0% found this document useful (0 votes)
14 views32 pages

Concentrex Questions

Uploaded by

Simply Cool
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views32 pages

Concentrex Questions

Uploaded by

Simply Cool
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

1.User is unable to connect to outlook, how will you assist?

Open the Control Panel.


Click Programs and Features.
Locate the entry for your Microsoft Office installation and select it.
Click Change.
Select Repair from the resulting window.
Click Continue.
Allow the repair to complete.
Reboot your computer.

2.How to open outlook in safe mode?


Right-click the Start button, and click Run. 2. Type Outlook.exe /safe, and click OK. Tip: If Windows can't
find Outlook.exe /safe, try using the full path to Outlook (for example C:\Program Files\Microsoft
Office\OfficeXX, where XX is your version number).

3. What all versions of outlook microsoft has realised ?


Version Release
Name Notes
number[i] date[7]
Included in Office 97 and
Outlook January
8.0 bundled with Exchange
97 16, 1997
Server 5.0 and 5.5
Freely distributed with books and
magazines for coping with the
newest Internet standard such
Outlook June 21, as HTML email.[8] Outlook 98
8.5
98 1998
setup was based on Active
Setup which also
installed Internet Explorer 4.[9]
Included in Office 2000 and
Outlook June 27,
9.0 bundled with Exchange 2000
2000 1999
Server.
Outlook May 31,
10 Included in Office XP
2002 2001
Included in Office 2003 (incl.
Outlook November Standard Edition for Students and
11
2003 20, 2003 Teachers) and bundled with
Exchange Server 2003
Outlook January Included in Office 2007, except
12
2007 27, 2007 Office Home and Student edition
Included in Office 2010 Home
Outlook July 15,
14 and Business, Standard,
2010 2010
Professional and Professional Plus
Outlook
October Included in Office for Mac
2011 14
26, 2010 2011 Home and Business
for Mac
Outlook January Included in Office 2013, except
15
2013 29, 2013 Home & Student edition
Included in Office 365, except
Outlook October
16 some[which?] commercial
for Mac 31, 2014
editions
Outlook September Included in Office 2016 and
16
2016 22, 2015 Office 365
Outlook
September Included in Office 2016 and Office
2016 16
25, 2015 365
for Mac
Outlook September Included in Office 2019 and
16
2019 24, 2018 Office 365
Outlook
September Included in Office 2019 and Office
2019 16
24, 2018 365
for Mac
Outlook Included in Office 365, except
for
some[which?] commercial
Phones 1.3 2015
editions
&
Includes iOS and Android support
Tablets

4. How will you help a new user to configure outlook successfully(Troubleshooting steps)
https://support.mail.com/premium/pop3/outlook.html

5. How to install Active directory?


https://www.varonis.com/blog/active-directory-users-and-computers/
https://collab365.community/configured-domain-services-controller-and-create-users-and-
groups/
https://youtu.be/Vo5WAoukDnE

6. What is difference between Workgroup and domain?


Computers on a network can be part of a workgroup or a domain. The main difference between
workgroups and domains is how resources on the network are managed. Computers on home networks
are usually part of a workgroup, and computers on workplace networks are usually part of a domain.
In a workgroup:
All computers are peers; no computer has control over another computer.
Each computer has a set of user accounts. To use any computer in the workgroup, you must have an
account on that computer.
There are typically no more than ten to twenty computers.
All computers must be on the same local network or subnet.
In a domain:
One or more computers are servers. Network administrators use servers to control the security and
permissions for all computers on the domain. This makes it easy to make changes because the changes
are automatically made to all computers.
If you have a user account on the domain, you can log on to any computer on the domain without
needing an account on that computer.
There can be hundreds or thousands of computers.
The computers can be on different local networks.
Due to the increase security and manageability in a domain environment
https://www.geeksforgeeks.org/difference-between-domain-and-workgroup/

7. What is port number for LDAP?


You should use TCP(transmission control protocol) ports 389 and/or 636. Port 636 is for
LDAPS(lightweight directory access protocol), which is LDAP over SSL(secure socket layer). Encryption on
port 389 is also possible using the STARTTLS mechanism, but in that case you should explicitly verify that
encryption is being done. LDAPS communication occurs over port TCP 636

8. What is format of LDAP?


The LDAP Data Interchange Format (LDIF) is a standard plain text data interchange format for
representing LDAP (Lightweight Directory Access Protocol) directory content and update requests. LDIF
conveys directory content as a set of records, one record for each object (or entry).

9. What do you understand about O365?


Office 365 is a cloud-based collaboration platform with Office applications and other productive services
that users can subscribe to based on their needs. So users can access emails, contacts, calendar and
other office apps like Excel, Word, PowerPoint, Outlook, and OneNote over the internet.

10.What are different types of license in Office 365?


Microsoft 365 ProPlus - Enterprise edition of the Office apps plus cloud-based file storage and sharing.
Business email, social apps, and Teams not included.
Office 365 E1*Enterprise - Includes business services (email, file storage and sharing, Office for web,
meetings, and IM, but not Office apps.
Office 365 E3* Enterprise - All Office apps and business services, plus meetings, social, email and
calendar, as well as security, compliance, and limited analytics.
Office 365 E5* Enterprise - All features of E3, plus advanced security, full analytics (MyAnalytics,
PowerBI Pro) and voice capabilities.
Microsoft 365 F3 (formerly F1) - Increasingly common front line worker licensing type; email and cloud
storage, plus Office web and mobile apps.
Microsoft 365 Business Basic (formerly Office 365 Business Essentials)Businesses (< 300 employees)
Includes web and mobile versions of Word, Excel, and Powerpoint, plus Microsoft Teams and cloud
storage. Desktop versions of Office apps not included.
Microsoft 365 Business Standard (formerly Office 365 Business Premium)Businesses (< 300 employees)
For businesses that need Office apps across devices, plus business email, cloud file storage, and online
meetings and chat.
Microsoft 365 Business Premium (formerly Microsoft 365 Business) Businesses (< 300 employees)
Includes everything in Business Standard, plus advanced cyberthreat protection and device
management with Intune and Azure Information Protection.

