Windows Server Interview Questions
Questions !
>What is Active Directory ?
Active Directory is a Meta Data. Active Directory is a data base which stores a data base like your user information, computer information and also other network object info. It has capabilities to manage and administrator the complete Network which connect with AD.
> What is Active Directory Domain Services ?
In Windows 2000 Server and Windows Server 2003, the directory service is named Active Directory. In Windows Server 2008 and Windows Server 2008 R2, the directory service is named Active Directory Domain Services (AD DS). The rest of this topic refers to AD DS, but the information is also applicable to Active Directory.
>What is domain ?
A domain is a set of network resources (applications, printers, and so forth) for a group of users. The user need only to log in to the domain to gain access to the resources, which may be located on a number of different servers in the network. The 'domain' is simply your computer address not to confused with an URL. A domain address might look something like 211.170.469.
>What is domain controller ?
A Domain controller (DC) is a server that responds to security authentication requests (logging in, checking permissions, etc.) within the Windows Server domain. A domain is a concept introduced in Windows NT whereby a user may be granted access to a number of computer resources with the use of a single username and password combination.
>What is LDAP ?
Lightweight Directory Access Protocol LDAP is the industry standard directory access protocol, making Active Directory widely accessible to management and query applications. Active Directory supports LDAPv3 and LDAPv2.
>What is KCC ?
KCC ( knowledge consistency checker ) is used to generate replication topology for inter site replication and for intrasite replication. Within a site replication traffic is done via remote procedure calls over ip, while between sites it is done through either RPC or SMTP.
>Where is the AD database held? What other folders are related to AD?
The AD data base is store in c:\windows\ntds\NTDS.DIT.
>What is the SYSVOL folder?
The sysVOL folder stores the server's copy of the domain's public files. The contents such as group policy, users etc of the sysvol folder are replicated to all domain controllers in the domain.
> What is the Netlogon folder use for?
Sysvol is an important component of Active Directory. The Sysvol folder is shared on an NTFS volume on all the domain controllers in a particular domain. Sysvol is used to deliver the policy and logon scripts to domain members.
By default sysvol includes 2 folders,the scripts folder is shared with the name NETLOGON
1.Policies - (Default location - %SystemRoot%\Sysvol\Sysvol\domain_name\Policies)
2.Scripts - (Default lcation - %SystemRoot%\Sysvol\Sysvol\domain_name\Scripts)
>What are the Windows Server 2003 keyboard shortcuts ?
Winkey opens or closes the Start menu. Winkey + BREAK displays the System Properties dialog box. Winkey + TAB moves the focus to the next application in the taskbar. Winkey + SHIFT + TAB moves the focus to the previous application in the taskbar. Winkey + B moves the focus to the notification area. Winkey + D shows the desktop. Winkey + E opens Windows Explorer showing My Computer. Winkey + F opens the Search panel. Winkey + CTRL + F opens the Search panel with Search for Computers module selected. Winkey + F1 opens Help. Winkey + M minimizes all. Winkey + SHIFT+ M undoes minimization. Winkey + R opens Run dialog. Winkey + U opens the Utility Manager. Winkey + L locks the computer.
>Where are the Windows NT Primary Domain Controller (PDC) and its Backup Domain Controller (BDC) in Server 2003 ?
The Active Directory replaces them. Now all domain controllers share a multimaster peer-to-peer read and write relationship that hosts copies of the Active Directory.
>I am trying to create a new universal user group. Why can’t I ?
Universal groups are allowed only in native-mode Windows Server 2003 environments. Native mode requires that all domain controllers be promoted to Windows Server 2003 Active Directory.
>What is LSDOU ?
It’s group policy inheritance model, where the policies are applied toLocal machines, Sites, Domains and Organizational Units.
>Why doesn’t LSDOU work under Windows NT ?
If the NTConfig.pol file exist, it has the highest priority among the numerous policies.
>What’s the number of permitted unsuccessful logons on Administrator account? Unlimited. Remember, though, that it’s the Administrator account, not any account that’s part of the Administrators group.
> What’s the difference between guest accounts in Server 2003 and other editions?
More restrictive in Windows Server 2003.
> How many passwords by default are remembered when you check "Enforce Password History Remembered"?
User’s last 6 passwords.
> Can GC Server and Infrastructure place in single server If not explain why ?
No, As Infrastructure master does the same job as the GC. It does not work together.
> Which is service in your windows is responsible for replication of Domain controller to another domain controller.
