How to Configure OUTLOOK & EXPRESS

How to Configure Outlook 2003 for Each User

This topic explains how to configure Outlook 2003 for the purposes of setting up a PKI/Exchange test environment.

The computer account and domain names used in this procedure are based on the test environment described in Implementing an Exchange 2003-Based Message Security System in a Test Environment.

Before You Begin

At the console, log on to CONT-WK01 as a member of the Domain Users group.


To configure Outlook 2003 for each user

1. Click Start, point to All Programs, point to Microsoft Office, and then click Microsoft Office Outlook 2003.

2. On the first page of the Outlook 2003 Startup Wizard, click Next.

3. On the Account Configuration page, select Yes, and then click Next.

4. On the Server Type page, select Microsoft Exchange Server, and then click Next.

5. On the Exchange Server Settings page, in the Microsoft Exchange Server box, type the name of the server running Exchange Server 2003 (CONT-EX01).

6. On the Exchange Server Settings page, in the User Name box, type the user name for the current user account, and then click Check name. Ensure that the name resolves correctly.

7. On the Exchange Server Settings page, make sure the Use local copy of Mailbox check box is selected, and then click Next.

8. On the last page, click Finish.

9. When prompted, enter the user name and initials in the User Name box.

How to Configure Outlook Express for Each User

This topic explains how to configure Outlook Express for the purposes of setting up a PKI/Exchange test environment.

The computer account and domain names used in this procedure are based on the test environment described in Implementing an Exchange 2003-Based Message Security System in a Test Environment.

Before You Begin

Because the differences between configuring Outlook Express for POP3 and IMAP4 are minimal, the following instructions detail how to configure Outlook Express to use IMAP4. If you want to use POP3, substitute POP3 for all IMAP4 references in the following instructions.

At the console, log on to CONT-WK01 as a member of the Domain Users group.


To configure Outlook Express for each user

1. Click Start, point to All Programs, and click Outlook Express.

2. When prompted to set Outlook Express as your default e-mail client, click No.

3. On the Your name page, enter the name of the current user in the Display name box, and then click Next.

4. On the Internet E-Mail Address page, enter the full Internet e-mail address for the user, for example, and then click Next.

5. On the E-mail Server Names page, make the following selection, and then click Next:

o In the My incoming mail server is a list, select IMAP.

o In the Incoming mail (POP3, IMAP, or HTTP) server box, type the full name of the Exchange server,

o In the Outgoing mail (SMTP) server box, type, the full name of the Exchange server.

6. On the Internet Mail Logon page, in the Account name box enter the user name, clear the Remember password check box, and then click Next.

7. On the final page, click Finish.

8. When prompted to download folders, click Yes.

PRINTER SHARING (How to Share a Printer on your Network)

How to Share a Printer on your Network

1. Go to the start menu

2. Click on the Printers and Faxes tab

3. Select the printer you wish to share

4. Right click on that printer and click on the sharing option

5. Select the Share this printer option

6. It will provide a default name, but you can change this name to anything you want

7. Click OK

8. Go to the other machines you wish to share this printer to - (make sure you know the IP address from the machine that has the printer attached to it)

9. Go to the start menu

10. Click on the Printers and Faxes tab

11. Click on the add a printer icon

12. Choose to connect to a printer on another computer or a printer on a network

13. Choose to browse for a network printer

14. Click on the next button

15. When it has finished searching for printers, a list will appear on the screen

16. Choose the desired printer

17. Right click on the printer and choose the add printer option

18. You will then be brought back to the Printers and Faxes window

19. Right click on the newly added printer and choose the set to default option

D H C P (How to configure DHCP on your Network)

Rahul K Revlana.


The DHCP server assigns a client an IP address taken from a predefined scope for a given amount of time. If an IP address is required for longer than the lease has been set for, the client must request an extension before the lease expires. If the client has not requested an extension on the lease time, the IP address will be considered free and can be assigned to another client. If the user wishes to change IP address then they can do so by typing "ipconfig /release", followed by "ipconfig /renew" in the command prompt. This will remove the current IP address and request a new one. Reservations can be defined on the DHCP server to allow certain clients to have their own IP address (this will be discussed a little later on). Addresses can be reserved for a MAC address or a host name so these clients will have a fixed IP address that is configured automatically. Most Internet Service Providers use DHCP to assign new IP addresses to client computers when a customer connects to the internet - this simplifies things at user level.

The above diagram diplays a simple structure consisting of a DHCP server and a number of client computers on a network.

The DHCP Server itself contains an IP Address Database which holds all the IP addresses available for distribution. If the client (a member of the network with a Windows 2000 Professional/XP operating system, for example) has "obtain an IP address automatically" enabled in TCP/IP settings, then it is able to receive an IP address from the DHCP server.

