Skip to main content

System-Administrator-interview-questions-and-answers-part3

Q21. What is Operation Master Role?
A. Operation Master Role is available on Domain Controller in the Network. There are five types of operation master roles:-
1. Schema master
2. Domain Naming Master
3. RID Master
4. PDC Emulator
5. Infrastructure Master

Q22. Difference between Mixed Mode and Native Mode?
A. There are two types of domain mode:
1. Mixed Mode: In this mode NT, win 2000 and win 2003 D.C. are available.
2. Native Mode: there are two types of native mode.
    i. Win 2000 Native Mode: In this mode win 2000 and win 2003 DC are available.
    ii. Win 2003 Native mode: in this mode only win 2003 DC are available.

Q23. What is SCSI?
A. SCSI stands for Small Computer System Interface. In SCSI the rate of data transmission is fast. SCSI Hard Disk Speed R.P.M. is fast in SCSI Data Transmission speed is 320 MBPS in the Network. In SCSI Controller We can connect Maximum 15 Physical Devices in the System.

Q24. What are A-Host Record and PTR Record?
A. A record is also called host record. This record is basically created in forward lookup Zone PTR record is also called a Pointer record. This record is basically created in reverse lookup Zone


Q25. What is reservation?
A. Reservation is basically used in DHCP Server. When Ever we want this computer is always received this IP address from DHCP Server in the network, in the network, in that case we create a reservation in DHCP Server of that particular computer in the network.

Q26. IP Address Range/Classes?
A. There are two types of IP address:-
1. Class Full IP Address
2. Class Less IP Address
Class Full IP Address – There are five classes:
    1. Class A - 0 - 126(127 is reserved for Loop back)
    2. Class B - 128 – 191
    3. Class C - 192 – 223
    4. Class D - 224 - 239
    5. Class E - 240 - 255

Q27. Difference between Hardware Router & Software Router?
A. Hardware Router: Hardware Router is a dedicated Router. It’s having a lot of feature such as Security, dedicated routing in the networking. As for Example Cisco Router.
Software Router: Software Router is not a dedicated router. It provides the different services also such as DNS Server, DHCP Server i.e. Windows Based Router.

Q28. Difference between Hardware Firewall and Software Firewall?
A. Hardware Firewall: It is a dedicated firewall. A lots of security features are available on hardware based firewall. As for Example- Cisco Pix Firewall.
Software Firewall: It is a dedicated firewall. It provides the normal security in the network- Check Point.

Q29. What is Domain Controller?
A. D.C. stands for Domain Controller. It provides the centralized management of entire domain in the network. When ever we will install active directory database on a server side operating system, then after that system becomes a D.C. Domain controller manages all security related interaction between users and computers in the network.

Q30. What is B Router?
A. B Router stands for Bridge Router. We can say this is a layer three bridge that provides the communication between two or
more different network ID.

Previous Part           Next Part

Thanks Suryavanshi Thakur for your contribution.

Comments

Popular posts from this blog

INSTALL CISCO VPN CLIENT ON WINDOWS 10 (32 & 64 BIT). FIX REASON 442

This article shows how correctly install Cisco VPN Client (32 & 64 bit) on Windows 10 (32 & 64 bit) using simple steps, overcome the ‘ This app can’t run on this PC ’ installation error , plus fix the Reason 442: Failed to enable Virtual Adapter error message . The article applies to New Windows 10 installations or Upgrades from earlier Windows versions and all versions before or after Windows 10 build 1511 .  To simplify the article, we’ve broken it into the following two sections: How to Install Cisco VPN client on Windows 10 (clean installation or upgrade from previous Windows), including Windows 10 build prior or after build 1511 . How to Fix Reason 442: Failed to enable Virtual Adapter on Windows 10 Figure 1. The Cisco VPN Client Reason 442: Failed to enable Virtual Adapter error on Windows 10 HOW TO INSTALL CISCO VPN CLIENT ON WINDOWS 10 (NEW INSTALLATIONS OR O/S UPGRADES) The instructions below are for new or clean Windows 10 inst...

Linux File and Directory Permissions

file & directory protection is a essential of any OS and Linux OS is no exception for it! These authorizations allow you to choose exactly who can access your files & directory, providing an overall improved system security. There was one of the major flaws in the older Windows operating-system where, by standard, all users can see each other people's information (Windows 95, 98, Me). For overcoming it, editions of the Windows based computer system such as NT, 2000, XP and 2003 lot more security features added. They fully support file & directory permissions, just as Linux system has since the beginning. Together, we'll now assess a directory listing from our Lab Linux system hosting server, to help us understand the information provided. a simple 'ls' command will give you the file and directory listing within a given directory, including the option  '-l' will display number of new areas that we are going to discuss here:

How to create a Hirens Boot CD 15.2 USB Disk

Hiren’s BootCD (HBCD) is a bootable CD that contains a set of tools that can help users to fix their computer if their system fails to boot. More specifically, HBCD contains hardware diagnostic programs, partition tools, data recovery utilities, antivirus tools and many other tools to fix your computer problems.  I write this article because I use Hiren’s BootCD frequently to troubleshoot computer problems, specially when a computer doesn’t boot anymore due to a virus attack or due to a corrupted file system. In this article you will find instructions on how to put Hiren’s BootCD on a USB flash drive (stick) in order to troubleshoot computer problems in the future.