11.How to create a new User in O365?


When a new person joins your company, you need to add them to your Microsoft 365 Business
subscription as a new user.
In the Microsoft 365 admin center, go to User management, and select Add user.
Enter the new user's First name and Last name. The Display name is filled in automatically, but you can
change it.
Enter a Username. This will be the new user's email address. If you have more than one domain, select
the correct domain from the drop-down list.
To have a password created automatically, select Auto-generate password.
To require the user to change their password, select the Require this user to change their password
when they first sign in check box.
If you'd like the account details sent in email, select the Send password in email upon completion check
box. Your email name will be added automatically, but you can add the new user's alternate email
address so that they also receive the account details. Select Next.
Select your location from the drop-down list, and then select the check box next to the subscription you
want the user to use. Select Next.
If you want the user to be an administrator, expand Roles, clear the User (no administrator
access) check box, and select an admin role from the list.
Under Profile info, enter details about the user's job, department, office, and so on. (You or the new
user can always add this information later.) Select Next.
Review the user details. If you need to purchase an additional license for this user, you will see a
notification on the review page. Select Finish adding, and then select Close.
Verify that the user has been created successfully: in the Microsoft 365 admin center, in the left
navigation pane, select Users> Active users. The new user should be listed, along with their assigned
license.
12.What is AD ? *
A - Active Directory (AD) is a database and set of services that connect users with the network resources
they need to get their work done. The database (or directory) contains critical information about your
environment, including what users and computers there are and who's allowed to do what.

B – what are the AD Roles?*


Active Directory extends the single-master model found in earlier versions of Windows to include
multiple roles, and the ability to transfer roles to any DC(domain controller) in the enterprise. Because
an Active Directory role isn't bound to a single DC, it's referred to as an FSMO role.

C - what are the FSMO Roles?*


The five FSMO roles are: Schema Master, Domain naming Master, Infrastructure Master, Relative ID
(RID) Master, PDC Emulator
https://www.varonis.com/blog/fsmo-roles/

D - how to install AD(Steps)?*


From the Start menu, select Settings > Apps. Click the hyperlink on the right side labeled Manage
Optional Features and then click the button to Add feature. Select RSAT: Active Directory Domain
Services and Lightweight Directory Tools. Click Install.
https://youtu.be/Vo5WAoukDnE.

13.What is Difference between Exchange serve 2010 and exchange server 2016
Exchange 2016 architecture will provide the following benefits: ... Simplicity: Less
number of namespace requirements in compare to Exchange 2010. One for protocols and
one for autodiscover is required. Outlook can connect only using Outlook Anywhere with either
MAPI over HTTP or RPC over HTTP.

14.What do you understand by DNS?


The domain name system (DNS) connects URLs with their IP address. With DNS, it's possible to type
words instead of a string of numbers into a browser, allowing people to search for websites and send
emails using familiar names. ... Once located, it uses the IP to retrieve the website's content.

15.What do you understand about protocols and tell something about OSI Layers?
A network protocol is an established set of rules that determine how data is transmitted between
different devices in the same network. Essentially, it allows connected devices to communicate with
each other, regardless of any differences in their internal processes, structure or design.

16.On what layer Router works?.


A router is a hardware device and has the function of routing packets between networks. A router works
at Layer 3 of the OSI model – the Network Layer. This is the layer that the IP protocol works at.

17.What is Difference between router, switch and Hub?


What Are Hub, Switch and Router?
Hub
Hub is commonly used to connect segments of a LAN (Local Area Network). A hub contains multiple
ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN
can see all packets. Hub acts as a common connection point for devices in a network.
Switch
A switch operates at the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI
(Open Systems Interconnection) Reference Model and therefore support any packet protocol. LANs that
use switches to join segments are called switched LANs or, in the case of Ethernet networks, switched
Ethernet LANs. In networks, the switch is the device that filters and forwards packets between LAN
segments. See more information on Network Switch and Selection Suggestions.
Router
A router is connected to at least two networks, commonly two LANs or WANs (Wide Area Networks) or
a LAN and its ISP.s (Internet Service Provider.s) network. The router is generally located at gateways, the
places where two or more networks connect. Using headers and forwarding tables, router determines
the best path to forward the packets. In addition, router uses protocols such as ICMP (Internet Control
Message Protocol) to communicate with each other and configures the best route between any two
hosts. In a word, router forwards data packets along with networks.
Hub vs Switch vs Router
In network equipment and devices, data is usually transmitted in the form of a frame. When a frame is
received, it is amplified and then transmitted to the port of the destination PC (Personal Computer). The
big difference between hub and switch is in the method in which frames are being delivered.

In a hub, a frame is passed along or "broadcast" to every one of its ports. It doesn't matter that the
frame is only destined for one port. The hub has no way of distinguishing which port a frame should be
sent to. Additionally, a 10/100Mbps hub must share its bandwidth with each and every one of its ports.
In comparison, a switch keeps a record of the MAC (Media Access Control) addresses of all the devices
connected to it. With this information, a network switch can identify which system is sitting on which
port. So when a frame is received, it knows exactly which port to send it to, without significantly
increasing network response times. In addition, unlike a hub, a 10/100Mbps switch will allocate a full
10/100Mbps to each of its ports. So regardless of the number of PCs transmitting, users will always have
access to the maximum amount of bandwidth.