Setting up a DHCP Server

This will serve as a step-by-step guide on how to setup a DHCP server.

Installing the DHCP server is made quite easy in Windows 2003. By using the "Manage your server" wizard, you are able to enter the details you require and have the wizard set the basics for you. Open to "Manage your server" wizard, select the DHCP server option for the list of server roles and press Next.

You will be asked to enter the name and description of your scope.

Scope: A scope is a collection of IP addresses for computers on a subnet that use DHCP.

The next window will ask you to define the range of addresses that the scope will distribute across the network and the subnet mask for the IP address. Enter the appropriate details and click next.

You are shown a window in which you must add any exclusions to the range of IP addresses you specified in the previous window. If for example, the IP address is that of the company router then you won't want the DHCP server to be able to distribute that address as well. In this example I have excluded a range of IP addresses, to, and a single address, In this case, eleven IP's will be reserved and not distributed amongst the network clients.

It is now time to set the lease duration for how long a client can use an IP address assigned to it from this scope. It is recommended to add longer leases for a fixed network (in the office for example) and shorter leases for remote connections or laptop computers. In this example I have set a lease duration of twelve hours since the network clients would be a fixed desktop computer in a local office and the usual working time is eight hours.

You are given a choice of whether or not you wish to configure the DHCP options for the scope now or later. If you choose Yes then the upcoming screenshots will be of use to you. Choosing No will allow you to configure these options at a later stage.

The router, or gateway, IP address may be entered in next. The client computers will then know which router to use.

In the following window, the DNS and domain name settings can be entered. The DNS server IP address will be distributed by the DHCP server and given to the client.

If you have WINS setup then here is where to enter the IP Address of the WINS server. You can just input the server name into the appropriate box and press "Resolve" to allow it to find the IP address itself.

The last step is to activate the scope - just press next when you see the window below. The DHCP server will not work unless you do this.

The DHCP server has now been installed with the basic settings in place. The next stage is to configure it to the needs of your network structure.

Configuring a DHCP server

Hereunder is a simple explanation of how to configure a DHCP server.

The address pool displays a list of IP ranges assigned for distribution and IP address exclusions. You are able to add an exclusion by right clicking the address pool text on the left hand side of the mmc window and selecting "new exclusion range". This will bring up a window (as seen below) which will allow you to enter an address range to be added. Entering only the start IP will add a single IP address.

DHCP servers permit you to reserve an IP address for a client. This means that the specific network client will have the same IP for as long as you wanted it to. To do this you will have to know the physical address (MAC) of each network card. Enter the reservation name, desired IP address, MAC address and description - choose whether you want to support DHCP or BOOTP and press add. The new reservation will be added to the list. As an example, I have reserved an IP address ( for a client computer called Andrew.

If you right click scope options and press "configure options" you will be taken to a window in which you can configure more servers and their parameters. These settings will be distributed by the DHCP server along with the IP address. Server options act as a default for all the scopes in the DHCP server. However, scope options take preference over server options.

In my opinion, the DHCP server in Windows 2003 is excellent! It has been improved from the Windows 2000 version and is classified as essential for large networks. Imagine having to configure each and every client manually - it would take up a lot of time and require far more troubleshooting if a problem was to arise. Before touching any settings related to DHCP, it is best to make a plan of your network and think about the range of IPs to use for the computers.

D N S (how to configure DNS service on ur Network)

Rahul K Revlana


The Domain Name System (DNS) is the Active Directory locator in Windows 2000 and Windows Server 2003. Active Directory clients and client tools use DNS to locate domain controllers for administration and logon. You must have a DNS server installed and configured for Active Directory and the associated client software to function correctly. This article guides you through the required DNS configuration.

Install Microsoft DNS Server

1. Click Start, point to Settings, and then click Control Panel.

2. Double-click Add/Remove Programs.

3. Click Add and Remove Windows Components.

4. The Windows Components Wizard starts. Click Next.

5. Click Networking Services, and then click Details.

6. Click to select the Domain Name System (DNS) check box, and then click OK.

7. Click OK to start server Setup. The DNS server and tool files are copied to your computer.

8. Continue to the next step to configure the DNS server.

Configure the DNS Server Using DNS Manager

These steps guide you through configuring DNS by using the DNS Manager snap-in in Microsoft Management Console (MMC).

1. Click Start, point to Programs, point to Administrative Tools, and then click DNS Manager. You see two zones under your computer name: Forward Lookup Zone and Reverse Lookup Zone.

2. The DNS Server Configuration Wizard starts. Click Next.

3. If the Wizard does not auto-start, right-click your server name object in the DNS Manager console and choose Configure your Server.

