7/28/2019 Interview System Admin
1/16
System Administrator Interview Questions & Answers
Section 1: Hardware & Networking
1. What are the reasons for Blue Dump error?*
. 1. Failure of the compatibility of hardware and software.
2. Running no of programs at a time.
3. Windows registry issues.
4. Viruses and Spyware activities.
2. What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?**
10Base2An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses
baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2
segments.
10Base5An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses
baseband signaling, with 5 continuous segments not exceeding 100 meters per segment.
10BaseTAn Ethernet term meaning a maximum transfer rate of 10 Megabits per second that usesbaseband signaling and twisted pair cabling.
3. What are the Booting files in XP & Windows 7?*In windows XP:
1. NTLDR, 2.BOOT.IN 3.BOOTSECT.DOS 4.NTDETECT.COM 5.NTBOOTDD.SYS
6.NTOSKRNL.EXE 7.WIN.COM 8.HAL.DLL
In windows 7:
1. OOTMGR 2.BCD 3.BOOTMGR 4.WINLOAD.EXE 5.NTOSKRNL.EXE 6.WIN.COM
7. HAL.DLL
4. What is Private IP Address & IP Ranges?*
It is a non-routable IP address which is not used in Internet.
Ranges are:
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
5.How would you Start or Stop a Windows Service?*
Logon to Windows with Administrator rights.
Click Start > Control Panel.
Double-click Administrative Tools.
Double-click the Services icon.
Double-click the service that you want to stop or start.
(OR) StartRunservices. mscEnter
7/28/2019 Interview System Admin
2/16
When the Service Properties window appears do one of the following:
* If the service is running, click Stop the service.
* If the service is not running, click Start the service.
Click OK.
6.Where are the Temp files located and how would you remove them?*
There are three different places that you can find temporary files on your computer. They are
located in different place in Windows Vista and Windows Xp. In Windows Vista there are three file
paths below to follow to view the temporary files.
C:\Users\Username\AppData\Local\Temp (%temp)
C:\Windows\Temp (temp)
C:\Users\Username\AppData\Local\Microsoft\Windows\Temporary Internet Files
7. What is Safe Mode?*
Safe mode is an alternate boot method for Windows operating systems that makes it easier to
diagnose problems. The only startup programs loaded are the operating system and drivers for the
mouse, keyboard, and display modes display. It is often possible to get a system to start in safe
mode when it won't start normally. To start in safe mode, press the F8 key while the system is
booting and select "safe mode" (or the safe mode option you want) from the menu that appears.
8. What is MSConfig? Explain about it.*
Msconfig.exe is a file which helps to edit and administer text configuration files such as win.ini and
autoexec.bat.Msconfig is used to control what programs and services start with your computer. Its vhelpful in troubleshooting startup problems as well as poor performance and getting rid of spyware a
viruses.
9.What would you do if your system is running slow?*
1. Empty Recycle Bin.
2. Empty Windows Temp folder.
3. Run Scandisk.
4. Run Defragmenter.
5. Full System Virus scan.
10. What is the port value of: RDP, DNS, SMTP, POP3, SQL, IMAP, and GC? **
RDP -3389, DNS - 53, SMTP - 25, POP3 - 110, SQL - 1433, IMAP 143, GC 3268
7/28/2019 Interview System Admin
3/16
11. What is the difference between MS outlook & MS outlook Express?
MS outlook
All files will be saved in *.pst format
Having some additional features like Address book, Contact, Reminder.
MS outlook Express
File will be saved *.DBX
Dont have any additional features
12. How to create a PST File in MS outlook 2010?
Open OutlookFileAccount Settings Data FilesAddthen OK
13. How do you block the web site from local machine?
1. Open the Operating system Drive with Administrator account (c drive)
2. Open C:\windows\system32\driver\etc\hosts
3. Edit hosts file
4. Type 127.0.0.1www.websitename.comthen save it.
14. What is a firewall?
A firewall is software or hardware that checks information coming from the Internet or a
network, and then either blocks it or allows it to pass through to your computer, depending
on your firewall settings.
A firewall can help prevent hackers ormalicious software(such as worms) from gaining
access to your computer through a network or the Internet. A firewall can also help stopyour computer from sending malicious software to other computers.
