Thursday, July 31, 2008

visual_certexam_suite_setup with crack





Visual CertExam Suite
Visual CertExam Suite is a desktop test engine designed specifically for certification exam preparation. It allows you to create, edit and take practice tests in the environment very similar to a real exam.
Visual CertExam Suite includes two applications:
Visual CertExam Designer allows you to create and edit your own professional practice exams.
Visual CertExam Manager is designed for taking exams created with Visual CertExam Designer.



Download

visual_certexam_suite_setup with crack





Visual CertExam Suite
Visual CertExam Suite is a desktop test engine designed specifically for certification exam preparation. It allows you to create, edit and take practice tests in the environment very similar to a real exam.
Visual CertExam Suite includes two applications:
Visual CertExam Designer allows you to create and edit your own professional practice exams.
Visual CertExam Manager is designed for taking exams created with Visual CertExam Designer.



Download

Tuesday, July 29, 2008

CBT Nuggets Deploying Messaging Solutions with Microsoft Exchange Server 2007





Want to manage your Exchange 2007 organization from the ground up? This training offers you the details on how to make it happen.
Peter Bruzzese covers the transition from Exchange 2003 to Exchange 2007, including the period when both systems are running. He tells you exactly what to do as you move things over to your new structure, and then, how to operate this great messaging server day-in and day-out.

Transport Rules. Peter focuses heavily on one of Exchange 2007's coolest features: Transport Rules. Because all messaging goes through the Hub Transport servers, Transport Rules allow you to apply rules to messages in transit.

PowerShell. The PowerShell command-line interface is another great feature of Exchange 2007 and is prominently featured on the certification exam. Peter's training transforms you into a PowerShell expert.

Throughout this series, Peter also highlights how Exchange interacts with other servers and services, such as ISA Server, MOM, ForeFront and more. He covers the real issues you'll face as you deploy your Exchange 2007 installation, whether from a previous version of Exchange or another messaging system.

Every IT administrator looking to deploy Exchange in their real-world environment will benefit from this video series. Peter's training prepares you for Microsoft's 70-238 exam, while giving you the skills you need to deploy Exchange in your own real-world environment.

Passing this exam tells employers that you've got the ultimate level of knowledge in Exchange 2007 deployment.

The Exam-Pack 70-238: Deploying Messaging Solutions with Microsoft Exchange Server 2007 video series contains:


70-238 Introduction

70-238 Requirements and Skills

Planning Exchange 2007 Upgrade Implementation (free video!)

Transitioning Co-Existence

Finalizing Your Transition

Migrating to Exchange 2007

Hosted Exchange Solutions

Planning for High Availability Implementation

Planning a Backup/Recovery Solution (Part 1)

Planning a Backup/Recovery Solution (Part 2)

Storage Group Deployment

Server Role Deployment

Managed Content Settings and ActiveSync Policies

Additional Servers to Deploy with Exchange 2007

Planning AntiSpam and AntiVirus Implementation

Plan Transport Rule Implementation

Planning Network Security

Exchange Infrastructure Improvements

Plan for Configuration Changes

Plan for Patch and Service Pack Implementation

Plan for Testing, Monitoring and Reporting
Here's what you'll learn in each video of the Exam-Pack 70-238: Deploying Messaging Solutions with Microsoft Exchange Server 2007
series:

Video 1 - "Introduction to Exchange 2007" - This nugget explains how Exchange and Active Directory work together and lays the foundation for future nuggets that discuss preparation and installation of Exchange 2007. There is a discussion of Exchange Clients that can be used in Exchange 2007. It also explains the 5 new Server Roles: Mailbox Role, Client Access Server, Hub Transport Server, Edge Transport Server and Unified Messaging Server.

Video 2 - "Preparing and Installing Exchange 2007" - This nugget discusses the preparation needed within your AD infrastructure, including information about your Schema preparation (preparation switches), permissions that need to be given to the correct individuals and so forth. For the official installation we discuss the hardware and software requirements to install Exchange 2007 on a particular server. And we walk through a stand-alone installation of Exchange 2007.

Video 3 - "Managing Storage Groups and Databases" - This nugget focuses on the Mailbox Server role, providing an overview of storage architecture (including Storage Groups and Databases) using the Exchange Management Console and Exchange Management Shell.

Video 4 - "Configure Public Folders" - Discusses the use of Public Folders in an Exchange 2007 environment. Covers the steps to adding new folders through Outlook or the Exchange Management Shell, and explains how replicas are established for increased availability to your users of the public folder structure as well as a greater level of fault tolerance.

Video 5 - "Managing Recipient Objects: Mailboxes" - This nugget discusses the many types of recipient objects that exist (mailbox users, mail-enabled groups, resource mailboxes, mail contacts, linked mailboxes and so forth). The main focus in this nugget is the creation, configuration and management of the Mailbox recipient object. Moving mailboxes is also covered in this nugget.

Video 6 - "Managing More Recipient Objects" - This nugget continues the theme of recipient object configuration and management with instructions on how to work with mail-enabled accounts, resource mailboxes (such as conference rooms and shared equipment) for the purpose of scheduling meeting requests, distribution groups and linked mailboxes.

Video 7 - "E-mail Policies, Accepted Domains and Address Lists" - This nugget addresses further Mailbox Server Role configuring by ensuring that you can establish e-mail policies for your organization. A discussion of accepted domains explains more complicated layouts for your Exchange organization, including authoritative domains and relay domains with multiple SMTP addresses. Finally, we discuss the Global Address List (GAL) and the creation of additional address lists for your organization.

Video 8 - "Configuring Your Client Access Server (CAS)" - In this nugget we discuss the Client Access Server (CAS) role in greater detail. We explain the configuration of Outlook Web Access for users who need to access their mailboxes through a browser, and ActiveSync for users with appropriate mobile devices. We discuss both server-side configuration and client-side connectivity.

Video 9 - "Outlook Anywhere and POP/IMAP Configuration" - This nugget is the follow-up to the "Configuring Your Client Access Server" nugget. It's purpose is to walk through the server-side configuration for Outlook Anywhere and POP/IMAP. It also explains the client connectivity configuration that is necessary. The nugget also discusses the various CAS services such as Autodiscover, the Offline Address Book (OAB) and the Availability Service.

Video 10 - "Configuring Disaster Recovery" - This nugget explains backup methodology and provides information on how to configure backups, recover messaging data, and recover server roles. There is also an important discussion regarding Recovery Storage Groups.

Video 11 - "Configure High Availability" - This nugget explains the purpose of High Availability for your Exchange environment and reviews possible high availability scenarios for your Exchange mailbox server. The discussion includes an overview and demonstration of Local Continuous Replication (LCR) and Cluster Continuous Replication (CCR) with a review of Single Copy Clusters (SCC).

Video 12 - "Understanding Message Transport" - This nugget describes the purpose of a Hub Transport Server and reviews the transport pipeline so that you can understand what is happening on your Exchange Servers behind the scenes when a message is sent within the organization and to persons outside of the organization. The nugget also explains the function of Send/Receive SMTP Connectors and AD Site Connections to ensure mail is flowing in the direction you want it to.

Video 13 - "Troubleshoot Message Transport" - This nugget reviews the use of the Mail Flow Tools, found in our Toolbox through the Exchange Management Console. These tools can be used for monitoring and troubleshooting and they include the following: Mail Flow Troubleshooter, Message Tracking (which helps you perform message tracking) and Queue Viewer (to monitor mail queues). The nugget concludes with protocol logging for your SMTP Send/Receive connectors.

Video 14 - "Configuring Your Edge Transport Role" - In this nugget we discuss the purpose of an Edge Transport server and explain the need to place this role on a stand-alone server at your network perimeter using ADAM for a directory database as opposed to Active Directory. We set up the connection between our Hub Transport and Edge Transport Servers through the EdgeSync process that involves exporting the configuration from the Edge Transport Server and important it onto the Hub Transport Server. We also explained the need to secure the Edge Transport Server while still allowing necessary ports to be open for communication to take place. We reviewed the use of the Security Configuration Wizard (SCW) to establish both the security and opening of needed ports.

Video 15 - "Finalizing Edge Transport" - In this nugget we finalized the configuration of our Edge Transport Server by creating a postmaster mailbox, configuring our DNS (both public and private configuration was discussed and demonstrated) and reviewed briefly anti-spam/anti-virus needs, connectors, transport rules, accepted domains, and... the pièce de résistance... address re-writing.

Video 16 - "Configuring Anti-Spam:" - The anti-spam system includes a very intense process of filtering that we discuss step-by-step in this nugget. We review the configuration of all of the settings within the system on our Edge Transport Server. Then we review the possibility of establishing these same settings on our Hub Transport Server.

Video 17 - "Analyze and Monitor Exchange 2007" - In this nugget we look into all the best monitoring and reporting tools in Exchange 2007. This include, of course, the Exchange Best Practices Analyzer, Disaster Recovery Tools (as well as the command-line tools ESEUTIL and ISINTEG), Performance Monitor and Troubleshooter, and the Microsoft Operations Manager (MOM).

Video 18 - "A Look At Unified Messaging" - Although not an exam topic, per se, we completed our understanding of all 5 server roles with this discussion on Unified Messaging. We reviewed all of the necessary hardware requirements and telephony requirements to get UM up and running within your organization. Then we discussed the configuration of both the UM server and the UM clients.

Video 19 - "Troubleshooting Your Exchange Environment" - This nugget establishes basic troubleshooting procedure for Exchange-related issues that may arise using Diagnostic Logging, the Exchange Troubleshooting Assistant and the Exchange Management Shell, including some key PowerShell cmdlets (like Test-) that will help you keep your Exchange environment up and running, as well as, help you on the exam.

Video 20 - "PowerShell, From 0 to 60" - A great deal of the exam revolves around your knowledge of PowerShell. But not just the commands. It also covers navigation, pipelining, scripts and other concepts that revolve around the new command-line interface (CLI) from Microsoft. We need to become experts in PowerShell if we plan on passing this exam. This nugget will help you build upon what you already know, by ensuring that your foundation is solid.

Video 21 - "Exam Prep" - This nugget is a full review of all exam oriented materials to assist the viewer in preparing further for the 70-236 Exchange Server 2007 Configuring exam.

Download:
http://u-cmj53r0vv.urlcash.net
http://u-wmj53sn21.urlcash.net
http://u-hmj53t0do.urlcash.net

CBT Nuggets Deploying Messaging Solutions with Microsoft Exchange Server 2007





Want to manage your Exchange 2007 organization from the ground up? This training offers you the details on how to make it happen.
Peter Bruzzese covers the transition from Exchange 2003 to Exchange 2007, including the period when both systems are running. He tells you exactly what to do as you move things over to your new structure, and then, how to operate this great messaging server day-in and day-out.

