Wintel Interview Questions and Answers II

Spread the love

1.What is the Order GPOs are applied?

Ans. Local, Sites, Domain, OU (Organizational Unit).

2. What is Active Directory Partition?

Ans. Directory partition is where the AD information is segregated and logically stored.

3. What are the Active Directory partition? And what is the use of them?

Ans. There are three native partitions Schema/Configuration/Domain and additionally there is also application partition.

Schema Partition Contains: Definition-al details about objects and attributes that one can store in AD. Replicates to all domain controller static in nature.

Configuration Partition Contains: Configuration data about forest and trees. Replicates to all domain controller’s static as forest.

Domain Partition Contains: Object information for a domain (Users, Computers, etc.). Replicates to all domain controller in a domain. The object portion becomes part of global catalogue.

Application Partition Contains: It contains information about application in Active Directory.

i.e., When AD integrated DNS Zones are used there are two application partitions for DNS Zones.

Forest DNS Zone: It is part of forest, all domain controllers and DNS Servers in a forest receive a replica of this partition. A forest wide application partition stores the forest zone data.

Domain DNS Zone: It is unique for each domain, all domain controllers that are DNS server in that domain receives a replica of this partition.

Note: No DNS data is replicated to the global catalog server.

4. What is the Need of Reverse look-up?

Ans. It is used mostly for tracking. In reverse lookup zone the client uses a known IP address and look for Computer name based on its address.

5.What is the port number used by WSUS to flow updates to client?

Ans. 80(HTTP), 443 (HTTPS).

6. What is SMB (Server Message Block) port number?

Ans. 445.

7. What is used to revoke expired certificates from clients?

Ans. Enterprise Certificate Authority.

8. What is ODBC?
Ans.
 Open Database is an open standard application programming interface for accessing a database. By using ODBC statements in a programme, you can access files in a number of different databases including Access, d Base, DB2, Excel and Text.

9. What are the port numbers used by HP Ilo.


Ans.
 Port Number                      Function

22          – – – – – – – – – SSH

23          – – – – – – – – – Telnet

80          – – – – – – – – – HTTP

443          – – – – – – – – – HTTPS

3389          – – – – – – – – – Terminal Services

17988          – – – – – – – – – Virtual Media

9300          – – – – – – – – – Shared Remote Control

17990          – – – – – – – – – Console Replay

3002          – – – – – – – – – Raw Serial Data

10. What are FSMO roles what are their functions?
Ans.
 There are changes, which could be performed across domain controllers in Active Directory, using the ‘multi-master replication’. However, performing all changes this way may not be practical, and so it must be refined under one domain controller that manoeuvres such change requests intelligently. And that domain controller is dubbed as Operations Master, sometimes known as Flexible Single Master Operations (FSMO).

There are five FSMO roles and again classified into Forest wide and Domain wide.

Forest Wide roles:

Schema Master: The schema master is shared between every tree and domain in a forest & must be consistent between all objects. The Schema master controls all updates and modifications to the schema. There can be only one schema master in the entire forest.


Domain Naming Master: 
When a domain is added to forest the name must be unique in the forest. The Domain Naming master must be available while adding or removing a domain in a forest.

Domain Wide Roles:

RID Master: It is the task of RID master to allot sequences of relative IDs to each of the (numerous) domain controllers in its domain. When a domain controller creates a user, group, or computer object, a unique security ID (SID) is assigned to the object.

The SID contains two elements:

One is the domain SID (which is the same name for all SIDs that’s created in a domain)

And the other is an RID, which is unique for each SID created in the domain.

Activities such as moving an object between domains (using Movetree.exe) must be instigated on the domain controller acting as the RID master of the domain (that currently contains the object).

PDC Emulator: In order to ensure consistency, password changes from client computers must be replicated and updated to all domain controllers throughout the domain. And the PDC emulator can be configured to synchronize with an external time source. Provides consistency in password experience for users across sites. (To turn off use: Avoid Pdc on Wan registry parameter). Double- checks incorrect passwords and reviews new password changes.

The domain controller configured with the PDC emulator role supports two authentication protocols:

The Kerberos V5 protocol

The NTLM protocol

Infrastructure Master: Tasks such as updating references from objects in its domain to objects in other domains are under the purview of the infrastructure master. The infrastructure master compares its data with that of a global catalogue, which receives regular updates for objects in all domains through replication, thus making the global catalogue data up to date. Say, in a scenario where the infrastructure master suspects outdated data, it fetches updated data from the GC and replicates it to the other domain controllers in a domain.