15. Difference between domain and workgroup?
Domain Work Group
1. Centralized network model Decentralized network
2. Domain is controlled by DC Control No centralized
3. Centralized login Local login
4. Centralized user database local user data based
http://www.websitename.com/http://www.websitename.com/http://www.websitename.com/http://mshelp//windows/?id=85b8c3e6-28c4-464d-b883-7764d16f54a2#gtmt_malicious_software_defhttp://mshelp//windows/?id=85b8c3e6-28c4-464d-b883-7764d16f54a2#gtmt_malicious_software_defhttp://mshelp//windows/?id=85b8c3e6-28c4-464d-b883-7764d16f54a2#gtmt_malicious_software_defhttp://mshelp//windows/?id=33a9d478-ea9c-4bf3-83da-96819d601bf2#gtmt_worm_defhttp://mshelp//windows/?id=33a9d478-ea9c-4bf3-83da-96819d601bf2#gtmt_worm_defhttp://mshelp//windows/?id=33a9d478-ea9c-4bf3-83da-96819d601bf2#gtmt_worm_defhttp://mshelp//windows/?id=85b8c3e6-28c4-464d-b883-7764d16f54a2#gtmt_malicious_software_defhttp://www.websitename.com/7/28/2019 Interview System Admin
4/16
Section II: Windows Active Directory
1. What is Active Directory? **
Active directory is the hierarchical database. It stores all the Information about network
resources, which makes the resources accessible to users and computers. It helps to centrally
manage, Organize & control access to resources.
It includes Groups, users, computers, printers servers, domains.
2. Explain About ADS Data Base: **
1. Ntds.dit: This is the main database file for active directory.
2. Edb.log: When a transaction performed to ad database, like writing some data first the
data will be stored to this file. And after that it will be sent to database. So the system
performance will be depends on how this data from edb.log file will be written to ntds.dit
3. res1.log: Used as reserve space in the case when drive had low space. It is basically 10MB
in size and crated when we run dcpromo.
4. Res2.log: Same as res1.log. It is also 10MB in size and the purpose also same.
5. Edb.chk: This file records the transactions committed to ad database. During shutdown,shutdown statement is written to this file. If it is not found when the system rebooted, the
ad database tries to check with edb.log for the updated information.
3. What are the Roles used in Active Directory? ***
1. Schema master (forest wide):
The Schema Master controls all updates to the Schema within the forest.
2. Domain Naming Master (forest wide):
The Domain Naming Master role is responsible for the creation and deletion of domains in
the forest.
3. PDC Emulator (domain wide):
The PDC emulator role provides backwards compatibility for Windows NT backup domain
controllers (BDCs), the PDC emulator advertises itself as the primary domain controller for
the domain. It also acts as the domain master browser and maintains the latest password for
all users within the domain.
4. Infrastructure Master (domain wide):
The Infrastructure Manager role is responsible for updating references from objects within
its domain with objects in other domains.
5. RID Master (domain wide): The RID Master manages the Security Identifier (SID) for every
object within the domain.
7/28/2019 Interview System Admin
5/16
4. How to verify the ADS Installation? **
1. Verifying the SRV records in DNs.
2. Verifying the SYSVOL,Database & Log files folders.
5. What is DNS (Domain Name Service) **
Domain NameSystem (DNS) servers maintain a distributed database used to translate computer
names to Internet Protocol (IP) addresses on Transmission Control Protocol/Internet Protocol(TCP/IP) networks which includes the internet.
There are two different types of DNS lookup
1. Forward Look up
2. Reverse Look Up
Forward lookup query resolves a DNS name to an IP address and is the most common DNS query.
Reverse lookup query resolves an IP address to a name.
A DNS name server can resolve a query only for a zone for which it has authority. When DNS
servers receive a resolution request, they attempt to locate the requested information in
their own database.
6. What are the Records in DNS? ***
NS Record:
Name serverAll the servers that are listed in the NS record are stated as the authoritative
name servers for a particular domain.
MX Record:
MX record is considered as the Mail Exchange Record. This MX record states the location where
the mail is being sent. Apart from IP address MX records contains fully qualified domain names.
A Record:
A record is the Address Record. This assigns an IP address for a domain or a subdomain name.
