Escolar Documentos
Profissional Documentos
Cultura Documentos
What are the most typical functional units of the Client/Server applications?
User interface
Business Logic and
Shared data.
Ubiquitous communications
Network OS extension
Binary large objects (BLOBs)
Global directories and Network yellow pages
Authentication and Authorization services
System management
Network time
Database and transaction services
Internet services
Object- oriented services
What is a TP Monitor?
There is no commonly accepted definition for a TP monitor. According to Jeri Edwards' a
TP Monitor is "an OS for transaction processing".
TP Monitor does mainly two things extremely well. They are Process management
and Transaction management.?
They were originally introduced to run classes of applications that could service hundreds
and sometimes thousands of clients. TP Monitors provide an OS - on top of existing OS -
that connects in real time these thousands of humans with a pool of shared server
processes.
The middleware buliding block runs on both the client and server sides of an
application. It is broken into three categories:-
Transport stack
Network OS
Service-specific middleware.
GUI clients
OOUI clients
What are called Non-GUI clients, GUI Clients and OOUI Clients?
Non-GUI Client: These are applications, generate server requests with a minimal amount
of human interaction.
GUI Clients: These are applicatoins, where occassional requests to the server result from
a human interacting with a GUI
(Example: Windows 3.x, NT 3.5)
OOUI clients : These are applications, which are highly-iconic, object-oriented user
interface that provides seamless access to information in very visual formats.
(Example: MAC OS, Windows 95, NT 4.0)
What is OLTP?
In the transaction server, the client component usually includes GUI and the server
components usually consists of SQL transactions against a database. These applications
are called OLTP (Online Transaction Processing) OLTP Applications typically,
Receive a fixed set of inputs from remote clients. Perform multiple pre-compiled SQL
comments against a local database. Commit the work and Return a fixed set of results.
What are the five major technologies that can be used to create Client/Server
applications?
Database Servers
TP Monitors
Groupware
Distributed Objects
Intranets.
What is Client/Server?
Clients and Servers are separate logical entities that work together over a network to
accomplish a task. Many systems with very different architectures that are connected
together are also called Client/Server.
List out the benefits obtained by using the Client/Server oriented TP Monitors?
Client/Server applications development framework.
Firewalls of protection.
High availability.
Load balancing.
MOM integration.
Scalability of functions.
Reduced system cost.
What is region?
When hierarchical routing is used, the routers are divided into what we call regions, with
each router knowing all the details about how to route packets to destinations within its
own region, but knowing nothing about the internal structure of other regions.
What is the difference between TFTP and FTP application layer protocols?
The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a
remote host but does not provide reliability or security. It uses the fundamental packet
delivery services offered by UDP.
The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for
copying a file from one host to another. It uses the services offered by TCP and so is
reliable and secure. It establishes two connections (virtual circuits) between the hosts, one
for data transfer and another for control information.
What are the advantages and disadvantages of the three types of routing tables?
The three types of routing tables are fixed, dynamic, and fixed central. The fixed table
must be manually modified every time there is a change. A dynamic table changes its
information based on network traffic, reducing the amount of manual maintenance. A
fixed central table lets a manager modify only one table, which is then read by other
devices. The fixed central table reduces the need to update each machine's table, as with
the fixed table. Usually a dynamic table causes the fewest problems for a network
administrator, although the table's contents can change without the administrator being
aware of the change.
What is Beaconing?
The process that allows a network to self-repair networks problems. The stations on the
network notify the other stations on the ring when they are not receiving the
transmissions. Beaconing is used in Token ring and FDDI networks.
What is the minimum and maximum length of the header in the TCP segment and
IP datagram?
The header should have a minimum length of 20 bytes and can have a maximum length
of 60 bytes.
What are the data units at different layers of the TCP / IP protocol suite?
The data unit created at the application layer is called a message, at the transport layer the
data unit created is called either a segment or an user datagram, at the network layer the
data unit created is called the datagram, at the data link layer the datagram is
encapsulated in to a frame and finally transmitted as signals along the transmission
media.
Guided Media:
These are those that provide a conduit from one device to another that include twisted-
pair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is
directed and is contained by the physical limits of the medium. Twisted-pair and coaxial
cable use metallic that accept and transport signals in the form of electrical current.
Optical fiber is a glass or plastic cable that accepts and transports signals in the form of
light.
Unguided Media:
This is the wireless media that transport electromagnetic waves without using a physical
conductor. Signals are broadcast either through air. This is done through radio
communication, satellite communication and cellular telephony.
Peer-to-peer network, computers can act as both servers sharing resources and as clients
using the resources.
Server-based networks provide centralized control of network resources and rely on
server computers to provide security and network administration.
What is SAP?
Series of interface points that allow other computers to communicate with the other
layers of network protocol stack.
What is REX?
Request to Exit (REX) - A signal that informs the controller that someone has requested
to exit from a secure area.