4. Choose to add a forward lookup zone. Click Next. The new forward lookup zone must be a primary zone so that it can accept dynamic updates. Click Primary, and then click Next.

5. The zone name must be exactly the same as your Active Directory Domain name, or, if on a stand-alone or workgroup environment - the same as the suffix for all of the network computers that are to register with this DNS server. Type the name of the zone, and then click Next.

6. Accept the default name for the new zone file. Click Next.

7. Choose to add a reverse lookup zone now. Click Next.

8. Click Primary, and then click Next.

9. Type the name of the zone, and then click Next. The zone name should match the Network ID of your local subnet. For example, if your subnet range is from to, type 192.168.0 in the name value.

10. Accept the default name for the new zone file. Click Next.

11. Click Finish to complete the Server Configuration Wizard.

After the Server Configuration Wizard is finished, DNS Manager starts. Proceed to the next step to enable dynamic update on the zone you just added.

Enable Dynamic Update on the Forward and Reverse Lookup Zones (Optional - Recommended)

1. In DNS Manager, expand the DNS Server object.

2. Expand the Forward Lookup Zones folder.

3. Right-click the zone you created, and then click Properties.

4. On the General tab, click to select the Allow Dynamic Update check box, and then click OK to accept the change.

5. Do the same for the Reverse Lookup Zone.

Enable DNS Forwarding for Internet connections

1. Click Start, point to Programs, point to Administrative Tools, and then click DNS to start the DNS Management Console.

2. Right click the DNS Server object for your server in the left pane of the console, and click Properties.

3. Click the Forwarders tab.

4. Check the Enable forwarders check-box.

5. In the IP address box enter the IP address of the DNS servers you want to forward queries to - typically the DNS server of your ISP. You can also move them up or down. The one that is highest in the list gets the first try, and if it does not respond within a given time limit - the query will be forwarded to the next server in the list.

6. Click OK.




How to Install Active Directory on Windows Server 2003

This topic explains how to install Active Directory on a Windows Server 2003 for the purposes of setting up a PKI/Exchange test environment.

The computer account and domain names used in this procedure are based on the test environment described in Implementing an Exchange 2003-Based Message Security System in a Test Environment.

Before You Begin

Either at the console or through a terminal session, log on to CONT-CA01 as a member of the Administrators group.


To install Active Directory on Windows Server 2003

1. Click Start, click Run, type dcpromo, and then click OK.

2. On the first page of the Active Directory Installation Wizard, click Next.


If this is the first time you have installed Active Directory, you can click Active Directory Help to learn more about Active Directory before clicking Next.

3. On the next page of the Active Directory Installation Wizard, click Next.

4. On the Domain Controller Type page, click Domain Controller for a new domain, and then click Next.

5. On the Create New Domain page, click Domain in a new forest, and then click Next.

6. On the New Domain Name page, in the Full DNS name for new domain box, type, and then click Next.

7. On the Database and Log Folders page, accept the defaults in the Database folder box and the Log folder box, and then click Next.

8. On the Shared System Volume page, accept the default in the Folder location box, and then click Next.

9. On the DNS Registration Diagnostics page, click Install and configure the DNS server on this computer and set this computer to use this DNS server as its preferred DNS Server, and then click Next.

10. On the Permissions page, click Permissions compatible only with Windows 2000 or Windows Server 2003 operating systems, and then click Next.

11. On the Directory Services Restore Mode Administrator Password page, enter a password in the Restore Mode Password box, retype the password to confirm it in the Confirm password box, and then click Next.


Consult your organization's security policy to ensure that the password you select meets your organization's security requirements.

12. On the Summary page, confirm the information is correct, and then click Next.

13. When prompted to restart the computer, click Restart now.

14. After the computer restarts, log on to CONT-CA01 as a member of the Administrators group.

Rahul k Revlana


Q: What is an IP address?

An Internet Protocol (IP) address is a numerical identification and logical address that is assigned to devices participating in a computer network utilizing the Internet Protocol for communication between its nodes

Q: What is a subnet mask?

Q: What is ARP?

ARP is the Address Resolution Protocol. The ARP protocol maps addresses between the Data Link Layer and the Network Layer of the OSI Model.

Q: What is ARP Cache Poisoning?

ARP poisoning or ARP Poison Routing (APR), is a technique used to attack an Ethernet wired or wireless network. ARP Spoofing may allow an attacker to sniff data frames on a local area network (LAN), modify the traffic, or stop the traffic altogether (known as a denial of service attack). The attack can only be used on networks that actually make use of ARP and not another method of address resolution

Q: What is the ANDing process?