Transport Rules. Peter focuses heavily on one of Exchange 2007's coolest features: Transport Rules. Because all messaging goes through the Hub Transport servers, Transport Rules allow you to apply rules to messages in transit.

PowerShell. The PowerShell command-line interface is another great feature of Exchange 2007 and is prominently featured on the certification exam. Peter's training transforms you into a PowerShell expert.

Throughout this series, Peter also highlights how Exchange interacts with other servers and services, such as ISA Server, MOM, ForeFront and more. He covers the real issues you'll face as you deploy your Exchange 2007 installation, whether from a previous version of Exchange or another messaging system.

Every IT administrator looking to deploy Exchange in their real-world environment will benefit from this video series. Peter's training prepares you for Microsoft's 70-238 exam, while giving you the skills you need to deploy Exchange in your own real-world environment.

Passing this exam tells employers that you've got the ultimate level of knowledge in Exchange 2007 deployment.

The Exam-Pack 70-238: Deploying Messaging Solutions with Microsoft Exchange Server 2007 video series contains:


70-238 Introduction

70-238 Requirements and Skills

Planning Exchange 2007 Upgrade Implementation (free video!)

Transitioning Co-Existence

Finalizing Your Transition

Migrating to Exchange 2007

Hosted Exchange Solutions

Planning for High Availability Implementation

Planning a Backup/Recovery Solution (Part 1)

Planning a Backup/Recovery Solution (Part 2)

Storage Group Deployment

Server Role Deployment

Managed Content Settings and ActiveSync Policies

Additional Servers to Deploy with Exchange 2007

Planning AntiSpam and AntiVirus Implementation

Plan Transport Rule Implementation

Planning Network Security

Exchange Infrastructure Improvements

Plan for Configuration Changes

Plan for Patch and Service Pack Implementation

Plan for Testing, Monitoring and Reporting
Here's what you'll learn in each video of the Exam-Pack 70-238: Deploying Messaging Solutions with Microsoft Exchange Server 2007
series:

Video 1 - "Introduction to Exchange 2007" - This nugget explains how Exchange and Active Directory work together and lays the foundation for future nuggets that discuss preparation and installation of Exchange 2007. There is a discussion of Exchange Clients that can be used in Exchange 2007. It also explains the 5 new Server Roles: Mailbox Role, Client Access Server, Hub Transport Server, Edge Transport Server and Unified Messaging Server.

Video 2 - "Preparing and Installing Exchange 2007" - This nugget discusses the preparation needed within your AD infrastructure, including information about your Schema preparation (preparation switches), permissions that need to be given to the correct individuals and so forth. For the official installation we discuss the hardware and software requirements to install Exchange 2007 on a particular server. And we walk through a stand-alone installation of Exchange 2007.

Video 3 - "Managing Storage Groups and Databases" - This nugget focuses on the Mailbox Server role, providing an overview of storage architecture (including Storage Groups and Databases) using the Exchange Management Console and Exchange Management Shell.

Video 4 - "Configure Public Folders" - Discusses the use of Public Folders in an Exchange 2007 environment. Covers the steps to adding new folders through Outlook or the Exchange Management Shell, and explains how replicas are established for increased availability to your users of the public folder structure as well as a greater level of fault tolerance.

Video 5 - "Managing Recipient Objects: Mailboxes" - This nugget discusses the many types of recipient objects that exist (mailbox users, mail-enabled groups, resource mailboxes, mail contacts, linked mailboxes and so forth). The main focus in this nugget is the creation, configuration and management of the Mailbox recipient object. Moving mailboxes is also covered in this nugget.

Video 6 - "Managing More Recipient Objects" - This nugget continues the theme of recipient object configuration and management with instructions on how to work with mail-enabled accounts, resource mailboxes (such as conference rooms and shared equipment) for the purpose of scheduling meeting requests, distribution groups and linked mailboxes.

Video 7 - "E-mail Policies, Accepted Domains and Address Lists" - This nugget addresses further Mailbox Server Role configuring by ensuring that you can establish e-mail policies for your organization. A discussion of accepted domains explains more complicated layouts for your Exchange organization, including authoritative domains and relay domains with multiple SMTP addresses. Finally, we discuss the Global Address List (GAL) and the creation of additional address lists for your organization.

Video 8 - "Configuring Your Client Access Server (CAS)" - In this nugget we discuss the Client Access Server (CAS) role in greater detail. We explain the configuration of Outlook Web Access for users who need to access their mailboxes through a browser, and ActiveSync for users with appropriate mobile devices. We discuss both server-side configuration and client-side connectivity.

Video 9 - "Outlook Anywhere and POP/IMAP Configuration" - This nugget is the follow-up to the "Configuring Your Client Access Server" nugget. It's purpose is to walk through the server-side configuration for Outlook Anywhere and POP/IMAP. It also explains the client connectivity configuration that is necessary. The nugget also discusses the various CAS services such as Autodiscover, the Offline Address Book (OAB) and the Availability Service.

Video 10 - "Configuring Disaster Recovery" - This nugget explains backup methodology and provides information on how to configure backups, recover messaging data, and recover server roles. There is also an important discussion regarding Recovery Storage Groups.

Video 11 - "Configure High Availability" - This nugget explains the purpose of High Availability for your Exchange environment and reviews possible high availability scenarios for your Exchange mailbox server. The discussion includes an overview and demonstration of Local Continuous Replication (LCR) and Cluster Continuous Replication (CCR) with a review of Single Copy Clusters (SCC).

Video 12 - "Understanding Message Transport" - This nugget describes the purpose of a Hub Transport Server and reviews the transport pipeline so that you can understand what is happening on your Exchange Servers behind the scenes when a message is sent within the organization and to persons outside of the organization. The nugget also explains the function of Send/Receive SMTP Connectors and AD Site Connections to ensure mail is flowing in the direction you want it to.

Video 13 - "Troubleshoot Message Transport" - This nugget reviews the use of the Mail Flow Tools, found in our Toolbox through the Exchange Management Console. These tools can be used for monitoring and troubleshooting and they include the following: Mail Flow Troubleshooter, Message Tracking (which helps you perform message tracking) and Queue Viewer (to monitor mail queues). The nugget concludes with protocol logging for your SMTP Send/Receive connectors.

Video 14 - "Configuring Your Edge Transport Role" - In this nugget we discuss the purpose of an Edge Transport server and explain the need to place this role on a stand-alone server at your network perimeter using ADAM for a directory database as opposed to Active Directory. We set up the connection between our Hub Transport and Edge Transport Servers through the EdgeSync process that involves exporting the configuration from the Edge Transport Server and important it onto the Hub Transport Server. We also explained the need to secure the Edge Transport Server while still allowing necessary ports to be open for communication to take place. We reviewed the use of the Security Configuration Wizard (SCW) to establish both the security and opening of needed ports.

Video 15 - "Finalizing Edge Transport" - In this nugget we finalized the configuration of our Edge Transport Server by creating a postmaster mailbox, configuring our DNS (both public and private configuration was discussed and demonstrated) and reviewed briefly anti-spam/anti-virus needs, connectors, transport rules, accepted domains, and... the pièce de résistance... address re-writing.

Video 16 - "Configuring Anti-Spam:" - The anti-spam system includes a very intense process of filtering that we discuss step-by-step in this nugget. We review the configuration of all of the settings within the system on our Edge Transport Server. Then we review the possibility of establishing these same settings on our Hub Transport Server.

Video 17 - "Analyze and Monitor Exchange 2007" - In this nugget we look into all the best monitoring and reporting tools in Exchange 2007. This include, of course, the Exchange Best Practices Analyzer, Disaster Recovery Tools (as well as the command-line tools ESEUTIL and ISINTEG), Performance Monitor and Troubleshooter, and the Microsoft Operations Manager (MOM).

Video 18 - "A Look At Unified Messaging" - Although not an exam topic, per se, we completed our understanding of all 5 server roles with this discussion on Unified Messaging. We reviewed all of the necessary hardware requirements and telephony requirements to get UM up and running within your organization. Then we discussed the configuration of both the UM server and the UM clients.

Video 19 - "Troubleshooting Your Exchange Environment" - This nugget establishes basic troubleshooting procedure for Exchange-related issues that may arise using Diagnostic Logging, the Exchange Troubleshooting Assistant and the Exchange Management Shell, including some key PowerShell cmdlets (like Test-) that will help you keep your Exchange environment up and running, as well as, help you on the exam.

Video 20 - "PowerShell, From 0 to 60" - A great deal of the exam revolves around your knowledge of PowerShell. But not just the commands. It also covers navigation, pipelining, scripts and other concepts that revolve around the new command-line interface (CLI) from Microsoft. We need to become experts in PowerShell if we plan on passing this exam. This nugget will help you build upon what you already know, by ensuring that your foundation is solid.

Video 21 - "Exam Prep" - This nugget is a full review of all exam oriented materials to assist the viewer in preparing further for the 70-236 Exchange Server 2007 Configuring exam.

Download:
http://u-cmj53r0vv.urlcash.net
http://u-wmj53sn21.urlcash.net
http://u-hmj53t0do.urlcash.net

Actice Directory FAQ with Answers

=================================
Download This Doc:
http://u-6m8hf6wp3.urlcash.net/
=================================
1. What is Global Catalog Server?
Global Catalog server is the server which keeps the stores the details of each object created in the forest. Global Catalog is the master searchable index to all objects in forest

2. Can GC Server and Infrastructure place in single server? If not explain why?
No, As Infrastructure master does the same job as the GC. It does not work together.

3. What is the size of log file which created before updating into ntds.dit and the total number of files?
Three Log files Names
Edb.log
Res1.log
Res2.log
Each initially 10 MB

4. What does SYSVOL contains?
SysVol Folder contains the public information of the domain & The information for replication
Ex: Group policy object & scripts can be found in this directory.

5. Which is service in your windows is responsible for replication of Domain controller to another domain controller.
KCC generates the replication topology.
Use SMTP / RPC to replicate changes.

6. How data will travel between sites in ADS replication?
As determined in the site connectors

7. What is the port number for SMTP, Kerberos, LDAP, and GC Server??
SMTP 25, Kerberos 88, GC 3268, LDAP 389

8. What Intrasite and Intersite Replication?
Intrasite is the replication within the same site & intersite the replication between sites

9. What is lost & found folder in ADS?
It's the folder where you can find the objects missed due to conflict.
Ex: you created a user in OU which is deleted in other DC & when replication happed ADS didn't find the OU then it will put that in Lost & Found Folder.

