2003 that wasnt there in previousproducts? Group Policy in Windows Server 2003 determines a users right to modify network and dial-up TCP/IP properties. Users may be selectively restricted from modifying their IPaddress and other network configuration parameters.

    How frequently is the client policy refreshed? 90 minutes give or take. Where is secedit ? Its now gpupdate . You want to create a new group policy but do not wish to inherit . Make sure you check

    Block inheritance among the options when creating the policy.

    What is "tattooing" the Registry? The user can view and modify user preferences that arenot stored in maintained portions of the Registry. If the group policy is removed or changed, theuser preference will persist in the Registry.

    How do you fight tattooing in NT/2000 installations? You cant. How do you fight tattooing in 2003 installations? User Configuration - Administrative

    Templates - System - Group Policy - enable - Enforce Show Policies Only.

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    1

  • 8/14/2019 Ineterview FAQs for windows server

    2/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    What does IntelliMirror do? It helps to reconcile desktop settings, applications, and storedfiles for users, particularly those who move between workstations or those who must periodicallywork offline.

    Whats the major difference between FAT and NTFS on a local machine? FAT andFAT32 provide no security over locally logged-on users. Only native NTFS provides extensive permission control on both remote and local files.

    How do FAT and NTFS differ in approach to user shares? They dont, both have supportfor sharing.

    Explan the List Folder Contents permission on the folder in NTFS . Same as Read &Execute, but not inherited by files within a folder. However, newly created subfolders willinherit this permission.

    I have a file to which the user has access, but he has no folder permission to read it. Canhe access it? It is possible for a user to navigate to a file for which he does not have folder permission. This involves simply knowing the path of the file object. Even if the user cant drilldown the file/folder tree using My Computer, he can still gain access to the file using theUniversal Naming Convention (UNC). The best way to start would be to type the full path of afile into Run window.

    For a user in several groups, are Allow permissions restrictive or permissive?Permissive, if at least one group has Allow permission for the file/folder, user will have the same permission.

    For a user in several groups, are Deny permissions restrictive or permissive? Restrictive,if at least one group has Deny permission for the file/folder, user will be denied access,regardless of other group permissions.

    What hidden shares exist on Windows Server 2003 installation? Admin$, Drive$, IPC$, NETLOGON, print$ and SYSVOL.

    Whats the difference between standalone and fault-tolerant DFS (Distributed FileSystem) installations? The standalone server stores the Dfs directory tree structure or topologylocally. Thus, if a shared folder is inaccessible or if the Dfs root server is down, users are leftwith no link to the shared resources. A fault-tolerant root node stores the Dfs topology in theActive Directory, which is replicated to other domain controllers. Thus, redundant root nodesmay include multiple connections to the same data residing in different shared folders.

    Were using the DFS fault-tolerant installation, but cannot access it from a Win98 box .Use the UNC path, not client, only 2000 and 2003 clients can access Server 2003 fault-tolerantshares.

    Where exactly do fault-tolerant DFS shares store information in Active Directory? InPartition Knowledge Table, which is then replicated to other domain controllers.

    Can you use Start->Search with DFS shares? Yes. What problems can you have with DFS installed? Two users opening the redundant copies

    of the file at the same time, with no file-locking involved in DFS, changing the contents and thensaving. Only one file will be propagated through DFS.

    I run Microsoft Cluster Server and cannot install fault-tolerant DFS . Yeah, you cant.Install a standalone one. Is Kerberos encryption symmetric or asymmetric? Symmetric. How does Windows 2003 Server try to prevent a middle-man attack on encrypted line?

    Time stamp is attached to the initial client request, encrypted with the shared key.

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    2

  • 8/14/2019 Ineterview FAQs for windows server

    3/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    What hashing algorithms are used in Windows 2003 Server? RSA Data SecuritysMessage Digest 5 (MD5), produces a 128-bit hash, and the Secure Hash Algorithm 1 (SHA-1), produces a 160-bit hash.

    What third-party certificate exchange protocols are used by Windows 2003 Server?Windows Server 2003 uses the industry standard PKCS-10 certificate request and PKCS-7certificate response to exchange CA certificates with third-party certificate authorities.

    Whats the number of permitted unsuccessful logons on Administrator account?Unlimited. Remember, though, that its the Administrator account, not any account thats part of the Administrators group.

    If hashing is one-way function and Windows Server uses hashing for storing passwords,how is it possible to attack the password lists, specifically the ones using NTLMv1? Acracker would launch a dictionary attack by hashing every imaginable term used for passwordand then compare the hashes.

    Whats the difference between guest accounts in Server 2003 and other editions? Morerestrictive in Windows Server 2003.

    How many passwords by default are remembered when you check "Enforce PasswordHistory Remembered"? Users last 6 passwords.

    Windows Server 2003 IIS and Scriptinginterview questions

    What is presentation layer responsible for in the OSI model? The presentation layer establishes the data format prior to passing it along to the network applications interface.TCP/IP networks perform this task at the application layer.

    Does Windows Server 2003 support IPv6? Yes, run ipv6.exe from command line todisable it.

    Can Windows Server 2003 function as a bridge? Yes, and its a new feature for the 2003

    product. You can combine several networks and devices connected via several adapters byenabling IP routing. Whats the difference between the basic disk and dynamic disk? The basic type contains

    partitions, extended partitions, logical drivers, and an assortment of static volumes; the dynamictype does not use partitions but dynamically manages volumes and provides advanced storageoptions

    Whats a media pool? It is any compilation of disks or tapes with the same administrative properties.

    How do you install recovery console? C:\i386\win32 /cmdcons , assuming that your Win server installation is on drive C.

    Whats new in Terminal Services for Windows 2003 Server? Supports audiotransmissions as well, although prepare for heavy network load.

    What scripts ship with IIS 6.0? iisweb.vsb to create, delete, start, stop, and list Web sites,iisftp.vsb to create, delete, start, stop, and list FTP sites,iisdir.vsb to create, delete, start, stop,and display virtual directories,iisftpdr.vsb to create, delete, start, stop, and display virtualdirectories under an FTP root,iiscnfg.vbs to export and import IIS configuration to an XML file.

    Whats the name of the user who connects to the Web site anonymously?IUSR_computername

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    3

  • 8/14/2019 Ineterview FAQs for windows server

    4/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    What secure authentication and encryption mechanisms are supported by IIS 6.0?Basic authentication, Digest authentication, Advanced digest authentication, Certificate-basedWeb transactions that use PKCS #7/PKCS #10, Fortezza, SSL, Server-Gated Cryptography,Transport Layer Security

    Whats the relation between SSL and TLS? Transport Layer Security (TLS) extends SSL by providing cryptographic authentication.

    Whats the role of http.sys in IIS? It is the point of contact for all incoming HTTP requests.It listens for requests and queues them until they are all processed, no more queues are available,or the Web server is shut down.

    Wheres ASP cache located on IIS 6.0? On disk, as opposed to memory, as it used to be inIIS 5.

    What is socket pooling? Non-blocking socket usage, introduced in IIS 6.0. More than oneapplication can use a given socket.

    Describe the process of clustering with Windows 2003 Server when a new node isadded. As a node goes online, it searches for other nodes to join by polling the designatedinternal network. In this way, all nodes are notified of the new nodes existence. If other nodescannot be found on a preexisting cluster, the new node takes control of the quorum resourcesresiding on the shared disk that contains state and configuration data. What applications are not capable of performing in Windows 2003 Server clusters? Theones written exclusively for NetBEUI and IPX.

    Whats a heartbeat? Communication processes between the nodes designed to ensurenodes health.

    Whats a threshold in clustered environment? The number of times a restart is attempted,when the node fails.

    You need to change and admin password on a clustered Windows box, but that requiresrebooting the cluster, doesnt it? No, it doesnt. In 2003 environment you can do that viacluster.exe utility which does not require rebooting the entire cluster.

    For the document of size 1 MB, what size would you expect the index to be withIndexing Service? 150-300 KB, 15-30% is a reasonable expectation.

    Doesnt the Indexing Service introduce a security flaw when allowing access to theindex? No, because users can only view the indices of documents and folders that they have permissions for.

    Whats the typical size of the index? Less then 100K documents - up to 128 MB. Morethan that - 256+ MB.

    Which characters should be enclosed in quotes when searching the index? &, @, $, #, ^,( ), and |.

