Thursday, October 10, 2013

What IS SMTP?

SMTP :- (Simple Mail Transfer Protocol)
SMTP comes under transport layer. It provides the foundation services for e-mail transfer across the internet. SMTP makes sure that e-mail message are delivered from the sender server to the addressee server it is used to sent text based information(E-mail) 
PORT NO:- 25

How Many Partition Can Create In 1 Hard Disk?

In 1 HDD, 23 partitions can create: - 26 alphabets, A & B for floppy drive, D goes for CD Drive
26-3 = 23 Partitions

Differences between SATA & PATA?

SATA


* It is a 5 pin connector

* At a one time, in one sata cable, we can connect only 1 device
* HDD speed is 3200rpm to 5200rpm
* The data moves in parallely

PATA


*It is a 40 pin connector

*At a one time, in one pata cable, we can connects 2 devices
*HDD is till 15200rpm
*the data moves in serially

Types of Backup. Differences between Differential & Incremental Backup?

*Full Backup: - In this backup we are talking all the files & folders on the system.

*Differential Backup: - it’s a cumulative backup of changed made since the last full backup it backup the only modified file but does not update the achieve attribute.

*Incremental Backup: - it takes the modified file since the last backup users need to update the
achieve attribute while backup only modified files.

Monday, October 7, 2013

Differences between PST & OST?

PST :
* PST is a personal folders we create PST For moving mails from mailbox to local Computer.

* PST Files is Simply a Storage Location on Your HDD or Server than the Exchange Server.

OST :
* OST created when the outlook is offline

* OST Files Starts as a mirror image of your Folders on your Exchange Server and works In conjunction with Exchange Server During Synchronization.

Sunday, October 6, 2013

Is Visual Upgrade available in SharePoint 2013?

No.

What does document parsing functionality do?

Document parsers extract useful metadata and remove redundant information.

How can you specify which entities to look for in the content in relation to SharePoint search?

Create and deploy your own dictionaries.

How can you remove items from the search index?

Using the crawl logs.

What is a Continuous crawl?

Eliminates the need to schedule incremental crawls and automatically starts crawls as necessary to keep the search index fresh.

What are Result sources?

Result source allow you to restrict queries to a subset of content by using a query transform.

What actions can a query rule specify?


  • Add one or more result blocks.
  • Change ranked results.
  • Add Promoted Results (formerly called Best Bets) that appear above ranked results.

What is a ranking model in SharePoint 2013 search?

A ranking model determines recall (which items are displayed in the search results) and rank (the order in which search results are displayed).

What is a ranking model in SharePoint 2013 search?

A ranking model determines recall (which items are displayed in the search results) and rank (the order in which search results are displayed).

What does the Workflow Manager do?

High Density and Multi-Tenancy, Elastic Scale, Activity / Workflow Artifact Management, Tracking and Monitoring, Instance Management, Fully Declarative Authoring, REST and Service Bus Messaging, Managed Service Reliability.

What is the Analytics Processing Component?

Runs different analytics jobs to analyze content in the search index and user actions that were performed on a site to identify items that users perceive as more relevant than others.

What are Refiners and faceted navigation?

Refiners are based on managed properties from the search index. With faceted navigation you can configure different refiners for different terms in a term set.

What is the Content Search Web Part?

Displays content that was crawled and added to the search index.

What are Category pages?

Category pages are page layouts that are used for displaying structured content such as catalog data.

What is Managed navigation?

Managed navigation lets you define and maintain the navigation on a site by using term sets.

What is Cross-site publishing?

Cross-site publishing lets you store and maintain content in one or more authoring site collections, and display this content in one or more publishing site collections.

How are multilingual sites implemented?

Variations, integrated translation service, cross-site publishing

What are Image renditions?

Image renditions let you display different sized versions of an image on different pages.

What is the primary change with MySite document libraries in 2013?

Users can specify permissions for a specific document without having to understand the inheritance model.

What are Community Sites in SharePoint 2013?

Community Sites offer a forum experience to categorize and cultivate discussions with a broad group of people across organizations in a company.

