Windows Admin Flashcards
What is group policy?
Network administrators can use group policy to control the working environment of users and computer accounts in an active directory. It provides a central place for administrators to manage and configure operating systems, applications, and user settings. Using it properly enables you to increase the security of users’ computers and help defend against insider and external threats.
Why is it said that we should restore a dc that was backed up 9 months ago?
We can face problems due to lingering objects because, when restoring a backup file, the active directory generally requires that the backup file should not be more than 180 days old.
Can you tell us about your experience with hardware Components?
A system administrator or system admin should be able to do installation and replacement operations with hardware. Sometimes, there can be a need to rebuild the hardware component.
What do forest, trees, and domain mean?
A domain is a logical group of network objects like computers, users, and devices with the same active directory database. A tree is a collection of domains within a Microsoft active directory network in which each domain has exactly one parent, leading to a hierarchical tree structure. A forest is a group of active directory trees.
What do you know about WINS servers?
WINS stands for Windows Internet Name Service. This will allow the users to access resources by a computer name rather than an IP address. It is an operating system that uses a centralized computer that will provide specific functions and predetermined rules for the users and the computers connected to a Network. For example, if you want your computer to keep track of the names and IP addresses of other computers in your network.
What, according to you, could be the personal characteristics of a person administering a system?
System administrators face a variety of challenges. They are the problem solvers and coordinators. They understand a computer’s software, hardware, and networks in-depth. Thus, they can instruct employees regarding technical issues. Their primary task is to monitor the system. They are able to keep track of the server performance and creative designs for computer systems and quickly arrange for replacement in case of any hardware failure.
What is a lingering object? What is the command that we use to remove lingering objects? Why is it important to remove the lingering objects?
The lingering object is a deleted active directory that remains on the restored domain controller in its local copy of the active directory. When an object is deleted from the active directory, a Tombstone (which is temporary) is created, which then has to be replicated by the domain controller before it expires, i.e., they seem to occur when some changes are made to the directories after the system backups are created.
When we restore a backup file, the AD (ACTIVE DIRECTORY) generally requires that the backup should not be more than 180 days old. This may happen if, after the backup was done, the object was deleted on another DC more than 180 days ago. In such cases, if we want to remove the lingering object, we use windows server 2003 and windows server 2008 as they can manually remove the lingering objects using the console utility command REPADMIN.EXE. It is necessary to remove the lingering object as it puts an extra burden on the system’s RAM and can create the problems like limited space availability.
Can you differentiate between firewall and antivirus?
Antivirus: We use antivirus to protect the system from computer viruses. When using your system, it actively monitors for any virus threats from different sources. If it finds any virus threats, it tries to clean or quarantine the virus and keeps your system and data safe.
Firewall: On the flip side, a firewall protects your system from outside/intruder/hacker attacks. Sometimes hackers may take control of your system remotely and steal your vital information or the data from the system. It happens mostly in cases when your system is connected directly to the internet or an extensive network. In that case, you should install a firewall on your pc to protect yourself from unauthorized access. It is either available in software or hardware form. If you have a single PC, the software firewall can do the work, but when you want to protect a large corporation, you have to install a hardware firewall to protect their system from such attacks.
According to you, why backing up an active directory is important, and how can you back up an active directory?
To maintain the proper health of the AD database, the backup of an active directory is important.
Windows Server 2003: In this, you can backup the active directory using the NTBACKUP tool that is inbuilt with windows server 2003, or we can also use any 3rd party tool that will support this feature.
Windows server 2008: There is no option to back up the system state data through the normal backup utility. Here we need to use the command line to backup the active directory.
Step 1 – Open the command prompt by clicking on start, typing “cmd,” and then hitting the enter button.
Step 2 – In the command prompt, type “wbadmin start systemstatebackup – backuptarget;e:” and then press the enter button.
Step 3 – Input “y” and press the enter button to start the backup process.
When the backup is finished, you will get a message that the backup is completed if it has not been completed properly, you need to troubleshoot.
What is a domain controller?
A domain controller (DC ) is a windows-based computer system that is used for storing user account data in a central database. The system administrator allows or denies users access to system resources, such as printers, documents, folders, network locations, etc.
According to you, what is the difference between FAT and NTFS?
FAT:
There is no security when the user logs in locally.
It usually supports file names with only 8 characters and does not support file compression.
The partition and file size can be up to 4 GB, and there is no such security permission for file and folder levels.
It doesn’t support bad cluster mapping, so it is not very reliable.
NTFS:
There is security for both the local and the remote users.
It usually supports file names that have 255 characters.
It supports file compression, and the partition size can be up to 16 exabytes.
There is security for file and folder levels.
It supports bad cluster mapping and transaction logging and is highly reliable.
Can you tell me what is loopback address and in what sense is it useful?
It is an address that sends outgoing signals back to the same computer for testing purposes. It is managed entirely within the operating system so the client and the server process on a single system and can communicate. It is not physically connected to a network. It is useful because the loopback provides IT professionals with an interface to test the IP software without worrying about broken or corrupted drives or hardware.
What do you know about proxy servers?
It acts as the gateway between a local network (e.g., computers in a company) and a large-scale network (for ex: the internet). By using this server, there is an increase in performance and security as it can be used to prevent employees from browsing inappropriate and distracting sites.
Can you tell us about the windows registry?
It is often referred to as “the registry.” In the Microsoft Windows operating system, it is the collection of databases of configuration settings (low-level settings). It stores important information like the location of programs, files, etc. If you don’t understand what you are doing, you should not edit the Windows registry, or it will cause problems with the installed applications or the operating system.
What is the Sysvol Folder?
We can say that it is a type of shared folder that stores group policy information, or we can say that it contains public files of the domain controllers, and the domain users can access it. Its significant feature is that it is used to deliver policy and login scripts to the domain members.