Unlike an Ethernet hub or switch that is concerned with transmitting frames, a router is to route packets
to other networks until that packet ultimately reaches its destination. One of the key features of a
packet is that it not only contains data but the destination address of where it's going. What's more,
router is the only one of these three devices that will allow you to share a single IP (Internet Protocol)
address among multiple network clients.

18.What do you undesrtand by half duplex and full duplex?


A full-duplex device is capable of bi-directional network data transmissions at the same time. Half-
duplex devices can only transmit in one direction at one time. With half-duplex mode, data can move in
two directions, but not at the same time

19. Can you define an IP Address?


a unique string of characters that identifies each computer using the Internet Protocol to communicate
over a network.

20.What is a difference between unicast, broadcast, multicast, anycast?


A unicast address is used to refer to a single host. It is ment to send data to a single destination.
A multicast address can be used to deliver a package to a group of destinations. ... in the broadcast the
packet is delivered to all the host connected to the network(slow in time compare to multicast )
Anycast address don't have a specific range, as they are exactly the same as regular unicast addresses.

21.What is network Subnet?


A subnetwork or subnet is a logical subdivision of an IP network. The practice of dividing a network into
two or more networks is called subnetting. ... This results in the logical division of an IP address into two
fields: the network number or routing prefix and the rest field or host identifier.

22.What is a Full form for Ping and usage of Ping?


The full form of PING is the Packet InterNet Groper. It is a computer network management system
software or utility software used to test the network communication between the two devices. The
classification of such systems considered may include any commonly used personal computer, switch,
server, gateway or router.

23.Tell something about IP classes and ranges of IP?

Class A 1.0.0.1 to 126.255.255.254

Class B 128.1.0.1 to 191.255.255.254

Class C 192.0.1.1 to 223.255.254.254

Class D 224.0.0.0 to 239.255.255.255

24.What are various type of network topologies?


Network Topology is the schematic description of a network arrangement, connecting various
nodes(sender and receiver) through lines of connection.
BUS Topology
Bus topology is a network type in which every computer and network device is connected to single
cable. When it has exactly two endpoints, then it is called Linear Bus topology.

Features of Bus Topology


It transmits data only in one direction.
Every device is connected to a single cable
Advantages of Bus Topology
It is cost effective.
Cable required is least compared to other network topology.
Used in small networks.
It is easy to understand.
Easy to expand joining two cables together.
Disadvantages of Bus Topology
Cables fails then whole network fails
If network traffic is heavy or nodes are more the performance of the network decreases.
Cable has a limited length.
It is slower than the ring topology.

RING Topology
It is called ring topology because it forms a ring as each computer is connected to another computer,
with the last one connected to the first. Exactly two neighbours for each device.

Features of Ring Topology


A number of repeaters are used for Ring topology with large number of nodes, because if someone
wants to send some data to the last node in the ring topology with 100 nodes, then the data will have to
pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are used in the
network.
The transmission is unidirectional, but it can be made bidirectional by having 2 connections between
each Network Node, it is called Dual Ring Topology.
In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction in them.
Also, if one ring fails, the second ring can act as a backup, to keep the network up.
Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass through each
node of the network, till the destination node.
Advantages of Ring Topology
Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes having
tokens can transmit data.
Cheap to install and expand
Disadvantages of Ring Topology
Troubleshooting is difficult in ring topology.
Adding or deleting the computers disturbs the network activity.
Failure of one computer disturbs the whole network.

STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This hub is the
central node and all others nodes are connected to the central node.

Features of Star Topology


Every node has its own dedicated connection to the hub.
Hub acts as a repeater for data flow.
Can be used with twisted pair, Optical Fibre or coaxial cable.
Advantages of Star Topology
Fast performance with few nodes and low network traffic.
Hub can be upgraded easily.
Easy to troubleshoot.
Easy to setup and modify.
Only that node is affected which has failed, rest of the nodes can work smoothly.
Disadvantages of Star Topology
Cost of installation is high.
Expensive to use.
If the hub fails then the whole network is stopped because all the nodes depend on the hub.
Performance is based on the hub that is it depends on its capacity

MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are connected to each
other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
Routing
Flooding
MESH Topology: Routing
In routing, the nodes have a routing logic, as per the network requirements. Like routing logic to direct
the data to reach the destination using the shortest distance. Or, routing logic which has information
about the broken links, and it avoids those node etc. We can even have routing logic, to re-configure the
failed nodes.
MESH Topology: Flooding
In flooding, the same data is transmitted to all the network nodes, hence no routing logic is required.
The network is robust, and the its very unlikely to lose the data. But it leads to unwanted load over the
network.

Types of Mesh Topology


Partial Mesh Topology : In this topology some of the systems are connected in the same fashion as mesh
topology but some devices are only connected to two or three devices.
Full Mesh Topology : Each and every nodes or devices are connected to each other.
Features of Mesh Topology
Fully connected.
Robust.
Not flexible.
Advantages of Mesh Topology
Each connection can carry its own data load.
It is robust.
Fault is diagnosed easily.
Provides security and privacy.
Disadvantages of Mesh Topology
Installation and configuration is difficult.
Cabling cost is more.
Bulk wiring is required.

TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.