Pointers:

Unless there is only one domain controller in the domain, the infrastructure master role should not be assigned to the domain controller that is hosting the global catalogue.

If the infrastructure master and global catalogue are on the same domain controller, the infrastructure master will not function.

The infrastructure master will seldom find data that is out of date, so it will never replicate any changes to the other domain controllers in the domain.

In the case where all of the domain controllers in a domain are also hosting the global catalogue, all of the domain controllers will have the current data and it does not matter which domain controller holds the infrastructure master role.

In scenarios where user / members of a group are renamed / modified, the infrastructure master is responsible for revising the group-to- user references.

When the member of a group is moved or renamed, especially if that member resides in a different domain from the group, the member will temporarily not appear in the group. It is the infrastructure master of the group’s domain’s responsibility to update the group of the new name or location of the member. This prevents the loss of group memberships associated with a user account.

Update is distributed by the infrastructure via multi-master replication.

11. How to get report of user’s last log on?


Ans.
 There are two ways one is using the AD Advanced searched window and other is using power shell.

Advanced Search Window –> Users –> Define the days since last logged on –> Find Now

PowerShell:

Import-Module Active Directory

function Get-ADUsersLastLogon()

{

  $dcs = Get-ADDomainController -Filter {Name -like “*”}

  $users = Get-ADUser -Filter *

  $time = 0

  $exportFilePath = “c:\lastLogon.csv”

  $columns = “name,username,datetime”


  Out-File -filepath $exportFilePath -force -InputObject $columns


  foreach($user in $users)

  {

    foreach($dc in $dcs)

    { 

      $hostname = $dc.HostName

      $currentUser = Get-ADUser $user.SamAccountName | Get-ADObject -Server $hostname -Properties lastLogon


      if($currentUser.LastLogon -gt $time) 

      {

        $time = $currentUser.LastLogon

      }

    }


    $dt = [DateTime]::FromFileTime($time)

    $row = $user.Name+”,”+$user.SamAccountName+”,”+$dt


    Out-File -filepath $exportFilePath -append -noclobber -InputObject $row


    $time = 0

  }

}

Get-ADUsersLastLogon

12. What is a forwarder and a conditional forwarder?


Ans. 
A forwarder is a DNS server on a network that forwards DNS queries for external DNS names to DNS servers outside of that network. You can also forward queries according to specific domain names using conditional forwarder.

13. What is DNS and What is the port number DNS uses?
Ans.
 DNS is equivalent to Internet’s phone book. It translates name to ip address and vice versa. DNS user port number 53.

14. What is DHCP and what are the port number used by them?
Ans.
 DHCP (Dynamic Host Configuration Protocol) is used to assign IP address automatically and efficiently throughout the network from a predefined range of ip addresses. DHCP server uses port number 67 and DHCP client uses 68.

15. What is the default interval for inter-site and intra-site replication?


Ans.
 For Intrasite Replication the DC waits for 15 seconds and then sends an update notification to its closest replication partner. If the source DC have more than one replication partner, subsequent notifications go out by at 3 seconds interval to each partner.

        By default, the inter site replication interval is 180 minutes/3 hours but it can be adjusted to minimum 15 minutes and maximum 1 week. It is not recommended to minimize the interval time as it will use lot of bandwidth.


16. What is the default time period for scavenging?
Ans.
 7 days.


17. What are the Active Directory database files and the default location they are stored in?
Ans. 
The Database files of Active Directory are: NTDS.dit ; and associated files are edb.chk , edb.log , res1.log & res2.log .

The data base and associated files are in: “C:\Windows\System 32\NTDS” folder.


18. What is the recommended maximum number of domain controller per domain?
Ans.
 To ensure reliable recovery of SYSVOL, it is recommended a limit of maximum 1200 domain controllers per domain.


19.What is the port number of RDP?
Ans.
 TCP&UDP – 3389.


20. What is the length limitation for FQDN?
Ans.
 Fully qualified domain names (FQDNs) in Active Directory cannot exceed 64 characters in total length, including hyphens and periods.

Leave a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Scroll to Top