10. What is Garbage collection?
Garbage collection is the process of the online defragmentation of active directory. It happens every 12 Hours.

11. What System State data contains?
Contains Startup files,
Registry
Com + Registration Database
Memory Page file
System files
AD information
Cluster Service information
SYSVOL Folder

12. How do you restore a particular OU which got deleted by accident?
Go authoritative restore

13. What is IPSec Policy?
IPSec provides secure gateway-to-gateway connections across outsourced private wide area network (WAN) or Internet-based connections using L2TP/IPSec tunnels or pure IPSec tunnel mode.
IPSec Policy can be deployed via Group policy to the Windows Domain controllers 7 Servers.

14. What are different types of Group Policy?
I don't think there are types of group policies????

15. What is the order of applying Group Policy?
Local Policy.
Site Policy.
Domain Policy.
OU Policy.

16. What are the new features in Windows 2003 related to ADS, Replication, and Trust?
ADS: Can more than 5000 users in the groups


17. How to edit the Schema in ADS?
ADSI Edit

18. What is Domain Local, Global Group, Universal group?
Domain Local – Only Users with in Domain
Global groups are used to grant permissions to objects in any domain in the domain tree or forest. Members of global groups can include only accounts and groups from the domain in which they are defined.
Universal groups are used to grant permissions on a wide scale throughout a domain tree or forest. Members of global groups include accounts and groups from any domain in the domain tree or forest.

19. Diff between Global & Universal group?
Check the answer above.

20. What are the different types of Terminal Services?
User Mode & Application Mode

21. What does mean by root DNS servers?
Public DNS servers Hosted in the Internet which registers the DNS

22. What are the different records in DNS?
A – Address record
MX – Mail Server Record
NS – Name Server
CNAME – Canonical name / Alias
SOA – Start of authority

23. What is a SOA record?
Start of authority – authorized DNS in the domain

24. How does the down-level clients register it names with DNS server?
Enable the WINS integration with DNS.

25. What is RsOP?
RsOP is the resultant set of policy applied on the object (Group Policy)

26. What is default lease period for DHCP Server?
8 days Default

27. What is the process of DHCP clients for getting the ip address?
Discover – Order – Receive - Acknowledge

28. What is multicast?
Multicast scopes enable you to lease Class D IP addresses to clients for participation in multicast transmissions, such as streaming video and audio transmissions.

29. What is superscope?
Superscope enables you to group several standard DHCP scopes into a single administrative group without causing any service disruption to network clients.

30. What is the System Startup process?

Windows 2K boot process on Intel architecture.

1. Power-On Self Tests (POST) is run.

2. The boot device is found, the Master Boot Record (MBR) is loaded into memory, and its program is run.

3. The active partition is located, and the boot sector is loaded.

4. The Windows 2000 loader (NTLDR) is then loaded.

The boot sequence executes the following steps:

1. The Windows 2000 loader switches the processor to the 32-bit flat memory model.

2. The Windows 2000 loader starts a mini-file system.

3. The Windows 2000 loader reads the BOOT.INI file and displays the operating system selections (boot loader menu).

4. The Windows 2000 loader loads the operating system selected by the user. If Windows 2000 is selected, NTLDR runs NTDETECT.COM. For other operating systems, NTLDR loads BOOTSECT.DOS and gives it control.

5. NTDETECT.COM scans the hardware installed in the computer, and reports the list to NTLDR for inclusion in the Registry under the HKEY_LOCAL_MACHINE_HARDWARE hive.

6. NTLDR then loads the NTOSKRNL.EXE, and gives it the hardware information collected by NTDETECT.COM. Windows NT enters the Windows load phases.




31. What is WINS hybrid & mixed mode?
Systems that are configured to use WINS are normally configured as a hybrid (H-node) client, meaning they attempt to resolve NetBIOS names via a WINS server and then try a broadcast (B-node) if WINS is unsuccessful. Most systems can be configured to resolve NetBIOS names in one of four modes:

Broadcast (B-node)—Clients use a broadcast only to resolve names. An enhanced B-node setting has the client use an LMHOST file as well. The hex value for this setting is 0x1.
Peer-to-Peer (P-node)—Clients use WINS only to resolve names. The hex value for this setting is 0x2.
Mixed (M-node)—Clients first use a broadcast in an attempt to resolve NetBIOS names. If this fails, they attempt the resolution via the WINS server. The hex value for this setting is 0x4.
Hybrid (H-node)—Clients first use the WINS service in an attempt to resolve NetBIOS names. If this fails, they attempt the resolution via broadcast. The hex value for this setting is 0x8.

32. What is Disk Quota?
Disk Quota is the specifying the limits of usage on the disks.

==========================================================

1) What is different Editions of Windows 2003 server?
i)Standard Edition
ii)Web Edition
iii)Enterprise Edition
iv)Datacenter Edition
2) What is active directory?

Active Directory is the directory service included in the Windows Server 2003 family. Active Directory includes the directory, which stores information about network resources, as well as all the services that make the information available and useful. Active Directory is also the directory service included in Windows 2000.

3)What is the active directory database name and where it is located?

Name : NTDS.Dit located in c:\windows\ntds\

4)What is the expansion of .Dit ? Scalable size of NTDS in 2k3?
Dit – Directory Information Tree. It is scalable up to 70 TB.

5) What is schema in AD?

The Active Directory schema defines objects that can be stored in Active Directory. The schema is a list of definitions that determines the kinds of objects and the types of information about those objects that can be stored in Active Directory. Because the schema definitions themselves are stored as objects, they can be administered in the same manner as the rest of the objects in Active Directory. Normally called schema object or metadata.

6) Structure of AD in 2kX?
1)Physical structure
Sites ,Domain Controllers
2)Logical structures
Forest, Tree, Domain, OU, object

7) What are the domain functional levels in 2k3?

1)Mixed mode
2)Native mode
3)Interim mode

8) What is Global catalog and GC server?

The global catalog is the central repository of information about objects in a tree or forest. By default, a global catalog is created automatically on the initial domain controller in the first domain in the forest. A domain controller that holds a copy of the global catalog is called a global catalog server.

9) What are the functions of GC?

A) It enables a user to log on to a network by providing universal group membership information to a domain controller when a logon process is initiated.
B) It enables finding directory information regardless of which domain in the forest actually contains the data.

10) What is the active directory database engine name?
ESE (Extensible Storage Engine)


11) What are the partitions available in AD?
i) Schema partition
ii) Configuration Partition
iii) Domain Partition
iv)Application Partition


12) What are the two types of replications?
Inter-site (Site to site) and Intra-site (With in site) replications.

13) What is KCC? What is the function of the KCC?
The KCC is a built-in process that runs on all domain controllers. The KCC configures connection objects between domain controllers. Within a site, each KCC generates its own connections. For replication between sites, a single KCC per site generates all connections between sites.

14) What is the two trust protocols 2k3 using?
Kerberos V5 and NTLM


15) What are the trust relations available in 2k3?
Tree-Root , Parent- Child , Shortcut, Realm, Forest trust , External trust

16)What is the hierarchy of applying Gpo in 2k3?
It is applied from parent level to child level in AD.
i) Local GPO
ii) GPOs linked to sites
iii) GPOs linked to domains
iv) GPOs linked to OUs


17) What are the protocols used on replication?
RPC over IP (Used for synchronies transfer) , SMTP over IP (Asynchronies transfer)

18) What is the default time delay on replication?
Intra site – 15 min ( KCC automatically create the topology for Replication)
Inter-site – 1 hrs.
Security related changes replicated immediately across sites.

19) What Different tables available in NTDS database?
i) Schema table
Ii) Link Table
iii) Data table
iv)Configuration Table

19) Where is the FRS logs stored in and what is the database engine name?
c:\windows\ntfrs\jet\log, The engine used is jet database engine. Ntfrs.jdb.


20) What is tombstone object in AD? What is its life time?
Any objects deleted from Active directory will not removed from Database immediately. That object is called tombstone object. The default life time for that object is 60 days. For win 2k3 SP1 180 days

21) FSMO Roles

In a forest, there are at least five FSMO roles that are assigned to one or more domain controllers. The five FSMO roles are

Schema Master:

The schema master domain controller controls all updates and modifications to the schema. To update the schema of a forest, you must have access to the schema master. There can be only one schema master in the whole forest.

Domain naming master

The domain naming master domain controller controls the addition or removal of domains in the forest. There can be only one domain naming master in the whole forest.

Infrastructure Master:

The infrastructure is responsible for updating references from objects in its domain to objects in other domains. At any one time, there can be only one domain controller acting as the infrastructure master in each domain.

Relative ID (RID) Master:

The RID master is responsible for processing RID pool requests from all domain controllers in a particular domain. At any one time, there can be only one domain controller acting as the RID master in the domain.

PDC Emulator

The PDC emulator is a domain controller that advertises itself as the primary domain controller (PDC) to workstations, member servers, and domain controllers that are running earlier versions of Windows.

For example, if the domain contains computers that are not running Microsoft Windows XP Professional or Microsoft Windows 2000 client software, or if it contains Microsoft Windows NT backup domain controllers, the PDC emulator master acts as a Windows NT PDC.

It is also the Domain Master Browser, and it handles password discrepancies. At any one time, there can be only one domain controller acting as the PDC emulator master in each domain in the forest


============================================================


Quicker Q&A

What are the required components of Windows Server 2003 for installing Exchange 2003? - ASP.NET, SMTP, NNTP, W3SVC
What must be done to an AD forest before Exchange can be deployed? - Setup /forestprep
What Exchange process is responsible for communication with AD? - DSACCESS
What 3 types of domain controller does Exchange access? - Normal Domain Controller, Global Catalog, Configuration Domain Controller
What connector type would you use to connect to the Internet, and what are the two methods of sending mail over that connector? - SMTP Connector: Forward to smart host or use DNS to route to each address
How would you optimise Exchange 2003 memory usage on a Windows Server 2003 server with more than 1Gb of memory? - Add /3Gb switch to boot.ini
What would a rise in remote queue length generally indicate? - This means mail is not being sent to other servers. This can be explained by outages or performance issues with the network or remote servers.
What would a rise in the Local Delivery queue generally mean? - This indicates a performance issue or outage on the local server. Reasons could be slowness in consulting AD, slowness in handing messages off to local delivery or SMTP delivery. It could also be databases being dismounted or a lack of disk space.
What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP and Global Catalog? - SMTP – 25, POP3 – 110, IMAP4 – 143, RPC – 135, LDAP – 389, Global Catalog - 3268
Name the process names for the following: System Attendant? – MAD.EXE, Information Store – STORE.EXE, SMTP/POP/IMAP/OWA – INETINFO.EXE
What is the maximum amount of databases that can be hosted on Exchange 2003 Enterprise? - 20 databases. 4 SGs x 5 DBs.
What are the disadvantages of circular logging? - In the event of a corrupt database, data can only be restored to the last backup.
========================================================
1. What are the Default shares in Windows Server 2003?
By default, Windows automatically creates special hidden administrative shares that administrators, programs, and services can use to manage the computer environment or network. These special shared resources are not visible in Windows Explorer or in My Computer, but you can use the Shared Folders tool in Computer Management to view them. Depending on the configuration of your computer, you may see some or all the following special shared resources listed in the Shares folder in Shared Folders:

DriveLetter$: Root partitions and volumes are shared as the drive letter name appended with the $ character. For example, drive letters C and D are shared as C$ and D$.