Features of Tree Topology


Ideal if workstations are located in groups.
Used in Wide Area Network.
Advantages of Tree Topology
Extension of bus and star topologies.
Expansion of nodes is possible and easy.
Easily managed and maintained.
Error detection is easily done.
Disadvantages of Tree Topology
Heavily cabled.
Costly.
If more nodes are added maintenance is difficult.
Central hub fails, network fails.

HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies. For example if in an
office in one department ring topology is used and in another star topology is used, connecting these
topologies will result in Hybrid Topology (ring topology and star topology).
Features of Hybrid Topology
It is a combination of two or topologies
Inherits the advantages and disadvantages of the topologies included
Advantages of Hybrid Topology
Reliable as Error detecting and trouble shooting is easy.
Effective.
Scalable as size can be increased easily.
Flexible.
Disadvantages of Hybrid Topology
Complex in design.
Costly.

25.What is full form for MAC?


MAC stands for Media Access Control Address. It is a hardware identification number that identifies
each device connected to a network. The MAC address is embedded into network interface cards (NIC)
in your computer such as an Ethernet card or Wi-Fi card, at time of manufacturing by the vendor, so it
cannot be changed.

26.What kind of memories are used by cisco router?


Dynamic Random Access Memory (DRAM)
Erasable Programmable Read-Only Memory (EPROM)
Non-Volatile Random Access Memory
Flash memory
https://blog.router-switch.com/2011/11/cisco-memory-types-and-functions/

27.What happens in Arp?


ARP stands for Address Resolution Protocol. When you try to ping an IP address on your local network,
say 192.168. ... If there is a value cached, ARP is not used. If the IP address is not found in the ARP table,
the system will then send a broadcast packet to the network using the ARP protocol to ask "who has
192.168.

28.Why do you choice Exchange server?


Microsoft Exchange enables email to be delivered directly to a server. It works by sending the emails
back to your individual workstations in which your staff can access. Small and medium-sized companies
can achieve three benefits from using Microsoft Exchange.
Benefits of Microsoft Exchange

Business-Class Messaging. ...


Enhanced Security. ...
Shared Calendars. ...
Shared Contacts. ...
Shared Task Management. ...
Anti-Virus and Anti-Spam Protection.

29.Tell me to what all portal we can add O365 users?


https://www.eginnovations.com/documentation/SharePoint-Online/Creating-a-New-User-in-the-Office-
365-
Portal.htm#:~:text=Click%20on%20Admin%20under%20Apps,appear%20(see%20Figure%20207).&text=
To%20create%20a%20new%20user%2C%20click%20on%20the%20Add%20a,Figure%20208%20will%20t
hen%20appear.

30.Please explain mail flow, if a mail is send from gmail to outlook(Exchange)?


When an individual or an organization sends an email, the message travels from its point of origination,
such as an email client where it was composed, across the Internet to its destination. Along the way, it
passes through multiple servers that help ensure it arrives at the right place. That email message flow
uses a systematic process based on a number of long-established technical standards
https://www.sparkpost.com/resources/email-explained/email-message-flow-sending-delivery/

31.IP address given (Need to tell which is network part and which is host part)?
Every IP address is composed of a network component and a host component. The subnet mask has a
single purpose: to identify which part of an IP address is the network component and which part is the
host component. Look at a 32-bit IP address expressed in binary, with the subnet mask written right
below it.

32.How to install Active Directory ?(Very important question)


From the Start menu, select Settings > Apps. Click the hyperlink on the right side labeled Manage
Optional Features and then click the button to Add feature. Select RSAT: Active Directory Domain
Services and Lightweight Directory Tools. Click Install

33.When we have free emails(Gmail, yahoo etc), why is need of exchange server(wen its not free)?
1. Integration across email, calendar and contacts
2. Offline access to email
3. Organize email your way
4. Categorize email items to stay organized
5. Multiple ways to find email
6. Flags, changing importance of email
7. Rules to minimize email clutter
8. Rich contact information
9. Scheduling meeting rooms
10. Mail tips
11. Ignore conversations
12. Sharing and delegating calendars
https://www.microsoft.com/en-us/microsoft-365/blog/2013/09/26/12-reasons-why-users-
prefer-outlook-over-gmail-at-work/

34.What is FSMO Role?


The operations master roles, also known as flexible single master operations (FSMO) roles, perform
specific tasks within a domain. The five FSMO roles are:
Schema Master
Domain naming Master
Infrastructure Master
Relative ID (RID) Master
PDC Emulator
https://docs.microsoft.com/en-us/troubleshoot/windows-server/identity/fsmo-roles
35.What is your understanding about Exchange server?
Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft. It runs
exclusively on Windows Server operating systems. ... Exchange Server primarily uses a proprietary
protocol called MAPI to talk to email clients, but subsequently added support for POP3, IMAP, and EAS.

36) Outlook trouble shooting scenario where a user forget his email account password.How you will
resolve the problem ?
Download Recovery Toolbox for Outlook Password.
Install Recovery Toolbox for Outlook Password
Run Recovery Toolbox for Outlook Password
Select email account in middle panel
The recovered password will appear in right panel
37) how you can install AD in windows server 2008 R2 ?
Open up Server Manager, expand Roles and click on Active Directory Domain Services. On the right hand
side click on the Run the Active Directory Domain Services Installation Wizard (dcpromo.exe) link.
This will kick off another wizard, this time to configure the settings for you domain, click
next to continue.
https://www.howtogeek.com/99323/installing-active-directory-on-server-2008-r2/

38) Exchange server roles.


