Showing posts with label networking. Show all posts
Showing posts with label networking. Show all posts

Sunday, November 3, 2013

NTFS Permission

Q1. Name the three file systems for installation partition?
  • NTFS
  • FAT
  • FAT32
 
Q2. What are the benefits of using NTFS?
  • Better scalability to large drives
  • Active directory to view and control network resources
  • Compression features
  • File encryption
  • Permissions on individual files rather than just folders
  • Remote storage
  • Recovery logging of disk activities
  • Disk qoutas
 
Q3. List the standard NTFS folder permissions?
  • Full control
  • Modify
  • Read and Execute
  • List folder content
  • Read
  • Write
 
Q4. What is Access Control List (ACL) ?
  • ACL is a list of all the user accounts and groups that have been granted or denied access to a file or a folder. When a user attempts to gain access to a resource, the ACL must contain an access control entry for the user account or a group to which the user belongs.
 
Q5. What is effective permission for a resource?
  • Effective permissions for a resource are the sum of the NTFS permissions that you assign to the individual user account and groups to which the user belongs
 
Q6. Do file permissions override folder permissions?
  • Yes, NTFS file permissions take priority over NTFS folder permissions.
 
Q7. If you do not have the permission to access the folder but have the permission on the file, then how will you access the file?
  • You need to know the full path of the file to access it when you do not have a folder level permission.
 
Q8. Does the Deny permission override all permissions?
  • Yes
 
Q9. Explain NTFS permission inheritance?
  • NTFS permissions inheritance implies that the permissions assigned to a parent folder are inherited and propagated to the subfolders and files contained in the parent folder.
 
Q10. How can you prevent permission inheritance?
  • You can prevent permission inheritance by setting an option of preventing inheritance at parent folder level.
 
Q11. Where do permissions assigned to CREATOR OWNER group apply?
  • The permission assigned to the CREATOR OWNER group apply only to the files and the subfolders in the folder to which permissions are assigned and not to the folder itself.
 
Q12. List the basic guidelines to follow while assigning NTFS permisions
  • Grant users only the level of access they require
  • Assign group membership based on access to resources
  • Deny permissions only when it is essential.
 
Q13. If an employee leaves an organization, what should be done to transfer the ownership of his/her files and folders to another employee?
  • Log in as administrator
  • Assign ownership permissions to another employee
  • Notify the employee that he/she has been given special permissions to take ownership of files and folders of the ex-employee
 
Q14. Which special permission enables you to browse through a folder, if you do have permission to access it?
  • Traverse folder permission

Storage Resources (Part 1)

Q1. What is primary and extended partition?
  •  Primary partition is an active partition where the hardware looks for boot files to start the operating system. Extended partition is created from whatever free space remains on the disk after creating the primary partition.
 
Q2. What is Internet SCSI (iSCSI)?
  • iSCSI is an industry standard that enables transmission of Small Computer System Interface (SCSI) block commands over the existing Internet Protocol (IP) network by using the TCP/IP protocol. It provides the possibility of delivering both messaging traffic and block-based storage over existing IP networks, without installing a separate and expensive Fiber Channel Network. 


Q3. What is SCSI?
  • SCSI (Pronounced as scuzzy) is a set of standards for physically connecting and transferring data between peripheral devices and computers.
  •  
Q4. What is Distributed File System or Network File System (DFS/NFS)?
  • DFS/NFS is any file system that allows access to multiple user on multiple machines to share files and storage resources.
 
Q5. What technologies are used in DFS?
  • The two technologies used in DFS are DFS Namespaces and DFS replication.
 
Q6. What is the role of DFS Namespaces?
  • DFS Namespaces enable grouping of shared folders located on different servers into one or more logically structured namespaces.
 
Q7. What is the role of DFS replication?
  • DFS replication keeps the folders synchronized between servers across network connections. It replaces the File Replication Service as the replication engine for DFS Namespaces, as well as for replicating the AD DS SYSVOL folder in domains that use the Windows Server 2008  domain functional level.
 