KCC generates the replication topology.
Use SMTP / RPC to replicate changes.
> What Intrasite and Intersite Replication ?
Intrasite is the replication with in the same site & intersite the replication between sites.
> What is lost & found folder in ADS ?
It’s the folder where you can find the objects missed due to conflict.
Ex: you created a user in OU which is deleted in other DC & when replication happed ADS didn’t find the OU then it will put that in Lost & Found Folder.
> What is Garbage collection ?
Garbage collection is the process of the online defragmentation of active directory. It happens every 12 Hours.
> What System State data contains ?
Contains Startup files,
Registry
Com + Registration Database
Memory Page file
System files
AD information
Cluster Service information
SYSVOL Folder
1. What is the different between Workgroup and Domain? Domain Server has
Centralized Control Where else Workgroup has no Centralized Control
- Domain Network has higher level of security when compared to Workgroup.
- Domain Network Implementation and Maintained cost is very less when compared to that of workgroup.
- Time constrain is very less when compared to that of a Workgroup.
- Administrator has overall control on the network where else workgroup has no control.
Navigate to Local User and Groups add the domain users to administrators group in the local system.
3. How will you restrict user logon timing in domain?
Navigate to Active Directory Users and Computers, User Properties select logon times and restrict the user logon timing as needed.
4. What is the purpose of sysvol?
5. What is OU? Explain its Uses.
Organization Unit is set of active directory object within a domain. It is used to design an organization structure, Restrict user’s visibility and to delegate control.
- Windows Server 2003, Standard Edition: - is aimed towards small to medium sized businesses. Standard Edition supports file and printer sharing, offers secure Internet connectivity, and allows centralized desktop application deployment.
- Windows Server 2003, Enterprise Edition: - is aimed towards medium to large businesses. It is a full-function server operating system that supports up to eight processors and provides enterprise-class features and support for up to 32 GB of memory.
- Windows Server 2003, Web Edition: - is mainly for building and hosting Web applications, Web pages, and XML Web Services.
- Windows Server 2003, Datacenter Edition: - is the flagship of the Windows Server line and designed for immense infrastructures demanding high security and reliability.
- A Record binds Name with IP Address
- PTR Record binds IP Address to Name
- A Record OR Host Record is used to bind a Name with IP Address.
- PTR Record is used to bind an IP Address with Name.
11. Explain about Scope in DHCP Server?
Scope is collective information of assigning IP address for clients. It contains information like IP Address Range, Exclusion Range, Lease Period, Reservation, Router IP Address, DNS Address, etc. Based on the scope configuration DHCP allocates IP address to its entire client.
13. How will you backup DNS Server?
Backup the directory “%System Root%\System32\DNS”.
Alternate method: Open DHCP Console select server to backup and restore DHCP database.
15. Explain APIPA.
A Windows-based computer that is configured to use DHCP can automatically assign itself an Internet Protocol (IP) address if a DHCP server is not available or does not exist. The Internet Assigned Numbers Authority (IANA) has reserved 169.254.0.0-169.254.255.255 for Automatic Private IP Addressing (APIPA).
Group policies are used by administrators to configure and control user environment settings. Group Policy Objects (GPOs) are used to configure group policies which are applied to sites, domains, and organizational units (OUs) .There is a maximum of 1000 applicable group policies.
19. Explain Hidden Share.
Hidden or administrative shares are share names with a dollar sign ($) appended to their names. Administrative shares are usually created automatically for the root of each drive letter. They do not display in the network browse list.
21. How do I configure a client machine to use a specific IP Address?
By reserving an IP Address using client machine MAC or Physical address.
- AD Integrated Zones allow Secure Dynamic Updates. I.e. there will not be any duplicate or unwanted records. Since all the information are validated in active directory.
- By creating AD- integrated zone you can also trace hacker and spammer by creating reverse zone.
- AD integrated zones are stored as part of the active directory and support domain-wide or forest-wide replication through application partitions in AD.
24. How do you change the DS Restore admin password?
Using NTDSUTIL tool.
25. How can you forcibly remove AD from a server?
Using the command dcpromo /forceremoval
27. How can you restrict running certain applications on a machine?
The Group Policy Object Editor and the Software Restriction Policies extension of Group Policy Object Editor are used to restrict running certain applications on a machine. For Windows XP computers that are not participating in a domain, you can use the Local Security Settings snap-in to access Software Restriction Policies.