What is the Analysis Services Effective User?

Eliminates the need for Kerberos delegation when per-user authentication is used for Analysis Services data sources. By supporting Analysis Services Effective User feature, authorization checks will be based on the user specified by the EffectiveUserName property instead of using the currently authenticated user.

Can PerformancePoint be displayed on iPads?

Yes.

What does the Power View Add-in for Excel do?

Power View (“Crescent”) enables users to visualize and interact with modeled data by using highly interactive visualizations, animations and smart querying.

What is the In-Memory BI Engine (IMBI)?

The In Memory multidimensional data analysis engine (IMBI), also known as the Vertipaq engine, allows for almost instant analysis.

What are some improvements in Excel Services in SharePoint 2013?

          1.     Field list and field well support
          2.     Calculated measures and members
          3.     Enhanced timeline controls
          4.     Application BI Servers
   5.     Business Intelligence Center update

What does a retention policy contain?

Generally what causes a project to be closed and when a project should expire.

What is Site-based retention?

You can create and manage retention policies in that will apply to SharePoint sites and any Exchange Server 2013 team mailboxes that are associated with the sites.

What field type would be used when working location specific SharePoint applications?

Geolocation field type.

What is the Microsoft Push Notification Service?

Supports applications on mobile devices that should receive notifications from a SharePoint site.

What are the different types of mobile views offered in SharePoint 2013?


  1. Contemporary view
  2. Classic view
  3. Full screen UI

In terms of enterprise-wide eDiscovery, what actions can be taken by an authorized user?


  1. Create a case, define a query, and then search SharePoint Server 2013, Exchange Server 2013, and file shares.
  2. Export all of the content that was identified.
  3. Preserve items in place in SharePoint Server 2013 or Exchange Server 2013.
  4. Track statistics related to the case.

What the content can be included with SharePoint eDiscovery export?


  1. Document
  2. Lists
  3. Pages
  4. Exchange objects

What is an in-place hold?

Content that is put on hold is preserved, but users can still change it.

What are some examples of some things you can related to an eDiscovery case?


  1. Sources
  2. eDiscovery sets
  3. Queries
  4. Exports

What is eDiscovery in the context of SharePoint 2013?

Introduces a new site for managing discovery cases and holds. The site allows one to access discovery cases to conduct searches, place content on hold, and export content.

How are BDC models and apps for SharePoint related?

BDC models can be scoped to apps for SharePoint and connection information is defined and stored separately from the app-scoped BDC model in BDC connections.

What is the primary benefit of using apps for SharePoint?

Each app for SharePoint is isolated from the rest of the system.

What are apps for SharePoint?

Apps for SharePoint allow addition of functionality to a SharePoint site by using the self-contained app for SharePoint.

With an event listener, what are the supported connections for an external system?

  1. OData
  2. SQL
  3. WCF

How is an event listener useful?

Enables SharePoint users and custom code to receive notifications of events that occur in an external system.

What Is An Event Listener in SharePoint 2013?

The event listener includes an event subscriber. The subscriber receives notifications from the event publisher (on the external system side) on changes to the data and then initiates predefined actions when changes occur.

How is the BDC model used after being built?

Imported into the Business Data Catalog as a farm-scoped external content type, or be included in an app for SharePoint.

How is the BDC model in SharePoint 2013 more streamlined than in SharePoint 2010?

Visual Studio 2010 is able to connect to the OData endpoint through Business Connectivity Services and read the OData source. Visual Studio 2010 will then automatically generate the BDC model.

What does a BDC model do?

Describes which tables to read, which items from those tables are of interest, and which operations to perform on them.

What types of authentication does Business Connectivity Services support?


  1. Anonymous
  2. Basic
  3. Windows
  4. Custom authentication to OData services when it is used with the Secure Store Service

What are some examples of technology that OData leverages?

  • Atom Publishing Protocol (AtomPub)
  • HTTP
  • JavaScript Object Notation (JSON)
  • What Business Data Connectivity (BDC) connections types are supported in SharePoint 2013?