Q8. What are Shadow Copies for Shared Folders?
  • Shadow Copies for Shared Folders are point-in-time copies of files that are located on shared resources, such as a file server. Users can view shared files and folders as they existed at points of time in the past by using Shadow Copies for Shared Folders.
 
Q9. What is the use of Shadow Copies? 
  • Recovery of files that are accidentally deleted
  • Recovery of accidentally overwritten file
  • Comparing different versions of a file while working

Saturday, November 2, 2013

Managing Client and Server Computers

Q1. What is device driver?
  • Device driver is a software component that provides an interface between the hardware of a computer and its operating system. Hardware, such as keyboards, graphic cards etc, requires device drivers so that the operating system can detect the devices and handle them effectively and efficiently.
Q2. What do you mean by client and server?
  • Client and server are two different machines (physical or virtual) connected in such a manner that whenever a client posts some request to a server, the server provides an appropriate response to the client.
Q3. What are the new networking features in Windows server 2008 R2?
  • Direct Access
  • VPN Reconnect
  • Branchcache
  • URL-based Quality of Service (QoS)
  • Mobile broadband device support
  • Multiple active firewall profiles
  • NDF, Network tracing, and Netsh trace
Q4. What is the role of Direct Access?
  • Direct Access enables users to access an enterprise network without the extra setup of initializing a VPN connection
Q5. What is the role of VPN reconnect?
  • VPN reconnect automatically re-establishes a VPN connection as soon as Internet connectivity is restored, saving users from re-entering their credentials and recreating the VPN connection.
Q6. What is the role of BranchCache?
  • BranchCache enables updated content from file and Web servers on a Wide Area Network(WAN) to be cached on computers at a local branch office, improving application response time and reducing WAN traffic.
Q7. What is the role of URL-based QoS?
  • It enables administrator to assign a priority level to traffic based on the Uniform Resource Locator (URL) from which the traffic originates.
Q8. What is the role of mobile broadband device support?
  • Mobile broadband device provides a driver-based model for devices that are used to access a mobile broadband network
Q9. What is the role of multiple active firewall profiles?
  • It enables the firewall rules most appropriate for each network adapter based on the network to which it is connected.
Q10. What is the role of NDF, Network tracing and Netsh trace?
  • NDF, Network Training and Netsh trace integrate the network Diagnostics Framework with Network Tracing and a new Netsh context, Netsh trace, to simplify and consolidate network connectivity troubleshooting processes.
Q11. What is Netsh?
Netsh is a command-line scripting utility that is used to display or modify the network configuration of a computer that is currently running. Both remote computers and local computers can be configured by using the netsh command. Netsh also provides a scripting feature that allows you to run a group of commands in batch mode against a specified computer 
Q12. What is the role of live migration in Windows 2008 R2?
  • Live migration enables customers to move virtual machines from one host to another with no perceivable downtime. It facilitates hardware maintenance, and upgrades manual failover and the consolidation of workloads on fewer servers.
Q13. What is File Classification Infrastructure (FCI)?
  • FCI provides a built-in solution to classify and manage files to users and help them to save time and money. Administrators can automatically classify files based on content and location, generate reports, and schedule file management tasks to manage data.
Q14. Explain the difference between Windows server 2008 R2 license and Windows server 2008 CAL?
  • The Windows server 2008 CAL grants the right to a device or user to access the server software; whereas, the Windows server 2008 R2 license gives the license holder the right to create, copy, store and run the server software.
 Q15. Is Windows Server 2008 a prerequisite for Windows server 2008 R2?
  • No, Windows server 2008 or Windows server 2003 R2 can be upgraded to Windows server 2008 R2.
 Q16. What is volume licensing?
  • When you acquire licenses from Microsoft and its partners in certain quantities or volumes, they offer discounts from their retail product prices. Volume licensing programs offer companies of all sizes an economical way to buy and manage multiple software licenses for as few as five desktops.
  Q17. What is Software Assurance (SA)?
  • SA is a way for volume licensing customers to keep up to date with the latest and most innovative Microsoft products. Customers acquire the right to install any new release of a product covered in the agreement during the term of coverage.