Windows Admin Flashcards

1
Q

What is group policy?

A

Network administrators can use group policy to control the working environment of users and computer accounts in an active directory. It provides a central place for administrators to manage and configure operating systems, applications, and user settings. Using it properly enables you to increase the security of users’ computers and help defend against insider and external threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is it said that we should restore a dc that was backed up 9 months ago?

A

We can face problems due to lingering objects because, when restoring a backup file, the active directory generally requires that the backup file should not be more than 180 days old.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Can you tell us about your experience with hardware Components?

A

A system administrator or system admin should be able to do installation and replacement operations with hardware. Sometimes, there can be a need to rebuild the hardware component.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do forest, trees, and domain mean?

A

A domain is a logical group of network objects like computers, users, and devices with the same active directory database. A tree is a collection of domains within a Microsoft active directory network in which each domain has exactly one parent, leading to a hierarchical tree structure. A forest is a group of active directory trees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do you know about WINS servers?

A

WINS stands for Windows Internet Name Service. This will allow the users to access resources by a computer name rather than an IP address. It is an operating system that uses a centralized computer that will provide specific functions and predetermined rules for the users and the computers connected to a Network. For example, if you want your computer to keep track of the names and IP addresses of other computers in your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What, according to you, could be the personal characteristics of a person administering a system?

A

System administrators face a variety of challenges. They are the problem solvers and coordinators. They understand a computer’s software, hardware, and networks in-depth. Thus, they can instruct employees regarding technical issues. Their primary task is to monitor the system. They are able to keep track of the server performance and creative designs for computer systems and quickly arrange for replacement in case of any hardware failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a lingering object? What is the command that we use to remove lingering objects? Why is it important to remove the lingering objects?

A

The lingering object is a deleted active directory that remains on the restored domain controller in its local copy of the active directory. When an object is deleted from the active directory, a Tombstone (which is temporary) is created, which then has to be replicated by the domain controller before it expires, i.e., they seem to occur when some changes are made to the directories after the system backups are created.

When we restore a backup file, the AD (ACTIVE DIRECTORY) generally requires that the backup should not be more than 180 days old. This may happen if, after the backup was done, the object was deleted on another DC more than 180 days ago. In such cases, if we want to remove the lingering object, we use windows server 2003 and windows server 2008 as they can manually remove the lingering objects using the console utility command REPADMIN.EXE. It is necessary to remove the lingering object as it puts an extra burden on the system’s RAM and can create the problems like limited space availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Can you differentiate between firewall and antivirus?

A

Antivirus: We use antivirus to protect the system from computer viruses. When using your system, it actively monitors for any virus threats from different sources. If it finds any virus threats, it tries to clean or quarantine the virus and keeps your system and data safe.

Firewall: On the flip side, a firewall protects your system from outside/intruder/hacker attacks. Sometimes hackers may take control of your system remotely and steal your vital information or the data from the system. It happens mostly in cases when your system is connected directly to the internet or an extensive network. In that case, you should install a firewall on your pc to protect yourself from unauthorized access. It is either available in software or hardware form. If you have a single PC, the software firewall can do the work, but when you want to protect a large corporation, you have to install a hardware firewall to protect their system from such attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

According to you, why backing up an active directory is important, and how can you back up an active directory?

A

To maintain the proper health of the AD database, the backup of an active directory is important.

Windows Server 2003: In this, you can backup the active directory using the NTBACKUP tool that is inbuilt with windows server 2003, or we can also use any 3rd party tool that will support this feature.

Windows server 2008: There is no option to back up the system state data through the normal backup utility. Here we need to use the command line to backup the active directory.

Step 1 – Open the command prompt by clicking on start, typing “cmd,” and then hitting the enter button.
Step 2 – In the command prompt, type “wbadmin start systemstatebackup – backuptarget;e:” and then press the enter button.
Step 3 – Input “y” and press the enter button to start the backup process.
When the backup is finished, you will get a message that the backup is completed if it has not been completed properly, you need to troubleshoot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a domain controller?

A

A domain controller (DC ) is a windows-based computer system that is used for storing user account data in a central database. The system administrator allows or denies users access to system resources, such as printers, documents, folders, network locations, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

According to you, what is the difference between FAT and NTFS?