    How would you search for C++? Just enter C++, since + is not a special character (andneither is C).

    What about Barnes&Noble? Should be searched for as Barnes&Noble. Are the searches case-sensitive? No. Whats the order of precedence of Boolean operators in Microsoft Windows 2003Server Indexing Service? NOT, AND, NEAR, OR. Whats a vector space query? A multiple-word query where the weight can be assigned to

    each of the search words. For example, if you want to fight information on black hole, butwould prefer to give more weight to the word hole, you can enter black[1] hole[20] into thesearch window.

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    4

  • 8/14/2019 Ineterview FAQs for windows server

    5/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    Whats a response queue? Its the message queue that holds response messages sent fromthe receiving application to the sender.

    Whats MQPing used for? Testing Microsoft Message Queue services between the nodeson a network.

    Which add-on package for Windows 2003 Server would you use to monitor the installedsoftware and license compliance? SMS (System Management Server).

    Which service do you use to set up various alerts? MOM (Microsoft Operations Manager). What languages does Windows Scripting Host support? VB, VBScript, JScript.

    1 :: How do you double-boot a Win 2003 server box? The Boot.ini file is set as read-only, system, and hidden to prevent unwantedediting. To change the Boot.ini timeout and default settings, use the System optionin Control Panel from the Advanced tab and select Startup.

    2 :: What do you do if earlier application does not run on Windows Server

    2003? When an application that ran on an earlier legacy version of Windows cannot beloaded during the setup function or if it later malfunctions, you must run thecompatibility mode function. This is accomplished by right-clicking the applicationor setup program and selecting Properties > Compatibility > selecting thepreviously supported operating system.

    3 :: If you uninstall Windows Server 2003, which operating systems canyou revert to? Win ME,Win 98,2000,XP.Note, however, that you cannot upgrade from ME and 98 to Windows Server 2003.

    4 :: How do you get to Internet Firewall settings? Start > Control Panel > Network and Internet Connections > NetworkConnections.

    5 :: What are the Windows Server 2003 keyboard shortcuts? Winkey opens or closes the Start menu. Winkey + BREAK displays the SystemProperties dialog box. Winkey + TAB moves the focus to the next application in thetaskbar. Winkey + SHIFT + TAB moves the focus to the previous application in thetaskbar. Winkey + B moves the focus to the notification area. Winkey + D showsthe desktop. Winkey + E opens Windows Explorer showing My Computer. Winkey +F opens the Search panel. Winkey + CTRL + F opens the Search panel with Searchfor Computers module selected. Winkey + F1 opens Help. Winkey + M minimizesall. Winkey + SHIFT+ M undoes minimization. Winkey + R opens Run dialog. Winkey+ U opens the Utility Manager. Winkey + L locks the computer.

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    5

    http://msdn.microsoft.com/library/en-us/script56/html/wsoriWindowsScriptHost.asphttp://www.globalguideline.com/interview_questions/Answer.php?a=How_do_you_double_boot_a_Win_2003_server_box&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=What_do_you_do_if_earlier_application_does_not_run_on_Windows_Server_2003&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=What_do_you_do_if_earlier_application_does_not_run_on_Windows_Server_2003&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=If_you_uninstall_Windows_Server_2003_which_operating_systems_can_you_revert_to&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=If_you_uninstall_Windows_Server_2003_which_operating_systems_can_you_revert_to&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=How_do_you_get_to_Internet_Firewall_settings&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=What_are_the_Windows_Server_2003_keyboard_shortcuts&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=How_do_you_double_boot_a_Win_2003_server_box&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=What_do_you_do_if_earlier_application_does_not_run_on_Windows_Server_2003&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=What_do_you_do_if_earlier_application_does_not_run_on_Windows_Server_2003&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=If_you_uninstall_Windows_Server_2003_which_operating_systems_can_you_revert_to&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=If_you_uninstall_Windows_Server_2003_which_operating_systems_can_you_revert_to&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=How_do_you_get_to_Internet_Firewall_settings&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=What_are_the_Windows_Server_2003_keyboard_shortcuts&page=1http://msdn.microsoft.com/library/en-us/script56/html/wsoriWindowsScriptHost.asp
  • 8/14/2019 Ineterview FAQs for windows server

    6/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    6 :: What is Active Directory? Active Directory is a network-based object store and service that locates andmanages resources, and makes these resources available to authorized users andgroups. An underlying principle of theActive Directory is that everything isconsidered an objectpeople, servers, workstations, printers, documents, and

    devices. Each object has certain attributes and its own security access control list(ACL).

    7 :: Where are the Windows NT Primary Domain Controller (PDC) and itsBackup Domain Controller (BDC) in Server 2003?

    The Active Directory replaces them. Now all domain controllers share a multimasterpeer-to-peer read and write relationship that hosts copies of theActive Directory.

    8 :: How long does it take for security changes to be replicated among thedomain controllers? Security-related modifications are replicated within a site immediately. These

    changes include account and individual user lockout policies, changes to passwordpolicies, changes to computer account passwords, and modifications to the LocalSecurity Authority (LSA).

    9 :: What is new in Windows Server 2003 regarding the DNS management? When DC promotion occurs with an existing forest, the Active Directory InstallationWizard contacts an existing DC to update the directory and replicate from the DCthe required portions of the directory. If the wizard fails to locate a DC, it performsdebugging and reports what caused the failure and how to fix the problem. In orderto be located on a network, every DC must register in DNS DC locator DNS records.

    The Active Directory Installation Wizard verifies a proper configuration of the DNSinfrastructure. All DNS configuration debugging and reporting activity is done withtheActive Directory Installation Wizard.

    10 :: When should you create a forest? Organizations that operate on radically different bases may require separate treeswith distinct namespaces. Unique trade or brand names often give rise to separateDNS identities. Organizations merge or are acquired and naming continuity isdesired. Organizations form partnerships and joint ventures. While access tocommon resources is desired, a separately defined tree can enforce more directadministrative and security restrictions.

    11 :: How can you authenticate between forests? Four types of authentication are used across forests:

    (1) Kerberos and NTLM network logon for remote access to a server in anotherforest;(2) Kerberos and NTLM interactive logon for physical logon outside the users homeforest;

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    6

    http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_Active_Directory&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=Where_are_the_Windows_NT_Primary_Domain_Controller_PDC_and_its_Backup_Domain_Controller_BDC_in_Server_2003&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=Where_are_the_Windows_NT_Primary_Domain_Controller_PDC_and_its_Backup_Domain_Controller_BDC_in_Server_2003&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=How_long_does_it_take_for_security_changes_to_be_replicated_among_the_domain_controllers&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=How_long_does_it_take_for_security_changes_to_be_replicated_among_the_domain_controllers&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_new_in_Windows_Server_2003_regarding_the_DNS_management&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=When_should_you_create_a_forest&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=How_can_you_authenticate_between_forests&page=3http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_Active_Directory&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=Where_are_the_Windows_NT_Primary_Domain_Controller_PDC_and_its_Backup_Domain_Controller_BDC_in_Server_2003&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=Where_are_the_Windows_NT_Primary_Domain_Controller_PDC_and_its_Backup_Domain_Controller_BDC_in_Server_2003&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=How_long_does_it_take_for_security_changes_to_be_replicated_among_the_domain_controllers&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=How_long_does_it_take_for_security_changes_to_be_replicated_among_the_domain_controllers&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_new_in_Windows_Server_2003_regarding_the_DNS_management&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=When_should_you_create_a_forest&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=How_can_you_authenticate_between_forests&page=3
  • 8/14/2019 Ineterview FAQs for windows server

    7/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    (3) Kerberos delegation to N-tier application in another forest; and(4) user principal name (UPN) credentials.

    12 :: What snap-in administrative tools are available for Active Directory? Active Directory Domains and Trusts Manager, Active Directory Sites and Services

    Manager, Active Directory Users and Group Manager, Active Directory Replication(optional, available from the Resource Kit), Active Directory Schema Manager(optional, available from adminpak)

    13 :: What types of classes exist in Windows Server 2003 Active Directory? Structural class:

    The structural class is important to the system administrator in that it is the onlytype from which new Active Directory objects are created. Structural classes aredeveloped from either the modification of an existing structural type or the use of one or more abstract classes.