28. What can you do to promote a server to DC?
Using the command dcpromo
29. How will map a folder through AD?
Specify the network share path (UNC) in the active directory users’ home directory.
30. Explain Quotas.
Disk Quota is a feature or service of NTFS which helps to restrict or manage the disk usage from the normal user. It can be implemented per user user per volume basis. By default it is disabled. Administrative privilege is required to perform the task. In 2003server we can control only drive but in 2008server we can establish quota in folder level.
- Normal Backup:-This is default backup in which all files are backed up even if it was backed up before.
- Incremental Backup:-In this type of backup only the files that haven’t been backed up are taken care of or backed up.
- Differential Backup:-This backup is similar to incremental backup because it does not take backup of those files backed up by normal backup but different from incremental because it will take backup of differentially backed up files at next time of differential backup.
- System Backup:-This type of backup takes backup of files namely, Boot file, COM+Class Registry, Registry. But in server it takes backup of ADS.
- ASR Backup:-This type of backup takes backup of entire boot partition including OS and user data. This should be the last troubleshooting method to recover an os from disaster.
33. Explain the functionality of FTP Server?
File Transfer Protocol is used transfer large volume of files and huge number of files simultaneous between different geographic locations.
- AD - 389
- DNS - 53
- DHCP - 67,68
- HTTP - 80
- HTTPS - 443
- SMTP - 25
- POP3 - 110
- FTP - 21,22
36. What is Exclusion Range in DHCP Server?
Exclusion Range is used to hold a range IP addresses. Those IP Address can be used or may not be used in the network, but DHCP server does not assign those IP to its client.
37. Explain SOA Record.
Start Of Authority (SOA) Records indicate that Name Server is authoritative server for the domain.
39. Explain Secure Dynamic Updates in DNS Server.
Only when installing active directory and DNS in the same server (AD Integrated Zones) we can select Secure Dynamic Updates. Then all the records will automatically be updated in DNS. Since all the information is validated in active directory there will not be any duplicate or unwanted records.
40. Explain FRS in detail.
File Replication Service is a Microsoft service which replicates folders stored in sysvol shared folders on domain controllers and distributed file system shared folders. This service is a part of Microsoft’s active directory service.
42. Explain the difference between Patches and Service pack.
Patches are fixes, updates or enhancements for a particular program whereas service packs include a collection of
43. What is WSUS?
WSUS is Windows Software Update Services. It is server provided by Microsoft free of cost to manage patches for windows environment centralized.
45. What is the difference between Dynamic Disk and Basic Disk?
Basic Disk: Basic Disk uses a partition table to manage all partitions on the disk, and it is supported by DOS and all Windows versions. A disk with installed OS would be default initialized to a basic one. A basic disk contains basic volumes, such as primary partitions, extended partition, and all logical partitions are contained in extended partition.
Dynamic Disk: Dynamic Disk is supported in Windows 2000 and later operating system. Dynamic disks do not use a partition table to track all partitions, but use a hidden database (LDM) to track information about dynamic volumes or dynamic partitions on the disk. With dynamic disks you can create volumes that span multiple disks such as spanned and striped volumes, and can also create fault-tolerant volumes such as mirrored volumes and RAID 5 volumes. Compared to a Basic Disk, Dynamic Disk offers greater flexibility.
46. What is maximum Size of file system NTFS and FAT32?
46. What is maximum Size of file system NTFS and FAT32?
FAT32 - 4GB
47. What is “hosts” files?
The hosts file is a computer file used in an operating system to map hostnames to IP addresses. The hosts file is a plain-text file and is traditionally named hosts.
48. What is “lmhosts” files?
The lmhosts files are a computer file used in an operating system to map NetBIOS name. It is equivalent that of WINS.
50. Name some OU design considerations.
It is used to design an organization structure, Restrict user’s visibility and to delegate control.
- GPMC is used to customize group policy.
- It is easy to maintain different OU policy effectively.
- Provide option to take backup and restore group policy.
53. By default, if the name is not found in the cache or local hosts file, what is the first step the client takes to resolve the FQDN name into an IP address?
Create a record in DNS Server
54. You are administering a network connected to the Internet. Your users complain that everything is slow. Preliminary research of the problem indicates that it takes a considerable amount of time to resolve names of resources on the Internet. What is the most likely reason for this?
DNS Issues
56. I can’t seem to access the Internet, don’t have any access to the corporate network and on ipconfig my address is 169.254.*.*. What happened?