ADMIN$: A resource that is used during remote administration of a computer.

IPC$: A resource that shares the named pipes that you must have for communication between programs. Note that this resource cannot be deleted.

NETLOGON: A resource that is used on domain controllers.

SYSVOL: A resources that is used on domain controllers.

PRINT$: A resource that is used during the remote administration of printers.

FAX$: A shared folder on a server that is used by fax clients during fax transmission.
Note NETLOGON and SYSVOL are not hidden shares but are instead special administrative shares. Generally, Microsoft recommends that you do not modify these special shared resources. However, if you want to remove the special shared resources and prevent them from being created automatically, you can do this by editing the registry.

1. Q) Can I changed password if my machince’s connectivity to DC who holds PDC emulator role has been fails?A) No You cant the password.
Q) i have been asked if there is set of 30 harddisk configured for raid 5 if two harddisk failed what about dataA) It depends how u had configured ur RAID its only Raid5 or with with spare if its only raid 5 then in raid5 if ur 2 nos of HDD goes then ur raid is gone.
Q) How Can i Deploy the Latest Patched in Pc through G.P. wihtout having the Admin Right in Pc.A) Create a batch file and place all the patches in the Netlogon, and deploy the batch file through GP to all the pcs so the same should take affect after restarting the pc.
Q) In Raid 5,Suppose i have 5 HDD of 10-10 GB, After configuring the Raid how much space do i have for utilise.A) -1 out of the total (eg- if u r using 5 u will get only 4 because 1 goes for parity).
Q) How Can i Resolve the Svr name through NslookupA) what exactly u want to do, nslookup command will let u know through which server u r getting routed, (eg- c:\nslookup then u will get ur domain name to which u r getting routed. and if u want to get the name of the pc/server with the ip address then u have to give the command c:\nbtstat -a ip xx-xx-xx-xx)
===========================================================
1. DHCP relay agent where to place it?
Ans: DHCP Relay agent u need to place in Software Router.

Question: How many Zones in Windows 2000 server and Windows 2003 Server ?
Ans: In Windows 2000 there are mainly 3 zones
Standard Primary — zone information is written in Txt fileStandard Secondary — copy of PrimaryActive Directory Integrated– Information stores in Active Directory
In Win2k3 one more zone is added that is Stub zone
–Stub is like secondary but it contains only copy of SOA records, copy of NS records, copy of A records for that zone. No copy of MX, SRV records etc.,With this Stub zone DNS traffic will be low
Question: What is Kerberos? Which version is currently used by Windows? How does Kerberos work?
Answer: Kerberos is the user authentication used in Win2000 and Win2003 Active Directory servers
Kerberos version in 5.0
Port is: 88
It’s more secure and encrypted than NTLM (NT authentication)

1. Which protocol is used for Public Folder?
ANS: SMTP
What is the use of NNTP with exchange?
ANS: This protocol is used the news group in exchange.


1. What is the content of System State backup?
The contents are: Boot files, system filesActive directory (if it’s done on DC)SysVol folder(if it done on DC)Certificate service ( on a CA server)Cluster database ( on a cluster server)registryPerformance counter configuration informationComponent services class registration database



Q: What are the perquisites for installation of Exchange Server?
The prerequisite are
IISSMTPWWW serviceNNTP.NET FrameworkASP.NETThen run ForestprepThen run domainprep

Question: What is Multi Master Replication?
Answer: Multi-master replication is a method of replication employed by databases to transfer data or changes to data across multiple computers within a group. Multi-master replication can be contrasted with a master-slave method (also known as single-master replication).


DFS? DFS Namespace ?
1. DFS Replication. New state-based, multimaster replication engine that is optimized for WAN environments. DFS Replication supports replication scheduling, bandwidth throttling, and a new byte-level compression algorithm known as remote differential compression (RDC).
DFS Namespaces. Technology that helps administrators group shared folders located on different servers and present them to users as a virtual tree of folders known as a namespace. DFS Namespaces was formerly known as Distributed File System in Windows 2000 Server and Windows Server 2003.


What are the four domain functional levels?
Windows 2000 MixedWindows 2000 NativeWindows Server 2003 InterimWindows Server 2003
Windows 2000 Mixed
When you configure a new Windows Server 2003 domain, the default domain functional level is Windows 2000 mixed.Under this domain functional level, Windows NT, 2000, and 2003 domain controllers are supported. However,certain features such as group nesting, universal groups, and so on are not available.
Windows 2000 Native
Upgrading the functional level of a domain to Windows 2000 Native should only be done if there areno Windows NT domain controllers remaining on the network. By upgrading to Windows 2000 Native functional level,additional features become available including: group nesting, universal groups, SID History, and the ability to convertsecurity groups and distribution groups.
Windows Server 2003 Interim
The third functional level is Windows Server 2003 Interim and it is often used when upgrading fromWindows NT to Windows Server 2003. Upgrading to this domain functional level provides support forWindows NT and Windows Server 2003 domain controllers. However, like Windows 2000 Mixed, it does not provide new features.
Windows Server 2003The last functional level is Windows Server 2003. This domain functional level only provides support forWindows Server 2003 domain controllers. If you want to take advantage of all the features included withWindows Server 2003, you must implement this functional level. One of the most important features introducedat this functional level is the ability to rename domain controllers

Actice Directory FAQ with Answers

=================================
Download This Doc:
http://u-6m8hf6wp3.urlcash.net/
=================================
1. What is Global Catalog Server?
Global Catalog server is the server which keeps the stores the details of each object created in the forest. Global Catalog is the master searchable index to all objects in forest

2. Can GC Server and Infrastructure place in single server? If not explain why?
No, As Infrastructure master does the same job as the GC. It does not work together.

3. What is the size of log file which created before updating into ntds.dit and the total number of files?
Three Log files Names
Edb.log
Res1.log
Res2.log
Each initially 10 MB

4. What does SYSVOL contains?
SysVol Folder contains the public information of the domain & The information for replication
Ex: Group policy object & scripts can be found in this directory.

5. Which is service in your windows is responsible for replication of Domain controller to another domain controller.
KCC generates the replication topology.
Use SMTP / RPC to replicate changes.

6. How data will travel between sites in ADS replication?
As determined in the site connectors

7. What is the port number for SMTP, Kerberos, LDAP, and GC Server??
SMTP 25, Kerberos 88, GC 3268, LDAP 389

8. What Intrasite and Intersite Replication?
Intrasite is the replication within the same site & intersite the replication between sites

9. What is lost & found folder in ADS?
It's the folder where you can find the objects missed due to conflict.
Ex: you created a user in OU which is deleted in other DC & when replication happed ADS didn't find the OU then it will put that in Lost & Found Folder.

10. What is Garbage collection?
Garbage collection is the process of the online defragmentation of active directory. It happens every 12 Hours.

11. What System State data contains?
Contains Startup files,
Registry
Com + Registration Database
Memory Page file
System files
AD information
Cluster Service information
SYSVOL Folder

12. How do you restore a particular OU which got deleted by accident?
Go authoritative restore

13. What is IPSec Policy?
IPSec provides secure gateway-to-gateway connections across outsourced private wide area network (WAN) or Internet-based connections using L2TP/IPSec tunnels or pure IPSec tunnel mode.
IPSec Policy can be deployed via Group policy to the Windows Domain controllers 7 Servers.

14. What are different types of Group Policy?
I don't think there are types of group policies????

15. What is the order of applying Group Policy?
Local Policy.
Site Policy.
Domain Policy.
OU Policy.

16. What are the new features in Windows 2003 related to ADS, Replication, and Trust?
ADS: Can more than 5000 users in the groups


17. How to edit the Schema in ADS?
ADSI Edit

18. What is Domain Local, Global Group, Universal group?
Domain Local – Only Users with in Domain
Global groups are used to grant permissions to objects in any domain in the domain tree or forest. Members of global groups can include only accounts and groups from the domain in which they are defined.
Universal groups are used to grant permissions on a wide scale throughout a domain tree or forest. Members of global groups include accounts and groups from any domain in the domain tree or forest.

19. Diff between Global & Universal group?
Check the answer above.

20. What are the different types of Terminal Services?
User Mode & Application Mode

21. What does mean by root DNS servers?
Public DNS servers Hosted in the Internet which registers the DNS

22. What are the different records in DNS?
A – Address record
MX – Mail Server Record
NS – Name Server
CNAME – Canonical name / Alias
SOA – Start of authority

23. What is a SOA record?
Start of authority – authorized DNS in the domain

24. How does the down-level clients register it names with DNS server?
Enable the WINS integration with DNS.

25. What is RsOP?
RsOP is the resultant set of policy applied on the object (Group Policy)

26. What is default lease period for DHCP Server?
8 days Default

27. What is the process of DHCP clients for getting the ip address?
Discover – Order – Receive - Acknowledge

28. What is multicast?
Multicast scopes enable you to lease Class D IP addresses to clients for participation in multicast transmissions, such as streaming video and audio transmissions.

29. What is superscope?
Superscope enables you to group several standard DHCP scopes into a single administrative group without causing any service disruption to network clients.

30. What is the System Startup process?

Windows 2K boot process on Intel architecture.

1. Power-On Self Tests (POST) is run.

2. The boot device is found, the Master Boot Record (MBR) is loaded into memory, and its program is run.

3. The active partition is located, and the boot sector is loaded.

4. The Windows 2000 loader (NTLDR) is then loaded.

The boot sequence executes the following steps:

1. The Windows 2000 loader switches the processor to the 32-bit flat memory model.

2. The Windows 2000 loader starts a mini-file system.

3. The Windows 2000 loader reads the BOOT.INI file and displays the operating system selections (boot loader menu).

4. The Windows 2000 loader loads the operating system selected by the user. If Windows 2000 is selected, NTLDR runs NTDETECT.COM. For other operating systems, NTLDR loads BOOTSECT.DOS and gives it control.