    Abstract class:Abstract classes are so named because they take the form of templates thatactually create other templates (abstracts) and structural and auxiliary classes.

    Think of abstract classes as frameworks for the defining objects.

    Auxiliary class: The auxiliary class is a list of attributes. Rather than apply numerous attributeswhen creating a structural class, it provides a streamlined alternative by applying acombination of attributes with a single include action.

    88 class: The 88 class includes object classes defined prior to 1993, when the 1988 X.500specification was adopted. This type does not use the structural, abstract, andauxiliary definitions, nor is it in common use for the development of objectsinWindows Server 2003 environments.

    14 :: How do you delete a lingering object? Windows Server 2003 provides a command called Repadmin that provides theability to delete lingering objects in the Active Directory.

    15 :: What is Global Catalog? The Global Catalog authenticates network user logons and fields inquiries aboutobjects across a forest or tree. Every domain has at least one GC that is hosted on adomain controller. In Windows 2000, there was typically one GC on every site inorder to prevent user logon failures across the network.

    16 :: How is user account security established in Windows Server 2003? When an account is created, it is given a unique access number known as a securityidentifier (SID). Every group to which the user belongs has an associated SID. The

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    7

    http://www.globalguideline.com/interview_questions/Answer.php?a=What_snap_in_administrative_tools_are_available_for_Active_Directory&page=3http://www.globalguideline.com/interview_questions/Answer.php?a=What_types_of_classes_exist_in_Windows_Server_2003_Active_Directory&page=3http://www.globalguideline.com/interview_questions/Answer.php?a=How_do_you_delete_a_lingering_object&page=3http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_Global_Catalog&page=3http://www.globalguideline.com/interview_questions/Answer.php?a=How_is_user_account_security_established_in_Windows_Server_2003&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=What_snap_in_administrative_tools_are_available_for_Active_Directory&page=3http://www.globalguideline.com/interview_questions/Answer.php?a=What_types_of_classes_exist_in_Windows_Server_2003_Active_Directory&page=3http://www.globalguideline.com/interview_questions/Answer.php?a=How_do_you_delete_a_lingering_object&page=3http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_Global_Catalog&page=3http://www.globalguideline.com/interview_questions/Answer.php?a=How_is_user_account_security_established_in_Windows_Server_2003&page=4
  • 8/14/2019 Ineterview FAQs for windows server

    8/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    user and related group SIDs together form the user accounts security token, whichdetermines access levels to objects throughout the system and network.SIDs from the security token are mapped to the access control list (ACL) of anyobject the user attempts to access.

    17 :: If I delete a user and then create a new account with the sameusername and password, would the SID and permissions stay the same? No.If you delete a user account and attempt to recreate it with the same user nameand password, the SID will be different.

    18 :: What do you do with secure sign-ons in an organization with manyroaming users? Credential Management feature of Windows Server 2003 provides a consistentsingle sign-on experience for users. This can be useful for roaming users who movebetween computer systems. The Credential Management feature provides a secure

    store of user credentials that includes passwords and X.509 certificates.

    19 :: Anything special you should do when adding a user that has a Mac? "Save password as encrypted clear text" must be selected on User PropertiesAccount Tab Options, since the Macs only store their passwords that way.

    20 :: What remote access options does Windows Server 2003 support? Dial-in,VPN,dial-in with callback.

    21 :: Where are the documents and settings for the roaming profilestored? All the documents and environmental settings for the roaming user are storedlocally on the system, and, when the user logs off, all changes to the locally storedprofile are copied to the shared server folder. Therefore, the first time a roaminguser logs on to a new system the logon process may take some time, depending onhow large his profile folder is.

    22 :: Where are the settings for all the users stored on a given machine? \Document and Settings\All Users

    23 :: What languages can you use for log-on scripts? JavaScipt,VBScript,DOS batch files(.com, .bat, or even .exe)

    Hardware design interview questionsMohammed Rafique | Windows Server 2003 IIS and Scripting interview

    questions8

    http://www.globalguideline.com/interview_questions/Answer.php?a=If_I_delete_a_user_and_then_create_a_new_account_with_the_same_username_and_password_would_the_SID_and_permissions_stay_the_same&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=If_I_delete_a_user_and_then_create_a_new_account_with_the_same_username_and_password_would_the_SID_and_permissions_stay_the_same&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=What_do_you_do_with_secure_sign_ons_in_an_organization_with_many_roaming_users&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=What_do_you_do_with_secure_sign_ons_in_an_organization_with_many_roaming_users&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=Anything_special_you_should_do_when_adding_a_user_that_has_a_Mac&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=What_remote_access_options_does_Windows_Server_2003_support&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=Where_are_the_documents_and_settings_for_the_roaming_profile_stored&page=5http://www.globalguideline.com/interview_questions/Answer.php?a=Where_are_the_documents_and_settings_for_the_roaming_profile_stored&page=5http://www.globalguideline.com/interview_questions/Answer.php?a=Where_are_the_settings_for_all_the_users_stored_on_a_given_machine&page=5http://www.globalguideline.com/interview_questions/Answer.php?a=What_languages_can_you_use_for_log_on_scripts&page=5http://www.globalguideline.com/interview_questions/Answer.php?a=If_I_delete_a_user_and_then_create_a_new_account_with_the_same_username_and_password_would_the_SID_and_permissions_stay_the_same&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=If_I_delete_a_user_and_then_create_a_new_account_with_the_same_username_and_password_would_the_SID_and_permissions_stay_the_same&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=What_do_you_do_with_secure_sign_ons_in_an_organization_with_many_roaming_users&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=What_do_you_do_with_secure_sign_ons_in_an_organization_with_many_roaming_users&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=Anything_special_you_should_do_when_adding_a_user_that_has_a_Mac&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=What_remote_access_options_does_Windows_Server_2003_support&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=Where_are_the_documents_and_settings_for_the_roaming_profile_stored&page=5http://www.globalguideline.com/interview_questions/Answer.php?a=Where_are_the_documents_and_settings_for_the_roaming_profile_stored&page=5http://www.globalguideline.com/interview_questions/Answer.php?a=Where_are_the_settings_for_all_the_users_stored_on_a_given_machine&page=5http://www.globalguideline.com/interview_questions/Answer.php?a=What_languages_can_you_use_for_log_on_scripts&page=5
  • 8/14/2019 Ineterview FAQs for windows server

    9/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    1. Give two ways of converting a two input NAND gate to an inverter 2. Given a circuit, draw its exact timing response. (I was given a Pseudo Random Signal

    Generator; you can expect any sequential ckt)3. What are set up time & hold time constraints? What do they signify? Which one is

    critical for estimating maximum clock frequency of a circuit?4. Give a circuit to divide frequency of clock cycle by two5. Design a divide-by-3 sequential circuit with 50% duty circle. (Hint: Double the Clock)6. Suppose you have a combinational circuit between two registers driven by a clock. What

    will you do if the delay of the combinational circuit is greater than your clock signal?(You cant resize the combinational circuit transistors)

    7. The answer to the above question is breaking the combinational circuit and pipelining it.What will be affected if you do this?

    8. What are the different Adder circuits you studied?9. Give the truth table for a Half Adder. Give a gate level implementation of the same.10. Draw a Transmission Gate-based D-Latch.11. Design a Transmission Gate based XOR. Now, how do you convert it to XNOR?

    (Without inverting the output)12. How do you detect if two 8-bit signals are same?13. How do you detect a sequence of "1101" arriving serially from a signal line?14. Design any FSM in VHDL or Verilog.15. Explain RC circuits charging and discharging.16. Explain the working of a binary counter.17. Describe how you would reverse a singly linked list.

    1 :: What is the Difference between Windows 2003 standard Enterprise,Premium, Data center and Web Edition? WEB EDITION:

    To position windows server 2003 more competitively against other web servers,Microsoft has released astripped-down-yet-impressive edition of windows server 2003 designed specially forweb services. the feature set and licensing allows customers easy deployment of web pages, web sites, web applications and web services.