In order to determine whether a destination host is local or remote, a computer will perform a simple mathematical computation referred to as an AND operation. While the sending host does this operation internally, understanding what takes place is the key to understanding how an IP-based system knows whether to send packets directly to a host or to a router.

An AND operation is very simple – two binary digits are compared, and the based on their combination, a resultant value is formed. It is neither adding nor subtracting, so do not consider it as such. In the most simple terms, there are only three possibilities when ANDing two binary digits. The list below outlines these operations and their results.

Q: What is a default gateway? What happens if I don't have one?

In computer networking, a default gateway is the device that passes traffic from the local subnet to devices on other subnets. The default gateway often connects a local network to the Internet, although internal gateways for local networks also exist.

Q: Can a workstation computer be configured to browse the Internet and yet NOT have a default gateway?

If we are using public ip address, we can browse the internet. If it is having an intranet address a gateway is needed as a router or firewall to communicate with internet.

Q: What is a subnet?

Q: What is APIPA?

A feature of Microsoft Windows, APIPA is a DHCP failover mechanism. With APIPA, DHCP clients can obtain IP addresses when DHCP servers are nonfunctional. APIPA exists in all popular versions of Windows except Windows NT.

When a DHCP server fails, APIPA allocates addresses in the private range to Clients verify their address is unique on the LAN using ARP. When the DHCP server is again able to service requests, clients update their addresses automatically.

Q: What is an RFC? Name a few if possible (not necessarily the numbers, just the ideas behind them)

A Request For Comments (RFC) document defines a protocol or policy used on the Internet. An RFC can be submitted by anyone. Eventually, if it gains enough interest, it may evolve into an Internet Standard ( see FAQ XXX). Each RFC is designated by an RFC number. Once published, an RFC never changes. Modifications to an original RFC are assigned a new RFC number

An Internet Document can be submitted to the IETF by anyone, but the IETF decides if the document becomes an RFC. Eventually, if it gains enough interest, it may evolve into an Internet standard.

Each RFC is designated by an RFC number. Once published, an RFC never changes. Modifications to an original RFC are assigned a new RFC number.

Q: What is RFC 1918?

Q: What is CIDR?

Q: You have the following Network ID: What is the IP range for your network?

Q: You have the following Network ID: You need at least 500 hosts per network. How many networks can you create? What subnet mask will you use?

Q: You need to view at network traffic. What will you use? Name a few tools

Q: How do I know the path that a packet takes to the destination?

Q: What does the ping -l 1000 -n 100 command do?

Q: What is DHCP? What are the benefits and drawbacks of using it?

Q: Describe the steps taken by the client and DHCP server in order to obtain an IP address.

Q: What is the DHCPNACK and when do I get one? Name 2 scenarios.

Q: What ports are used by DHCP and the DHCP clients?

Q: Describe the process of installing a DHCP server in an AD infrastructure.


Q: Describe the integration between DHCP and DNS.

Q: What options in DHCP do you regularly use for an MS network?

Q: What are User Classes and Vendor Classes in DHCP?

Q: How do I configure a client machine to use a specific User Class?

Q: What is the BOOTP protocol used for, where might you find it in Windows network infrastructure?

Q: DNS zones – describe the differences between the 4 types.

Q: DNS record types – describe the most important ones.

Q: Describe the process of working with an external domain name

Q: Describe the importance of DNS to AD.

Q: Describe a few methods of finding an MX record for a remote domain on the Internet.

Q: What does "Disable Recursion" in DNS mean?

Q: What could cause the Forwarders and Root Hints to be grayed out?

Q: What is a "Single Label domain name" and what sort of issues can it cause?

Q: What is the "" zone used for?

Q: What are the requirements from DNS to support AD?

Q: How do you manually create SRV records in DNS?

Q: Name 3 benefits of using AD-integrated zones.

Q: What are the benefits of using Windows 2003 DNS when using AD-integrated zones?

Q: You installed a new AD domain and the new (and first) DC has not registered its SRV records in DNS. Name a few possible causes.

Q: What are the benefits and scenarios of using Stub zones?

Q: What are the benefits and scenarios of using Conditional Forwarding?

Q: What are the differences between Windows Clustering, Network Load Balancing and Round Robin, and scenarios for each use?

Q: How do I work with the Host name cache on a client computer?

Q: How do I clear the DNS cache on the DNS server?

Q: What is the address used for?

Q: What is WINS and when do we use it?

Q: Can you have a Microsoft-based network without any WINS server on it? What are the "considerations" regarding not using WINS?

Q: Describe the differences between WINS push and pull replications.

Q: What is the difference between tombstoning a WINS record and simply deleting it?

Q: Name the NetBIOS names you might expect from a Windows 2003 DC that is registered in WINS.