    • WCF
    • SQL Server
    • NET assemblies
    • Open Data Protocol

    SharePoint Store and App Catalog Access SharePoint resources on behalf of a user using?

    OAuth 2.0.

    What protocol does server-to-server authentication extend?

    SharePoint 2013 extends OAuth

    Out of the available authentication methods, which one would is considered the recommend according to Microsoft?

    Claims-based authentication methods are recommended.

    What are the three user authentication methods that SharePoint 2013 supports?


    1. Windows claims
    2. Security Assertion Markup Language (SAML)-based claims
    3. Forms-based authentication claims

    Saturday, October 5, 2013

    What happens to a running Cluster if the quorum disk fails in Windows Server 2003 Cluster ?


    In Windows Server 2003, the Quorum disk resource is required for the Cluster to function. In your example, if the Quorum disk suddenly became unavailable to the cluster then both nodes would immediately fail and not be able to restart the clussvc.In that light, the Quorum disk was a single point of failure in a Microsoft Cluster implementation. However, it was usually a fairly quick workaround to get the cluster back up and operational. There are generally two solutions to that type of problem.



    1. Detemrine why the Quorum disk failed and repair.



    2. Reprovision a new LUN, present it to the cluster, assign it a drive letter and format. Then start one node with the /FQ switch and through cluadmin designate the new disk resource as the Quorum. Then stop and restart the clussvc normally and then bring online the second node.


    What new functionality does failover clustering provide in Windows Server 2008 ?


    New validation feature. With this feature, you can check that your system, storage, and network configuration is suitable for a cluster.
    Support for GUID partition table (GPT) disks in cluster storage. GPT disks can have partitions larger than two terabytes and have built-in redundancy in the way partition information is stored, unlike master boot record (MBR) disks.

    What does a failover cluster do in Windows Server 2008 ?


    A failover cluster is a group of independent computers that work together to increase the availability of applications and services. The clustered servers (called nodes) are connected by physical cables and by software. If one of the cluster nodes fails, another node begins to provide service (a process known as failover). Users experience a minimum of disruptions in service.

    Does MNS get rid of the need for shared disks?


    It depends on the application. For example, clustered SQL Server 2000 requires shared disk for data. Remember, MNS only removes the need for a shared disk quorum.

    What does a failover cluster do in Windows Server 2008 ?


    A failover cluster is a group of independent computers that work together to increase the availability of applications and services. The clustered servers (called nodes) are connected by physical cables and by software. If one of the cluster nodes fails, another node begins to provide service (a process known as failover). Users experience a minimum of disruptions in service.

    Does a cluster aware application need to be rewritten to support MNS?


    No, using an MNS quorum requires no change to the application. However, some cluster aware applications expect a shared disk (for example SQL Server 2000), so while you do not need shared disks for the quorum, you do need shared disks for the application.


    Do I need special hardware to use an MNS cluster?


    There is nothing inherent in the MNS architecture that requires any special hardware, other than what is required for a standard cluster (for example, there must be on the Microsoft Cluster HCL). However, some situations that use an MNS cluster may have unique requirements (such as geographic clusters), where data must be replicated in real time between sites.

    What is the maximum number of nodes in an MNS cluster?


    Windows Server 2003 supports 8-node clusters for both Enterprise Edition and Datacenter Edition.

    What is the difference between a geographically dispersed cluster and an MNS cluster?


    A geographic cluster refers to a cluster that has nodes in multiple locations, while an MNS-based cluster refers to the type of quorum resources in use. A geographic cluster can use either a shared disk or MNS quorum resource, while an MNS-based cluster can be located in a single site, or span multiple sites.

    Can this method be used to replicate application data as well?


    No, that is not possible in this version of clustering. Only Quorum information is replicated and maintained in a synchronized state by the clustering infrastructure.

    How is the quorum information located on the system disk of each node kept in synch?


    The server cluster infrastructure ensures that all changes are replicated and updated on all members in a cluster.

    How is the quorum information located on the system disk of each node kept in synch?


