answersLogoWhite

0

Windows Server 2003

Also known as the Win2K3, Windows Server 2003 is a server OS (operating system) from the American software company Microsoft. This OS has the capability to share printers and files, provide email services, authenticate users, and host message queues.

1,215 Questions

What is difference between host and server?

The terms host and end system can be used interchangeably. Both refer to the systems that sit on the "edge" of the internet and run application programs

What command should you use to query a dns server?

nslookup command is used

C:\>nslookup ?

Usage:

nslookup [-opt ...] # interactive mode using default server

nslookup [-opt ...] - server # interactive mode using 'server'

nslookup [-opt ...] host # just look up 'host' using default server

nslookup [-opt ...] host server # just look up 'host' using 'server'

What are the differences between Windows Server 2003 and Windows Server 2008 R2?

1. windows 2008 support Power shell , windows 2k3 not support powershell

2.Win2k8 has inbuilt IPV6 , win2k3 not

3. IIS 7.0 for windows 2k8 , IIS 6.0 for win2k3

4. Virtualzation support for windows 2008

What happens when your school does not have a DNS server?

A school probably doesn't need its own DNS server unless it has internal servers or printers that the students, faculty, and staff would need to access by name.

DNS converts names into IP addresses (numbers). If you set up access by IP addresses only, you're fine.

You can just your OpenDNS, Google DNS, or your ISP DNS servers for resources (websites) outside of the school.

What is the security boundary within Active Directory?

the Domain is called as the security boundary with in the active directory.

A Windows domain is a logical group of computers running versions of the Microsoft Windows operating system that share a central directory database.

domain governs the way user access resources of the network

Why does DNS run over udp?

DNS runs over UDP because the UDP does not have any delay to establish the connection, which DNS will have finer application level control for faster connection speed in comparison to TCP protocol.

What are the two types of groups that can be created in a Windows active directory domain?

There are two types of groups in Active Directory: distribution groups : You can use distribution groups to create e-mail distribution lists security groups. security groups to assign permissions to shared resources like printers ,scanners ,servers etc.

What is DHCP?

Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the sub net mask and default gateway.

For any further detail, so you can visit this website:http://www.iyogibusiness.com

Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. RFCs 2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF) standard based on Bootstrap Protocol (BOOTP), a protocol with which DHCP shares many implementation details. DHCP allows hosts to obtain necessary TCP/IP configuration information from a DHCP server.

If you want to more further detail so you can visit this website:http://www.iyogibusiness.com DHCP (Dynamic Host Configuration Protocol) is a network protocol that enables a server to automatically assign an IP address to a computer.

How do you close an open dialog box?

You can close a dialog box without making changes to it by clicking the Cancel button or by clicking the Close button.

(D.)

What is the role of dhcp?

Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. RFCs 2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF) standard based on Bootstrap Protocol (BOOTP), a protocol with which DHCP shares many implementation details. DHCP allows hosts to obtain necessary TCP/IP configuration information from a DHCP server.
If you want to more further detail so you can visit this website:http://www.iyogibusiness.com

What are the differences between file server and client server architectures?

file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files. A file server allows users to share information over a network without having to physically transfer files by floppy diskette or some other external storage device. Any computer can be configured to be a host and act as a file server. In its simplest form, a file server may be an ordinary PC that handles requests for files and sends them over the network. In a more sophisticated network, a file server might be a dedicated network-attached storage (NAS) device that also serves as a remote hard disk drive for other computers, allowing anyone on the network to store files on it as if to their own hard drive.

Client/server it is the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request. Although the client/server idea can be used by programs within a single computer, it is a more important idea in a network. In a network, the client/server model provides a convenient way to interconnect programs that are distributed efficiently across different locations. Computer transactions using the client/server model are very common. For example, to check your bank account from your computer, a client program in your computer forwards your request to a server program at the bank. That program may in turn forward the request to its own client program that sends a request to a database server at another bank computer to retrieve your account balance. The balance is returned back to the bank data client, which in turn serves it back to the client in your personal computer, which displays the information for you. Fore More information with help website :http://www.iyogibusiness.com

What is the SDLC process?

The Software Development Lifecycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.

How many DNS root server in the world?

there are many hundreds of root DNS servers around the world . And there are 13 organisation responsible for the management of these servers . In India , there are three root servers located in Mumbai , Delhi and Chennai .