Usually A record will be an IP address.
CNAME Record:Canonical Name Record makes one domain name as an alias of another domain name. Usually
the aliased domain acquires all the subdomains and DNS record of the original domain. CNAME
redirects request to another record. CNAME will be fully qualified domain name.
TXT Record:
TXT Record allows inserting arbitrary text into a DNS record. These TEXT Record adds SPF
records to a domain.
TIL Record:
TIL is nothing but Time to Live. This TIL value sets the tenure of information which will be good
when a recursive DNS server queries for your domain name information Usually the value is set
in seconds.SOA Record:
This State of Authority record specifies the DNS server that provides authoritative information
about the domain name, domain administrator email, domain serial number, along with several
timers in relation to refreshing the zone.
7/28/2019 Interview System Admin
6/16
7. Different types of Groups in AD 2003? ***
Domain Local Group
Domain Local groups can only be used in the domain in which they were created. A Domain
Local group allows membership from any other group as well as any user or computer. Domain
Local groups from other domains cannot be used as members because they are limited in their
use outside of the domain in which they were created. Universal groups can only be used as
members when the Universal group exists in the same forest as the Domain Local group.
Global Group
Global groups have the most restrictive membership requirements, only allowing users,
computers, and other Global groups from the same domain to be used as members. However,
Global groups can be used as members of any other group, including other forest and external
domains. This means a Global group has the most restrictive membership requirements of all
the groups but is the most flexible when being used as members of other groups.
Universal Group
the Universal group is replicated via the global catalog server. For this reason, it is available to
any domain in the forest but not to other forests or external domains. Since the Universal groupis available forest wide, it does not allow Domain Local groups to be members even when the
Universal group has been created in the same domain as the Domain Local group.
8. What is RAID? Explain about Raid 1 & 5 Model. **
RAID is a technology of grouping disk in order to provide more space and redundancy. There are
total 54 RAID method. Windows 2003 support RAID 0, 1& 5.
RAID-1:
1. Min. and max. 2 hard disk
2. If anyone disk fails data can be recovered from other disk.
3.50% space wastage.
4. No read/write performance improvement.
5. Good for storing Operating system.
RAID-5:
1. Data is stored in distributed format across the entire disk
2. Min 3 max. 32
3. If anyone disk fails data can be recovered using parity.
4. Parity space wastage e.g. Parity = total space \ no of disk.
5. Good for storing data.
9.What is DHCP DORA process? **
1. Discover: Client sends the request for IP.
2. Offer: DHCP server send & offer with IP address.
3. Request: If client accept the IP it sends a request to DHCP.
4. Acknowledgement: DHCP server sends Ack for the same.
7/28/2019 Interview System Admin
7/16
10. What are the different types of profile? **
1. Local Profile: stored on local machine where the user log on. User gets different profile
when he logs on to different machine.
2. Roaming Profile: Stored in shared folder of server. User gets same profile when he
logs on to different machine. User can modify his profile.
3. Mandatory profile: Stored in shared folder of server. User gets same profile when he
logs on to different machine. User cannot modify his profile.
11.What is domain controller? **
A Domain controller (DC) is a server that responds to security authentication requests
(logging in, checking permissions, etc.) within the Windows Server domain. A domain is a concept
introduced in Windows NT whereby a user may be granted access to a number of computer
resources with the use of a single username and password combination.
12. What is REPADMIN? **
This command-line tool assists administrators in diagnosing replication problems between
windows domain conrollers. Administrators can use Repadmin to view the replication topology as
seen from the perspective of each domain contrsoller.
13.You want to standardize the desktop environments (wallpaper, My Documents, Start menu,
printers etc.) on the computers in one department. How would you do that? **
1. Go to Start->programs->Administrative tools->Active Directory Users and Computers
2. Right Click on Domain->click on properties
3. On New windows Click on Group Policy
4. Select Default Policy->click on Edit on group Policy console go to User Configuration-Administrative Template->Start menu and Taskbar Select each property you want to modify and do
the same.
14.What is a Stub zone and what is the use of it.
Stub zones are a new feature of DNS in Windows Server 2003 that can be used to streamline
name resolution, especially in a split namespace scenario. They also help reduce the amount of DNS
traffic on your network, making DNS more efficient especially over slow WAN links.
