networking & mcse interview questions and answers
TRANSCRIPT
-
8/2/2019 Networking & MCSE Interview Questions and Answers
1/23
-
8/2/2019 Networking & MCSE Interview Questions and Answers
2/23
User interface
Business Logic and
Shared data.
5. What are all the Extended services provided by the OS?
Ubiquitous communications
Network OS extension
Binary large objects (BLOBs)
Global directories and Network yellow pages
Authentication and Authorization services
System management
Network time
Database and transaction services
Internet services
Object- oriented services
6. What are Triggers and Rules?
Triggers are special user defined actions usually in the form of stored
procedures, that are automatically invoked by the server based on data
related events. It can perform complex actions and can use the full power of
procedural languages.
A rule is a special type of trigger that is used to perform simple checks on
data.
7. What is meant by Transparency?
Transparency really means hiding the network and its servers from the users
and even the application programmers.
8. What are TP-Lite and TP-Heavy Monitors?
-
8/2/2019 Networking & MCSE Interview Questions and Answers
3/23
TP-Lite is simply the integration of TP Monitor functions in the database
engines. TP-Heavy are TP Monitors which supports the Client/Server
architecture and allow PC to initiate some very complex multiserver
transaction from the desktop.
9. What are the two types of OLTP?
TP lite, based on stored procedures. TP heavy, based on the TP monitors.
10. What is a Web server?
This new model of Client/Server consists of thin, protable, "universal" clients
that talk to superfat servers. In the simplet form, a web server returns
documents when clients ask for them by name. The clients and server
communicate using an RPC-like protocol called HTTP.
11. What are Super servers?
These are fully-loaded machines which includes multiprocessors, high-speed
disk arrays for intervive I/O and fault tolerant features.
12. What is a TP Monitor?
There is no commonly accepted definition for a TP monitor. According to Jeri
Edwards' a TP Monitor is "an OS for transaction processing".
13. TP Monitor does mainly two things extremely well. They are
Process management and Transaction management.?
They were originally introduced to run classes of applications that could
service hundreds and sometimes thousands of clients. TP Monitors provide an
OS - on top of existing OS - that connects in real time these thousands of
humans with a pool of shared server processes.
-
8/2/2019 Networking & MCSE Interview Questions and Answers
4/23
14. What is meant by Asymmetrical protocols?
There is a many-to-one relationship between clients and server. Clients
always initiate the dialog by requesting a service. Servers are passively
awaiting for requests from clients.
15. What are the types of Transparencies?
The types of transparencies the NOS middleware is expected to provide are:-
Location transparency
Namespace transparency
Logon transparency
Replication transparency
Local/Remote access transparency
Distributed time transparency
Failure transparency and
Administration transparency.
16. What is the difference between trigger and rule?
The triggers are called implicitly by database generated events, while stored
procedures are called explicitly by client applications.
17. What are called Transactions?
The grouped SQL statements are called Transactions (or) A transaction is a
collection of actions embused with ACID properties.
18. What are the building blocks of Client/Server?
The client
The server and
-
8/2/2019 Networking & MCSE Interview Questions and Answers
5/23
Middleware.
19. Explain the building blocks of Client/Server?
The client side building block runs the client side of the application.
The server side building block runs the server side of the application.
20. The middleware buliding block runs on both the client and server
sides of an application. It is broken into three categories:-
Transport stack
Network OS
Service-specific middleware.
21. What are all the Base services provided by the OS?
Task preemption
Task priority
Semaphores
Interprocess communications (IPC)
Local/Remote Interprocess communication
Threads
Intertask protection
Multiuser
High performance file system
Efficient memory management and
Dynamically linked Run-time extensions.
22. What are the roles of SQL?
SQL is an interactive query language for ad hoc database queries.
SQL is a database programming language.
SQL is a data definition and data administration language.
SQL is the language of networked database servers
-
8/2/2019 Networking & MCSE Interview Questions and Answers
6/23
-
8/2/2019 Networking & MCSE Interview Questions and Answers
7/23
a remote server and suspends itself until it gets back the results. Parameters
are passed like in any ordinary procedure. The RPC, like an ordinary
procedure, is synchoronous. The process that issues the call waits until it
gets the results.