References : -

http://www.iana.org/domains/root/servers

http://www.apnic.net/community/support/root-servers

http://blog.icann.org/2007/11/there-are-not-13-root-servers/

What are the features of Windows Server 2012?

Windows 2000 had new and updated features when it was released. Features of Windows 2000 include administrative tools, accessing Internet, USB support, plug and play, multi-processing, and backup options.

What are the differences between Windows XP and Windows Vista and Windows Server?

Windows Vista Service Pack is being released to manufacturing on Monday 4 Feb and will start being available to customers in March, starting with Microsoft Volume Licensing customers.

Windows Server 2008 is also being released to manufacturing on the same date and will be available to new customers on March 1. Microsoft Volume Licensing customers with active Microsoft Software Assurance coverage or an Enterprise Agreement will be able to download the new Server software toward the end of February as part of the joint Microsoft SQL Server 2008 and Visual Studio 2008 Heroes Happen Here launch event

What are GPOs in windows?

Group Policy gives you administrative control over users and computers in your network. By using Group Policy, you can define the state of a user's work environment once, and then rely on Windows Server 2003 to continually force the Group Policy settings that you apply across an entire organization or to specific groups of users and computers.

Group Policy Advantages

You can assign group policy in domains, sites and organizational units.

All users and computers get reflected by group policy settings in domain, site and organizational unit.

No one in network has rights to change the settings of Group policy; by default only administrator has full privilege to change, so it is very secure.

Policy settings can be removed and can further rewrite the changes.

Where GPO's store Group Policy Information

Group Policy objects store their Group Policy information in two locations:

Group Policy Container: The GPC is an Active Directory object that contains GPO status, version information, WMI filter information, and a list of components that have settings in the GPO. Computers can access the GPC to locate Group Policy templates, and domain controller does not have the most recent version of the GPO, replication occurs to obtain the latest version of the GPO.

Group Policy Template: The GPT is a folder hierarchy in the shared SYSVOL folder on a domain controller. When you create GPO, Windows Server 2003 creates the corresponding GPT which contains all Group Policy settings and information, including administrative templates, security, software installation, scripts, and folder redirection settings. Computers connect to the SYSVOL folder to obtain the settings.

The name of the GPT folder is the Globally Unique Identifier (GUID) of the GPO that you created. It is identical to the GUID that Active Directory uses to identify the GPO in the GPC. The path to the GPT on a domain controller is systemroot\SYSVOL\sysvol.

Managing GPOs

To avoid conflicts in replication, consider the selection of domain controller, especially because the GPO data resides in SYSVOL folder and the Active Directory. Active Directory uses two independent replication techniques to replicate GPO data among all domain controllers in the domain. If two administrator's changes can overwrite those made by other administrator, depends on the replication latency. By default the Group Policy Management console uses the PDC Emulator so that all administrators can work on the same domain controller.

WMI Filter

WMI filters is use to get the current scope of GPOs based on attributes of the user or computer. In this way, you can increase the GPOs filtering capabilities beyond the security group filtering mechanisms that were previously available.

Linking can be done with WMI filter to a GPO. When you apply a GPO to the destination computer, Active Directory evaluates the filter on the destination computer. A WMI filter has few queries that active Directory evaluates in place of WMI repository of the destination computer. If the set of queries is false, Active Directory does not apply the GPO. If set of queries are true, Active Directory applies the GPO. You write the query by using the WMI Query Language (WQL); this language is similar to querying SQL for WMI repository.

Planning a Group Policy Strategy for the Enterprise

When you plan an Active Directory structure, create a plan for GPO inheritance, administration, and deployment that provides the most efficient Group Policy management for your organization.

Also consider how you will implement Group Policy for the organization. Be sure to consider the delegation of authority, separation of administrative duties, central versus decentralized administration, and design flexibility so that your plan will provide for ease of use as well as administration.

Planning GPOs

Create GPOs in way that provides for the simplest and most manageable design -- one in which you can use inheritance and multiple links.

Guidelines for Planning GPOs

Apply GPO settings at the highest level: This way, you take advantage of Group Policy inheritance. Determine what common GPO settings for the largest container are starting with the domain and then link the GPO to this container.

Reduce the number of GPOs: You reduce the number by using multiple links instead of creating multiple identical GPOs. Try to link a GPO to the broadest container possible level to avoid creating multiple links of the same GPO at a deeper level.