    Web Edition supports 2GB of RAM and a two-way symmetric multiprocessor(SMP). Itprovides unlimited anonymous web connections but only 10 inbound servermessage block(SMB) connections, which should be more than enough for contentpublishing. The server cannot be an internet gateway, DHCP or fax server. Althoughyou can remotely administer the server with Remote Desktop, the server can not bea terminalserver in the traditional sense. The server can belong to a domain, but cannot be a

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    9

    http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_Difference_between_Windows_2003_standard_Enterprise_Premium_Data_center_and_Web_Edition&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_Difference_between_Windows_2003_standard_Enterprise_Premium_Data_center_and_Web_Edition&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_Difference_between_Windows_2003_standard_Enterprise_Premium_Data_center_and_Web_Edition&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_Difference_between_Windows_2003_standard_Enterprise_Premium_Data_center_and_Web_Edition&page=1
  • 8/14/2019 Ineterview FAQs for windows server

    10/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    domain controller. The included version of the microsoft SQL server databaseEngine can support as many as 25 concurrent connections.

    2 :: How do you recover an object in Active Directory, which is accidentallydeleted by you, with no backup?

    Using ntdsutil.exe command,we can restored the AD objects.3 :: What is the Logical / Physical Structures of the AD Environment? physical structure:Forest, Site, Domain, DC

    logical structure:Schema partition, configuration partition, domainpartition and application partition

    4 :: How to change the windows xp product key if wrongly installed with

    other product key but you have originalproduct key? What you will do to Make your os as Genuine? Some third party software are available for this function or reinstall this system

    5 :: If 512mb Ram is there what will be the minimum and maximum Virtualmemory for the system?

    To workout the total virtual memory (page file) required for windows XP you shouldtake the amount of ram in the system and + 25% (512MB + 25% (128MB) = 640MBtotal virtual memory. by setting both the min and max to 640MB you can increasethe performances of the operating system.

    6 :: Ntfldr.exe is missing in win xp os what will you do? Boot from windows xp cd and go to recovery console modegive the administrator passwordc:\windows>prompt will comecome out from windows with the help of commandc:\windows>cd ..c:>

    go to cd prompt d:d:>cd i386d:\i386>copy ntldr c: enter

    d:\i386>copy ntdetect.com c: enter

    restart u r computer

    problem fix

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    10

    http://www.globalguideline.com/interview_questions/Answer.php?a=How_do_you_recover_an_object_in_Active_Directory_which_is_accidentally_deleted_by_you_with_no_backup&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=How_do_you_recover_an_object_in_Active_Directory_which_is_accidentally_deleted_by_you_with_no_backup&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_Logical_Physical_Structures_of_the_AD_Environment&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=How_to_change_the_windows_xp_product_key_if_wrongly_installed_with_other_product_key&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=How_to_change_the_windows_xp_product_key_if_wrongly_installed_with_other_product_key&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=How_to_change_the_windows_xp_product_key_if_wrongly_installed_with_other_product_key&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=If_512mb_Ram_is_there_what_will_be_the_minimum_and_maximum_Virtual_memory_for_the_system&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=If_512mb_Ram_is_there_what_will_be_the_minimum_and_maximum_Virtual_memory_for_the_system&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=Ntfldr_exe_is_missing_in_win_xp_os_what_will_you_do&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=How_do_you_recover_an_object_in_Active_Directory_which_is_accidentally_deleted_by_you_with_no_backup&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=How_do_you_recover_an_object_in_Active_Directory_which_is_accidentally_deleted_by_you_with_no_backup&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_Logical_Physical_Structures_of_the_AD_Environment&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=How_to_change_the_windows_xp_product_key_if_wrongly_installed_with_other_product_key&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=How_to_change_the_windows_xp_product_key_if_wrongly_installed_with_other_product_key&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=How_to_change_the_windows_xp_product_key_if_wrongly_installed_with_other_product_key&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=If_512mb_Ram_is_there_what_will_be_the_minimum_and_maximum_Virtual_memory_for_the_system&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=If_512mb_Ram_is_there_what_will_be_the_minimum_and_maximum_Virtual_memory_for_the_system&page=1http://www.globalguideline.com/interview_questions/Answer.php?a=Ntfldr_exe_is_missing_in_win_xp_os_what_will_you_do&page=2
  • 8/14/2019 Ineterview FAQs for windows server

    11/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    7 :: What is LDAP? LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email andother programs use to look up information from a server.

    8 :: What is the SYSVOL folder?

    The Sysvol folder on a Windows domain controller is used to replicate file-baseddata among domain controllers. Because junctions are used within the Sysvol folderstructure, Windows NT file system (NTFS) version 5.0 is required on domaincontrollers throughout a Windows distributed file system (DFS) forest.

    9 :: What are application partitions? When do we use them? Application Directory Partition is a partition space in Active Directory which anapplication can use to store that application specific data. This partition is thenreplicated only to some specific domain controllers.

    The application directory partition can contain any type of data except security

    principles (users, computers, groups).

    10 :: What is the KCC? With in a Site, a Windows server 2003 service known as the KCC automaticallygenerates a topology for replication among the domain controllers in the domainusing a ring structure.Th Kcc is a built in process that runs on all domain controllers.

    The KCC analyzes the replication topology within a site every 15 minute to ensurethat it still works. If you add or remove a domain controller from the network or asite, the KCC reconfigures the topology to relect the change.

    11 :: What is tombstone lifetime attribute? The number of days before a deleted object is removed from the directory services. This assists in removing objects from replicated servers and preventing restoresfrom reintroducing a deleted object. This value is in the Directory Service object inthe configuration NIC

    by default 2000 (60 days)

    12 :: How do we Backup Active Directory? Backing up Active Directory is essential to maintain an Active Directory database.

    You can back up Active Directory by using the Graphical User Interface (GUI) andcommand-line tools that the Windows Server 2003 family provides.

    You frequently backup the system state data on domain controllers so that you canrestore the most current data. By establishing a regular backup schedule, you havea better chance of recovering data when necessary.

    To ensure a good backup includes at least the system state data and contents of

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    11

    http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_LDAP&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_SYSVOL_folder&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=What_are_application_partitions_When_do_we_use_them&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_KCC&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_tombstone_lifetime_attribute&page=3http://www.globalguideline.com/interview_questions/Answer.php?a=How_do_we_Backup_Active_Directory&page=3http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_LDAP&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_SYSVOL_folder&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=What_are_application_partitions_When_do_we_use_them&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_KCC&page=2http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_tombstone_lifetime_attribute&page=3http://www.globalguideline.com/interview_questions/Answer.php?a=How_do_we_Backup_Active_Directory&page=3
  • 8/14/2019 Ineterview FAQs for windows server

    12/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    the system disk, you must be aware of the tombstone lifetime. By default, thetombstone is 60 days. Any backup older than 60 days is not a good backup. Plan tobackup at least two domain controllers in each domain, one of at least one backupto enable an authoritative restore of the data when necessary.

    13 :: How do we restore AD? You cant restore Active Directory (AD) to a domain controller (DC) while theDirectory Service (DS) is running. To restore AD, perform the following steps.

    Reboot the computer.

    The computer will boot into a special safe mode and wont start the DS. Be awarethat during this time the machine wont act as a DC and wont perform functionssuch as authentication.

    1. Start NT Backup.2. Select the Restore tab.3. Select the backup media, and select System State.4. Click Start Restore.5. Click OK in the confirmation dialog box.

    After you restore the backup, reboot the computer and start in normal mode to usethe restored information. The computer might hang after the restore completes; Iveexperienced a 30-minute wait on some machines.

    14 :: What are GPOs? Group Policy gives you administrative control over users and computers in yournetwork. By using Group Policy, you can define the state of a user's workenvironment once, and then rely onWindows Server 2003 to continually force theGroup Policy settings that you apply across an entire organization or to specificgroups of users and computers.

    15 :: What is the order in which GPOs are applied? Group Policy settings are processed in the following order:

    1:- Local Group Policy object-each computer has exactly one Group Policy objectthat is stored locally. This processes for both computer and user Group Policy

    processing.

    2:- Site-Any GPOs that have been linked to the site that the computer belongs to areprocessed next. Processing is in the order that is specified by the administrator, onthe Linked Group Policy Objects tab for the site in Group Policy ManagementConsole (GPMC). The GPO with the lowest link order is processed last, and thereforehas the highest precedence.