Q: Describe the role of the routing table on a host and on a router.

Q: What are routing protocols? Why do we need them? Name a few.

Q: What are router interfaces? What types can they be?

Q: In Windows 2003 routing, what are the interface filters?

Q: What is NAT?

Q: What is the real difference between NAT and PAT?

Q: How do you configure NAT on Windows 2003?

Q: How do you allow inbound traffic for specific hosts on Windows 2003 NAT?

Q: What is VPN? What types of VPN does Windows 2000 and beyond work with natively?

Q: What is IAS? In what scenarios do we use it?

Q: What's the difference between Mixed mode and Native mode in AD when dealing with RRAS?

Q: What is the "RAS and IAS" group in AD?

Q: What are Conditions and Profile in RRAS Policies?

Q: What types or authentication can a Windows 2003 based RRAS work with?

Q: How does SSL work?

Q: How does IPSec work?

Q: How do I deploy IPSec for a large number of computers?

Q: What types of authentication can IPSec use?

Q: What is PFS (Perfect Forward Secrecy) in IPSec?

Q: How do I monitor IPSec?

Q: Looking at IPSec-encrypted traffic with a sniffer. What packet types do I see?

Q: What can you do with NETSH?

Q: How do I look at the open ports on my machine?

Q: What is Active Directory?

Q: What is LDAP?

Q: Can you connect Active Directory to other 3rd-party Directory Services? Name a few options.

Q: Where is the AD database held? What other folders are related to AD?

Q: What is the SYSVOL folder?

Q: Name the AD NCs and replication issues for each NC

Q: What are application partitions? When do I use them

Q: How do you create a new application partition

Q: How do you view replication properties for AD partitions and DCs?

Q: What is the Global Catalog?

Q: How do you view all the GCs in the forest?

Q: Why not make all DCs in a large forest as GCs?

Q: Trying to look at the Schema, how can I do that?

Q: What are the Support Tools? Why do I need them?

Q: What is LDP? What is REPLMON? What is ADSIEDIT? What is NETDOM? What is REPADMIN?

Q: What are sites? What are they used for?

Q: What's the difference between a site link's schedule and interval?

Q: What is the KCC?

Q: What is the ISTG? Who has that role by default?

Q: What are the requirements for installing AD on a new server?

Q: What can you do to promote a server to DC if you're in a remote location with slow WAN link?

Q: How can you forcibly remove AD from a server, and what do you do later? • Can I get user passwords from the AD database?

Q: What tool would I use to try to grab security related packets from the wire?

Q: Name some OU design considerations.

Q: What is tombstone lifetime attribute?

Q: What do you do to install a new Windows 2003 DC in a Windows 2000 AD?

Q: What do you do to install a new Windows 2003 R2 DC in a Windows 2003 AD?

Q: How would you find all users that have not logged on since last month?

Q: What are the DS* commands?

Q: What's the difference between LDIFDE and CSVDE? Usage considerations?

Q: What are the FSMO roles? Who has them by default? What happens when each one fails?

What FSMO placement considerations do you know of?

Q: I want to look at the RID allocation table for a DC. What do I do?

Q: What's the difference between transferring a FSMO role and seizing one? Which one should you NOT seize? Why?

Q: How do you configure a "stand-by operation master" for any of the roles?

Q: How do you backup AD?

Q: How do you restore AD?

Q: How do you change the DS Restore admin password?

Q: Why can't you restore a DC that was backed up 4 months ago?

Q: What are GPOs?

Q: What is the order in which GPOs are applied?

Q: Name a few benefits of using GPMC.

Q: What are the GPC and the GPT? Where can I find them?

Q: What are GPO links? What special things can I do to them?

Q: What can I do to prevent inheritance from above?

Q: How can I override blocking of inheritance?

Q: How can you determine what GPO was and was not applied for a user? Name a few ways to do that.

Q: A user claims he did not receive a GPO, yet his user and computer accounts are in the right OU, and Q: everyone else there gets the GPO. What will you look for?

Q: Name a few differences in Vista GPOs

Q: Name some GPO settings in the computer and user parts.

Q: What are administrative templates?

Q: What's the difference between software publishing and assigning?

Q: Can I deploy non-MSI software with GPO?

Q: You want to standardize the desktop environments (wallpaper, My Documents, Start menu, printers etc.) on the computers in one department. How would you do that?

Technical Interview Questions – Exchange 2003

• Tell me a bit about the capabilities of Exchange Server.

• What are the different Exchange 2003 versions?

• What's the main differences between Exchange 5.5 and Exchange 2000/2003?

• What are the major network infrastructure for installing Exchange 2003?

