Windows Admin Interview Questions & Answers

Started by Kalyan, Jul 31, 2008, 07:54 PM

previous topic - next topic
Go Down


Windows Admin Interview Questions & Answers

   1. Describe how the DHCP lease is obtained.

      It's a four-step process consisting of (a) IP request, (b) IP offer, IP selection and (d) acknowledgement.

   2. I can't seem to access the Internet, don't have any access to the corporate network and on ipconfig my address is 169.254.*.*. What happened?

      The 169.254.*.* netmask is assigned to Windows machines running 98/2000/XP if the DHCP server is not available. The name for the technology is APIPA (Automatic Private Internet Protocol Addressing).

   3. We've installed a new Windows-based DHCP server, however, the users do not seem to be getting DHCP leases off of it. The server must be authorized first with the Active Directory.

   4. How can you force the client to give up the dhcp lease if you have access to the client PC?

      ipconfig /release

   5. What authentication options do Windows 2000 Servers have for remote clients?


   6. What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP/IP? NWLink (Novell), NetBEUI, AppleTalk (Apple).

   7. What is data link layer in the OSI reference model responsible for? Data link layer is located above the physical layer, but below the network layer.

      Taking raw data bits and packaging them into frames. The network layer will be responsible for addressing the frames, while the physical layer is reponsible for retrieving and sending raw data bits.

   8. What is binding order?

      The order by which the network protocols are used for client-server communications. The most frequently used protocols should be at the top.
   9. How do cryptography-based keys ensure the validity of data transferred across the network?

      Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.

  10. Should we deploy IPSEC-based security or certificate-based security?

      They are really two different technologies. IPSec secures the TCP/IP communication and protects the integrity of the packets. Certificate-based security ensures the validity of authenticated clients and servers.

  11. What is LMHOSTS file?

      It's a file stored on a host machine that is used to resolve NetBIOS to specific IP addresses.

  12. What's the difference between forward lookup and reverse lookup in DNS?

      Forward lookup is name-to-address, the reverse lookup is address-to-name.

  13. How can you recover a file encrypted using EFS?

      Use the domain recovery agent.


Can post question for Microsoft certification test

Go Up

Quick Reply

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Warning: this topic has not been posted in for at least 120 days.
Unless you're sure you want to reply, please consider starting a new topic.

Note: this post will not display until it's been approved by a moderator.
Please leave this box empty:

Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:

shortcuts: alt+s submit/post or alt+p preview
IT Acumens Web Designing Chennai | GinGly :: Build your Personal Website | CineBuzz :: Cinema News | My Kids Diary :: Kids Memories Writing :: Book Website @ 349 Rs monthly
Copyright 2005 - 2020 :: IT Acumens :: All Rights Reserved. :: Sitemap
ITAcumens Discussion Forum with 2 lakhs post running for 15 years - Powered by IT Acumens Dedicated Server