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    12

    http://www.globalguideline.com/interview_questions/Answer.php?a=How_do_we_restore_AD&page=3http://www.globalguideline.com/interview_questions/Answer.php?a=What_are_GPOs&page=3http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_order_in_which_GPOs_are_applied&page=3http://www.globalguideline.com/interview_questions/Answer.php?a=How_do_we_restore_AD&page=3http://www.globalguideline.com/interview_questions/Answer.php?a=What_are_GPOs&page=3http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_order_in_which_GPOs_are_applied&page=3
  • 8/14/2019 Ineterview FAQs for windows server

    13/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    3:- Domain-processing of multiple domain-linked GPOs is in the order specified bythe administrator, on the Linked Group Policy Objects tab for the domain in GPMC.

    The GPO with the lowest link order is processed last, and therefore has the highestprecedence.

    4:- Organizational units-GPOs that are linked to the organizational unit that ishighest in the Active Directory hierarchy are processed first, then GPOs that arelinked to its child organizational unit, and so on. Finally, the GPOs that are linked tothe organizational unit that contains the user or computer are processed.

    16 :: Name a few benefits of using GPMC? Microsoft released the Group Policy Management Console (GPMC) years ago, whichis an amazing innovation in Group Policy management. The tool provides controlover Group Policy in the following manner:

    Easy administration of all GPOs across the entire Active Directory Forest View of all GPOs in one single list Reporting of GPO settings, security, filters, delegation, etc. Control of GPO inheritance with Block Inheritance, Enforce, and Security Filtering Delegation model Backup and restore of GPOs Migration of GPOs across different domains and forests

    With all of these benefits, there are still negatives in using the GPMC alone.Granted, the GPMC is needed and should be used by everyone for what it is ideal

    for. However, it does fall a bit short when you want to protect the GPOs from thefollowing:

    Role based delegation of GPO management Being edited in production, potentially causing damage to desktops and servers Forgetting to back up a GPO after it has been modified Change management of each modification to every GPO

    17 :: What are the GPC and the GPT? Where can I find them? GPOs store group policy settings in two locations: a Group Policy container (GPC)(preferred) and a Group Policy template (GPT). The GPC is an Active Directory objectthat stores version information, status information, and other policy information (forexample, application objects).

    The GPT is used for file-based data and stores software policy, script, anddeployment information. The GPT is located on the system volume folder of thedomain controller. A GPO can be associated with one or more Active Directorycontainers, such as a site, domain, or organizational unit. Multiple containers can be

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    13

    http://www.globalguideline.com/interview_questions/Answer.php?a=Name_a_few_benefits_of_using_GPMC&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=What_are_the_GPC_and_the_GPT_Where_can_I_find_them&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=Name_a_few_benefits_of_using_GPMC&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=What_are_the_GPC_and_the_GPT_Where_can_I_find_them&page=4
  • 8/14/2019 Ineterview FAQs for windows server

    14/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    associated with the same GPO, and a single container can have more than oneassociated GPO.

    18 :: What are GPO links? What special things can I do to them? To apply the settings of a GPO to the users and computers of a domain, site, or OU,

    you need to add a link to that GPO. You can add one or more GPO links to eachdomain, site, or OU by using GPMC. Keep in mind that creating and linking GPOs is asensitive privilege that should be delegated only to administrators who are trustedand understand Group Policy.

    19 :: What are administrative templates? The GPO settings is divided between the Computer settings and the User settings.In both parts of the GPO you can clearly see a large section called Administrative

    Templates.

    Administrative Templates are a large repository of registry-based changes (in fact,

    over 1300 individual settings) that can be found in any GPO on Windows 2000,Windows XP, and Windows Server 2003.

    By using the Administrative Template sections of the GPO you can deploymodifications to machine (called HKEY_LOCAL_MACHINE in the registry) and user(called HKEY_CURRENT_USER in the registry) portions of the Registry of computersthat are influenced by the GPO.

    20 :: Name the AD NCs and replication issues for each NC? Name the AD NCs and replication issues for each NC

    *Schema NC, *Configuration NC, * Domain NC

    Schema NC This NC is replicated to every other domain controller in the forest. Itcontains information about the Active Directory schema, which in turn defines thedifferent object classes and attributes within Active Directory.

    Configuration NC Also replicated to every other DC in the forest, this NC containsforest-wide configuration information pertaining to the physical layout of ActiveDirectory, as well as information about display specifiers and forest-wide ActiveDirectory quotas.

    Domain NC This NC is replicated to every other DC within a single Active Directorydomain. This is the NC that contains the most commonly-accessed Active Directorydata: the actual users, groups, computers, and other objects that reside within aparticular Active Directory domain.

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    14

    http://www.globalguideline.com/interview_questions/Answer.php?a=What_are_GPO_links_What_special_things_can_I_do_to_them&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=What_are_administrative_templates&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=Name_the_AD_NCs_and_replication_issues_for_each_NC&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=What_are_GPO_links_What_special_things_can_I_do_to_them&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=What_are_administrative_templates&page=4http://www.globalguideline.com/interview_questions/Answer.php?a=Name_the_AD_NCs_and_replication_issues_for_each_NC&page=4
  • 8/14/2019 Ineterview FAQs for windows server

    15/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    21 :: What is MUTEX? A mutual exclusion object, or MUTEX, is an object created for use in computerprograms. The essential function of MUTEX is to make it possible for a multipleprogram thread to make use of a single resource. Generally, the functionality of mutual exclusion objects is to allow this use of a single resource by creating an

    environment where the access to the resource is continually passed back and forthbetween the various aspects of the program.

    22 :: What is the difference between a computer process and thread? A single process can have multiple threads that share global data and addressspace with other threads running in the same process, and therefore can operate onthe same data set easily. Processes do not share address space and a differentmechanism must be used if they are to share data.

    If we consider running a word processing program to be a process, then the auto-save and spell check features that occur in the background are different threads of that process which are all operating on the same data set (your document).

    process:In computing, a process is an instance of a computer program that is beingsequentially executed[1] by a computer system that has the ability to run severalcomputer programs concurrently.

    Thread:A single process may contain several executable programs (threads) that worktogether as a coherent whole. One thread might, for example, handle error signals,

    another might send a message about the error to the user, while a third thread isexecuting the actual task of the...

    23 :: What is INODE? INODE is a pointer to a block on the disk and it is unique.Inode is an unique number. Inode holds metadata of files.

    24 :: Explain the working of Virtual Memory? Virtual memory like as a temporary storage area.It consists of page table.In thispages are divided into frames.It is a continuous memory allocation.It is also calledlogical memory.

    25 :: How does Windows NT supports Multitasking? Preemptive multitask

    26 :: What is Semaphore? A hardware or software flag.In multitasking systems, a semaphore is a variable with a value that indicates thestatus of a common resource.

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    15

    http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_MUTEX&page=5http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_difference_between_a_computer_process_and_thread&page=5http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_INODE&page=5http://www.globalguideline.com/interview_questions/Answer.php?a=Explain_the_working_of_Virtual_Memory&page=5http://www.globalguideline.com/interview_questions/Answer.php?a=How_does_Windows_NT_supports_Multitasking&page=5http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_Semaphore&page=6http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_MUTEX&page=5http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_difference_between_a_computer_process_and_thread&page=5http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_INODE&page=5http://www.globalguideline.com/interview_questions/Answer.php?a=Explain_the_working_of_Virtual_Memory&page=5http://www.globalguideline.com/interview_questions/Answer.php?a=How_does_Windows_NT_supports_Multitasking&page=5http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_Semaphore&page=6
  • 8/14/2019 Ineterview FAQs for windows server

    16/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    Its used to lock the resource that is being used.A process needing the resource checks the semaphore to determine the resource'sstatusand then decides how to proceed.

    27 :: Recovery from Deadlock? Process Termination:->Abort all deadlocked processes.->Abort one process at a time until the deadlock cycle is eliminated.->In which order should we choose to abort?Priority of the process.How long process has computed, and how much longer to completion.Resources the process has used.Resources process needs to complete.How many processes will need to be terminated?Is process interactive or batch?Resource Preemption:->Selecting a victim ? minimize cost.->Rollback ? return to some safe state, restart process for that state.->Starvation ? same process may always be picked as victim, include number of rollback in cost factor.

    28 :: What is multi tasking, multi programming, multi threading? Multi programming:Multiprogramming is the technique of running several programs at a time usingtimesharing.It allows a computer to do several things at the same time. Multiprogrammingcreates logical parallelism.