15.What is Domain Policy, Domain controller policy, Local policy and Group Policy?
Domain Policy will apply to all computers in the domain, because by default it will be
associated with domain GPO.
Domain controller policy will be applied only on domain controller. By default domain
controller security policy will be associated with domain controller GPO.
Local policy will be applied to that particular machine only and effects to that computer only.
7/28/2019 Interview System Admin
8/16
16. What is PPTP protocol for VPN in windows 2003?
Point-to-Point-Tunneling Protocol (PPTP) is a networking technology that supports
multiprotocol virtual private networks (VPN), enabling remote users to access corporate networks
securely across the Microsoft Windows NT Workstation, Windows 95, and Windows 98 operating
systems and other point-to-point protocol (PPP)-enabled systems to dial into a local Internet service
provider to connect securely to their corporate network through the Internet.
17. What are the additional tools found after installing a DC?
1. Active Directory User and Computers,
2. Active Directory Sites and Services,
3. Active Directory Domain & Trust,
4. Domain Controller Security Policy,
5. Domain Security Policy
18. What are some of the new tools and features provided by Windows Server 2008?
Windows Server 2008 now provides a desktop environment similar to MicrosoftWindows Vista and includes tools also found in Vista, such as the new backup snap-in and
The Bit Locker drive encryption feature. Windows Server 2008 also provides the new IIS7
Web server and the Windows Deployment Service.
19.How do you deal with Group Policy inheritance issues?
GPOs are inherited down through the Active Directory tree by default. You can block the
Inheritance of settings from up line GPOs (for a particular container such as an OU or a local
Computer) by selecting Block Inheritance for that particular object. If you want to enforce a
Higher-level GPO so that it overrides directly linked GPOs, you can use the Enforce
Command on the inherited (or up line) GPO.
20.What System State data contains?
1. Contains Startup files,
2. Registry
3. Com + Registration Database
4. Memory Page file
5. System files
6. AD information
7. Cluster Service information
8. SYSVOL Folder
7/28/2019 Interview System Admin
9/16
Section III: System Test:
1. How to Install the IIS in windows 7 Operating System:
Install IIS 7 or Above
1. To open the Windows Features dialog box, click Start, and then click Control Panel.
Figure 1: Windows Vista Start menu
http://i1.iis.net/media/7187748/installing-iis-on-windows-vista-and-windows-7-707-image002.jpg?cdn_id=2013-05-01-0017/28/2019 Interview System Admin
10/16
2. In the Control Panel, clickPrograms.
Figure 2: Control Panel Home
3. Click Turn Windows features on or off.
Figure 3: Control Panel install options
http://i2.iis.net/media/7187736/installing-iis-on-windows-vista-and-windows-7-707-image004.jpg?cdn_id=2013-05-01-001http://i3.iis.net/media/7187742/installing-iis-on-windows-vista-and-windows-7-707-image003.jpg?cdn_id=2013-05-01-001http://i2.iis.net/media/7187736/installing-iis-on-windows-vista-and-windows-7-707-image004.jpg?cdn_id=2013-05-01-001http://i3.iis.net/media/7187742/installing-iis-on-windows-vista-and-windows-7-707-image003.jpg?cdn_id=2013-05-01-0017/28/2019 Interview System Admin
11/16
4. You may receive the Windows Security warning. Click Allow to continue. The Windows Features dialog
box is displayed.
Figure 4: Windows Security dialog box
5. Expand Internet Information Services. Additional categories of IIS features are displayed.
Select Internet Information Services to choose the default features for installation.
Figure 5: Windows Features dialog box - IIS
http://i2.iis.net/media/7187724/installing-iis-on-windows-vista-and-windows-7-707-image006.jpg?cdn_id=2013-05-01-001http://i3.iis.net/media/7187730/installing-iis-on-windows-vista-and-windows-7-707-image005.jpg?cdn_id=2013-05-01-001http://i2.iis.net/media/7187724/installing-iis-on-windows-vista-and-windows-7-707-image006.jpg?cdn_id=2013-05-01-001http://i3.iis.net/media/7187730/installing-iis-on-windows-vista-and-windows-7-707-image005.jpg?cdn_id=2013-05-01-0017/28/2019 Interview System Admin
12/16
6. Expand the additional categories displayed, and select any additional features you want to install, such
as Web Management Tools.
