Data Center Infrastructure Management (DCIM) Interview Questions Answers

  • Question 1. How To Check Ad Configured Properly?

    Answer :

    Check NTDS and SYSVOL shared folder at %systemroot%windows.

  • Question 2. How To Transfer Global Catalog To Another Domain?

    Answer :

    We can not transfer the global catalog; we can only remove the global catalog from one server and enable other server as a global catalog.

  • Data Center Management Interview Questions

  • Question 3. How To Configure Global Catalog Server?

    Answer :

    Go to Active directory site and services and expand till your desire server’s NTDS settings and then right click; property and check mark the Global catalog check box.

  • Question 4. What Are The Fsmo Roles And It Gets Down What Will Impact?

    Answer :

    1. Domain Naming Master (Forest wide role)
    2. Schema Master (Forest wide role)
    3. PDC Emulator (Domain wide role)
    4. RID Master (Domain wide role)
    5. Infrastructure Master (Domain wide role)
  • Service Oriented Architecture (SOA) Tutorial

  • Question 5. What Is The Rid Pool?

    Answer :

    RID Master provides the RID (Relative Identifier) pool to Domain controller of the Domain. When an object is create in a domain, a Unique SID (Security ID) is assigned to it which consisting of a RID (Unique ID) and a SID (Common ID for all Object), A RID pool contain 500 RIDs.

  • Data Communications Interview Questions

  • Question 6. Write Down The Command Line To Seize All The Fsmo Roles To A Server?

    Answer :

    1. Click Start, click Run, type ntdsutil in the Open box, and then click OK
    2. Type roles, and then press ENTER.
    3. Type connections, and then press ENTER.
    4. Type connect to server servername, and then press ENTER, where servername is the name of the domain controller that you want to assign the FSMO role to.
    5. At the server connections prompt, type q, and then press ENTER.
    6. Type seize role, where role is the role that you want to seize. For example,
    7. To seize the RID master role, type seize schema master
    8. To seize the RID master role, type seize domain naming master
    9. To seize the RID master role, type seize rid master
    10. To seize the RID master role, type seize pdc
    11. To seize the RID master role, type seize infrastructure master.
    12. At the fsmo maintenance prompt, type q, and then press ENTER to gain access to the ntdsutil prompt.
  • Question 7. Command For Removing Active Directory?

    Answer :

    dcpromo /forceremoval

  • Data compression Interview Questions

  • Question 8. What Kind Of Privilege Is Required To Transfer Fsmo Roles?

    Answer :

    logged-on user should be a member of the Enterprise Administrators group to transfer Schema master or Domain naming master roles, or a member of the Domain Administrators group of the domain where the PDC emulator, RID master and the Infrastructure master roles are being transferred.

  • Question 9. Which Layer Of Osi Model Does The Router Works In?

    Answer :

    One layer Three (Network layer)

  • Service Oriented Architecture (SOA) Interview Questions

  • Question 10. What Are Difference Between Tcp And Udp Protocol?

    Answer :

    TCP is a connection oriented protocol while UDP is not a connection oriented protocol.

  • Question 11. Do You Know About Frs?

    Answer :

    File Replication Services.

    Example: Replication of SYSVOL folder.

  • Data Center Technician Interview Questions

  • Question 12. What Is The Use Of Dfs?

    Answer :

    Distributed File System, It is used for the fault tolerance because it makes the duplicate copy of every DFS root. Not only that the domain login process as well uses DFS to find out the nearest DC to login.

  • Data Center Management Interview Questions

  • Question 13. What Are The Two Types Of Replication?

    Answer :

    Inter-site replication, Intra-site replication.

  • Question 14. What Are The Protocols Used In Replication?

    Answer :

    RPC and SMTP. Predominantly RPC is used. SMTP is not used as its not recommended for replication of Domain Partition. 

    Replication conflict is managed using a method described here. Read the full article several times and you would be happy that you got to know something very important. 

  • Question 15. What Is Default Time For Replication?

    Answer :

    KCC (Knowledge Consistency Checker) is the algorithm and the two protocols used are RPC over IP and SMTP over IP. They replicate in every 15 min.

  • Data Architect Interview Questions

  • Question 16. What Is The Difference Between The Two Types Of Replication I.e. Intrasite And Intersite?