The 169.254.*.* netmask is assigned to Windows machines running 98/2000/XP if the DHCP server is not available. The name for the technology is APIPA (Automatic Private Internet Protocol Addressing).
58. How do you configure mandatory profiles?
Rename ntuser.dat to ntuser.man
59. What is Page File and Virtual Memory?
Page File Is Storage Space For The Virtual Memory, Page File Uses Hard Disk Space As a Memory To Provide Memory Allocation...
61. Where are group policies stored?
%SystemRoot%System32\Group Policy
62. What are GPT and GPC?
Group policy template and group policy container.
63. Where is GPT stored?
%System Root%\SYSVOL\sysvol\domain name\Policies\GUID
64. You change the group policies, and now the computer and user settings are in conflict. Which one has the highest priority?
The computer settings take priority.
65. What hidden shares exist on Windows Server 2003 installation?
Admin$, Drive$, IPC$, NETLOGON, print$ and SYSVOL.
More Question Answers
Refresh the Zone on the DNS server in the site you want to see the changes.
How do you restore a deleted OU in AD?
Do an authoritative restore of the selective OU that is deleted.
How to apply DesktopLockDown/Restrictions policy to selective AD OUs?
Apply the DesktopLockDown/Restrictions policy to selective OUs. In case you need to apply for all but not to a particular OU, apply the policy at the domain level and block the policy inheritance at the OU that you need to exclude.
How to apply DesktopLockDown/Restrictions policy to selective AD Security Groups?
Apply the DesktopLockDown/Restrictions policy to OU and Deny the Policy to the selected AD Security Group.
What permissions required for installing an application that updates AD Schema?
One has to be a Schema Administrator for installing such an application as well as he should be have administrator rights on the system where he is installing it.
How do you provide the DNS zone details?
Use dnscmd /ZoneExport command to have all the zone data exported to file formats.
DNSCmd displays and changes the properties of DNS servers, zones, and resource records. It manually modifies these properties, creates and deletes zones and resource records, and forces replication events between DNS server physical memory and DNS databases and data files. Some operations of this tool work at the DNS server level while others work at the zone level.
References:
You need to modify the permissions on DNS server via DNS Manager to let users modify that DNS zone.
How do you remove/uninstall AD DS role?
Run Dcpromo.exe and Choose Remove AD DS role
What are various Options available to Remove/Uninstall AD DS Role?
How do you configure AD FS such that AD FS tokens contain information from AD? Or How do you integrate AD FS with AD for populating the information from AD into AD FS tokens?
You need to Add and Configure a new Account Store in AD FS Trust Policy
How do you ensure that only Authenticated users are allowed to update Host (A) records in DNS zones?
One has to convert or setup such a DNS zone as Active Directory Integrated Zone. AD Integrated Zones allow only Authenticated users to update the Host records.
How do you configure your Online Responder server to issue Certificate Revocation List (CRLs) for enterprise root CA?
Since the CA is a standalone server, that is it’s not part of your domain, so you can’t apply auditing from a domain GPO rather you need to achieve the same via Local Group Policies. Here are the steps for configuring the same:
In DNS Manager Console, choose the zone to be allowed for transfers to Unix server and enable the BIND Secondaries
What are the steps involved in creating a New AD Site and Establishing Replication between two AD Sites?
How do you Launch AD Schema Snap-in?
AD Schema snap-in isn’t registered default for the user to find it readily, in view of it’s security. However, one can have it launched by manually registering the Schmmgmt.dll file.
In order to with stand the WAN unreliability issues, one has to have the ability to update the DNS entries even when disconnected from Primary DNS Zone servers. This can be achieved through configuring DNS zones as AD-Integrated DNS. Thus my recommendation is to convert the existing primary/secondary DNS zones into AD integrated DNS zones.
How do you configure IIS Security Settings in GPO?
How do you login to an external domain for which a AD Trust has been setup?
One has to login using the User Principal Name (UPN) like username@domain.suffix to an external domain that trusts your domain.
How do you fix “This user account has Expired”?
Modify the properties of the user account to set account never expires
What Forest level is required to support Active Directory Recycle Bin feature?
One has to run Windows Server 2008 R2 Forest Functional Level for the support of Active Directory Recycle Bin. That means all your Domain Controllers should be running Windows Server 2008 R2.
Where do you manage the Password Replication Policy for a Read Only Domain Controller (RODC) ?