5. NTDETECT.COM scans the hardware installed in the computer, and reports the list to NTLDR for inclusion in the Registry under the HKEY_LOCAL_MACHINE_HARDWARE hive.

6. NTLDR then loads the NTOSKRNL.EXE, and gives it the hardware information collected by NTDETECT.COM. Windows NT enters the Windows load phases.




31. What is WINS hybrid & mixed mode?
Systems that are configured to use WINS are normally configured as a hybrid (H-node) client, meaning they attempt to resolve NetBIOS names via a WINS server and then try a broadcast (B-node) if WINS is unsuccessful. Most systems can be configured to resolve NetBIOS names in one of four modes:

Broadcast (B-node)—Clients use a broadcast only to resolve names. An enhanced B-node setting has the client use an LMHOST file as well. The hex value for this setting is 0x1.
Peer-to-Peer (P-node)—Clients use WINS only to resolve names. The hex value for this setting is 0x2.
Mixed (M-node)—Clients first use a broadcast in an attempt to resolve NetBIOS names. If this fails, they attempt the resolution via the WINS server. The hex value for this setting is 0x4.
Hybrid (H-node)—Clients first use the WINS service in an attempt to resolve NetBIOS names. If this fails, they attempt the resolution via broadcast. The hex value for this setting is 0x8.

32. What is Disk Quota?
Disk Quota is the specifying the limits of usage on the disks.

==========================================================

1) What is different Editions of Windows 2003 server?
i)Standard Edition
ii)Web Edition
iii)Enterprise Edition
iv)Datacenter Edition
2) What is active directory?

Active Directory is the directory service included in the Windows Server 2003 family. Active Directory includes the directory, which stores information about network resources, as well as all the services that make the information available and useful. Active Directory is also the directory service included in Windows 2000.

3)What is the active directory database name and where it is located?

Name : NTDS.Dit located in c:\windows\ntds\

4)What is the expansion of .Dit ? Scalable size of NTDS in 2k3?
Dit – Directory Information Tree. It is scalable up to 70 TB.

5) What is schema in AD?

The Active Directory schema defines objects that can be stored in Active Directory. The schema is a list of definitions that determines the kinds of objects and the types of information about those objects that can be stored in Active Directory. Because the schema definitions themselves are stored as objects, they can be administered in the same manner as the rest of the objects in Active Directory. Normally called schema object or metadata.

6) Structure of AD in 2kX?
1)Physical structure
Sites ,Domain Controllers
2)Logical structures
Forest, Tree, Domain, OU, object

7) What are the domain functional levels in 2k3?

1)Mixed mode
2)Native mode
3)Interim mode

8) What is Global catalog and GC server?

The global catalog is the central repository of information about objects in a tree or forest. By default, a global catalog is created automatically on the initial domain controller in the first domain in the forest. A domain controller that holds a copy of the global catalog is called a global catalog server.

9) What are the functions of GC?

A) It enables a user to log on to a network by providing universal group membership information to a domain controller when a logon process is initiated.
B) It enables finding directory information regardless of which domain in the forest actually contains the data.

10) What is the active directory database engine name?
ESE (Extensible Storage Engine)


11) What are the partitions available in AD?
i) Schema partition
ii) Configuration Partition
iii) Domain Partition
iv)Application Partition


12) What are the two types of replications?
Inter-site (Site to site) and Intra-site (With in site) replications.

13) What is KCC? What is the function of the KCC?
The KCC is a built-in process that runs on all domain controllers. The KCC configures connection objects between domain controllers. Within a site, each KCC generates its own connections. For replication between sites, a single KCC per site generates all connections between sites.

14) What is the two trust protocols 2k3 using?
Kerberos V5 and NTLM


15) What are the trust relations available in 2k3?
Tree-Root , Parent- Child , Shortcut, Realm, Forest trust , External trust

16)What is the hierarchy of applying Gpo in 2k3?
It is applied from parent level to child level in AD.
i) Local GPO
ii) GPOs linked to sites
iii) GPOs linked to domains
iv) GPOs linked to OUs


17) What are the protocols used on replication?
RPC over IP (Used for synchronies transfer) , SMTP over IP (Asynchronies transfer)

18) What is the default time delay on replication?
Intra site – 15 min ( KCC automatically create the topology for Replication)
Inter-site – 1 hrs.
Security related changes replicated immediately across sites.

19) What Different tables available in NTDS database?
i) Schema table
Ii) Link Table
iii) Data table
iv)Configuration Table

19) Where is the FRS logs stored in and what is the database engine name?
c:\windows\ntfrs\jet\log, The engine used is jet database engine. Ntfrs.jdb.


20) What is tombstone object in AD? What is its life time?
Any objects deleted from Active directory will not removed from Database immediately. That object is called tombstone object. The default life time for that object is 60 days. For win 2k3 SP1 180 days

21) FSMO Roles

In a forest, there are at least five FSMO roles that are assigned to one or more domain controllers. The five FSMO roles are

Schema Master:

The schema master domain controller controls all updates and modifications to the schema. To update the schema of a forest, you must have access to the schema master. There can be only one schema master in the whole forest.

Domain naming master

The domain naming master domain controller controls the addition or removal of domains in the forest. There can be only one domain naming master in the whole forest.

Infrastructure Master:

The infrastructure is responsible for updating references from objects in its domain to objects in other domains. At any one time, there can be only one domain controller acting as the infrastructure master in each domain.

Relative ID (RID) Master:

The RID master is responsible for processing RID pool requests from all domain controllers in a particular domain. At any one time, there can be only one domain controller acting as the RID master in the domain.

PDC Emulator

The PDC emulator is a domain controller that advertises itself as the primary domain controller (PDC) to workstations, member servers, and domain controllers that are running earlier versions of Windows.

For example, if the domain contains computers that are not running Microsoft Windows XP Professional or Microsoft Windows 2000 client software, or if it contains Microsoft Windows NT backup domain controllers, the PDC emulator master acts as a Windows NT PDC.

It is also the Domain Master Browser, and it handles password discrepancies. At any one time, there can be only one domain controller acting as the PDC emulator master in each domain in the forest


============================================================


Quicker Q&A

What are the required components of Windows Server 2003 for installing Exchange 2003? - ASP.NET, SMTP, NNTP, W3SVC
What must be done to an AD forest before Exchange can be deployed? - Setup /forestprep
What Exchange process is responsible for communication with AD? - DSACCESS
What 3 types of domain controller does Exchange access? - Normal Domain Controller, Global Catalog, Configuration Domain Controller
What connector type would you use to connect to the Internet, and what are the two methods of sending mail over that connector? - SMTP Connector: Forward to smart host or use DNS to route to each address
How would you optimise Exchange 2003 memory usage on a Windows Server 2003 server with more than 1Gb of memory? - Add /3Gb switch to boot.ini
What would a rise in remote queue length generally indicate? - This means mail is not being sent to other servers. This can be explained by outages or performance issues with the network or remote servers.
What would a rise in the Local Delivery queue generally mean? - This indicates a performance issue or outage on the local server. Reasons could be slowness in consulting AD, slowness in handing messages off to local delivery or SMTP delivery. It could also be databases being dismounted or a lack of disk space.
What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP and Global Catalog? - SMTP – 25, POP3 – 110, IMAP4 – 143, RPC – 135, LDAP – 389, Global Catalog - 3268
Name the process names for the following: System Attendant? – MAD.EXE, Information Store – STORE.EXE, SMTP/POP/IMAP/OWA – INETINFO.EXE
What is the maximum amount of databases that can be hosted on Exchange 2003 Enterprise? - 20 databases. 4 SGs x 5 DBs.
What are the disadvantages of circular logging? - In the event of a corrupt database, data can only be restored to the last backup.
========================================================
1. What are the Default shares in Windows Server 2003?
By default, Windows automatically creates special hidden administrative shares that administrators, programs, and services can use to manage the computer environment or network. These special shared resources are not visible in Windows Explorer or in My Computer, but you can use the Shared Folders tool in Computer Management to view them. Depending on the configuration of your computer, you may see some or all the following special shared resources listed in the Shares folder in Shared Folders:

DriveLetter$: Root partitions and volumes are shared as the drive letter name appended with the $ character. For example, drive letters C and D are shared as C$ and D$.

ADMIN$: A resource that is used during remote administration of a computer.

IPC$: A resource that shares the named pipes that you must have for communication between programs. Note that this resource cannot be deleted.

NETLOGON: A resource that is used on domain controllers.

SYSVOL: A resources that is used on domain controllers.

PRINT$: A resource that is used during the remote administration of printers.

FAX$: A shared folder on a server that is used by fax clients during fax transmission.
Note NETLOGON and SYSVOL are not hidden shares but are instead special administrative shares. Generally, Microsoft recommends that you do not modify these special shared resources. However, if you want to remove the special shared resources and prevent them from being created automatically, you can do this by editing the registry.

1. Q) Can I changed password if my machince’s connectivity to DC who holds PDC emulator role has been fails?A) No You cant the password.
Q) i have been asked if there is set of 30 harddisk configured for raid 5 if two harddisk failed what about dataA) It depends how u had configured ur RAID its only Raid5 or with with spare if its only raid 5 then in raid5 if ur 2 nos of HDD goes then ur raid is gone.
Q) How Can i Deploy the Latest Patched in Pc through G.P. wihtout having the Admin Right in Pc.A) Create a batch file and place all the patches in the Netlogon, and deploy the batch file through GP to all the pcs so the same should take affect after restarting the pc.
Q) In Raid 5,Suppose i have 5 HDD of 10-10 GB, After configuring the Raid how much space do i have for utilise.A) -1 out of the total (eg- if u r using 5 u will get only 4 because 1 goes for parity).
Q) How Can i Resolve the Svr name through NslookupA) what exactly u want to do, nslookup command will let u know through which server u r getting routed, (eg- c:\nslookup then u will get ur domain name to which u r getting routed. and if u want to get the name of the pc/server with the ip address then u have to give the command c:\nbtstat -a ip xx-xx-xx-xx)
===========================================================
1. DHCP relay agent where to place it?
Ans: DHCP Relay agent u need to place in Software Router.