Under the covers, the RPC run-time software collects values for the
parameters, forms a message, and sends it to the remote server. The server
receives the request, unpack the parameters, calls the procedures, and sends
the reply back to the client. It is a telephone-like metaphor.
26. What are the main components of Transaction-based Systems?
Resource Manager
Transaction Manager and
Application Program.
27. What are the three types of SQL database server architecture?
Process-per-client Architecture. (Example: Oracle 6, Informix )
Multithreaded Architecture. (Example: Sybase, SQL server)
Hybrid Architecture (Example: Oracle 7)
28. What are the Classification of clients?
Non-GUI clients - Two types are:-
1. Non-GUI clients that do not need multi-tasking
(Example: Automatic Teller Machines (ATM), Cell phone)
2. Non-GUI clients that need multi-tasking
(Example: ROBOTs)
GUI clients
OOUI clients
29. What are called Non-GUI clients, GUI Clients and OOUI Clients?
-
8/2/2019 Networking & MCSE Interview Questions and Answers
8/23
Non-GUI Client: These are applications, generate server requests with a
minimal amount of human interaction.
GUI Clients: These are applicatoins, where occassional requests to the
server result from a human interacting with a GUI
(Example: Windows 3.x, NT 3.5)
OOUI clients : These are applications, which are highly-iconic, object-
oriented user interface that provides seamless access to information in very
visual formats.
(Example: MAC OS, Windows 95, NT 4.0)
30. What is Message Oriented Middleware (MOM)?
MOM allows general purpose messages to be exchanged in a Client/Server
system using message queues. Applications communicate over networks by
simply putting messages in the queues and getting messages from queues. It
typically provides a very simple high level APIs to its services.
MOM's messaging and queuing allow clients and servers to communicate
across a network without being linked by a private, dedicated, logical
connection. The clients and server can run at different times. It is a post-
office like metaphor.
31. What is meant by Middleware?
Middleware is a distributed software needed to support interaction between
clients and servers. In short, it is the software that is in the middle of the
Client/Server systems and it acts as a bridge between the clients and
servers. It starts with the API set on the client side that is used to invoke a
service and it covers the transmission of the request over the network and
the resulting response.
It neither includes the software that provides the actual service - that is in
the servers domain nor the user interface or the application login - that's in
clients domain.
-
8/2/2019 Networking & MCSE Interview Questions and Answers
9/23
32. What are the functions of the typical server program?
It waits for client-initiated requests. Executes many requests at the same
time. Takes care of VIP clients first. Initiates and runs background task
activity. Keeps running. Grown bigger and faster.
33. What is meant by Symmentric Multiprocessing (SMP)?
It treats all processors as equal. Any processor can do the work of any other
processor. Applications are divided into threads that can run concurrently on
any available processor. Any processor in the pool can run the OS kernel and
execute user-written threads.
34. What are Service-specific middleware?
It is needed to accomplish a particular Client/Server type of services which
includes:-
Database specific middleware
OLTP specific middleware
Groupware specific middleware
Object specific middleware
Internet specific middleware and
System management specific middleware.
35. What are General Middleware?
It includes the communication stacks, distributed directories, authentication
services, network time, RPC, Queuing services along with the network OS
extensions such as the distributed file and print services.
36. What is meant by Asymmetric Multiprocessing (AMP)?
-
8/2/2019 Networking & MCSE Interview Questions and Answers
10/23
It imposses hierarchy and a division of labour among processors. Only one
designated processor, the master, controls (in a tightly coupled
arrangement) slave processors dedicated to specific functions.
37. What is OLTP?
In the transaction server, the client component usually includes GUI and the
server components usually consists of SQL transactions against a database.
These applications are called OLTP (Online Transaction Processing) OLTP
Applications typically,
Receive a fixed set of inputs from remote clients. Perform multiple pre-
compiled SQL comments against a local database. Commit the work andReturn a fixed set of results.
38. What is meant by 3-Tier architecture?
In 3-tier Client/Server systems, the application logic (or process) lives in the
middle tier and it is separated from the data and the user interface. In
theory, the 3-tier Client/Server systems are more scalable, robust and
flexible.Example: TP monitor, Web.
39. What is meant by 2-Tier architecture?
In 2-tier Client/Server systems, the application logic is either burried inside
the user interface on the client or within the database on the server.
Example: File servers and Database servers with stored procedures.
