What is the role of ESE in active directory?
The role of ESE in an active directory is to store and retrieve data through indexed and sequential access.Its the data storage technology from Microsoft.
What does an active directory client use to locate objects in another domain?
The Global Catalog
Source:
Windows Server 2008 Administrator MOAC 70-646
Chapter 3, Planning an Active Directory Deployment
pg. 98
Routers operate at layer LAN switches operate at layer Ethernet hubs operate at layer?
Routers operate at layer 3. LAN switches operate at layer 2. Ethernet hubs operate at layer 1.
How do you install a fan system in a 1994 olds eighty- eight?
If you are referring to the blower motor, it is located centrally behind the motor on the firewall. There should be 6 bolts holding it in place and there is one wire connection to unclip. You may have to remove the bar that is located over the engine before you can pull out the blower motor. If you are putting in a used blower motor, make sure you have the matching gasket as they can vary. Also, make sure that the fan blades are positioned in the same direction as the original blower's to prevent reverse airflow.
What are the Active directory Support Tools Why do you need them?
Support Tools are the tools that are used for performing the complicated tasks easily. These can also be the third party tools. Some of the Support tools include DebugViewer, DependencyViewer, RegistryMonitor, etc.
-edit by Casquehead
I believe this question is reffering to the Windows Server 2003 Support Tools, which are included with Microsoft Windows Server 2003 Service Pack 2. They are also available for download here:
http://www.Microsoft.com/downloads/details.aspx?familyid=96A35011-FD83-419D-939B-9A772EA2DF90&displaylang=en
You need them because you cannot properly manage an Active Directory network without them.
Here they are, it would do you well to familiarize yourself with all of them.
Acldiag.exe
Adsiedit.msc
Bitsadmin.exe
Dcdiag.exe
Dfsutil.exe
Dnslint.exe
Dsacls.exe
Iadstools.dll
Ktpass.exe
Ldp.exe
Netdiag.exe
Netdom.exe
Ntfrsutl.exe
Portqry.exe
Repadmin.exe
Replmon.exe
Setspn.exe
Read more: http://wiki.answers.com/What_are_the_Support_Tools_Why_do_you_need_them#ixzz1GEDhEBWB
Which record is the first record created for a zone on a DNS Server?
Start of Authority (SOA) is the first record in the zone file. It contains the name of the primary DNS Server, which must correspond to an Name Server (NS) record in the file, the administrator's e-mail address and the length of time records can be cached before going back to the authoritative DNS server.
The Feature is know as Microsoft Meta directory service..
A metadirectory is a dedicated enterprise directory solution that joins (or merges) information between the various existing directory systems and programs used within an enterprise, and then provides access to the consolidated information for Lightweight Directory Access Protocol (LDAP) clients, Web browsers, and possibly other computers.
Microsoft Metadirectory Overview
In the MMS model, the enterprise metadirectory structure is comprised of one or more servers, management agents, and connected directories:
Management Agents
Management agents are responsible for importing connected directory information into the connector namespace, and where desired, merging it with entries in the metaverse. It keeps the directory information synchronized by allowing attributes to flow bi-directionally. There is one management agent for each connected directory.
Connected Directory
A connected directory is essentially any directory that you want to integrate into the metadirectory. The only requirement is that the directory contents must be organized into some minimal hierarchical structure, and that there a method for extracting the directory information in it exists. The information extracted from the connected directory is imported into the metadirectory. Optionally you may want to export information from the metadirectory into the connected directory.
Metadirectory Namespace
While the metadirectory contents can be presented as a single tree structure, it can also be thought of as consisting of two logical namespaces.
Connector Space
The area into which connected directory entries are first imported. This area links each connected namespace with the metadirectory.
Metaverse
That portion of the directory that presents the global view of the union of entries from multiple connected directories.
MMS Client Access
The MMS client access consists of four primary client access methods:
Compass Client
A stand-alone client with the most complete features and most efficient interface of the MMS clients. Can be used to manage the directory.
Active Compass Client
An ActiveX implementation of the Compass client that runs within any browser that supports ActiveX technology. Can be used to manage the directory. This client must be installed to run.
LDAP-Compliant User Agent
E-mail, programs.
Web Access
Windows Explorer, Netscape Navigator.
MMS Security
MMS security is comprised of three key features:
Login and Authentication
There are two kind of logins, anonymous and authenticated logins. Authenticated logins (or named logins), require a password. The password may be a "simple" password or a "strong" password.
Access Controls
Access controls are used to evaluate the level of access to entries in the directory.
MMS Distributed Directory
MMS has two methods to scale the product to your organization. The Distributed Directory is required for the following uses or conditions:
* Distant geographical locations.
* Load balancing and/or redundancy.
* Servers to manage connected directories.
* Other servers to service end users.
* Servers to support programs.