Question: How many Zones in Windows 2000 server and Windows 2003 Server ?
Ans: In Windows 2000 there are mainly 3 zones
Standard Primary — zone information is written in Txt fileStandard Secondary — copy of PrimaryActive Directory Integrated– Information stores in Active Directory
In Win2k3 one more zone is added that is Stub zone
–Stub is like secondary but it contains only copy of SOA records, copy of NS records, copy of A records for that zone. No copy of MX, SRV records etc.,With this Stub zone DNS traffic will be low
Question: What is Kerberos? Which version is currently used by Windows? How does Kerberos work?
Answer: Kerberos is the user authentication used in Win2000 and Win2003 Active Directory servers
Kerberos version in 5.0
Port is: 88
It’s more secure and encrypted than NTLM (NT authentication)

1. Which protocol is used for Public Folder?
ANS: SMTP
What is the use of NNTP with exchange?
ANS: This protocol is used the news group in exchange.


1. What is the content of System State backup?
The contents are: Boot files, system filesActive directory (if it’s done on DC)SysVol folder(if it done on DC)Certificate service ( on a CA server)Cluster database ( on a cluster server)registryPerformance counter configuration informationComponent services class registration database



Q: What are the perquisites for installation of Exchange Server?
The prerequisite are
IISSMTPWWW serviceNNTP.NET FrameworkASP.NETThen run ForestprepThen run domainprep

Question: What is Multi Master Replication?
Answer: Multi-master replication is a method of replication employed by databases to transfer data or changes to data across multiple computers within a group. Multi-master replication can be contrasted with a master-slave method (also known as single-master replication).


DFS? DFS Namespace ?
1. DFS Replication. New state-based, multimaster replication engine that is optimized for WAN environments. DFS Replication supports replication scheduling, bandwidth throttling, and a new byte-level compression algorithm known as remote differential compression (RDC).
DFS Namespaces. Technology that helps administrators group shared folders located on different servers and present them to users as a virtual tree of folders known as a namespace. DFS Namespaces was formerly known as Distributed File System in Windows 2000 Server and Windows Server 2003.


What are the four domain functional levels?
Windows 2000 MixedWindows 2000 NativeWindows Server 2003 InterimWindows Server 2003
Windows 2000 Mixed
When you configure a new Windows Server 2003 domain, the default domain functional level is Windows 2000 mixed.Under this domain functional level, Windows NT, 2000, and 2003 domain controllers are supported. However,certain features such as group nesting, universal groups, and so on are not available.
Windows 2000 Native
Upgrading the functional level of a domain to Windows 2000 Native should only be done if there areno Windows NT domain controllers remaining on the network. By upgrading to Windows 2000 Native functional level,additional features become available including: group nesting, universal groups, SID History, and the ability to convertsecurity groups and distribution groups.
Windows Server 2003 Interim
The third functional level is Windows Server 2003 Interim and it is often used when upgrading fromWindows NT to Windows Server 2003. Upgrading to this domain functional level provides support forWindows NT and Windows Server 2003 domain controllers. However, like Windows 2000 Mixed, it does not provide new features.
Windows Server 2003The last functional level is Windows Server 2003. This domain functional level only provides support forWindows Server 2003 domain controllers. If you want to take advantage of all the features included withWindows Server 2003, you must implement this functional level. One of the most important features introducedat this functional level is the ability to rename domain controllers

system admin FAQ with Answers


===============================================================
Download This doc:
http://u-bm8g42kfs.urlcash.net
===============================================================

FSMO ROLES

1) While Active Directory is a distributed system, some servers only carry out specific roles. If something happens to this server or you need a more substantial server to handle a particular role, you must know which servers are handling each role.
There are five FSMO roles:•
PDC emulator (one per domain): This role allows Windows Server 2003 to act as a Windows NT primary domain controller (PDC), and it provides replication support for Windows NT-based backup domain controllers (BDCs). In addition, this role assists with time and group policy synchronization. •
Infrastructure master (one per domain): This role is responsible for updating the group-to-user references whenever the members of groups change or receive new names. •
Relative ID (RID) master (one per domain): This role ensures that every object created has a unique identification number. •
Schema master (one per forest): This role is responsible for maintaining and modifying the Active Directory schema. •
Domain naming master (one per forest): This role is responsible for the addition and deletion of domains in a forest.
==============================
How can you determine which servers hold these roles in an Active Directory forest?
To find the PDC emulator, the infrastructure master, and the RID master, follows these steps:
1. Go to Start Administrative Tools Active Directory Users and Computers.
2. Right-click the domain and select Operations Master. The resulting three tabs will show you which server holds each respective role.
To find the schema master, follow these steps:
1. Go to Start Run.
2. Enter regsvr32 schmmgmt.dll in the Open text box, and click OK.
3. Go to Start Run.
4. Enter mmc in the Open text box, and click OK.
5. Go to File Add/Remove Snap-In, and click Add.
6. Click Active Directory Schema, click Add, click Close, and click OK.
7. Right-click Active Directory Schema and select Operations Master from the shortcut menu.

To find the domain naming master, follow these steps:
1. Go to Start Administrative Tools Active Directory Domains and Trusts.
2. Right-click Active Directory Domains and Trusts, and select Operations Master from the list.

Transferring the RID Master, PDC Emulator, and Infrastructure Masters via GUITo Transfer the Domain-Specific RID Master, PDC Emulator, and Infrastructure Master FSMO Roles:
1. Open the Active Directory Users and Computers snap-in from the Administrative Tools folder.
2. If you are NOT logged onto the target domain controller, in the snap-in, right-click the icon next to Active Directory Users and Computers and press Connect to Domain Controller.
3. Select the domain controller that will be the new role holder, the target, and press OK.
4. Right-click the Active Directory Users and Computers icon again and press Operation Masters.
5. Select the appropriate tab for the role you wish to transfer and press the Change button.
6. Press OK to confirm the change.7. Press OK all the way out

.DHCP LEASE PROCESS
1. Discover: The host will initially send a broadcast in an attempt to discover a DHCP server on the network.
2. Offer: The DHCP server will 'see' the workstation looking for the DHCP service and respond with an 'offer', which is an IP address.
3. Request: The client will receive the 'offer' and, in most cases, will accept it. This means it sends an 'official request' for the same IP address offered previously by the server.
4. Accept: The DHCP server will complete the transaction by sending an 'accept' message and marking the particular IP address for the specific host.

DHCP SERVER- Dynamic host configuration protocol is used to automatically assign TCP/IP addresses to clients along with the correct subnet mask, default gateway, and DNS server.
169.254.0.0 -169.254.255.255-APIPA Address

BOOTP- short for Bootstrap Protocol is a UDP network protocol used by a network client to obtain its IP address automatically. This is usually done during the bootstrap process when a computer is starting up. The BOOTP servers assign the IP address from a pool of addresses to each client.

BOOTP/DHCP differencesThere are significant differences in the way in which BOOTP and DHCP perform host configuration. The following table compares and contrasts the features of the two protocols that vary.

BOOTP DHCP Designed prior to DHCP. Designed after BOOTP.Intended to configure diskless workstations with limited boot capabilities. Intended to configure frequently relocated networked computers (such as portables) that have local hard drives and full boot capabilities.Dynamic BOOTP has default 30-day expiration on IP address leases. DHCP has default eight-day expiration on IP address leases.Supports a limited number of client configuration parameters called vendor extensions. Supports a larger and extensible set of client configuration parameters called options.Describes a two-phase bootstrap configuration process, as follows:• Clients contact BOOTP servers to perform address determination and boot file name selection.• Clients contact Trivial File Transfer Protocol (TFTP) servers to perform file transfer of their boot image. Describes a single-phase boot configuration process whereby a DHCP client negotiates with a DHCP server to determine its IP address and obtain any other initial configuration details it needs for network operation.BOOTP clients do not rebind or renew configuration with the BOOTP server except when the system restarts. DHCP clients do not require a system restart to rebind or renew configuration with the DHCP server. Instead, clients automatically enter a rebinding state at set timed intervals to renew their leased address allocation with the DHCP server. This process occurs in the background and is transparent to the user.

ARP (Address Resolution Protocol)Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address.

RARP (Reverse Address Resolution Protocol)Address Resolution Protocol (ARP) is a protocol for mapping a physical machine address to Internet Protocol address (IP address).

DHCP Relay AgentThe DHCP Relay Agent component is a Bootstrap Protocol (BOOTP) relay agent that relays Dynamic Host Configuration Protocol (DHCP) messages between DHCP clients and DHCP servers on different IP networks. The DHCP Relay Agent is compliant with RFC 1542. You cannot use the DHCP Relay Agent component on a computer running the DHCP service. BOOTP is a host configuration protocol developed before DHCP that was designed to configure diskless workstations with limited boot capabilities
RAID types
RAID-0: RAID-0 is called disk "striping". All the data is spread out in chunks across all the disks in the RAID set. RAID-0 has great performance, because you spread out the load of storing data onto more physical drives. There is no parity generated for RAID-0. Therefore there is no overhead to write data to RAID-0 disks. RAID-0 is only good for better performance, and not for high availability, since parity is not generated for RAID-0 disks. RAID-0 requires at least two physical disks.
RAID-1: RAID-1 is called disk mirroring. All the data is written to at least two separate physical disks. The disks are essentially mirror images of each other. If one of the disks fails, the other can be used to retrieve data. Disk mirroring is good for very fast read operations. It's slower when writing to the disks, since the data needs to be written twice. RAID-1 requires at least two physical disks.

RAID-5: RAID-5 uses disk striping with parity. The data is striped across all the disks in the RAID set, along with the parity information needed to reconstruct the data in case of disk failure. RAID-5 is the most common method used, since it achieves a good balance between performance and availability. RAID-5 requires at least three physical disks.

How do I Backup Active Directory?

Backing up Active Directory is essential to maintain an Active Directory database. You can back up Active Directory by using the Graphical User Interface (GUI) and command-line tools that the Windows Server 2003 family provides.You frequently backup the system state data on domain controllers so that you can restore the most current data. By establishing a regular backup schedule, you have a better chance of recovering data when necessary.To ensure a good backup includes at least the system state data and contents of the system disk, you must be aware of the tombstone lifetime. By default, the tombstone is 60 days. Any backup older than 60 days is not a good backup. Plan to backup at least two domain controllers in each domain, one of at least one backup to enable an authoritative restore of the data when necessary.

System State Data
Several features in the windows server 2003 family make it easy to backup Active Directory. You can backup Active Directory while the server is online and other network function can continue to function.
System state data on a domain controller includes the following components:•
Active Directory system state data does not contain Active Directory unless the server, on which you are backing up the system state data, is a domain controller. Active Directory is present only on domain controllers. •
The SYSVOL shared folder:
This shared folder contains Group policy templates and logon scripts. The SYSVOL shared folder is present only on domain controllers. •
The Registry: This database repository contains information about the computer's configuration. • System startup files: Windows Server 2003 requires these files during its initial startup phase. They include the boot and system files that are under windows file protection and used by windows to load, configure, and run the operating system. •

The COM+ Class Registration database: The Class registration is a database of information about Component Services applications. •

The Certificate Services database: This database contains certificates that a server running Windows server 2003 uses to authenticate users. The Certificate Services database is present only if the server is operating as a certificate server. System state data contains most elements of a system's configuration, but it may not include all of the information that you require recovering data from a system failure. Therefore, be sure to backup all boot and system volumes, including the System State, when you back up your server.