    The concept of multiprogramming is that the operating system keeps several jobs inmemory simultaneously. The operating system selects a job from the job pool andstarts executing a job, when that job needs to wait for any i/o operations the CPU isswitched to another job. So the main idea here is that the CPU is never idle.

    Multi tasking:Multitasking is the logical extension of multiprogramming .The concept of multitasking is quite similar to multiprogramming but difference is that theswitchingbetween jobs occurs so frequently that the users can interact with each programwhile it is running. This concept is also known as time-sharing systems. A time-shared operating system uses CPU scheduling and multiprogramming to provideeach user with a small portion of time-shared system.

    Multi threading:An application typically is implemented as a separate process with several threads

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    16

    http://www.globalguideline.com/interview_questions/Answer.php?a=Recovery_from_Deadlock&page=6http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_multi_tasking_multi_programming_multi_threading&page=6http://www.globalguideline.com/interview_questions/Answer.php?a=Recovery_from_Deadlock&page=6http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_multi_tasking_multi_programming_multi_threading&page=6
  • 8/14/2019 Ineterview FAQs for windows server

    17/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    of control. In some situations a single application may be required to performseveral similar tasks for example a web server accepts client requests for webpages, images, sound, and so forth.

    29 :: Differentiate between RAM and ROM?

    Semiconductor memories are of two types: RAM (random access memory) and ROM(read only memory).RAM is a read/write memory. Information can be written into and read from a RAM.It is volatile memory.It stores information so long as power supply is on.ROM is permanent type memory. Its contents are not lost when power supply goesoff. the user cannot write into a ROM.Its contents are decided by the manufacturerand written at the time of manufacture. Programmable ROMs are also available.

    They are called PROMs.

    30 :: Binding of Instructions and Data to Memory?

    Address binding of instructions and data to memory addresses can happen at threedifferent stagesCompile time: If memory location known a priori, absolute code can be generated;must recompile code if starting location changes.Load time: Must generate relocatable code if memory location is not known atcompile time.Execution time: Binding delayed until run time if the process can be moved duringits execution from one memory segment to another. Need hardware support foraddress maps (e.g., base and limit registers).Multistep Processing of a User Program

    31 :: Why paging is used? Paging is solution to external fragmentation problem which is to permit the logicaladdress space of a process to be noncontiguous, thus allowing a process to beallocating physical memory wherever the latter is available.

    32 :: What is a Safe State and its use in deadlock avoidance? When a process requests an available resource, system must decide if immediateallocation leaves the system in a safe state->System is in safe state if there exists a safe sequence of all processes.->Sequence is safe if for each Pi, the resources that Pi can stillrequest can be satisfied by currently available resources + resources held by all thePj, with j

  • 8/14/2019 Ineterview FAQs for windows server

    18/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    When Pi terminates, Pi+1 can obtain its needed resources, and so on.->Deadlock Avoidance ?ensure that a system will never enter an unsafe state.

    33 :: Explain the difference between microkernel and macro kernel? Micro-Kernel: A micro-kernel is a minimal operating system that performs only the

    essential functions of an operating system. All other operating system functions areperformed by system processes.Monolithic: A monolithic operating system is one where all operating system code isin a single executable image and all operating system code runs in system mode.

    34 :: Differentiate between Compiler and Interpreter? An interpreter reads one instruction at a time and carries out the actions implied bythat instruction. It does not perform any translation. But a compiler translates theentire instructions.

    35 :: What is the relation between process system time, process waiting

    time , and process CPU time? Process system time (turn around time) = process cpu time + process waiting time

    36 :: Condition for deadlock occurrence? Deadlock can arise if four conditions hold simultaneously.

    Mutual exclusion:only one process at a time can use a resource.

    Hold and wait:a process holding at least one resource is waiting to acquire additional resources

    held by other processes.

    No preemption:a resource can be released only voluntarily by the process holding it, after thatprocess has completed its task.

    Circular wait:there exists a set {P0, P1, ?, P0} of waiting processes such that P0 is waiting for aresource that is held by P1, P1 is waiting for a resource that is held by P2, Pn1 is waiting for a resource that is held byPn, and P0 is waiting for a resource that is held by P0.

    37 :: Compare Linux credit based algorithm with other schedulingalgorithms? For the conventional time ?shared processes, Linux uses a prioritized, credit-basedalgorithm. Each process possesses a certain number of scheduling credits; when anew task must be chosen to run, the process with most credits is selected. Everytime that a timer interrupt occurs, the currently running process loses one credit;

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    18

    http://www.globalguideline.com/interview_questions/Answer.php?a=Explain_the_difference_between_microkernel_and_macro_kernel&page=7http://www.globalguideline.com/interview_questions/Answer.php?a=Differentiate_between_Compiler_and_Interpreter&page=7http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_relation_between_process_system_time&page=7http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_relation_between_process_system_time&page=7http://www.globalguideline.com/interview_questions/Answer.php?a=Condition_for_deadlock_occurrence&page=8http://www.globalguideline.com/interview_questions/Answer.php?a=Compare_Linux_credit_based_algorithm_with_other_scheduling_algorithms&page=8http://www.globalguideline.com/interview_questions/Answer.php?a=Compare_Linux_credit_based_algorithm_with_other_scheduling_algorithms&page=8http://www.globalguideline.com/interview_questions/Answer.php?a=Explain_the_difference_between_microkernel_and_macro_kernel&page=7http://www.globalguideline.com/interview_questions/Answer.php?a=Differentiate_between_Compiler_and_Interpreter&page=7http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_relation_between_process_system_time&page=7http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_relation_between_process_system_time&page=7http://www.globalguideline.com/interview_questions/Answer.php?a=Condition_for_deadlock_occurrence&page=8http://www.globalguideline.com/interview_questions/Answer.php?a=Compare_Linux_credit_based_algorithm_with_other_scheduling_algorithms&page=8http://www.globalguideline.com/interview_questions/Answer.php?a=Compare_Linux_credit_based_algorithm_with_other_scheduling_algorithms&page=8
  • 8/14/2019 Ineterview FAQs for windows server

    19/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    when its credits reaches zero, it is suspended and another process is chosen. If norunnable processes have any credits, then Linux performs a recrediting operation,adding credits to every process in the system (rather than just to the runnableones), according to the following rule:Credits = credits/2 + priority

    The above scheduling class is used for time-shared process and the in Linux for thereal-time scheduling is simpler it uses scheduling classes: first come, first served(FCFS), and round-robin (RR) .In both cases, each process has a priority in additionto its scheduling class. In time-sharing scheduling, however, processes of differentpriorities can still compete with one another to some extent; in real-timescheduling, the scheduler always runs the process with the highest priority. Amongprocesses of equal priority, it runs the process that has been waiting longest. The only differencebetween FCFS and RR scheduling is that FCFS processes continue to run until theyeither exit or block, whereas a round-robin process will be preempted after a whileand will be moved to the end of the scheduling queue.

    38 :: Why thread is called as a lightweight process? It is called light weight process to emphasize the fact that a thread is like a processbut is more efficient and uses fewer resources( n hence "lighter")and they alsoshare the address space.

    39 :: What is the cause of thrashing? How does the system detectthrashing? Once it detects thrashing, what can the system do to eliminatethis problem?

    Thrashing is caused by under allocation of the minimum number of pages requiredby a process, forcing it to continuously page fault. The system can detect thrashingby evaluating the level of CPU utilization as compared to the level of multiprogramming. It can be eliminated by reducing the level of multiprogramming.

    40 :: Define Demand Paging, Page fault interrupt, and Trashing? Demand Paging: Demand paging is the paging policy that a page is not read intomemory until it is requested, that is, until there is a page fault on the page.Page fault interrupt: A page fault interrupt occurs when a memory reference ismade to a page that is not in memory. The present bit in the page table entry willbe found to be off by the virtual memory hardware and it will signal an interrupt.