    Answer :

    Intersite replication is for replication with in the site and Intra-site replication is for the replication between the sites.

  • Question 17. What Is The Dns?

    Answer :

    Domain Naming System:

    Used to resolve the host name (FQDN) name to IP Address and Vice Versa

  • Question 18. What Are Types Of Dns And Zones?

    Answer :

    1. Primary DNS zone
    2. Secondary DNS zone
    3. Active directory integrated zone
    4. Stub zone
  • Data Communications Interview Questions

  • Question 19. What Are Records Available In Dns?

    Answer :

    Address records, Host Records, MX Records, and CNAME records.

  • Question 20. Which Type Backup Reset Archive Bits?

    Answer :

    The bit which has check mark on the folder whose backup has been done using normal backup method.

  • Question 21. What Are The Backup Types?

    Answer :

    1. Normal or full Backup
    2. Differential Backup
    3. Incremental Backup
    4. Copy backup
    5. Daily Backup
  • Question 22. What Is Disk Striping?

    Answer :

    Disk striping is the technique of spreading data over multiple disks. The data to be stored is divided into blocks and spread across several partitions on various hard disk. Disk striping is used with or without equivalence. Disk striping helps in improving the performance of the disk.

  • Question 23. What Are The Different Raid1 And Raid 5?

    Answer :

    RAID-1: In RAID-1 two hard disk are there and the data on one is mirrored to another. So even if one fails other one is there with the same data for service continuity. 

    RAID-5: We can use minimum three hard disk and maximum depend upon RAID controller card, Data written on disk in stripes with distributed parity set.

  • Question 24. Which Raid You Will Recommend And Why?

    Answer :

    RAID-1 for O.S – mirroring.

    RAID-5 for DATA partition- Stripe set with parity.

  • Data compression Interview Questions

  • Question 25. What Are Raid Levels?

    Answer :

    Main RAID levels are RAID-0, RAID-1, RAID-5 and RAID-10.

  • Question 26. What Is The Version Kerberos Protocol?

    Answer :

    We are using Kerberos V 5.0.

  • Question 27. What Is Use Of Kerberos Protocol?

    Answer :

    Kerberos protocol is an authentication protocol. When we login in an Active Directory environment its the protocol that is used to authenticate us.

  • Service Oriented Architecture (SOA) Interview Questions

  • Question 28. What Are The Two Modes A Terminal Server Works In?

    Answer :

    User mode and application mode.

  • Question 29. How To Take A Backup Of Group Policy?

    Answer :

    We can use GPMC (Group Policy Management Console), right click on the GPO and select backup and take backup on destination folder

  • Question 30. How To Reserve Ip Address?

    Answer :

    We can assign a particular IP address to the MAC address of a machine using IP reservation in DHCP.

  • Question 31. Why Do We Need Two Or More Subnets?

    Answer :

    To segment or restrict/localize one type of traffic to one segment or subnet of the network.

  • Question 32. If We Have Two Different Subnets Then How Do I Configure It In Single Dhcp Server?

    Answer :

    Two different scopes are created for two subnets.

  • Question 33. What Is The Use Of Relay Agent?

    Answer :

    A router drops the DHCP packet as its a broadcast packet. When we enable the relay agent option on the router it then lets the DHCP Broadcast packets pass through. Hence the relay agent helps in sending it over to the destined subnet.

  • Data Center Technician Interview Questions

  • Question 34. What Is The Group Policy?

    Answer :

    It is way to provide the desirable predefined environment to all users in an Active Directory environment and it is centrally manageable.

  • Question 35. Where Dns File Stored And Database Of Dna?

    Answer :

    %SYSTEMROOT%Windows System32 DNS.

  • Question 36. Explain About Srv, Mx And Cname Records?

    Answer :

    • SRV records point a client to the servers which are hosting a service. For example Active Directory Service.
    • MX record points to the client to servers hosting mail service. MX stands for Mail Exchanger.
    • CNAME record is a alias record for a name that already exists. Suppose there were two servers and both of them consolidated into one, in that case one name becomes useless. But any application dependent on unused name has to work, in that case we create an alias record which is the unused name pointing to the name in use. Hence the application keeps functioning. 
  • Data Architect Interview Questions