    The server cluster infrastructure ensures that all changes are replicated and updated on all members in a cluster.

    Explain about each Quorum type ?

    Node Majority: Each node that is available and in communication can vote. The cluster functions only with a majority of the votes, that is, more than half. Node and Disk Majority: Each node plus a designated disk in the cluster storage (the “disk witness”) can vote, whenever they are available and in communication. The cluster functions only with a majority of the votes, that is, more than half.


    Node and File Share Majority: Each node plus a designated file share created by the administrator (the “file share witness”) can vote, whenever they are available and in communication. The cluster functions only with a majority of the votes, that is, more than half.



    No Majority: Disk Only: The cluster has quorum if one node is available and in communication with a specific disk in the cluster storage.

    Different types of Quorum in Windows server 2003 ?

    Standard Quorum As mentioned above, a quorum is simply a configuration database for MSCS, and is stored in the quorum log file. A standard quorum uses a quorum log file that is located on a disk hosted on a shared storage interconnect that is accessible by all members of the cluster. Standard quorums are available in Windows NT 4.0 Enterprise Edition, Windows 2000 Advanced Server, Windows 2000 Datacenter Server, Windows Server 2003 Enterprise Edition and Windows Server 2003 Datacenter Edition.


    Majority Node Set Quorums : A majority node set (MNS) quorum is a single quorum resource from a server cluster perspective. However, the data is actually stored by default on the system disk of each member of the cluster. The MNS resource takes care to ensure that the cluster configuration data stored on the MNS is kept consistent across the different disks. Majority node set quorums are available in Windows Server 2003 Enterprise Edition, and Windows Server 2003 Datacenter Edition.

    Why Quorum is necessary ?


                  When network problems occur, they can interfere with communication between cluster nodes. A small set of nodes might be able to communicate together across a functioning part of a network, but might not be able to communicate with a different set of nodes in another part of the network. This can cause serious issues. In this “split” situation, at least one of the sets of nodes must stop running as a cluster. 
                 To prevent the issues that are caused by a split in the cluster, the cluster software requires that any set of nodes running as a cluster must use a voting algorithm to determine whether, at a given time, that set has quorum. Because a given cluster has a specific set of nodes and a specific quorum configuration, the cluster will know how many “votes” constitutes a majority (that is, a quorum). If the number drops below the majority, the cluster stops running. Nodes will still listen for the presence of other nodes, in case another node appears again on the network, but the nodes will not begin to function as a cluster until the quorum exists again. 
                 For example, in a five node cluster that is using a node majority, consider what happens if nodes 1, 2, and 3 can communicate with each other but not with nodes 4 and 5. Nodes 1, 2, and 3 constitute a majority, and they continue running as a cluster. Nodes 4 and 5 are a minority and stop running as a cluster, which prevents the problems of a “split” situation. If node 3 loses communication with other nodes, all nodes stop running as a cluster. However, all functioning nodes will continue to listen for communication, so that when the network begins working again, the cluster can form and begin to run.

    What is Quorum ?

    A shared storage need to provide for all servers which keeps information about clustered application and session state and is useful in FAILOVER situation. This is very important if Quorum disk fails entire cluster will fails.

    Types of Clusters ?

    In Windows we can configure two types of clusters 


    1. NLB (network load balancing)  : cluster for balancing load between servers. This cluster will not provide any high availability. Usually preferable at edge servers like web or proxy.



    2. Server Cluster: This provides High availability by configuring active-active or active-passive cluster. In 2 node active-passive cluster one node will be active and one node will be stand by. When active server fails the application will FAILOVER to stand by server automatically. When the original server backs we need to FAILBACK the application

    What is Clustering. Briefly define & explain it ?

    Clustering is a technology, which is used to provide High Availability for mission critical applications. We can configure cluster by installing MCS (Microsoft cluster service) component from Add remove programs, which can only available in Enterprise Edition and Data center edition. 

    What is the main purpose of SRV records?

    SRV records are used in locating hosts that provide certain network services.

    How do I clear the DNS cache on the DNS server?