Figure 6: Windows Features dialog box - IIS feature selection
7. If you are installing IIS for evaluation purposes, you may want to select additional features to install.
Select the check boxes for all IIS features you want to install, and then click OK to start installation.
http://i3.iis.net/media/7187712/installing-iis-on-windows-vista-and-windows-7-707-image008.jpg?cdn_id=2013-05-01-001http://i3.iis.net/media/7187718/installing-iis-on-windows-vista-and-windows-7-707-image007.jpg?cdn_id=2013-05-01-001http://i3.iis.net/media/7187712/installing-iis-on-windows-vista-and-windows-7-707-image008.jpg?cdn_id=2013-05-01-001http://i3.iis.net/media/7187718/installing-iis-on-windows-vista-and-windows-7-707-image007.jpg?cdn_id=2013-05-01-0017/28/2019 Interview System Admin
13/16
Figure 7: Windows Features dialog box - Installation selection
8. The progress indicator appears.
Figure 8: Progress indicatorWhen the installation completes, the Windows Features dialog box closes, and the Control Panel is
displayed.
Figure 9: Control Panel Home page
10. IIS is now installed with a default configuration on Windows Vista or Windows 7. To confirm that the
installation succeeded, type the following URL into your browser,http://localhost.
http://localhost/http://localhost/http://localhost/http://i3.iis.net/media/7187700/installing-iis-on-windows-vista-and-windows-7-707-image010.jpg?cdn_id=2013-05-01-001http://i1.iis.net/media/7187706/installing-iis-on-windows-vista-and-windows-7-707-image009.jpg?cdn_id=2013-05-01-001http://i3.iis.net/media/7187700/installing-iis-on-windows-vista-and-windows-7-707-image010.jpg?cdn_id=2013-05-01-001http://i1.iis.net/media/7187706/installing-iis-on-windows-vista-and-windows-7-707-image009.jpg?cdn_id=2013-05-01-001http://localhost/7/28/2019 Interview System Admin
14/16
Figure 10: Default Web site11. Next, you can use Internet Information Services Manager to manage and configure IIS. To open IIS Manager,
click Start, typeinetmgr in the Search Programs and Files box, and then press ENTER.
Figure 11: Default Web Site Home pageIf you want to use ASP, Microsoft ASP.NET, or PHP, install the modules needed to host these pages; this can be
done during the installation of IIS or after the installation is complete.
http://i3.iis.net/media/7187688/installing-iis-on-windows-vista-and-windows-7-707-image012.jpg?cdn_id=2013-05-01-001http://i2.iis.net/media/7187694/installing-iis-on-windows-vista-and-windows-7-707-image011.jpg?cdn_id=2013-05-01-001http://i3.iis.net/media/7187688/installing-iis-on-windows-vista-and-windows-7-707-image012.jpg?cdn_id=2013-05-01-001http://i2.iis.net/media/7187694/installing-iis-on-windows-vista-and-windows-7-707-image011.jpg?cdn_id=2013-05-01-0017/28/2019 Interview System Admin
15/16
2. How to create a FTP account & Permissions?
I. Create FTP User
1. Log into Windows 2003 Server using MS Terminal Service or login from local.
2. Right Click "My Computer", choose "Manage"
3. Expand the "Computer Management" console: Local > Local Users and Groups > Users
4. Right Click on "Users", Add Users
II. Create FTP Virtual Directory
1. Open IIS 6.0
2. Expand IIS Console Local > FTP Sites > Default FTP Site
3. Right Click on "Default FTP Site", new virtual directory
4. Enter "Alias" name, put it as exactly the same as the username you have just created and click
Next.
5. Browse to the directory where you wish to allow this FTP user to access to.
6. Click next, enable "Read" and "Write" privileges.
7. Click Finish
III. Create Permissions on FTP Folder
1. Right click on your FTP folder and add the FTP user you have just created above to this folder.
2. Enable full permissions or any permission set you wish to create.
Done!
7/28/2019 Interview System Admin
16/16
3.