40. What is Load balancing?
If the number of incoming clients requests exceeds the number of processes
in a server class, the TP Monitor may dynamically start new ones and this is
called Load balancing.
-
8/2/2019 Networking & MCSE Interview Questions and Answers
11/23
41. What are called Fat clients and Fat servers?
If the bulk of the application runs on the Client side, then it is Fat clients. It
is used for decision support and personal software.
If the bulk of the application runs on the Server side, then it is Fat servers. It
tries to minimize network interchanges by creating more abstract levels of
services.
42. What is meant by Horizontal scaling and Vertical scaling?
Horizontal scaling means adding or removing client workstations with only a
slight performance impact. Vertical scaling means migrating to a larger and
faster server machine or multiservers.
43. What is Groupware server?
Groupware addresses the management of semi-structured information such
as text, image, mail, bulletin boards and the flow of work. These
Client/Server systems have people in direct contact with other people.
44. What are the two broad classes of middleware?
General middleware
Service-specific middleware.
45. What are the types of Servers?
File servers
Database servers Transaction servers Groupware servers
Object servers Web servers.
46. What is a File server?
-
8/2/2019 Networking & MCSE Interview Questions and Answers
12/23
File servers are useful for sharing files across a network. With a file server,
the client passes requests for file records over nerwork to file server.
47. What are the five major technologies that can be used to create
Client/Server applications?
Database Servers
TP Monitors
Groupware
Distributed Objects
Intranets.
48. What is Client/Server?
Clients and Servers are separate logical entities that work together over a
network to accomplish a task. Many systems with very different architectures
that are connected together are also called Client/Server.
49. List out the benefits obtained by using the Client/Server oriented
TP Monitors?
Client/Server applications development framework.
Firewalls of protection.
High availability.
Load balancing.
MOM integration.
Scalability of functions.
Reduced system cost.
50. What are the services provided by the Operating System?
Extended services - These are add-on modular software components that
are layered on top of base service.
-
8/2/2019 Networking & MCSE Interview Questions and Answers
13/23
BANDWIDTH EXPLAINED
BandWidth Explained
Most hosting companies offer a variety of bandwidth options in their
plans. So exactly what is bandwidth as it relates to web hosting? Put simply,
bandwidth is the amount of traffic that is allowed to occur between your web
site and the rest of the internet. The amount of bandwidth a hosting
company can provide is determined by their network connections, both
internal to their data center and external to the public internet.
Network Connectivity :
The internet, in the most simplest of terms, is a group of millions of
computers connected by networks. These connections within the internet can
be large or small depending upon the cabling and equipment that is used at a
particular internet location. It is the size of each network connection that
determines how much bandwidth is available. For example, if you use a DSL
connection to connect to the internet, you have 1.54 Mega bits (Mb) of
bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are
grouped in bytes which form words, text, and other information that is
transferred between your computer and the internet.
If you have a DSL connection to the internet, you have dedicated bandwidth
between your computer and your internet provider. But your internet
provider may have thousands of DSL connections to their location. All of
these connection aggregate at your internet provider who then has their own
dedicated connection to the internet (or multiple connections) which is much
larger than your single connection. They must have enough bandwidth to
serve your computing needs as well as all of their other customers. So while
you have a 1.54Mb connection to your internet provider, your internet
provider may have a 255Mb connection to the internet so it can
accommodate your needs and up to 166 other users (255/1.54).
Traffic :
-
8/2/2019 Networking & MCSE Interview Questions and Answers
14/23
A very simple analogy to use to understand bandwidth and traffic is to think
of highways and cars. Bandwidth is the number of lanes on the highway and
traffic is the number of cars on the highway. If you are the only car on a
highway, you can travel very quickly. If you are stuck in the middle of rush
hour, you may travel very slowly since all of the lanes are being used up.
Traffic is simply the number of bits that are transferred on network
connections. It is easiest to understand traffic using examples. One Gigabyte
is 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024
megabytes. To put this in perspective, it takes one byte to store one
character. Imagine 100 file cabinets in a building, each of these cabinets
holds 1000 folders. Each folder has 100 papers. Each paper contains 100characters - A GB is all the characters in the building. An MP3 song is about
4MB, the same song in wav format is about 40MB, a full length movie can be
800MB to 1000MB (1000MB = 1GB).