    Go to cmd prompt and type ipconfig /flushdns

    What is WINS server? where we use WINS server? difference between DNS and WINS?

    WINS is windows internet name service used to resolve the NetBIOS(computer name)name to IP address.This is proprietary for Windows.You can use in LAN.DNS is a Domain Naming System, which resolves Host names to IP addresses. It uses fully qualified domain names. DNS is an Internet standard used to resolve host names.

    Tools for troubleshooting DNS?

    DNS Console, NSLOOKUP, DNSCMD, IPCONFIG, Logs.

    What are the diff. types of Queries?

    Recursion, iteration.

    What is a query?

    A request made by the DNS client to provide the name server information.

    What is SOA?

    Start of Authority: useful when a zone starts. Provides the zone startup information.

    Where does a Host File Reside?

    c:\windows\system32\drivers\etc.

    What are the types of SRV records?

    MSDCS:Contains DCs information.
    TCP:Contains Global Catalog, Kerberos & LDAP information.

    UDP:Contains Sites information.

    Sites:Contains Sites information.
    Domain DNS Zone:Conations domain?s DNS specific information.
    Forest DNS zone:Contains Forest?s Specific Information.

    What are SRV records?

    SRV are the service records, there are 6 service records. They are useful for locating the services.

    What is scavenging?

    Finding and deleting unwanted records.

    Properties of a Zone?

    General, SOA, NAMESERVER, WINS, Security, and ZONE Transfer.

    What are the properties of DNS server?

    INTERFACES, FORWARDERS, ADVANCED, ROUTINGS, SECURITY, MONITORING, LOGGING, DEBUG LOGGING.

    How to enable Dynamic updates in DNS?

    StartProgramAdmin toolsDNS Zone properties.

    What is secondary DNS Server?

    It is backup for primary DNS where it maintains a read only copy of DNS database.

    What is forwarder?

    When one DNS server can't receive the query it can be forwarded to another DNS once configured as forwarder.

    What is Caching Only Server?

    When we install 2000 & 2003 server it is configured as caching only server where it maintains the frequently accessed sites information and again when we access the same site for next time it is obtain from cached information instead of going to the actual site.

    What does a zone consist of & why do we require a zone?

    Zone consists of resource records and we require zone for representing sites.

    What is the main purpose of SRV records ?

    SRV records are used in locating hosts that provide certain network services.

    How do you manually create SRV records in DNS?

    This is on windows server go to run ---dnsmgmt.msc rightclick on the zone you want to add srv record to and choose "other new record" and choose service location(srv).

    By default, if the name is not found in the cache or local hosts file, what is the first step the client takes to resolve the FQDN name into an IP address?

    Performs a recursive search through the primary DNS server based on the network interface configuration.

    SOA records must be included in every zone. What are they used for?

    SOA records contain a TTL value, used by default in all resource records in the zone. SOA records contain the e-mail address of the person who is responsible for maintaining the zone. SOA records contain the current serial number of the zone, which is used in zone transfers.

    Secure services in your network require reverse name resolution to make it more difficult to launch successful attacks against the services. To set this up, you configure a reverse lookup zone and proceed to add records. Which record types do you need to create?

    PTR Records

    What is a Zone?

    Zone is a sub tree of DNS database.

    What are the diff. DNS Roles?

    Standard Primary, Standard Secondary, & AD Integrated.

    What is a Resource Record?

    It is a record provides the information about the resources available in the N/W infrastructure.

    What is Reverse Lookup?

    Resolving IP Addresses to Host Names

    What is a Forward Lookup?

    Resolving Host Names to IP Addresses

    What is the port no of dns ?

    53.

    What is the main purpose of a DNS server?

    DNS servers are used to resolve FQDN hostnames into IP addresses and vice versa.

    port numbers for SMTP, POP3, IMAP4, RPC, LDAP and Global Catalog

    SMTP – 25, POP3 – 110, IMAP4 – 143, RPC – 135, LDAP – 389, Global Catalog - 3268

    I have a file to which the user has access, but he has no folder permission to read it. Can he access it?