BOOT PROCESS-XP, 2000, 2003
First is the POST, this stands for Power on Self Test, for the computer. This process tests memory as well as a number of other subsystems. You can usually monitor this as it runs each test. After that is complete the system will run POST for any device that has BIOS (Basic Input-Output System). An AGP has its own BIOS, as do some network cards and various other devices.Once the POST is complete and the BIOS is sure that everything is working properly, the BIOS will then attempt to read the MBR (Master Boot Record). This is the first sector of the first hard drive (called the Master or HD0). When the MBR takes over it means that Windows is now in control.The MBR looks at the BOOT SECTOR (the first sector of the active partition). That is where NTLDR is located; NTLDR is the BOOT LOADER for Windows XP. NTLDR will allow memory addressing, initiate the file system, read the boot.ini and load the boot menu. NTLDR has to be in the root of the active partition as do NTDETECT.COM, BOOT.INI, BOOTSECT.DOS (for multi-OS booting) and NTBOOTDD.SYS (if you have SCSI adapters)Once XP is selected from the Boot Menu, NTLDR will run NTDETECT.COM, BOOT.INI and BOOTSECT.DOS to get the proper OS selected and loaded. The system starts in 16-bit real mode and then moves into 32-bit protected mode.NTLDR will then load NTOSKRNL.EXE and HAL.DLL. Effectively, these two files are windows XP. They must be located in %SystemRoot%System32.NTLDR reads the registry, chooses a hardware profile and authorizes device drivers, in that exact order.At this point NTOSKRNL.EXE takes over. It starts WINLOGON.EXE that in turn starts LSASS.EXE; this is the program that displays the Logon screen so that you can logon.Sample Boot.ini File
This is a sample of a default Boot.ini file from a Windows XP Professional computer.

[boot loader]
timeout=30
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fast detect
=============================================================
TYPES OF WINDOWS 2003
Standard Edition-4 processors with up to 4 GB RAM
Enterprise Edition-eight processors with up to 32 GB memory.
Datacenter Edition-32 processors with up to 64 GB RAM.
Web Edition-supports a maximum of 2 processors with support for a maximum of 2GB of RAM
The Five IP Address Classes
Class A networks have a beginning octet of 1 - 126.
Class B networks have a beginning octet of 128-191.
Class C networks have a beginning octet of 192 - 223.
Class D networks have a beginning octet of 224 – 239.
Class E networks have a beginning octet of 224.0.0.0 - 255.255.255.255

What are the benefits of using DHCP?
A. DHCP provides the following benefits for administering your TCP/IP-based network:• Reliable configuration
DHCP avoids configuration errors caused by the need to manually type in values at each computer. Also, DHCP helps prevent address conflicts caused by a previously assigned IP address being reused to configure a new computer on the network.•
Reduces configuration management
Using DHCP servers can greatly decrease time spent configuring and reconfiguring computers on your network. Servers can be configured to supply a full range of additional configuration values when assigning address leases. These values are assigned using DHCP options.

The DHCP lease renewal process helps assure that where client configurations need to be updated often (such as users with mobile or portable computers who change locations frequently), these changes can be made efficiently and automatically by clients communicating directly with DHCP servers.

What protocols and ports does DHCP traffic use?
All DHCP traffic uses the User Datagram Protocol (UDP). Messages from the DHCP client to the DHCP server use UDP source port 68 and UDP destination port 67. Messages from the DHCP server to the DHCP client use UDP source port 67 and UDP destination port 68.

Backing up the DHCP databaseMaintaining a backup of the DHCP database protects you from data loss if the DHCP database is lost (for example, due to hard disk failure) or becomes corrupted.

There are three backup methods supported by the DHCP Server service:•
Synchronous backups that occur automatically. The default backup interval is 60 minutes.• Asynchronous (manual) backups, performed by using the Backup command on the DHCP console. For more information about asynchronous backups, see back up the DHCP database. • Backups using Windows Backup (ntbackup.exe) or non-Microsoft backup software. For more information about Windows Backup, see Backup.To move a DHCP database to another serverThis topic provides details on how to move a DHCP database from one server computer (the source server) to another server computer (the destination server).

To back up the DHCP database (at the source server)
1. Open DHCP.
2. In the console tree, click the applicable DHCP server.
3. On the Action menu, click Backup.
4. In the Browse for Folder dialog box, select the folder that will contain the backup DHCP database, and then click OK.
5. Stop the DHCP server. This prevents the server from assigning new address leases to clients after the database has been backed up.For more information, see Start or stop a DHCP server.
6. Disable the DHCP Server service in the list of services. This prevents the DHCP server from starting after the database has been transferred. For more information, see Enable or disable a service for a hardware profile.
7. Copy the folder that contains the backup DHCP database to the destination

Group policy- is a feature of Microsoft Windows NT family of operating systems that provides centralized management and configuration of computers and remote users in an Active Directory environment


DNS Query Process

A DNS query is the process of a computer or networking device making an inquiry to get an IP address for a DNS name such as w3.org The client computer will send a DNS query to one of their internet service provider's DNS servers. The DNS server looks in it's DNS database to tell whether it can answer the query authoritatively. If the DNS server can answer authoritatively, the DNS server answers the query and the DNS query process is complete.
If the server cannot answer the query authoritatively it will look in its DNS cache of previous queries. If the DNS server finds a matching entry in its cache, it will answer the query with a non-authoritative answer based on the information in its cache and the DNS query process is complete.
If the ISP DNS server did not have the DNS information in its DNS database or its DNS cache the DNS query process will use recursion to complete the DNS query. The ISP DNS server will use its root hints file to find information to contact other DNS servers. The root hints file specified DNS servers that are authoritative for the DNS domain root and top level domains in the DNS system. This includes the .com, .org, .net, .gov and other domain types. If the query is for www.w3.org the ISP DNS server would contact an authorititative server for the top level "org" domain and send an iterative query to the org DNS server asking for information about the authoritative server for w3.org. The org domain DNS server responds with the the nameserver information including IP address of the nameserver for w3.org. Then the ISP DNS server sends a query to the w3.org DNS server asking for the IP address of www.w3c.org. The w3.org DNS server sends an authoritative answer back to the ISP DNS server which is cached in the ISP DNS server cache and also sent to the client computer.

If another client computer later does a request for information about www.w3.org the ISP DNS server has the information in its cache and will not neet to ask other DNS servers for additional information.



=============================================================================

system admin FAQ with Answers


===============================================================
Download This doc:
http://u-bm8g42kfs.urlcash.net
===============================================================

FSMO ROLES

1) While Active Directory is a distributed system, some servers only carry out specific roles. If something happens to this server or you need a more substantial server to handle a particular role, you must know which servers are handling each role.
There are five FSMO roles:•
PDC emulator (one per domain): This role allows Windows Server 2003 to act as a Windows NT primary domain controller (PDC), and it provides replication support for Windows NT-based backup domain controllers (BDCs). In addition, this role assists with time and group policy synchronization. •
Infrastructure master (one per domain): This role is responsible for updating the group-to-user references whenever the members of groups change or receive new names. •
Relative ID (RID) master (one per domain): This role ensures that every object created has a unique identification number. •
Schema master (one per forest): This role is responsible for maintaining and modifying the Active Directory schema. •
Domain naming master (one per forest): This role is responsible for the addition and deletion of domains in a forest.
==============================
How can you determine which servers hold these roles in an Active Directory forest?
To find the PDC emulator, the infrastructure master, and the RID master, follows these steps:
1. Go to Start Administrative Tools Active Directory Users and Computers.
2. Right-click the domain and select Operations Master. The resulting three tabs will show you which server holds each respective role.
To find the schema master, follow these steps:
1. Go to Start Run.
2. Enter regsvr32 schmmgmt.dll in the Open text box, and click OK.
3. Go to Start Run.
4. Enter mmc in the Open text box, and click OK.
5. Go to File Add/Remove Snap-In, and click Add.
6. Click Active Directory Schema, click Add, click Close, and click OK.
7. Right-click Active Directory Schema and select Operations Master from the shortcut menu.

To find the domain naming master, follow these steps:
1. Go to Start Administrative Tools Active Directory Domains and Trusts.
2. Right-click Active Directory Domains and Trusts, and select Operations Master from the list.

Transferring the RID Master, PDC Emulator, and Infrastructure Masters via GUITo Transfer the Domain-Specific RID Master, PDC Emulator, and Infrastructure Master FSMO Roles:
1. Open the Active Directory Users and Computers snap-in from the Administrative Tools folder.
2. If you are NOT logged onto the target domain controller, in the snap-in, right-click the icon next to Active Directory Users and Computers and press Connect to Domain Controller.
3. Select the domain controller that will be the new role holder, the target, and press OK.
4. Right-click the Active Directory Users and Computers icon again and press Operation Masters.
5. Select the appropriate tab for the role you wish to transfer and press the Change button.
6. Press OK to confirm the change.7. Press OK all the way out

.DHCP LEASE PROCESS
1. Discover: The host will initially send a broadcast in an attempt to discover a DHCP server on the network.
2. Offer: The DHCP server will 'see' the workstation looking for the DHCP service and respond with an 'offer', which is an IP address.
3. Request: The client will receive the 'offer' and, in most cases, will accept it. This means it sends an 'official request' for the same IP address offered previously by the server.
4. Accept: The DHCP server will complete the transaction by sending an 'accept' message and marking the particular IP address for the specific host.

DHCP SERVER- Dynamic host configuration protocol is used to automatically assign TCP/IP addresses to clients along with the correct subnet mask, default gateway, and DNS server.
169.254.0.0 -169.254.255.255-APIPA Address

BOOTP- short for Bootstrap Protocol is a UDP network protocol used by a network client to obtain its IP address automatically. This is usually done during the bootstrap process when a computer is starting up. The BOOTP servers assign the IP address from a pool of addresses to each client.

BOOTP/DHCP differencesThere are significant differences in the way in which BOOTP and DHCP perform host configuration. The following table compares and contrasts the features of the two protocols that vary.