If you were to transfer this MP3 song from a web site to your computer, you
would create 4MB of traffic between the web site you are downloading from
and your computer. Depending upon the network connection between the
web site and the internet, the transfer may occur very quickly, or it could
take time if other people are also downloading files at the same time. If, for
example, the web site you download from has a 10MB connection to the
internet, and you are the only person accessing that web site to download
your MP3, your 4MB file will be the only traffic on that web site. However, if
three people are all downloading that same MP at the same time, 12MB (3 x
4MB) of traffic has been created. Because in this example, the host only has
10MB of bandwidth, someone will have to wait. The network equipment at
the hosting company will cycle through each person downloading the file and
transfer a small portion at a time so each person's file transfer can take
place, but the transfer for everyone downloading the file will be slower. If
100 people all came to the site and downloaded the MP3 at the same time,
the transfers would be extremely slow. If the host wanted to decrease the
-
8/2/2019 Networking & MCSE Interview Questions and Answers
15/23
time it took to download files simultaneously, it could increase the bandwidth
of their internet connection (at a cost due to upgrading equipment).
Hosting Bandwidth :
In the example above, we discussed traffic in terms of downloading an MP3
file. However, each time you visit a web site, you are creating traffic,
because in order to view that web page on your computer, the web page is
first downloaded to your computer (between the web site and you) which is
then displayed using your browser software (Internet Explorer, Netscape,
etc.) . The page itself is simply a file that creates traffic just like the MP3 file
in the example above (however, a web page is usually much smaller than a
music file).
A web page may be very small or large depending upon the amount of text
and the number and quality of images integrated within the web page. For
example, the home page for CNN.com is about 200KB (200 Kilobytes =
200,000 bytes = 1,600,000 bits). This is typically large for a web page. In
comparison, Yahoo's home page is about 70KB.
How Much Bandwidth Is Enough?
It depends (don't you hate that answer). But in truth, it does. Since
bandwidth is a significant determinant of hosting plan prices, you should take
time to determine just how much is right for you. Almost all hosting plans
have bandwidth requirements measured in months, so you need to estimate
the amount of bandwidth that will be required by your site on a monthly
basis
If you do not intend to provide file download capability from your site, theformula for calculating bandwidth is fairly straightforward:
Average Daily Visitors x Average Page Views x Average Page Size x 31 x
Fudge Factor
-
8/2/2019 Networking & MCSE Interview Questions and Answers
16/23
If you intend to allow people to download files from your site, your bandwidth
calculation should be:
[(Average Daily Visitors x Average Page Views x Average Page Size) +
(Average Daily File Downloads x Average File Size)] x 31 x Fudge Factor
Let us examine each item in the formula:
Average Daily Visitors - The number of people you expect to visit your
site, on average, each day. Depending upon how you market your site, this
number could be from 1 to 1,000,000.
Average Page Views - On average, the number of web pages you expect a
person to view. If you have 50 web pages in your web site, an average
person may only view 5 of those pages each time they visit.
Average Page Size - The average size of your web pages, in Kilobytes (KB).
If you have already designed your site, you can calculate this directly.
Average Daily File Downloads - The number of downloads you expect tooccur on your site. This is a function of the numbers of visitors and how
many times a visitor downloads a file, on average, each day.
Average File Size - Average file size of files that are downloadable from
your site. Similar to your web pages, if you already know which files can be
downloaded, you can calculate this directly.
Fudge Factor - A number greater than 1. Using 1.5 would be safe, whichassumes that your estimate is off by 50%. However, if you were very unsure,
you could use 2 or 3 to ensure that your bandwidth requirements are more
than met.
-
8/2/2019 Networking & MCSE Interview Questions and Answers
17/23
Usually, hosting plans offer bandwidth in terms of Gigabytes (GB) per month.
This is why our formula takes daily averages and multiplies them by 31.
Summary :
Most personal or small business sites will not need more than 1GB of
bandwidth per month. If you have a web site that is composed of static web
pages and you expect little traffic to your site on a daily basis, go with a low
bandwidth plan. If you go over the amount of bandwidth allocated in your
plan, your hosting company could charge you over usage fees, so if you think
the traffic to your site will be significant, you may want to go through the
calculations above to estimate the amount of bandwidth required in a hosting
plan.