What is redirector?
Redirector is software that intercepts file or prints I/O requests and translates them into
network requests. This comes under presentation layer.
What is Kerberos?
It is an authentication service developed at the Massachusetts Institute of Technology.
Kerberos uses encryption to prevent intruders from discovering passwords and gaining
unauthorized access to files.
What is MAU?
In token Ring , hub is called Multistation Access Unit(MAU).
What is ICMP?
ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite
used by hosts and gateways to send notification of datagram problems back to the sender.
It uses the echo test / reply to test whether a destination is reachable and responding. It
also handles both control and error messages.
What is Brouter?
Hybrid devices that combine the features of both bridges and routers.
What is frame relay, in which layer it comes?
Frame relay is a packet switching technology. It will operate in the data link layer.
What is Bandwidth?
Every line has an upper limit and a lower limit on the frequency of signals it can carry.
This limited range is called the bandwidth.
What is the difference between an unspecified passive open and a fully specified
passive open?
An unspecified passive open has the server waiting for a connection request from a client.
A fully specified passive open has the server waiting for a connection from a specific
client.
What is RAID?
A method for providing fault tolerance by using multiple hard disk drives.
What is cladding?
A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.
What is subnet?
A generic term for section of a large networks usually separated by a bridge or router.
A gateway operates at the upper levels of the OSI model and translates information
between two completely different network architectures or data formats.
What is ARP?
A subnetwork, or subnet, is a logically visible, distinctly addressed part of a single
Internet Protocol network.[1][2] The process of subnetting is the division of a computer
network into groups of computers that have a common, designated IP address routing
prefix
What is a subnet?
A subnet (short for "subnetwork") is an identifiably separate part of an organization's
network. Typically, a subnet may represent all the machines at one geographic location,
in one building, or on the same local area network (LAN). Having an organization's
network divided into subnets allows it to be connected to the Internet with a single shared
network address. Without subnets, an organization could get multiple connections to the
Internet, one for each of its physically separate subnetworks, but this would require an
unnecessary use of the limited number of network numbers the Internet has to assign. It
would also require that Internet routing tables on gateways outside the organization
would need to know about and have to manage routing that could and should be handled
within an organization.
What is APIPA?
Short for Automatic Private IP Addressing, a feature of later Windows operating
systems. With APIPA, DHCP clients can automatically self-configure an IP address and
subnet mask when a DHCP server isn't available. When a DHCP client boots up, it first
looks for a DHCP server in order to obtain an IP address and subnet mask. If the client is
unable to find the information, it uses APIPA to automatically configure itself with an IP
address from a range that has been reserved especially for Microsoft. The IP address
range is 169.254.0.1 through 169.254.255.254. The client also configures itself with a
default class B subnet mask of 255.255.0.0. A client uses the self-configured IP address
until a DHCP server becomes available.
The APIPA service also checks regularly for the presence of a DHCP server (every five
minutes, according to Microsoft). If it detects a DHCP server on the network, APIPA
stops, and the DHCP server replaces the APIPA networking addresses with dynamically
assigned addresses.
APIPA is meant for nonrouted small business environments, usually less than 25 clients.
Source: http://www.webopedia.com/TERM/A/APIPA.html
What is an RFC?
A Request For Comments (RFC) document defines a protocol or policy used on the
Internet. An RFC can be submitted by anyone. Eventually, if it gains enough interest, it
may evolve into an Internet Standard ( see FAQ XXX). Each RFC is designated by an
RFC number. Once published, an RFC never changes. Modifications to an original RFC
are assigned a new RFC number.
What is CIDR?
Classless Inter-Domain Routing (CIDR) is a methodology of allocating IP addresses and
routing Internet Protocol packets.
You have the following Network ID: 192.115.103.64/27. What is the IP range for your
network?
It ranges from 192.115.103.64 - 192.115.103.96
But the usable address are from 192.115.103.64 -192.115.103.94
192.115.103.95 - it is the broadcast address
192.115.103.96 - will be the ip address of next range
we can use 30 hostes in this network
You have the following Network ID: 131.112.0.0. You need at least 500 hosts per
network. How many networks can you create? What subnet mask will you use?
subnetmask is 255.255.252.0, we can create 4 subnet and atleast we can connect 500host
per network
You need to view at network traffic. What will you use? Name a few tools
How do I know the path that a packet takes to the destination?
What does the ping 192.168.0.1 -l 1000 -n 100 command do?
What is DHCP? What are the benefits and drawbacks of using it?
Describe the steps taken by the client and DHCP server in order to obtain an IP address.
What is the DHCPNACK and when do I get one? Name 2 scenarios.
What ports are used by DHCP and the DHCP clients?
Describe the process of installing a DHCP server in an AD infrastructure.
What is DHCPINFORM?