BOOTP DHCP Designed prior to DHCP. Designed after BOOTP.Intended to configure diskless workstations with limited boot capabilities. Intended to configure frequently relocated networked computers (such as portables) that have local hard drives and full boot capabilities.Dynamic BOOTP has default 30-day expiration on IP address leases. DHCP has default eight-day expiration on IP address leases.Supports a limited number of client configuration parameters called vendor extensions. Supports a larger and extensible set of client configuration parameters called options.Describes a two-phase bootstrap configuration process, as follows:• Clients contact BOOTP servers to perform address determination and boot file name selection.• Clients contact Trivial File Transfer Protocol (TFTP) servers to perform file transfer of their boot image. Describes a single-phase boot configuration process whereby a DHCP client negotiates with a DHCP server to determine its IP address and obtain any other initial configuration details it needs for network operation.BOOTP clients do not rebind or renew configuration with the BOOTP server except when the system restarts. DHCP clients do not require a system restart to rebind or renew configuration with the DHCP server. Instead, clients automatically enter a rebinding state at set timed intervals to renew their leased address allocation with the DHCP server. This process occurs in the background and is transparent to the user.

ARP (Address Resolution Protocol)Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address.

RARP (Reverse Address Resolution Protocol)Address Resolution Protocol (ARP) is a protocol for mapping a physical machine address to Internet Protocol address (IP address).

DHCP Relay AgentThe DHCP Relay Agent component is a Bootstrap Protocol (BOOTP) relay agent that relays Dynamic Host Configuration Protocol (DHCP) messages between DHCP clients and DHCP servers on different IP networks. The DHCP Relay Agent is compliant with RFC 1542. You cannot use the DHCP Relay Agent component on a computer running the DHCP service. BOOTP is a host configuration protocol developed before DHCP that was designed to configure diskless workstations with limited boot capabilities
RAID types
RAID-0: RAID-0 is called disk "striping". All the data is spread out in chunks across all the disks in the RAID set. RAID-0 has great performance, because you spread out the load of storing data onto more physical drives. There is no parity generated for RAID-0. Therefore there is no overhead to write data to RAID-0 disks. RAID-0 is only good for better performance, and not for high availability, since parity is not generated for RAID-0 disks. RAID-0 requires at least two physical disks.
RAID-1: RAID-1 is called disk mirroring. All the data is written to at least two separate physical disks. The disks are essentially mirror images of each other. If one of the disks fails, the other can be used to retrieve data. Disk mirroring is good for very fast read operations. It's slower when writing to the disks, since the data needs to be written twice. RAID-1 requires at least two physical disks.

RAID-5: RAID-5 uses disk striping with parity. The data is striped across all the disks in the RAID set, along with the parity information needed to reconstruct the data in case of disk failure. RAID-5 is the most common method used, since it achieves a good balance between performance and availability. RAID-5 requires at least three physical disks.

How do I Backup Active Directory?

Backing up Active Directory is essential to maintain an Active Directory database. You can back up Active Directory by using the Graphical User Interface (GUI) and command-line tools that the Windows Server 2003 family provides.You frequently backup the system state data on domain controllers so that you can restore the most current data. By establishing a regular backup schedule, you have a better chance of recovering data when necessary.To ensure a good backup includes at least the system state data and contents of the system disk, you must be aware of the tombstone lifetime. By default, the tombstone is 60 days. Any backup older than 60 days is not a good backup. Plan to backup at least two domain controllers in each domain, one of at least one backup to enable an authoritative restore of the data when necessary.

System State Data
Several features in the windows server 2003 family make it easy to backup Active Directory. You can backup Active Directory while the server is online and other network function can continue to function.
System state data on a domain controller includes the following components:•
Active Directory system state data does not contain Active Directory unless the server, on which you are backing up the system state data, is a domain controller. Active Directory is present only on domain controllers. •
The SYSVOL shared folder:
This shared folder contains Group policy templates and logon scripts. The SYSVOL shared folder is present only on domain controllers. •
The Registry: This database repository contains information about the computer's configuration. • System startup files: Windows Server 2003 requires these files during its initial startup phase. They include the boot and system files that are under windows file protection and used by windows to load, configure, and run the operating system. •

The COM+ Class Registration database: The Class registration is a database of information about Component Services applications. •

The Certificate Services database: This database contains certificates that a server running Windows server 2003 uses to authenticate users. The Certificate Services database is present only if the server is operating as a certificate server. System state data contains most elements of a system's configuration, but it may not include all of the information that you require recovering data from a system failure. Therefore, be sure to backup all boot and system volumes, including the System State, when you back up your server.

BOOT PROCESS-XP, 2000, 2003
First is the POST, this stands for Power on Self Test, for the computer. This process tests memory as well as a number of other subsystems. You can usually monitor this as it runs each test. After that is complete the system will run POST for any device that has BIOS (Basic Input-Output System). An AGP has its own BIOS, as do some network cards and various other devices.Once the POST is complete and the BIOS is sure that everything is working properly, the BIOS will then attempt to read the MBR (Master Boot Record). This is the first sector of the first hard drive (called the Master or HD0). When the MBR takes over it means that Windows is now in control.The MBR looks at the BOOT SECTOR (the first sector of the active partition). That is where NTLDR is located; NTLDR is the BOOT LOADER for Windows XP. NTLDR will allow memory addressing, initiate the file system, read the boot.ini and load the boot menu. NTLDR has to be in the root of the active partition as do NTDETECT.COM, BOOT.INI, BOOTSECT.DOS (for multi-OS booting) and NTBOOTDD.SYS (if you have SCSI adapters)Once XP is selected from the Boot Menu, NTLDR will run NTDETECT.COM, BOOT.INI and BOOTSECT.DOS to get the proper OS selected and loaded. The system starts in 16-bit real mode and then moves into 32-bit protected mode.NTLDR will then load NTOSKRNL.EXE and HAL.DLL. Effectively, these two files are windows XP. They must be located in %SystemRoot%System32.NTLDR reads the registry, chooses a hardware profile and authorizes device drivers, in that exact order.At this point NTOSKRNL.EXE takes over. It starts WINLOGON.EXE that in turn starts LSASS.EXE; this is the program that displays the Logon screen so that you can logon.Sample Boot.ini File
This is a sample of a default Boot.ini file from a Windows XP Professional computer.

[boot loader]
timeout=30
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fast detect
=============================================================
TYPES OF WINDOWS 2003
Standard Edition-4 processors with up to 4 GB RAM
Enterprise Edition-eight processors with up to 32 GB memory.
Datacenter Edition-32 processors with up to 64 GB RAM.
Web Edition-supports a maximum of 2 processors with support for a maximum of 2GB of RAM
The Five IP Address Classes
Class A networks have a beginning octet of 1 - 126.
Class B networks have a beginning octet of 128-191.
Class C networks have a beginning octet of 192 - 223.
Class D networks have a beginning octet of 224 – 239.
Class E networks have a beginning octet of 224.0.0.0 - 255.255.255.255

What are the benefits of using DHCP?
A. DHCP provides the following benefits for administering your TCP/IP-based network:• Reliable configuration
DHCP avoids configuration errors caused by the need to manually type in values at each computer. Also, DHCP helps prevent address conflicts caused by a previously assigned IP address being reused to configure a new computer on the network.•
Reduces configuration management
Using DHCP servers can greatly decrease time spent configuring and reconfiguring computers on your network. Servers can be configured to supply a full range of additional configuration values when assigning address leases. These values are assigned using DHCP options.

The DHCP lease renewal process helps assure that where client configurations need to be updated often (such as users with mobile or portable computers who change locations frequently), these changes can be made efficiently and automatically by clients communicating directly with DHCP servers.

What protocols and ports does DHCP traffic use?
All DHCP traffic uses the User Datagram Protocol (UDP). Messages from the DHCP client to the DHCP server use UDP source port 68 and UDP destination port 67. Messages from the DHCP server to the DHCP client use UDP source port 67 and UDP destination port 68.

Backing up the DHCP databaseMaintaining a backup of the DHCP database protects you from data loss if the DHCP database is lost (for example, due to hard disk failure) or becomes corrupted.

There are three backup methods supported by the DHCP Server service:•
Synchronous backups that occur automatically. The default backup interval is 60 minutes.• Asynchronous (manual) backups, performed by using the Backup command on the DHCP console. For more information about asynchronous backups, see back up the DHCP database. • Backups using Windows Backup (ntbackup.exe) or non-Microsoft backup software. For more information about Windows Backup, see Backup.To move a DHCP database to another serverThis topic provides details on how to move a DHCP database from one server computer (the source server) to another server computer (the destination server).

To back up the DHCP database (at the source server)
1. Open DHCP.
2. In the console tree, click the applicable DHCP server.
3. On the Action menu, click Backup.
4. In the Browse for Folder dialog box, select the folder that will contain the backup DHCP database, and then click OK.
5. Stop the DHCP server. This prevents the server from assigning new address leases to clients after the database has been backed up.For more information, see Start or stop a DHCP server.
6. Disable the DHCP Server service in the list of services. This prevents the DHCP server from starting after the database has been transferred. For more information, see Enable or disable a service for a hardware profile.
7. Copy the folder that contains the backup DHCP database to the destination

Group policy- is a feature of Microsoft Windows NT family of operating systems that provides centralized management and configuration of computers and remote users in an Active Directory environment


DNS Query Process

A DNS query is the process of a computer or networking device making an inquiry to get an IP address for a DNS name such as w3.org The client computer will send a DNS query to one of their internet service provider's DNS servers. The DNS server looks in it's DNS database to tell whether it can answer the query authoritatively. If the DNS server can answer authoritatively, the DNS server answers the query and the DNS query process is complete.
If the server cannot answer the query authoritatively it will look in its DNS cache of previous queries. If the DNS server finds a matching entry in its cache, it will answer the query with a non-authoritative answer based on the information in its cache and the DNS query process is complete.
If the ISP DNS server did not have the DNS information in its DNS database or its DNS cache the DNS query process will use recursion to complete the DNS query. The ISP DNS server will use its root hints file to find information to contact other DNS servers. The root hints file specified DNS servers that are authoritative for the DNS domain root and top level domains in the DNS system. This includes the .com, .org, .net, .gov and other domain types. If the query is for www.w3.org the ISP DNS server would contact an authorititative server for the top level "org" domain and send an iterative query to the org DNS server asking for information about the authoritative server for w3.org. The org domain DNS server responds with the the nameserver information including IP address of the nameserver for w3.org. Then the ISP DNS server sends a query to the w3.org DNS server asking for the IP address of www.w3c.org. The w3.org DNS server sends an authoritative answer back to the ISP DNS server which is cached in the ISP DNS server cache and also sent to the client computer.

If another client computer later does a request for information about www.w3.org the ISP DNS server has the information in its cache and will not neet to ask other DNS servers for additional information.



=============================================================================