SETTING UP A VPN IN WINDOWS IS A TWO STEP PROCESS.
Setting up a VPN in Windows is a two step process:
Set up one computer to share files (server).
Set up another computer to access them (client).
Begin by setting up the server:Open Internet Explorer and go to www.whatismyip.com. Write down the IP
address. You will need it to configure the client.
1. Click the Start button and click Run.
2. Type control and hit Enter.
3. Click Network and Internet Connections.
4. Click Network Connections .
5. Click Create a New Connection, which is the first option on the left
toolbar.
6. The New Connection Wizard will open. Click Next.
7. Choose Set up an advanced connection, the last element on the list.
Click Next .
8. Choose Accept incoming connections. Click Next.
http://www.whatismyip.com/http://www.whatismyip.com/ -
8/2/2019 Networking & MCSE Interview Questions and Answers
18/23
9. You will see the Devices for Incoming Connections screen.
10. Do not select anything on this screen. Click Next.
11. Select Allow virtual private connections. Click Next.
12. Select to whom you want to give access. Click Next. If a user is
not listed, you will have to add an account. See "Related Wikihows" for
more information.
13. Do not change anything on the Networking Software screen.
Click Next.
That's it! Your computer is now set up to allow for VPNs. Click Finish to
complete the wizard.
Now proceed to connect the client:
1. Click the Start button and click Run.
2. Type control and hit Enter.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Click Create a New Connection, which is the first option on the left
toolbar.6. The New Connection Wizard will open. Click Next.
7. Select Connect to the network at my workplace and click Next.
8. Select Virtual Private Network connection and click Next.
9. Type the name of your network in the blank box. Click Next.
10. Enter the IP address you wrote down earlier and click Next.
11. Select Add a shortcut to this connection to my desktop and click
Finish.
Tips :
1. Both computers must be connected to the internet.
2. The user name and password must be entered exactly as you saved
them.
3. The IP address must be written exactly as listed on the screen.
-
8/2/2019 Networking & MCSE Interview Questions and Answers
19/23
4. If the VPN doesn't work, turn off your firewall.
Warnings :
Do not give access to the "guest" account. It does not require a password,allowing anyone to access the VPN.
-
8/2/2019 Networking & MCSE Interview Questions and Answers
20/23
-
8/2/2019 Networking & MCSE Interview Questions and Answers
21/23
MCSE Sample Questions : General MCSE SampleQuestions
General MCSE Sample Questions
Following are some MCSE sample questions:
1. What is the GUI tool used to build the UNATTEND.TXT file
included with the Windows 2000 Resource Kit?
A. SETUPMGR.EXE
B. UNATTEND.EXE
C. PREBUILD.EXE
D. SYSLOAD.SYSE. SETUP.EXE
Answer: A
2. Which component of the Windows 2000 Executive is
responsible for handling input and output from installed
devices?
A. The Device Manager
B. The Cache Manager
C. The I/O ManagerD. The Device Manager
E. none of the above
Answer: C
3. Which of the following IRQs are used for LPT1?
A. 1
B. 3
C. 5
D. 7
E. 9
Answer: D
-
8/2/2019 Networking & MCSE Interview Questions and Answers
22/23
4. Which layer(s) of the OSI model is/are included in the NDIS
specification?
A. 1
B. 2
C. 3
D. 4
E. 5
Answer: B
5. Windows 2000 Professional can access drives compressed with
DriveSpace.
A. TRUE
B. FALSE
Answer: B
6. What should the impedance on RG-58 cable be?
A. 50
B. 75
C. 90
D. 93
E. 98
Answer: A
7. What is another name for 10BaseT?
A. Baseband
B. Broadband
C. Thicknet
D. Thinnet
E. Twisted Pair
Answer: E
8. Which of the following categories for UTP has the least
expensive cable?
A. 1
B. 2
C. 3
-
8/2/2019 Networking & MCSE Interview Questions and Answers
23/23
D. 4
E. 5
Answer: C
9. Which of the following modules manages bindings in NDIS?
A. Protocol manager
B. Binding manager
C. Redirector
D. The registry
E. None of the above
Answer: A
10. If a network has a Windows NT domain controller, what kind ofnetwork is it?
A. WAN
B. High-speed
C. Peer-to-peer
D. Server-based
E. Server-to-server
Answer: D