Windows System Administrator Interview Questions – Part I

Discussed here are the questions that you may face if you’re FRESHER or one year experienced.

1. What is your current profile? And what all are the tasks assigned?
Here you can discuss about your current profile and the tasks you have been assigned. Also, you could discuss about the infrastructure exposure you have been into.

2. Starting with Active Directory, what is AD and what are its partitions?
Active Directory (AD) is a database, which is designed to handle a large number of read and search operations and a smaller number of changes and updates. And it consists of all the users and groups within the domain. Its also does authenticates the users when login to a domain computer.
AD partitions are
Configuration : Stores configuration objects for the entire forest domain. Updates are replicated to all domain controllers in the forest.
Schema : Stores class and attribute definitions for all existing AD objects. Updates are replicated to all domain controllers in the forest.
Domain : Stores users, computers, groups and other objects for a specific domain.
Application : Store information about application in AD. Unlike domain this cannot store security principal objects such as user accounts.

3. What do you know about AD database file? Where is it located?
Ntds.dit is the AD database file. NTDS stands for NT Directory Service whereas DIT stands for Directory Information Tree. This files is considered to be the heart of AD. This is located in “%SystemRoot%\ntds\NTDS.DIT” by default.
NTDS.dit consists of schema information – details that can be defined about objects and attributes
Configuration information – configuration data about forest and trees
Domain information – Object information for a domain which replicates to all dc’s within a domain.

4. What is global catalog?
It acts a central repository that contains a searchable, partial representation of every object in every domain in a multidomain ADDS forest. That is, it stores a full copy of all objects in the directory for its host domain and a partial copy of all objects of other domains in the forest. By default, first DC in a forest is designated as the GC server.

5. What are the FSMO roles available?
Schema Master : Controls all updates and modifications to the schema. Only one schema master across a forest.
Domain Naming Master : Controls the addition or removal of domains in the forest. Only one domain naming master in the whole forest.
Infrastructure Master : Responsible for correct handling of cross-domain object references. Only one infrastructure master in a domain and this role should be held by a dc that is not a global catalog server.
Relative ID (RID) Master : Responsible for processing RID pool requests from all dc’s in a single domain. Again only one dc acting as RID Master in a domain.
PDC Emulator : This synchronizes the clocks of all windows computers in your forest.

6. What is KCC?
Knowledge COnsistency Checker generates and maintains the replication topology within and between sites. By default KCC reviews and modifies its replication topology every 15 minutes.

7. What is DHCP and what are its ports?
Standard networking protocol used on IP networks for dynamically distributing network configuration parameters such as IP addresses.
Client uses port number 68 whereas Server uses port number 67 for DHCP.

8. What is DORA process?
Discover Offer Request Acknowledge, is a process followed in DHCP, while allocating IP addresses to clients by servers.
1. Client makes a UDP broadcast to the server about the DHCP discovery.
2. DHCP server reservs and offers an IP address to the client.
3. Client requests the server, responding to the offer recieved from server.
4. Server reponds back with the IP and other related details.

9. What is Ping? And what is its protocol?
Ping is a command used to check whether a specific IP address is accessible or not. It works by sending packets to the destination address. Ping is said to be successful only if an acknowledgement is recieved by the source address for each packet sent to the destination. The protocol used in Ping is ICMP.

10. Name some of the known protocols in Windows.

Check out our second part of interview questions and answers here.

Let us know your ratings on this blog here. Also feel free to contact me here.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s