    It is possible for a user to navigate to a file for which he does not have folder permission. This involves simply knowing the path of the file object. Even if the user can’t drill down the file/folder tree using My Computer, he can still gain access to the file using the Universal Naming Convention (UNC). The best way to start would be to type the full path of a file into Run… window.

    Explan the List Folder Contents permission on the folder in NTFS.


    Same as Read & Execute, but not inherited by files within a folder. However, newly created subfolders will inherit this permission.

    What’s the major difference between FAT and NTFS on a local machine?


    FAT and FAT32 provide no security over locally logged-on users. Only native NTFS provides extensive permission control on both remote and local files.

    You want to create a new group policy but do not wish to inherit.

    Make sure you check Block inheritance among the options when creating the policy.

    How frequently is the client policy refreshed?

    90 minutes give or take.

    What can be restricted on Windows Server 2003 that wasn’t there in previous products?


    Group Policy in Windows Server 2003 determines a users right to modify network and dial-up TCP/IP properties. Users may be selectively restricted from modifying their IP address and other network configuration parameters.

    What’s the difference between Software Installer and Windows Installer?


    The former has fewer privileges and will probably require user intervention. Plus, it uses .zap files.

    You need to automatically install an app, but MSI file is not available. What do you do?

    A .zap text file can be used to add applications using the Software Installer, rather than the Windows Installer.

    How can you restrict running certain applications on a machine?

    Via group policy, security settings for the group, then Software Restriction Policies.

    What’s contained in administrative template conf.adm?

    Microsoft NetMeeting policies.

    You change the group policies, and now the computer and user settings are in conflict. Which one has the highest priority?


    The computer settings take priority.

    Where is GPT stored?

    %SystemRoot%\SYSVOL\sysvol\domainname\Policies\GUID

    What is GPT and GPC?


    Group policy template and group policy container.

    Where are group policies stored?


    %SystemRoot%System32\GroupPolicy

    Why doesn’t LSDOU work under Windows NT?


    If the NTConfig.pol file exist, it has the highest priority among the numerous policies.

    What are the advantages of using Subneting ?

    Advantages of using Subneting:- 
    1.  Easier network management and trouble shooting
    2.  Routing table's size is reduced which means faster network transfers
    3.  Solves network congestion problems:- Since the complete network is divided into smaller networks
    4.  Network addresses can be decentralized e.g. the administrator of the network can monitor the subnet .

    Explain static and dynamic tunnels.

    Tunnels that are created manually are static tunnels. Tunnels that are auto discovered are dynamic tunnels. In dynamic tunneling, tcp connections can be checked dynamically. If no connections exist that are routed through the tunnel, a check for more suitable gateway can be done. Static tunneling may at times require dedicated equipment's.

    What are voluntary and compulsory tunnels?


    Voluntary Tunneling: 
    Users computer is an end point of the tunnel and acts as tunnel client. Here the client or user issues a request to configure and create a voluntary tunnel. They require a dial up or LAN connection. Example of dial up connection is internet at home where a call is made to the ISP and connection is obtained.


    Compulsory tunneling: 
    In compulsory tunneling, instead of the user a vpn remote access server configures and creates a tunnel. Hence, the end point is the Remote sever not the user.

    What is Tunneling?

    Tunneling is a mechanism provided to transfer data securely between two networks. The data is split into smaller packets and passed through the tunnel. The data passing through the tunnel has 3 layers of encryption. The data is encapsulated. Tunneling can be approached by Point to Point tunneling protocol.

    Wednesday, October 2, 2013

    What is Spanning-Tree Protocol (STP).

    Spanning- Tree Protocol (STP) as defined in the IEEE 802.1D is a link management protocol that provides path redundancy while preventing undesirable loops in the network. For an Ethernet network to function properly, only one active path can exist between two stations. Loops occur in networks for a variety of reasons. The most common reason you find loops in network is the result of a deliberate attempt to provide redundancy- in case one link or switch fails, another link or switch can take over.