The server roles in Exchange Server 2010 are:
Mailbox Server – hosts the mailbox and public folder databases
Client Access Server – provides connectivity for clients (eg Outlook, Outlook Web App, ActiveSync) to
mailboxes
Hub Transport Server – responsible for all mail flow in the organization
Edge Transport Server – a special transport server intended for installation in DMZ networks to
provide secure inbound/outbound email flow for the organization
Unified Messaging Server – provides voice mail and other telephony integration with Exchange

39) Networking
Networking is the exchange of information and ideas among people with a common profession or
special interest, usually in an informal social setting. Networking often begins with a single point of
common ground.
Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks. ... It
authenticates and authorizes all users and computers in a Windows domain type network. Assigning and
enforcing security policies for all computers and installing or updating software.

40) Active directory cycle Installation of AD


Provisioning, Managing, and De-provisioning User Accounts Through a Life Cycle
Every organization has to deal with employee turnover. “People come and people go” as they say. Along
with the turnover, the user accounts for all of those employees must also be managed. When
employees are hired, new user accounts must be created. On the other end, when employees leave the
organization, their user accounts must be disabled and eventually deleted.
When a single user is hired or leaves the company, those tasks seem minor and quite simple. And they
are. But what about an organization with an employee population of 5,000 to 10,000 or 100,000 – or
more? Now, the turnover is not just one employee at a time. It’s more like hundreds of employees at a
time.

41) pre-requisites for AD installation


Active Directory Domain Service installation prerequisites

1.4 GHz 64-bit processor.


2 GB RAM.
Storage adapter which supports PCI Express architecture (Windows Server 2016 does not support
IDE/ATA/PATA/EIDE for boot and data)
32 GB of free space.
1 x network adapter.
DVD drive or support for network, USB boot.

42) Every FSMO role in detail


The domain-level FSMO roles are called the Primary Domain Controller Emulator, the Relative Identifier
Master, and the Infrastructure Master. In a new Active Directory forest, all five FSMO roles are assigned
to the initial domain controller in the newly-created forest root domain.

43) Exchange server in detail


Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft. It runs
exclusively on Windows Server operating systems. ... Exchange Server primarily uses a proprietary
protocol called MAPI to talk to email clients, but subsequently added support for POP3, IMAP, and EAS.

44)Explain-
A) Installation of active directory
From the Start menu, select Settings > Apps. Click the hyperlink on the right side labeled Manage
Optional Features and then click the button to Add feature. Select RSAT: Active Directory Domain
Services and Lightweight Directory Tools. Click Install.

B) Exchange active directory roles.


Role groups are special universal security groups (USGs) used by Exchange Server that can contain Active
Directory users, USGs, and other role groups. When a role is assigned to a role group, the permissions
granted by the role are granted to all the members of the role group

C) Networking competencies
Network competencies help define success in any networking role. The skills and abilities collected
below include specific behaviors and technical skills that are consistently exhibited
by network professionals

45) How to install active directory for windows


Right-click the Start button and choose “Settings” > “Apps” > “Manage optional features” > “Add
feature“. Select “RSAT: Active Directory Domain Services and Lightweight Directory Tools“. Select
“Install“, then wait while Windows installs the feature

46) Dhcp dns port number

Common TCP/IP Protocols and Ports


Protocol TCP/UDP Port Description
Number

File Transfer TCP 20/21 FTP is one of the


Protocol (FTP) most commonly
(RFC 959) used file
transfer
protocols on the
Internet and
within private
networks. An
FTP server can
easily be set up
with little
networking
knowledge and
provides the
ability to easily
relocate files
from one
system to
another. FTP
control is
handled on TCP
port 21 and its
data transfer
can use TCP
port 20 as well
as dynamic
ports depending
on the specific
configuration.

Secure Shell TCP 22 SSH is the


(SSH) primary method
(RFC 4250- used to manage
4256) network devices
securely at the
command level.
It is typically
used as a secure
alternative to
Telnet which
does not
support secure
connections.
Telnet TCP 23 Telnet is the
(RFC 854) primary method
used to manage
network devices
at the command
level. Unlike SSH
which provides
a secure
connection,
Telnet does not,
it simply
provides a basic
unsecured
connection.
Many lower
level network
devices support
Telnet and not
SSH as it
required some
additional
processing.
Caution should
be used when
connecting to a
device using
Telnet over a
public network
as the login
credentials will
be transmitted
in the clear.

Simple Mail TCP 25 SMTP is used for


Transfer two primary
Protocol functions, it is
(SMTP) used to transfer
(RFC 5321) mail (email)
from source to
destination
between mail
servers and it is
used by end
users to send
email to a mail
system.
Domain TCP/UDP 53 The DNS is used
Name System widely on the
(DNS) public internet
(RFC 1034- and on private
1035) networks to
translate
domain names
into IP
addresses,
typically for
network
routing. DNS is
hieratical with
main root
servers that
contain
databases that
list the
managers of
high level Top
Level Domains
(TLD) (such as
.com). These
different TLD
managers then
contain
information for
the second level
domains that
are typically
used by
individual users
(for example,
cisco.com). A
DNS server can
also be set up
within a private
network to
private naming
services
between the
hosts of the
internal
network
without being
part of the
global system.
Dynamic Host UDP 67/68 DHCP is used on
Configuration networks that
Protocol do not use static
(DHCP) IP address
(RFC 2131) assignment
(almost all of
them). A DHCP
server can be
set up by an
administrator or
engineer with a
poll of
addresses that
are available for
assignment.
When a client
device is turned
on it can
request an IP
address from
the local DHCP
server, if there
is an available
address in the
pool it can be
assigned to the
device. This
assignment is
not permanent
and expires at a
configurable
interval; if an
address renewal
is not requested
and the lease
expires the
address will be
put back into
the poll for
assignment.