We have two ways to distribute the directory, referrals and replication:
Referrals
Used to set a pointer within the directory to point to another location on a different server. Note that not visible to the user. This is useful when there are space requirements that need to be distributed to other servers but the users still can obtain access one central location.
Who can always reset the permission of an object to allow himself access to the object?
administrators group member for the particular system
adminstrators group member of the domain
What is Group Policy Objects in AD?
A group policy object on Active Directory(AD)
is a object where you can restrict a user or a group to access a folder, Install an application and to deny a user to modify the system.
Provide an example of how one domain of development impacts the other two?
provide an example of how one domain of development impacts the other two.
What is the directory structure for the texts?
A directory structure for a computer hard drive is located in a text file. This will show how the files and programs are organised in a tree structure on that drive.
The Netlogon subkey stores information for the Net Logon service.
The Net Logon service verifies logon requests, and it registers, authenticates, and locates domain controllers. Also, to maintain backward compatibility, Net Logon manages replication of the user account database to back up domain controllers running Windows NT 4.0 and earlier.
For Windows 2000, Net Logon manages replication only when replication involves servers running Windows NT 4.0 and earlier. Net Logon for Windows 2000 does not manage replication between two servers running Windows 2000.
When you perform a default restore of Active Directory it will be of this type?
Non-authoritative restore is the default method for restoring Active Directory.
Non-authoritative restore of SYSVOL
When you non-authoritatively restore the SYSVOL, the local copy of SYSVOL on the restored domain controller is compared with that of its replication partners. After the domain controller restarts, it contacts its replication partners, compares SYSVOL information, and replicate the any necessary changes, bringing it up-to-date with the other domain controllers within the domain.
Perform a non-authoritative restore of SYSVOL if at least one other functioning domain controller exists in the domain. This is the default method for restoring SYSVOL and occurs automatically if you perform a non-authoritative restore of the Active Directory.
If no other functioning domain controller exists in the domain, then perform a primary restore of the SYSVOL. A primary restore builds a new File Replication service (FRS) database by loading the data present under SYSVOL on the local domain controller. This method is the same as a non-authoritative restore, except that the SYSVOL is marked primary.
What is the purpose of the LDAP protocol?
A directory is often described as a database, but it is a specialized database that has characteristics that set it apart from general-purpose relational databases. One special characteristic of directories is that they are accessed (read or searched) much more often than they are updated (written). Hundreds of people might look up an individual's phone number, or thousands of print clients might look up the characteristics of a particular printer, but the phone number or printer characteristics rarely change.
What command line utility can install active directory?
dcpromo.exe command line tool
:source 70-640 windows server 2008 book pg.25
Distinguish between Active Directory Services and Novel Directory Services?
NDS (Novell Directory Services) is a feature in NetWare 4.x that implements a distributed directory service similar to the X.500 specification. Novell has adapted NDS for use on Windows NT and UNIX platforms. A special e-commerce version of NDS is also available. Active Directory combines features of the Internet's DNS locator service and X.500 naming. LDAP is the core access protocol for the service. LDAP will allow Microsoft's Active Directory to work across operating system boundaries and integrate multiple name spaces, thus allowing administrators to manage other vendors' directory services. Differences 1)
Active Directory Based on TCPIP
DNS Server Resource Records ( MX-Record)
LDAP for internal searches, each object has a unique GUID example on following page
All Domain Controllers are native LDAP Servers
Integrates with DNS NDS
Originally based on IPX/SPX
Service Advertising Protocol (SAP) to advertise Services
Implemented in TCPIP with
Service Location Protocol (SLIP) also advertisement based
SLIP does not integrate with DNS proprietary
When implemented together reduces network performance because routers must support RIP that allows for both SLIP and SAP protocols
Not a native LDAP Server - it has a LDAP interface that translates LDAP request to native NDAP protocols
2)Internet Standards Support Active Directory
Native LDAP server
Full namespace integration with DNS
Integrated support for PKI technologies
NDS
LDAP requests are translated
No Namespace Integration with DNS
Limited Integration with PKI
What two tools allow you to begin the Active Directory installation process?
The "Manage your Server" Web Page or typing "dcpromo" on the command line interface
Early warning of DNS service failure?
The issues which comes up if dns is not working
nslookup(forward and reverse) result failure
cannot connect to any machines.
cannot resolve Ip to FQDN and vice versa
What is Windows Live Mesh ActiveX?
ActiveX is used for visuals in diffrent games and windows software.
Live Mesh was Microsoft's old sync application. It's been replaced by SkyDrive.
organizational unit.
What happened schema master fails?
No updates to the Active Directory schema will be possible. Since schema updates are rare (usually done by certain applications and possibly an Administrator adding an attribute to an object), then the malfunction of the server holding the Schema Master role will not pose a critical problem.