    Trashing: The problem of many page faults occurring in a short time, called page

    thrashing41 :: Give a non-computer example of preemptive and non-preemptivescheduling? Consider any system where people use some kind of resources and compete forthem. The non-computer examples for preemptive scheduling the traffic on thesingle lane road if there is emergency or there is an ambulance on the road the

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    19

    http://www.globalguideline.com/interview_questions/Answer.php?a=Why_thread_is_called_as_a_lightweight_process&page=8http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_cause_of_thrashing_How_does_the_system_detect_thrashing&page=8http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_cause_of_thrashing_How_does_the_system_detect_thrashing&page=8http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_cause_of_thrashing_How_does_the_system_detect_thrashing&page=8http://www.globalguideline.com/interview_questions/Answer.php?a=Define_Demand_Paging_Page_fault_interrupt_and_Trashing&page=8http://www.globalguideline.com/interview_questions/Answer.php?a=Give_a_non-computer_example_of_preemptive_and_non-preemptive_scheduling&page=9http://www.globalguideline.com/interview_questions/Answer.php?a=Give_a_non-computer_example_of_preemptive_and_non-preemptive_scheduling&page=9http://www.globalguideline.com/interview_questions/Answer.php?a=Why_thread_is_called_as_a_lightweight_process&page=8http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_cause_of_thrashing_How_does_the_system_detect_thrashing&page=8http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_cause_of_thrashing_How_does_the_system_detect_thrashing&page=8http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_cause_of_thrashing_How_does_the_system_detect_thrashing&page=8http://www.globalguideline.com/interview_questions/Answer.php?a=Define_Demand_Paging_Page_fault_interrupt_and_Trashing&page=8http://www.globalguideline.com/interview_questions/Answer.php?a=Give_a_non-computer_example_of_preemptive_and_non-preemptive_scheduling&page=9http://www.globalguideline.com/interview_questions/Answer.php?a=Give_a_non-computer_example_of_preemptive_and_non-preemptive_scheduling&page=9
  • 8/14/2019 Ineterview FAQs for windows server

    20/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    other vehicles give path to the vehicles that are in need. The example forpreemptive scheduling ispeople standing in queue for tickets.

    42 :: What is starvation and aging?

    Starvation:Starvation is a resource management problem where a process does not get theresources it needs for a long time because the resources are being allocated toother processes.

    Aging:Aging is a technique to avoid starvation in a scheduling system. It works by addingan aging factor to the priority of each request. The aging factor must increase therequest?s priority as time passes and must ensure that a request will eventually bethe highest priority request (after it has waited long enough)

    43 :: If a system has 128 MB RAM and 1 GB hard Disk, and a processdecides to use its fully allotted Virtual Memory 2^32 - 2GB = 2 GB, how isit practically possible?. But this works in all machines. How? Virtual memory is double of RAM.As per question RAM is 128MB.so virtual memoryis 256MB.

    44 :: Difference between Logical and Physical Address Space? The concept of a logical address space that is bound to a separate physical addressspace is central to proper memory management.Logical address generated by the CPU; also referred to as virtual address.Physical address address seen by the memory unit.Logical and physical addresses are the same in compile-time and load-time address-binding schemes; logical (virtual) and physical addresses differ in execution-timeaddress-binding scheme

    45 :: Describe the actions taken by thread library to context switchbetween user level threads?

    The thread library function performs the following actions to context switchbetween user level threads Copy all live registers to Thread control Block (TCB)Restore the state of the thread to run next i.e (copy the values of live registers from(TCB) to registers) Move to the next thread to execute

    46 :: Explain briefly about, processor, assembler, compiler, loader, linkerand the functions executed by them? Processor:A processor is the part a computer system that executes instructions .It is alsocalled a CPU

    Assembler:

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    20

    http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_starvation_and_aging&page=9http://www.globalguideline.com/interview_questions/Answer.php?a=If_a_system_has_128_MB_RAM_and_1_GB_hard_Disk_and_a_process_decides_to_use_its_fully_allotted_Virtual_Memory&page=9http://www.globalguideline.com/interview_questions/Answer.php?a=If_a_system_has_128_MB_RAM_and_1_GB_hard_Disk_and_a_process_decides_to_use_its_fully_allotted_Virtual_Memory&page=9http://www.globalguideline.com/interview_questions/Answer.php?a=If_a_system_has_128_MB_RAM_and_1_GB_hard_Disk_and_a_process_decides_to_use_its_fully_allotted_Virtual_Memory&page=9http://www.globalguideline.com/interview_questions/Answer.php?a=Difference_between_Logical_and_Physical_Address_Space&page=9http://www.globalguideline.com/interview_questions/Answer.php?a=Describe_the_actions_taken_by_thread_library_to_context_switch_between_user_level_threads&page=9http://www.globalguideline.com/interview_questions/Answer.php?a=Describe_the_actions_taken_by_thread_library_to_context_switch_between_user_level_threads&page=9http://www.globalguideline.com/interview_questions/Answer.php?a=Explain_briefly_about_processor_assembler_compiler_loader_linker_and_the_functions_executed_by_them&page=10http://www.globalguideline.com/interview_questions/Answer.php?a=Explain_briefly_about_processor_assembler_compiler_loader_linker_and_the_functions_executed_by_them&page=10http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_starvation_and_aging&page=9http://www.globalguideline.com/interview_questions/Answer.php?a=If_a_system_has_128_MB_RAM_and_1_GB_hard_Disk_and_a_process_decides_to_use_its_fully_allotted_Virtual_Memory&page=9http://www.globalguideline.com/interview_questions/Answer.php?a=If_a_system_has_128_MB_RAM_and_1_GB_hard_Disk_and_a_process_decides_to_use_its_fully_allotted_Virtual_Memory&page=9http://www.globalguideline.com/interview_questions/Answer.php?a=If_a_system_has_128_MB_RAM_and_1_GB_hard_Disk_and_a_process_decides_to_use_its_fully_allotted_Virtual_Memory&page=9http://www.globalguideline.com/interview_questions/Answer.php?a=Difference_between_Logical_and_Physical_Address_Space&page=9http://www.globalguideline.com/interview_questions/Answer.php?a=Describe_the_actions_taken_by_thread_library_to_context_switch_between_user_level_threads&page=9http://www.globalguideline.com/interview_questions/Answer.php?a=Describe_the_actions_taken_by_thread_library_to_context_switch_between_user_level_threads&page=9http://www.globalguideline.com/interview_questions/Answer.php?a=Explain_briefly_about_processor_assembler_compiler_loader_linker_and_the_functions_executed_by_them&page=10http://www.globalguideline.com/interview_questions/Answer.php?a=Explain_briefly_about_processor_assembler_compiler_loader_linker_and_the_functions_executed_by_them&page=10
  • 8/14/2019 Ineterview FAQs for windows server

    21/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    An assembler is a program that takes basic computer instructions and convertsthem into a pattern of bits that the computer's processor can use to perform itsbasic operations. Some people call these instructions assembler language andothers use the term assembly language.

    Compiler:A compiler is a special program that processes statements written in a particularprogramming language and turns them into machine language or "code" that acomputer'sprocessor uses. Typically, a programmer writes language statements in alanguage such as Pascal or C one line at a time using an editor. The file that iscreated contains what are called the source statements. The programmer then runsthe appropriate language compiler, specifying the name of the file that contains thesource statements.

    Loader:In a computer operating system, a loader is a component that locates a givenprogram (which can be an application or, in some cases, part of the operatingsystem itself) in offline storage (such as a hard disk), loads it into main storage (in apersonal computer, it's called random access memory), and gives that programcontrol of the compute

    Linker:Linker performs the linking of libraries with the object code to make the object codeinto an executable machine code.

    47 :: Explain Segmentation with paging?

    Segments can be of different lengths, so it is harder to find a place for a segment inmemory than a page. With segmented virtual memory, we get the benefits of virtual memory but we still have to do dynamic storage allocation of physicalmemory. In order to avoid this, it is possible to combine segmentation and paginginto a two-levelvirtual memory system. Each segment descriptor points to page table for thatsegment.This give some of the advantages of paging (easy placement) with some of the advantages of segments (logical division of the program).

    48 :: What are the major differences between windows XP and Windows2000 operating systems?

    Both Windows XP and 2000 come in different flavors like for XP u haveHome,professional and Enterprise Edition.With 2000 u have professional,Server/s as it professional is more like client pc inClient server Architecture can also be used for development environment XP homefor rather general purpose users or say newbies with minimal configuration.