Trivial File UDP 69 TFTP offers a


Transfer method of file
Protocol transfer without
(TFTP) the session
(RFC 1350) establishment
requirements
that FTP uses.
Because TFTP
uses UDP
instead of TCP it
has no way of
ensuring the file
has been
properly
transferred, the
end device must
be able to check
the file to
ensure proper
transfer. TFTP is
typically used by
devices to
upgrade
software and
firmware; this
includes Cisco
and other
network
vendors’
equipment.

Hypertext TCP 80 HTTP is one of


Transfer the most
Protocol commonly used
(HTTP) protocols on
(RFC 2616) most networks.
HTTP is the
main protocol
that is used by
web browsers
and is thus used
by any client
that uses files
located on these
servers.

Post Office TCP 110 POP version 3 is


Protocol one of the two
(POP) version main protocols
3 used to retrieve
(RFC 1939) mail from a
server. POP was
designed to be
very simple by
allowing a client
to retrieve the
complete
contents of a
server mailbox
and then
deleting the
contents from
the server.

Network UDP 123 One of the most


Time Protocol overlooked
(NTP) protocols is
(RFC 5905) NTP. NTP is
used to
synchronize the
devices on the
Internet. Even
most modern
operating
systems support
NTP as a basis
for keeping an
accurate clock.
The use of NTP
is vital on
networking
systems as it
provides an
ability to easily
interrelate
troubles from
one device to
another as the
clocks are
precisely
accurate.

NetBIOS TCP/UDP 137/138/139 NetBIOS itself is


(RFC 1001- not a protocol
1002) but is typically
used in
combination
with IP with the
NetBIOS over
TCP/IP (NBT)
protocol. NBT
has long been
the central
protocol used to
interconnect
Microsoft
Windows
machines.

Internet TCP 143 IMAP version3 is


Message the second of
Access the main
Protocol protocols used
(IMAP) to retrieve mail
(RFC 3501) from a server.
While POP has
wider support,
IMAP supports a
wider array of
remote mailbox
operations
which can be
helpful to users.

Simple TCP/UDP 161/162 SNMP is used by


Network network
Management administrators
Protocol as a method of
(SNMP) network
(RFC 1901- management.
1908, 3411- SNMP has a
3418) number of
different
abilities
including the
ability to
monitor,
configure and
control network
devices. SNMP
traps can also
be configured
on network
devices to notify
a central server
when specific
actions are
occurring.
Typically, these
are configured
to be used when
an alerting
condition is
happening. In
this situation,
the device will
send a trap to
network
management
stating that an
event has
occurred and
that the device
should be
looked at
further for a
source to the
event.

Border TCP 179 BGP version 4 is


Gateway widely used on
Protocol the public
(BGP) internet and by
(RFC 4271) Internet Service
Providers (ISP)
to maintain very
large routing
tables and
traffic
processing. BGP
is one of the
few protocols
that have been
designed to deal
with the
astronomically
large routing
tables that must
exist on the
public Internet.

Lightweight TCP/UDP 389 LDAP provides a


Directory mechanism of
Access accessing and
Protocol maintaining
(LDAP) distributed
(RFC 4510) directory
information.
LDAP is based
on the ITU-T
X.500 standard
but has been
simplified and
altered to work
over TCP/IP
networks.

Hypertext TCP 443 HTTPS is used in


Transfer conjunction
Protocol over with HTTP to
SSL/TLS provide the
(HTTPS) same services
(RFC 2818) but doing it
using a secure
connection
which is
provided by
either SSL or
TLS.

Lightweight TCP/UDP 636 Just like HTTPS,


Directory LDAPS provides
Access the same
Protocol over function as
TLS/SSL LDAP but over a
(LDAPS) secure
(RFC 4513) connection
which is
provided by
either SSL or
TLS.

FTP over TCP 989/990 Again, just like


TLS/SSL the previous
(RFC 4217) two entries, FTP
over TLS/SSL
uses the FTP
protocol which
is then secured
using either SSL
or TLS.
47) Dora process

The DHCP employs a connectionless service model, using the User Datagram Protocol (UDP). ... DHCP
operations fall into four phases: server discovery, IP lease offer, IP lease request, and IP lease
acknowledgement. These stages are often abbreviated as DORA for discovery, offer, request, and
acknowledgement.

48) How to add membership groups in AD


Select Start, Programs, Administrative Tools, and User Manager. (If you are on a domain controller,
select User Manager for Domains.) Double-click the group to be modified or highlight it and select User,
Properties. To add local users, domain users, and/or global groups to the group, click Add.

49) DNS, it three queries types (Recursive query, Iterative query & non Recursive query)
https://www.cloudflare.com/learning/dns/glossary/dns-root-server/
The Domain Name System is a hierarchical and decentralized naming system for computers, services, or
other resources connected to the Internet or a private network. It associates various information with
domain names assigned to each of the participating entities.
A recursive query is a kind of query, in which the DNS server, who received your query will do all the job
of fetching the answer, and giving it back to you. During this process, the DNS server might
also query other DNS server's in the internet on your behalf, for the answer.
A non-recursive query is a query in which the DNS Resolver already knows the answer. It either
immediately returns a DNS record because it already stores it in local cache, or queries a DNS Name
Server which is authoritative for the record, meaning it definitely holds the correct IP for that hostname.
An iterative DNS query is a request for a website name or uniform resource locator (URL) that the
domain name system (DNS) server responds to with the IP address from its zone file cache, if possible. If
the server doesn't have the IP address requested, it forwards the request on to another DNS server.
A Name Authority Pointer (NAPTR) is a type of resource record in the Domain Name System of the
Internet. NAPTR records are most commonly used for applications in Internet telephony, for example, in
the mapping of servers and user addresses in the Session Initiation Protocol (SIP).
An Inverse Query is a Domain Name System (DNS) query in which a resolver contacts a name server to
perform a reverse name lookup, requesting a host name for a given IP address. ... However, inverse
queries can take place only on the name server queried and cannot be forwarded to another name
server.