• What is the latest Exchange 2003 Service Pack? Name a few changes in functionality in that SP.

• What are the disk considerations when installing Exchange (RAID types, locations and so on).

• You got a new HP DL380 (2U) server, dual Xeon, 4GB of RAM, 7 SAS disks, 64-bit. What do you do next to install Exchange 2003? (you have AD in place)

• Why not install Exchange on the same machine as a DC?

• Are there any other installation considerations?

• How would you prepare the AD Schema in advance before installing Exchange?

• What type or permissions do you need in order to install the first Exchange server in a forest? In a domain?

• How would you verify that the schema was in fact updated?

• What type of memory optimization changes could you do for Exchange 2003?

• How would you check your Exchange configuration settings to see if they're right?

• What are the Exchange management tools? How and where can you install them?

• What types of permissions are configurable for Exchange?

• How can you grant access for an administrator to access all mailboxes on a specific server?

• What is the Send As permission?

• What other management tools are used to manage and control Exchange 2003? Name the tools you'd use.

• What are Exchange Recipient types? Name 5.

• You created a mailbox for a user, yet the mailbox does not appear in ESM. Why?

• You wanted to change mailbox access permissions for a mailbox, yet you see the SELF permission alone on the permissions list. Why?

• What are Query Based Distribution groups?

• What type of groups would you use when configuring distribution groups in a multiple domain forest?

• Name a few configuration options for Exchange recipients.

• What's the difference between Exchange 2003 Std. and Ent. editions when related to storage options and size?

• Name a few configuration options related to mailbox stores.

• What are System Public Folders? Where would you find them?

• How would you plan and configure Public Folder redundancy?

• How can you immediately stop PF replication?

• How can you prevent PF referral across slow WAN links?

• What types of PF management tools might you use?

• What are the differences between administrative permissions and client permissions in PF?

• How can you configure PF replication from the command prompt in Exchange 2003?

• What are the message hygiene options you can use natively in Exchange 2003?

• What are the configuration options in IMF?

• What are virtual servers? When would you use more than one?

• Name some of the SMTP Virtual Server configuration options.

• What is a Mail Relay? Name a few known mail relay software or hardware options.

• What is a Smart Host? Where would you configure it?

• What are Routing Groups? When would you use them?

• What are the types of Connectors you can use in Exchange?

• What is the cost option in Exchange connectors?

• What is the Link State Table? How would you view it?

• How would you configure mail transfer security between 2 routing groups?

• What is the Routing Group Master? Who holds that role?

• Explain the configuration steps required to allow Exchange 2003 to send and receive email from the Internet (consider a one-site multiple server scenario).

• What is DS2MB?

• What is Forms Based Authentication?

• How would you configure OWA's settings on an Exchange server?

• What is DSACCESS?

• What are Recipient Policies?

• How would you work with multiple recipient policies?

• What is the "issue" with trying to remove email addresses added by recipient policies? How would you fix that?

• What is the RUS?

• When would you need to manually create additional RUS?

• What are Address Lists?

• How would you modify the filter properties of one of the default address lists?

• How can you create multiple GALs and allow the users to only see the one related to them?

• What is a Front End server? In what scenarios would you use one?

• What type of authentication is used on the front end servers?

• When would you use NLB?

• How would you achieve incoming mail redundancy?

• What are the 4 types of Exchange backups?

• What is the Dial-Tone server scenario?

• When would you use offline backup?

• How do you re-install Exchange on a server that has crashed but with AD intact?

• What is the dumpster?

• What are the e00xxxxx.log files?

• What is the e00.chk file?

• What is circular logging? When would you use it?

• What's the difference between online and offline defrag?

• How would you know if it is time to perform an offline defrag of your Exchange stores?

• How would you plan for, and perform the offline defrag?

• What is the eseutil command?

• What is the isinteg command?

• How would you monitor Exchange's services and performance? Name 2 or 3 options.

• Name all the client connection options in Exchange 2003.

• What is Direct Push? What are the requirements to run it?

• How would you remote wipe a PPC?

• What are the issues with connecting Outlook from a remote computer to your mailbox?

• How would you solve those issues? Name 2 or 3 methods

• What is RPC over HTTP? What are the requirements to run it?

• What is Cached Mode in OL2003/2007?

• What are the benefits and "issues" when using cached mode? How would you tackle those issues?

• What is S/MIME? What are the usage scenarios for S/MIME?

• What are the IPSec usage scenarios for Exchange 2003?

• How do you enable SSL on OWA?

• What are the considerations for obtaining a digital certificate for SSL on Exchange?

• Name a few 3rd-party CAs.

• What do you need to consider when using a client-type AV software on an Exchange server?