    With 2000 server you have all the server capabilities plus on default u might have

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    21

    http://www.globalguideline.com/interview_questions/Answer.php?a=Explain_Segmentation_with_paging&page=10http://www.globalguideline.com/interview_questions/Answer.php?a=What_are_the_major_differences_between_windows_XP_and_Windows__2000_operating_systems&page=10http://www.globalguideline.com/interview_questions/Answer.php?a=What_are_the_major_differences_between_windows_XP_and_Windows__2000_operating_systems&page=10http://www.globalguideline.com/interview_questions/Answer.php?a=Explain_Segmentation_with_paging&page=10http://www.globalguideline.com/interview_questions/Answer.php?a=What_are_the_major_differences_between_windows_XP_and_Windows__2000_operating_systems&page=10http://www.globalguideline.com/interview_questions/Answer.php?a=What_are_the_major_differences_between_windows_XP_and_Windows__2000_operating_systems&page=10
  • 8/14/2019 Ineterview FAQs for windows server

    22/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    NTFS system rather than FAT or FAT32. pluse with server u have capabilities of hosting services like DHCP, DNS, TERMINAL SERVICES etc..

    There would be a lot if i start explaining in detail but for a creamy part...this is morethan enough

    49 :: What is the difference between Hard and Soft real-time systems? A hard real-time system guarantees that critical tasks complete on time. This goalrequires that all delays in the system be bounded from the retrieval of the storeddata to the time that it takes the operating system to finish any request made of it.A soft real time system where a critical real-time task gets priority over other tasksand retains that priority until it completes. As in hard real time systems kerneldelays need to be bounded

    50 :: Why are page sizes always powers of 2? Recall that paging is implemented by breaking up an address into a page and offset

    number. It is most efficient to break the address into X page bits and Y offset bits,rather than perform arithmetic on the address to calculate the page number andoffset. Because each bit position represents a power of 2, splitting an addressbetween bits results in a page size that is a power of 2.

    51 :: On a system with paging, a process cannot access memory that itdoes not own why? How could the operating system allow access to othermemory? Why should it or should it not? An address on a paging system is a logical page number and an offset. The physicalpage is found by searching a table based on the logical page number to produce aphysical page number. Because the operating system controls the contents of thistable, it can limit a process to accessing only those physical pages allocated to theprocess. There is no way for a process to refer to a page it does not own becausethe page will not be in the page table. To allow such access, anoperating systemsimply needs to allow entries for non-process memory to be added to the process?spage table. This is useful when two or more processes need to exchange data?they

    just read and write to the same physical addresses (which may be at varying logicaladdresses). This makes for very efficient interprocess communication.

    52 :: What is active directory? How it works?What is dns? How it works?What is dhcp? How it works?What is ias? How it works? Active is a centralize directory database it's provide single point of administrationwhat is DHCPdynamic host configuration protocolit is one of the network service which is provides the ip address dynamically to theDHCP client

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    22

    http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_difference_between_Hard_and_Soft_real-time_systems&page=10http://www.globalguideline.com/interview_questions/Answer.php?a=Why_are_page_sizes_always_powers_of_2&page=10http://www.globalguideline.com/interview_questions/Answer.php?a=On_a_system_with_paging_a_process_cannot_access_memory_that_it_does_not_own_why&page=11http://www.globalguideline.com/interview_questions/Answer.php?a=On_a_system_with_paging_a_process_cannot_access_memory_that_it_does_not_own_why&page=11http://www.globalguideline.com/interview_questions/Answer.php?a=On_a_system_with_paging_a_process_cannot_access_memory_that_it_does_not_own_why&page=11http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_active_directory_How_it_works_What_is_dns_How_it_works_What_is_dhcp_How_it_works_What_is_ias_How_it_works&page=11http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_active_directory_How_it_works_What_is_dns_How_it_works_What_is_dhcp_How_it_works_What_is_ias_How_it_works&page=11http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_active_directory_How_it_works_What_is_dns_How_it_works_What_is_dhcp_How_it_works_What_is_ias_How_it_works&page=11http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_active_directory_How_it_works_What_is_dns_How_it_works_What_is_dhcp_How_it_works_What_is_ias_How_it_works&page=11http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_difference_between_Hard_and_Soft_real-time_systems&page=10http://www.globalguideline.com/interview_questions/Answer.php?a=Why_are_page_sizes_always_powers_of_2&page=10http://www.globalguideline.com/interview_questions/Answer.php?a=On_a_system_with_paging_a_process_cannot_access_memory_that_it_does_not_own_why&page=11http://www.globalguideline.com/interview_questions/Answer.php?a=On_a_system_with_paging_a_process_cannot_access_memory_that_it_does_not_own_why&page=11http://www.globalguideline.com/interview_questions/Answer.php?a=On_a_system_with_paging_a_process_cannot_access_memory_that_it_does_not_own_why&page=11http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_active_directory_How_it_works_What_is_dns_How_it_works_What_is_dhcp_How_it_works_What_is_ias_How_it_works&page=11http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_active_directory_How_it_works_What_is_dns_How_it_works_What_is_dhcp_How_it_works_What_is_ias_How_it_works&page=11http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_active_directory_How_it_works_What_is_dns_How_it_works_What_is_dhcp_How_it_works_What_is_ias_How_it_works&page=11
  • 8/14/2019 Ineterview FAQs for windows server

    23/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    it give ip address automatically to the clientWHAT IS DNSdo mine naming serviceit provide ip to host and host to ip

    53 :: What is the main component of operating system? Main component of operating system are kernel and shell.

    Shell is a interface between application program and kernel whenever applicationprogram wants some work to be done It contacts kernel and kernel inturn performwork with the help of device drivers .thus we can say kernel is an interface betweenhardware and shell.

    Kernel uses device drivers to control microcontroller card of peripheral device andinturn work is being accomplished.

    application program -> [shells ->kernel ->device driver -> controller card ->physical hardware]

    54 :: What are Dynamic Loading, Dynamic Linking and Overlays? Dynamic Loading: Routine is not loaded until it is called Better memory-space utilization; unused routine is never loaded. Useful when large amounts of code are needed to handle infrequently occurringcases. No special support from the operating system is required implemented throughprogram design.Dynamic Linking: Linking postponed until execution time. Small piece of code, stub, used to locate the appropriate memory-resident libraryroutine. Stub replaces itself with the address of the routine, and executes the routine. Operating system needed to check if routine is in processes? memory address. Dynamic linking is particularly useful for libraries.Overlays: Keep in memory only those instructions and data that are needed at any giventime. Needed when process is larger than amount of memory allocated to it. Implemented by user, no special support needed from operating system,programming design of overlay structure is complex.

    55 :: What is Dispatcher? Dispatcher module gives control of the CPU to the process selected by the short-term scheduler; this involves:

    Mohammed Rafique | Windows Server 2003 IIS and Scripting interviewquestions

    23

    http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_main_component__of_operating_system&page=11http://www.globalguideline.com/interview_questions/Answer.php?a=What_are_Dynamic_Loading__Dynamic_Linking_and_Overlays&page=11http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_Dispatcher&page=11http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_the_main_component__of_operating_system&page=11http://www.globalguideline.com/interview_questions/Answer.php?a=What_are_Dynamic_Loading__Dynamic_Linking_and_Overlays&page=11http://www.globalguideline.com/interview_questions/Answer.php?a=What_is_Dispatcher&page=11
  • 8/14/2019 Ineterview FAQs for windows server

    24/28

    February 3, 2010 [ WINDOWS SERVER INTERVIEW FAQS ]

    Switching contextSwitching to user mode

    Jumping to the proper location in the user program to restart that programDispatch latency ? time it takes for the dispatcher to stop one process and startanother running.

    56 :: What is the difference between unix and windows? Unix and Windows use completely different paradigms for run-time loading of code.Before you try to build a module that can be dynamically loaded, be aware of howyour system works.

    In Unix, a shared object (.so) file contains code to be used by the program, and alsothe names of functions and data that it expects to find in the program. When the fileis joined to the program, all references to those functions and data in the file's codeare changed to point to the actual locations in the program where the functions anddata are placed in memory. This is basically a link operation.

    In Windows, a dynamic-link library (.dll) file has no dangling references. Instead, anaccess to functions or data goes through a lookup table. So the DLL code does nothave to be fixed up at runtime to refer to the program's memory; instead, the codealready uses the DLL's lookup table, and the lookup table is modified at runtime topoint to the functions and data.

    In Unix, there is only one type of library file (.a) which contains code from severalobject files (.o). During the link step to create a shared object file (.so), the linkermay find that it doesn't know where