50) Root server


A root name server is a name server for the root zone of the Domain Name System of the Internet. It
directly answers requests for records in the root zone and answers other requests by returning a list of
the authoritative name servers for the appropriate top-level domain.

51) DNS zones


A DNS zone is a distinct part of the domain namespace which is delegated to a legal entity—a person,
organization or company, who are responsible for maintaining the DNS zone. A DNS zone is also an
administrative function, allowing for granular control of DNS components, such as authoritative name
servers.
Active Directory Integrated Zones. Active Directory Integrated Zones stores its zone data in Active
Directory. ...
Primary Zone. This is the main zone and has a read/write copy of the zone data. ...
Secondary Zone. ...
Stub Zone. ...
Forward Lookup Zone. ...
Reverse Lookup Zone. ...
Zone Transfers

52) DNS records


DNS servers create a DNS record to provide important information about a domain or hostname,
particularly its current IP address. The most common DNS record types are: Address
Mapping record (A Record)—also known as a DNS host record, stores a hostname and its corresponding
IPv4 address.
https://simpledns.plus/help/dns-record-types

53) Dhcp dns


Dynamic Host Configuration Protocol (DHCP) enables users to dynamically and transparently assign
reusable IP addresses to clients. ... Domain Name System (DNS) is the system in the Internet that maps
names of objects (usually host names) into IP numbers or other resource record values.

54) These are some few questions:


1. LDAP (whole concept)
LDAP, or Lightweight Directory Access Protocol, is an open protocol used to store and retrieve data from
a hierarchical directory structure. Commonly used to store information about an organization and its
assets and users, LDAP is a flexible solution for defining any type of entity and its qualities.

2. How to create group policy


Open Group Policy Management by navigating to the Start menu > Windows Administrative Tools, then
select Group Policy Management. Right-click Group Policy Objects, then select New to create a new
GPO. Enter a name for the new GPO that you can identify what it is for easily, then click OK.

3. Apipa and range


This temporary IP address is called Automatic Private IP Address (APIPA). APIPA IP address range will be
from 169.254. 0.1 to 169.254. 255.254.

4. Exchange server
Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft. It runs
exclusively on Windows Server operating systems. The first version was called Exchange Server 4.0, to
position it as the successor to the related Microsoft Mail 3.5.

5. Forest functional
A Active Directory Forest is the collection of more than one domain trees having different name spaces
or roots. This means that the forest contains a number of domain trees that do not share a common
name space, or more so, do not have the same parent domain.
When the functional level of a forest or domain within Active Directory is raised, certain set of advanced
features become available to the users. The forest functional level (FFL) determines the features of
Active Directory Domain Services (AD DS) that are enabled in a forest.
6. Domain functional Level
Domain functional level (DFL) determines the features of a Domain Controller (DC) based on the
Windows server Operating System (OS) it runs on. Feature set of a particular DFL will be available for a
DC if it runs on the operating system version that is compatible with the functional level.

7. Active directory roles

Specific responsibilities

Function Roles & Responsibilities

Domain Domain Administrators at LBL, on occasion, have to perform the duties


Administrators associated with Schema and Enterprise administrators as identified below.
Schema Administrator
Maintains security and integrity of schema
Oversees modifications to schema
Full disaster recovery plan and practice of schema recovery
Enterprise Administrator
Creation and management of the forest
Overall security and reliability of the forest
Creation and removal of domains
Management of trust relationship with ALS domain
Management of trust relationship with JGI-OSF domain
Full disaster recovery plan and practice of trust recovery
Domain Administrator
Creation and management of directory infrastructure
Includes FSMO roles, trusts, Kerberos KDCs, replication topology, etc.
Creation of all top-level OU hierarchies with LBL standard sub-OUs, groups,
and appropriate security permissions. This includes adding the OU Admins
to the AddComputers group, Group Policy Creator Owners group, and OU
Admins mail list. It also includes setting appropriate permissions on the
created objects and linking of default GPOs.
Monitoring and reporting associated with the reliability and security of the
domain
Use the domain admin account only for actions that require the privilege
level of this account
Monitoring changes to domain root and domain controllers OU to ensure
unauthorized changes do not occur
Day-to-day management of the domain controllers
Monitoring connectivity, synchronization, replication, netlogon, time
services, FSMO roles, schema, NTDS database partitions, DNS settings, SRV
records, and trust relationships
Review DC event and security logs and take corrective actions
Monitor and resolve security situations at all levels of the domain to ensure
a stable and secure domain
Domain Controller Management
Physical security of the domain controllers in IT Division space and oversite
for all domain controllers
Backups and restores on domain controllers
Full disaster recovery plan and practice recovery of DCs and core Directory
objects
Policy monitoring and compliance
Apply and enforce LBL standard naming conventions for objects in the
domain
Comply with LBL AD policies and standards as defined on the AD Web Site
Monitor compliance with LBL AD policies and standards as defined on the AD
Web Site, including Change Management,
Communication and Coordination
Arbitrate disputes between OU Admins
Provide OU Admins with assistance when requested
Coordination with the LBL Cyber Security group to ensure the LBL domain is
secure
Comply with all Cyber Security group orders regarding emergency conditions
Work collectively with the OU administrators
Secure remote administration of the DCs and member servers managed by
the Infrastructure Group
Manage group policy at root of domain and for Domain Controllers OU
Manage the root Users and the root Computers OUs
Install and manage security reporting tools used to monitor changes to the
Active Directory
Coordinate and configure alarm distribution to OU Admins for OU-related
events
Plan and manage all migrations and upgrades related to the AD or the DCs