• What are the different clustering options in Exchange 2003? Which one would you choose and why.

PC Hardware

• What is FSB?

• What are Vcore and Vi/o?

• On what type of socket can you install a Pentium 4 CPU?

• What is SMP?

• Which Intel and AMD processors support SMP?

• How do LGA sockets differ from PGA and SEC?

• What is the difference between Pentium 4 and Pentium Core 2 Duo? Explain the new technology.

• How does IRQ priority works?

• What technology enables you to upgrade your computer's BIOS by simply using a software?

• What happens if you dissemble the battery located on the Mother-Board?

• How do L1, L2, and L3 work?

• How should we install RAM on a Dual-Channel Motherboard?

• What is the advantage of serial over parallel bus?

• Is USB using serial or parallel bus? What about Firewire?

• How much power is supplied to each USB port?

• When should you change your bus-powered USB hub to a self-powered USB hub?

• What is a UPS?

• What is the difference between standby and online UPS?

• What is LBA (in Hard-Disks)?

• How many Hard Disks can you install on an E-IDE controller?

• Can you configure two hard disks to use the Master setting on the same PC?

• What is the difference between Narrow-SCSI and Wide-SCSI?

• What is SAS?

• What are the three main reasons for using RAID?

• Is RAID 0 considered to be a redundant Solution? Why?

• How many disks can be used for RAID 1?

• How RAID 5 works?

• What is the smallest number of disks required for RAID5?

• What other types of RAID do you know?

• What are the six steps for laser printing?

• What is the difference between PCI-EX x1 and PCI-EX x16?

Microsoft-based Operating Systems

• What is the difference between a workgroup and a domain?

• What are the major advantages of working in a domain model?

• What types of operating system installation methods do you know?

• What is an answer file?

• How would you create an answer file for Windows XP? How would you create one for Windows Vista?

• How do you perform an unattended installation on Windows XP?

• What is Sysprep?

• How do you use Sysprep?

• What is the major difference between Newsid and Sysprep?

• What is the function of the pagefile.sys file?

• What is the function of the hiberfil.sys file?

• What is the Registry?

• How can you edit the Registry? Name at least 3 ways of doing that.

• What should you do if you receive a message stating: "The following file is missing or corrupt: 'WINDOWS'SYSTEM32'CONFIG'SYSTEM"?

• How would you repair an unsuccessful driver update?

• When should you use each of the fallowing tools: System Restore, LKGC and Recovery Console?

• How do you set different print priority for different users?

• How can you reset user's passwords if you don't know his current password?

• What's the difference between changing a user's password and resetting it?

• You want to grant a user the right to perform backups – should you add him to the administrators group?

• What is MMC?

• What is gpedit.msc?

• How would you use the MMC to manage other servers on your network?

• You set a local policy for your Stand-alone XP Professional – would the local policy effects the administrators group?

• What new in the Windows Vista Local Policy?

• What is the difference between User Privileges and User Permissions?

• What is Safe Mode?

• Which logs can be found in Event Viewer?

• What is msconfig? On which OS can it be found?

• Can you upgrade XP Home Edition to Server 2003?

• Which permission will you grant a user for a folder he need to be able to create and delete files in, if you do not want him to be able to change permissions for the folder?

• What is the difference between clearing the "allow" permission and checking the "deny"?


• What is a NIC?

• What is a MAC Address?

• When would you use a crosslink cable?

• What are the main advantages and disadvantages of Fiber-Optic-based networks?

• What is the difference between a Hub and a Switch?

• On which OSI layer can a router be found?

• What is CSMA/CD?

• What is multicast?

• What is broadcast?

• What is the difference between TCP and UDP?

• Describe some of the settings that are added by TCP and by UDP to the packet's header.

• What are TCP Ports? Name a few.

• What is a TCP Session?

• What three elements make up a socket?

• What will happen if you leave the default gateway information empty while manually configuring TCP/IP?

• What will happen if you execute the following command: "arp –d *"?

• What is ICMP?

• When would you use the ping command with the "-t" switch?

• What command-line tool would help you discover for which port numbers your computer is listening?

• What is APIPA? How would you recognize it?

• What is a Cyclic Redundancy Check?

• What would you type in at a command prompt to view the IP settings for the computer that you are sitting at?

• What command would you type in at a command prompt to view the IP address of the remote computer?

• What is the W Value for class B?

• What is the Net ID of an IP Address of with Subnet Mask of

• What is CIDR?

• What is used for?

• What is the maximum number of hosts for a Class B Network?

• What is the (default) class type of

• What is the subnet mask for

• What is the result when changing from a subnet mask of to a subnet mask of

• How can you access a shared folder from a remote computer? Name at least 3 methods.