Create specialized GPOs: Use these GPOs to apply unique settings when necessary. GPOs at a higher level will not apply the settings in these specialized GPOs.

Disable computer or use configuration settings: When you create a GPO to contain settings for only one of the two levels-user and computer-disable the logon and prevents accidental GPO settings from being applied to the other area.

Disadvantages of multi user operating system?

Two Operating systems take up hard drive space.

More importantly, they need to work separately, so you will need to partition your hard drive. This can be tedious and difficult to undo.

Booting will take longer.

What is a container object in active directory?

A container object is one that can other objects housed within it. These can be additional container objects or leaf objects.

What are the features of Active Directory Services?


Windows Server 2012 R2

Protected Users Security Group

Authentication Policy and Authentication Policy Silos

Windows Server 2012

Virtualization safeguards and Virtualized domain controller cloning

Improved upgrade preparation and installation

Dynamic Access Control

DirectAccess Offline Domain Join

AD FS built in as a server role

Windows PowerShell History Viewer

Fine-grained password Policy UI

Active Directory Recycle Bin UI

Active Directory Replication and Topology Windows PowerShell cmdlets

Active Directory-based Activation

Group Managed Service Accounts

RID Improvements

Deferred Index Creation

Kerberos enhancements

Windows Server 2008 R2

Active Directory Recycle Bin (requires Windows Server 2008 R2 forest functional level)

Active Directory module for Windows PowerShell and Windows PowerShell cmdlets

Active Directory Best Practices Analyzer

Active Directory Web Services

Active Directory Administrative Center

Authentication mechanism assurance

Offline domain join

Managed Service Accounts

New logic for bridgehead server selection

Windows Server 2008

Auditing Improvements

Fine-grained password policies (requires Windows Server 2008 domain functional level)

Read-only domain controllers (requires Windows Server 2003 functional level)

Restartable Active Directory

AD database mounting tool

UI improvements

Owner rights

DFSR replication of SYSVOL (requires Windows Server 2008 domain functional level)

DSRM password sync

Active Directory Application Mode (ADAM) rebranded as Active Directory Lightweight Directory Service (AD LDS) and included in Windows Server 2008 as a server role.

Windows Server 2003

Multiple selection of user objects

Drag and drop functionality

Efficient search capabilities

Saved queries

New Active Directory command-line tools, such as adprep.exe

InetOrgPerson class

Application directory partitions

Ability to add additional domain controllers by using backup media

Universal group membership caching

Secure Lightweight Directory Access Protocol (LDAP) traffic

Partial synchronization of the global catalog

Active Directory quotas

How do you log into a domain?

join the PC in a domain and restart , you will need domain admin rights to do so

What are the advantages and disadvantages of personal savings?

•Advantage: unlimited, the more you save the more you have to spend

•Advantage: You have full control of your personal savings and you decide what to do with it.

•Advantage: no interest

•Disadvantage: it takes time to save up money

• disadvantage: temptation to spend some of your savings is never too far away.

What is a web server?

Page 256 Lesson 7, sixth paragraph down.

The primary function of the Web Server is to send and receive text-based messages containing requests and replies.

Trending Questions
What is the recommended method for moving active directory objects from one domain to another? Which file system in Windows server 2003 allows folders to be shared? What is the differences between a PC and a server UPS? Which Windows Server 2008 features enables you to perform certain Active Directory maintenance functions without needing to reboot the domain controller? How does a WiFi vnc server can be accessed from a vnc viewer where the ip of the vnc server is dynamic? What is the difference between LDAP and Active Directory? What type of server provides a minimal environment with no windows explorer shell and no start button? What is GCs and Universal Groups? What happens if primary domain controller fails? What are the advantages and disadvantages of personal savings? When you create a standard user which group is the user added to? What is directory schema? Which sharing method does not allow you to pick the folder that is being shared? Is the SAM located on the domain controller? When assigning rights and permissions which tab normally shows the permissions granted to a group in a particular field? Where is the coolant temperature sensor on a 2001 Ford Focus? Where could one find information on windows server monitoring? Difference between active site and binding site? You want to set up remote installation procedure but do not want the user to gain access over it What do you do? Under what circumstances would a user be better of using a time-sharing system rather than a PC or single-user workstation?