OU Administrators Ensure overall security and integrity of their managed OU hierarchy


Use the OU admin account only for actions that require the privilege level of
this account
Monitoring changes to OU hierarchy to ensure unauthorized changes do not
occur
Delegation of authority to others for appropriate object administration in
their OU hierarchy
Account management
Creation/deletion/management of objects, i.e. local user accounts, groups,
workstations, servers, printers, etc. in their OU hierarchy
Regularly perform housekeeping duties to keep their OU hierarchy clear of
stale, unused, expired, and other no longer needed objects
Process requests for access control authorized by data owner
Process requests for group drive mappings via login script
Create new computer accounts and join to directory services
The OU administrator will designate which administrators have "account
operator" access to the Windows user accounts for users in their
department.
These account operators will have privileges that let them make changes to
a subset of attributes for the accounts in their OU
This subset of attributes includes Windows-centric information like home
directory location, profile location, terminal server settings and other kinds
of user data that isn’t replicated from the root of the LBL domain
Group Policy Object (GPO) creation, troubleshooting, and management
Publishing resource objects from their OU hierarchy in the Active Directory
as applicable
Manage Group Policy Object (GPO) links within their OU hierarchy
Coordinate activities of Member Server owners
Work with server and/or data owners to set up permissions
Policy Compliance
Comply with LBL AD policies and standards as defined on the AD Web Site
Apply LBL standard naming conventions to objects in their OU hierarchy
Contact information.
Each top-level OU must contain contact information for the department to
facilitate contacting OU administrators
When OU manager changes, notify the Enterprise Administrator
Verify new software deployments and GPO policies work by testing them in
a test domain as appropriate.
Communication and coordination
Work collectively with the domain admins and with other OU administrators
Keep informed about domain-wide changes (e.g. attend periodic meetings of
the OU administrators or participate in mail lists)
Provide the following to the domain admins, when suspecting a desktop
related problem stems from a change to the Active Directory or DC
configuration
event description
logon name of affected user
name of affected computer
time of event
relevant warnings and errors in event logs
relevant warnings or errors displayed on screen

Server Owners Host and maintain server (i.e., IIS, business specific service, etc.)
(maybe dual role Patching/software upgrades
with OU Volume/partition space management
administrator) Hardware migration
Software licenses for all member server(s) added to their OU hierarchy
Hardware maintenance for all non-Infrastructure-managed member servers
Operating system maintenance for all non-Infrastructure-managed member
servers
Maintain level of member server system security by applying Service Packs
and security patches
Department application, file service, workstation and printer support
Create printer objects and access control lists.
Backup/recovery
Full disaster recovery plan and practice recovery

Desktop Support Request drive mapping via login script when needed from OU manager
Add user domain account to workstation
Assist data owners with archiving to alternative storage (cloud/solid state
device/Blu-Ray/dvd/cd)
Provide the following (if possible) to the domain admins, when suspecting a
desktop related problem stems from a change to the Active Directory or DC
configuration
event description
logon name of affected user
name of affected computer
time of event
relevant warnings and errors in event logs
relevant warnings or errors displayed on screen

Data Owners Request workspace from OU manager


Setup data access control lists with OU manager
Provide space usage projections to OU manager
Maintain house keeping & periodic data cleanup
Request drive mapping via login script when needed from OU manager

Help Desk Create new user accounts


Disable user accounts for xstaff (Remove Password)
Password reset service
Creating and routing of tickets related to Active Directory issues

End user Users who experience problems with a particular service should contact the
IT Help desk for general questions.

If the issue can’t be resolved, then the Help Desk (or the End user) can
contact the OU administrator

8. DHCP and DORA process.


DHCP operations fall into four phases: server discovery, IP lease offer, IP lease request, and IP lease
acknowledgement. These stages are often abbreviated as DORA for discovery, offer, request, and
acknowledgement. The DHCP operation begins with clients broadcasting a request.
DORA is a process which is used by DHCP in order to provide an IP address to hosts or client machine.
The DORA process has four messages

--------------------------
Full form notes :-
(SCTP) Stream Control Transmission Protocol.
(ECN) Explicit Congestion Notification.
(DCCP) Datagram Congestion Control Protocol.
(UDP) User Datagram Protocol.
(TCP) Transmission control protocol.
(Network access, internet, transport, application) 4 layers in tcp/ip.
(DHCP) Dynamic Host Configuration Protocol.
(OSI) Open Systems Interconnection Model.
(Physical, datalink, network, transport, session, presentation, application) 7 layers of osi model.
(SASL) Simple Authentication and Security Layer
(SAML) Security Assertion Markup Language
(SSO) single-sign on.
(FSMO) flexible single master operation.
(PDC) primary domain controller emulator.
(RSAT) Remote server administration tool.
ICMP (Internet Control Message Protocol)
(Saas) software as a service
Api application programming interface
MTA mail transfer agent
MX email exchange
Messaging Application Programming Interface (MAPI)

You might also like