In Active Directory Users and Computers, Go to Domain Controllers OU, Select the RODC server object, Under the properties control the list of user/group objects that are configured for password replication to that RODC server.
x
2. How
will assign Local Administrator rights for domain user?
The sysvol
folder stores the server's copy of the domain's public files. The contents such
as group policy, users, and groups of the sysvol folder are replicated to all
domain controllers in the domain. The sysvol folder must be located on an NTFS
volume.
6.
Explain different edition of windows 2003 Server?
7. What
is DNS Server?
Domain Name
System is used to resolve domain name to IP Address and also used to resolve IP
Address to Domain Name. It has two zones Forward and Reverse Lookup Zone.
Forward Lookup Zone resolve Domain name to IP address. Reverse Lookup Zone is
used to resolve IP address to Domain Name. Some records associate with DNS
8. Why
DNS server is required for Active Directory?
The key
reason for integrating DNS with AD is that client server communication takes
place with Domain Name. Network needs IP address to reach the destination; In
order to resolve Domain Name to IP Address we need DNS Server. If DNS Server is
n
not
configured properly the network becomes slow.
9. What
is the Purpose of A and PTR Record?
10. What
is the purpose of DHCP Server?
DHCP Server
is used to assign IP address automatically to all the clients’ computers. It is
useful in large enterprise network, where we may not able track the IP address
and also used to avoid IP conflict.
12.
Explain about Group Scopes?
14. How
will backup DHCP Server?
First
Method: Backup the directory in the %System Root%\System32\DHCP folder.
16.
Explain about AD Database.
Windows
2003 Active Directory data store, the actual database file, is %System
Root%\NTDS\NTDS.DIT. AD Database all information such as User Accounts, Groups,
Computer Information, Domain Controller information, Group Policy, Organization
Unit,etc.
17.
Explain about Group Policy.
18. What
is the default time for group policy refresh interval time?
The default
refresh interval for policies is 90 minutes. The default refresh interval for
domain controllers is 5 minutes. Group policy object's group policy refresh
intervals may be changed in the group policy object.
20. What
ports are used by DHCP and the DHCP clients?
Requests
are on UDP port 68, Server replies on UDP 67.
22. Name
3 benefits of using AD-integrated zones.
23. How
do you backup & Restore AD?
Using
Windows NTBackup Utility. In Backup select systemstate will include active
directory backup. Restore the Same using NTBackup Utility.
26. What
will be the problem if DNS Server fails?
If your DNS
server fails, No Client will able to reach the Domain Controller, which will
create authentication and Control Issues.
31.
Explain Backup Methodology.
The
different types of backup methodologies are:
32.
Explain how to publish printer through AD.
Navigate to
Active Directory Users and Computers, Create new printer and add the printer
i.e. the printer share name (UNC) Path. Automatically the printer will be
published in Active Directory.
34.
Specify the Port Number for AD, DNS, DHCP, HTTP, HTTPS, SMTP, POP3 & FTP
35.
Explain Virtual Directory in IIS?
A virtual
server can have one home directory and any number of other publishing
directories. These other publishing directories are referred to as virtual
directories.
38. What
command is used to clear DNS cache in client PC?
Ipconfig
/flushdns
41.
Explain the protocol involved in ADC replication.
Remote
Procedure Call (RPC) is the protocol used in ADC replication.
44. How
client server communication takes place in WSUS server?
Using Web
Server or Web Services
NTFS - 16TB
49.
Explain About Global Catalog.
global
catalog contains a complete replica of all objects in Active Directory for its
Host domain, and contains a partial replica of all objects in Active Directory
for every other domain in the forest.
51. Name
a few benefits of using GPMC.
Configure
Group Policy based on OU.
55.
Describe how the DHCP lease is obtained.
It’s a
four-step process consisting of (a) IP request, (b) IP offer, (c) IP selection
and (d) acknowledgement.
57.
We’ve installed a new Windows-based DHCP server, however, the users do not seem
to be getting DHCP leases off of it.
The server
must be authorized first with the Active Directory.
60. What
is the difference between DNS in Windows 2000 & Windows 2003 Server?
We can
rename or moved the domain name without rebuilding in windows 2003 server, but
in windows 2000 server, we can't do that.
How do you load the DNS zone changes on other site before the
scheduled replication happens?
Dnscmd.exe: DNS Server Troubleshooting Tool
This command-line tool
assists administrators in Domain Name System (DNS) management.