DHCPInform is a DHCP message used by DHCP clients to obtain DHCP options. While
PPP remote access clients do not use DHCP to obtain IP addresses for the remote access
connection, Windows 2000 and Windows 98 remote access clients use the DHCPInform
message to obtain DNS server IP addresses, WINS server IP addresses, and a DNS
domain name. The DHCPInform message is sent after the IPCP negotiation is concluded.
The DHCPInform message received by the remote access server is then forwarded to a
DHCP server. The remote access server forwards DHCPInform messages only if it has
been configured with the DHCP Relay Agent.
Describe the integration between DHCP and DNS.
What options in DHCP do you regularly use for an MS network?
What are User Classes and Vendor Classes in DHCP?
How do I configure a client machine to use a specific User Class?
What is the BOOTP protocol used for, where might you find it in Windows network
infrastructure?
DNS zones � describe the differences between the 4 types.
DNS record types � describe the most important ones.
Describe the process of working with an external domain name
Describe the importance of DNS to AD.
Describe a few methods of finding an MX record for a remote domain on the Internet.
What does "Disable Recursion" in DNS mean?
What could cause the Forwarders and Root Hints to be grayed out?
What is a "Single Label domain name" and what sort of issues can it cause?
What is the "in-addr.arpa" zone used for?
What are the requirements from DNS to support AD?
How do you manually create SRV records in DNS?
Name 3 benefits of using AD-integrated zones.
What are the benefits of using Windows 2003 DNS when using AD-integrated zones?
You installed a new AD domain and the new (and first) DC has not registered its SRV
records in DNS. Name a few possible causes.
What are the benefits and scenarios of using Stub zones?
What are the benefits and scenarios of using Conditional Forwarding?
What are the differences between Windows Clustering, Network Load Balancing and
Round Robin, and scenarios for each use?
How do I work with the Host name cache on a client computer?
How do I clear the DNS cache on the DNS server?
What is the 224.0.1.24 address used for?
What is WINS and when do we use it?
Can you have a Microsoft-based network without any WINS server on it? What are the
"considerations" regarding not using WINS?
Describe the differences between WINS push and pull replications.
What is the difference between tombstoning a WINS record and simply deleting it?
Name the NetBIOS names you might expect from a Windows 2003 DC that is registered
in WINS.
Describe the role of the routing table on a host and on a router.
What are routing protocols? Why do we need them? Name a few.
What are router interfaces? What types can they be?
In Windows 2003 routing, what are the interface filters?
What is NAT?
What is the real difference between NAT and PAT?
How do you configure NAT on Windows 2003?
How do you allow inbound traffic for specific hosts on Windows 2003 NAT?
What is VPN? What types of VPN does Windows 2000 and beyond work with natively?
What is IAS? In what scenarios do we use it?
What's the difference between Mixed mode and Native mode in AD when dealing with
RRAS?
What is the "RAS and IAS" group in AD?
What are Conditions and Profile in RRAS Policies?
What types or authentication can a Windows 2003 based RRAS work with?
How does SSL work?
How does IPSec work?
How do I deploy IPSec for a large number of computers?
What types of authentication can IPSec use?
What is PFS (Perfect Forward Secrecy) in IPSec?
How do I monitor IPSec?
Looking at IPSec-encrypted traffic with a sniffer. What packet types do I see?
What can you do with NETSH?
How do I look at the open ports on my machine?
Can you connect Active Directory to other 3rd-party Directory Services? Name a
few options.
Yes you can connect other vendors.
Examples: E-directory from Novell
Where is the AD database held? What other files are related to AD?
AD Database is saved in %systemroot%/ntds.You can see other files also in this folder.
These are the main files controlling the AD structure
ntds.dit
edb.log
res1.log
res2.log
edb.chk
How to share AD folders
What can you do to promote a server to DC if you're in a remote location with slow
WAN link?
you will create a copy of the system state from an existing DC and copy it to the new
remote server. Run "Dcpromo /adv". You will be prompted for the location of the system
state files
How can you forcibly remove AD from a server, and what do you do later? � Can I
get user passwords from the AD database?
See Answer Here
What tool would I use to try to grab security related packets from the wire?
Name some OU design considerations.
What is tombstone lifetime attribute?
What do you do to install a new Windows 2003 DC in a Windows 2000 AD?
What do you do to install a new Windows 2003 R2 DC in a Windows 2003 AD?
How would you find all users that have not logged on since last month?
What are the DS* commands?
What's the difference between LDIFDE and CSVDE? Usage considerations?
What are the FSMO roles? Who has them by default? What happens when each one
fails?
What FSMO placement considerations do you know of?
I want to look at the RID allocation table for a DC. What do I do?
What's the difference between transferring a FSMO role and seizing one? Which one
should you NOT seize? Why?
How do you configure a "stand-by operation master" for any of the roles?
How do you backup AD?
How do you restore AD?