A

FAT:

There is no security when the user logs in locally.
It usually supports file names with only 8 characters and does not support file compression.
The partition and file size can be up to 4 GB, and there is no such security permission for file and folder levels.
It doesn’t support bad cluster mapping, so it is not very reliable.
NTFS:

There is security for both the local and the remote users.
It usually supports file names that have 255 characters.
It supports file compression, and the partition size can be up to 16 exabytes.
There is security for file and folder levels.
It supports bad cluster mapping and transaction logging and is highly reliable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Can you tell me what is loopback address and in what sense is it useful?

A

It is an address that sends outgoing signals back to the same computer for testing purposes. It is managed entirely within the operating system so the client and the server process on a single system and can communicate. It is not physically connected to a network. It is useful because the loopback provides IT professionals with an interface to test the IP software without worrying about broken or corrupted drives or hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do you know about proxy servers?

A

It acts as the gateway between a local network (e.g., computers in a company) and a large-scale network (for ex: the internet). By using this server, there is an increase in performance and security as it can be used to prevent employees from browsing inappropriate and distracting sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Can you tell us about the windows registry?

A

It is often referred to as “the registry.” In the Microsoft Windows operating system, it is the collection of databases of configuration settings (low-level settings). It stores important information like the location of programs, files, etc. If you don’t understand what you are doing, you should not edit the Windows registry, or it will cause problems with the installed applications or the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Sysvol Folder?

A

We can say that it is a type of shared folder that stores group policy information, or we can say that it contains public files of the domain controllers, and the domain users can access it. Its significant feature is that it is used to deliver policy and login scripts to the domain members.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is VOIP important?

A

VOIP is important as it makes the user adopt modern techniques over traditional infrastructure. Using it, the users can use the transmission medium by delivering the voice packets designed for telephone calls.

17
Q

What do you know about Windows deployment services?

A

The name itself suggests that it is used to deploy the windows operating system (i.e., there is no need to install each operating system directly from CD or DVD. Some tools are used for managing the server.

Windows deployment services MMC
Windows PowerShell cmdlets for WDS
WDSUTIL command-line tool

18
Q

What is the difference between a workgroup and a domain?

A

In a workgroup, a particular system has a collection of systems having their own rules and local users’ logins. Whereas in the domain, the centralized authentication server, which is a collection of systems, tells what the rules are. Workgroups are like P2P networks, whereas domains are like standard client/server relationships.

19
Q

What can you tell us about the lightweight directory access protocol?

A

The LDAP (lightweight directory access protocol) is used to name the object in an AD (Active Directory) and makes it widely accessible for management and query applications. It is most commonly used to provide a central place to store the usernames and passwords.

20
Q

What do you know about the PPP protocol?

A

PPP protocol stands for point-to-point protocol. This protocol helps us communicate between the two computers (routers). The two derivatives of the point-to-point protocol are:

  1. Point-to-point protocol over Ethernet
  2. Point-to-point protocol over ATM

It is a multilayer protocol that operates on the same communication link.

21
Q

What is IP Spoofing, and what can we do to prevent it?

A

It is a type of mechanism that is used by attackers to get authorized access to the system. The intruder sends the message to the computer with an IP address from a trusted source/host. We can prevent it by filtering packets using special routers and firewalls that allow packets with recognized formats to enter the network.

22
Q

What is garbage collection?

A

The memory that is occupied and is no longer in use is called garbage collection. One of the significant advantages of garbage collection is that it frees the user from dealing with memory deallocation. The higher level of programming languages has more garbage collection, and resources other than memory are not handled by garbage collection.

23
Q

What is DNS?

A

The DNS stands for the domain name system. The IP addresses are constantly changing, so the DNS makes the IP address into human-friendly names so humans can remember them much more easily. This is less likely to change. For example, if you look at the standard phone book and search for a person’s name, you will get their phone number. In this case, the DNS performs the same operation as a standard phone book but with updates on an hourly or daily basis. Due to the tiring nature of the DNS, it makes it possible to have repeated queries that can be responded to quickly.