Rahul K Revlana

Networking Interview Questions

what is the role of Domain controller in lan ? What is the active directory ?

What is the differnce between win 2000 server & win 2003 server?

what is troublshooting the network

what is web server,application server,database server

what is frame realy

How many types of backups in windows2003

When we are developing interface program in oracle apps what we have to do if there is no interface table.

how many systems can i connect in class “A,B AND C” as well as private and publi network?


What is the difference between software deployment and DFS

I am using vm ware In my system and I am using 2003server in vm ware ( my o.s is XP ) Now I would like to install .zip in my 2003server machine .how can I do this

How to use a user of domain as a SQL server database login.

Different Solutions to dining philosophers problem.

When you look at a Cisco switch like Cisco 2950, why are the ports labeled with an ‘X’ behind the number? Like 1x, 2x…..23x, 24x, and what does it mean when there is no ‘X’?

what does star, ring, and tree mean

Expand IDEA?

What is Kerberos?

What is wide-mouth frog?

What is packet filter?

Rahul K Revlana

Explain 5-4-3 rule?

What are the important topologies for networks?

What is the difference between TFTP and FTP application layer protocols?

What is difference between ARP and RARP?

What are the different type of networking or internetworking devices?

What is Project 802?

How Gateway is different from Routers?

What is cladding?


What is Beaconing?

What do you meant by “triple X” in Networks?

Which one is not done by Data link layer ? 1. bit stuffing 2. LRC 3. CRC 4. parity check

Why networks are layered ? What is the advantage of that ?

How many layers are there in OSI ? Why is it called OSI model ?

what are the various network topologies ?

Give an example for bus type network.

What is the Bandwidth of ethernet ?

Explain the advantage and disadvantage of ethernet ?

Which is the protocol used in ethernet. (CSMA/CD) Why is it called so ?

What is the advantage of Ring network ? Compare it with ethernet

TCP/IP can work on a)ethernet b)tokenring c)a&b d)none

x.25 protocol encapsulates the follwing layers a)network b)datalink c)physical d)all of the above e)none of the above

wht is DSL?

Rahul K Revlana

whtch file system support the tcp/ip , http protocal and ftp protocal?

where can we see the OS in the system?

what is the difference between HTTP and TCP/IP protocol?

How to communicate between different processes?

What is lock granularity?

what is disk interleaving? why is disk interleaving adopted?

What is Semaphore? What is deadlock?

What is a router? What is a gateway?

What is UTP?

How do cryptography-based keys ensure the validity of data transferred across the network?

What is data link layer in the OSI reference model responsible for?

What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP or IP?

What is the difference between forward lookup and reverse lookup in DNS?

What is LMHOSTS file?

What is binding order?

what is firewall?How it differs from ACLS?

what are the different ways to achieve the network security?

What are the ways to troubleshoot the network, techniques, commands?

What problems with the network you had had and how you solved it?

what is active directory?

how would you troubleshoot a situation where there is no display on a monitor?

What are some of the basic steps taken while troubleshooting blue screen errors in win xp?

Rahul K Revlana

Question What is datagram, datagram packets and datagram sockets?

How is Network Testing carried out?

How would you capture network traffic?

How would you find what ports are open on a machine (local and remote)?

What?s a switch?

What is a router?

which of the following is not used for client/server. i)RPC,ii)TCP/IP,iii)MESSAGEQs,iv)None

voltage levels of rs232c

What exactly happens after each system call in sockets, both at the client and at the server.

how many no of 4×1 muxs are required for making an 16×1 mux

minimum Number of ip addresses requiered for an router

If A sends a message to B with encryption then key is a)A public key b)B public key c)A private key d)B private key

client server is working in asyn mode then how communication will take place bt client and server.

What are class A, B,C,…

Checksum in IP packet is

CSMA/Cd protocol used in

Which one is not done by Data link layer ? bit stuffing, LRC,CRC,parity check

Which one is costly – ethernet of ring networks ?

What is the basic requirement of a real-time network ?

What is the advantage of Ring network ?

Explain the advantage and disadvantage of ethernet ?

What is the Bandwidth of ethernet ?

Rahul K Revlana

Tell an example of bus type network.

Which are the different network toplogies ?

How many layers are there in OSI ?

Why networks are layered ?

what is DHCP in networking clear it properly pls

What is datagram, datagram packets and datagram sockets?

Why is Socket used?

What is socket and server socket?

Why TCP and IP are written all together as TCP/IP?

How data flow from source to destination, Explain each step from layer to layer?

What are the 3 most common LAN architectures?

Coaxial Cable?

What is a NIC?

Which is better Router or Layer 3 switch?How.

What is ARP and RARP?