·
Dnscmd
How do you allow users a domain be able to modify entries in one
AD integrated DNS zone but not in the other?
·
Run Dcpromo and choose
Remove options. For automation, you can use an answer file.
·
Goto Server Manager,
Roles and uninstall AD DS Role
1.
Import the Enterprise
root CA certificate.
2.
Import the OCSP
Response Signing Certificate.
3.
4.
How do you configure the Change Auditing for a Standalone Certificate
Authority (CA)?
1.
Enable the Audit
Object Access setting in Local Security Policy on the CA server
2.
Configure the Auditing
in Certification Authority snap-in
3.
What are the possible
ways to decommission a 2008 domain controller server and remove a child domain
of a Forest?
In order to decommission a child domain and
it’s DC, first you have to move/migrate all the required AD objects out from
that domain to the parent domain or wherever needed. Then use need to
uninstall the AD DS role on the DC. This can be done via
1.
Server Manager,
Uninstall the AD DS server role
2.
Run Dcpromo.exe ,
Choose Remove Option. You can run the same tool using an answer file for
automated uninstall of AD DS role.
3.
4.
How do you configure your Windows 2008 R2 environment to allow
Zone transfers to a UNIX-based DNS server?
1.
Create new AD Site
2.
Install and Add a new
Domain Controller to the new Site
3.
There will be a
Default IP Site Link created for the replication with other AD sites in the
domain
4.
On the new DC, In AD
Sites and Services Console, Create a new IP Subnet to the new Site
5.
Move the DC Object to
the new Site
6.
What
is your recommendation for ensuring that the DNS server in a branch Office can
update and resolve DNS queries for a primary DNS zone even in the event of a
WAN link failure?
1.
Export the settings on
IIS server to create a security template.
2.
Import the Security
template into the GPO
3.
Link the GPO to
required IIS servers OU
IIS
What is Web Farm?
When we hosted our web Application on multiple web server
under a load balancer call the Web Farm. This is generally used for heavy load
web application where there are many user requests at a time. So When Web
Application is hosted on Different IIS Server over a load balancer, Load
balancer is responsible for distribute the load on different server.
What is Web Garden?
A Web garden is configured on a single server by specifying
multiple worker processes for an application pool. Web farms use multiple
physical servers for supporting a single Web site.
What is the default Identity of an Application Pool ?
Network Services
What is the available Identity of an Application Pool?
In IIS 6.0 - NetworkServices | LocalService | LocalSystem
In IIS 7.0 - NetworkServices | LocalService | LocalSystem |
ApplicationPoolIdentity
What are the worker process for IIS 5.1 and IIS 6.0 and IIS
7.0?
For IIS 5.1 > aspnet_wp.exe
For IIS 6.0 > w3wp.exe
For IIS 7.0 > w3wp.exe
Types of Authentication available in IIS 6.0 and 7.0
What are the different type of application pool available in
IIS 7.0 ?
1. DefaultAppPool (Integrated)
2. ClassicAppPool
Where is the default location for IIS Log files ?
C:\WINDOWS\system32\LogFiles\W3SVC1
What is the use of aspnet_regiis -i command ?
This is used automatically register the .NET Framework with
your IIS.
How to check Installed .Net Version on IIS
C:\WINDOWS\Microsoft.NET\Framework\v1.1.4322>aspnet_regiis.exe
–lv
If there are multiple worker process running on IIS, then
how can you attach a particular worker process for application ?
run cscript iisapi.vbs script to find out the process ID and
Application Pool name . Based on the process Id for particular application I
have to attache the process from Visual studio IDE.
Which Tool is used for Remote IIS Debugging ?
Tools is : msvsmon.exe
This is located at : \Microsoft Visual Studio
8\Common7\IDERemote Debuggerx86\
IIS Port numbers?
HTTP : 80 (default port for iis), SSL : 443,FTP : 21,SMTP :
25,POP2 : 109,POP3 : 110,IMAP : 143,NNTP : 119,LDAP : 89, DNS : 53,DHCP : 67
IIS Services?
1. www services
2. FTP services
3. SMTP services
4. NNTP services
IIS Application pool
?
Group of web applications are called application pool.
An application pool is a group of one or more URLs that are
served by a worker process or set of worker processes. Any Web directory or
virtual directory can be assigned to an application pool. so that one webiste
cannot be effected by other , if u used seperated application pool.
What is App Pool and App Domain? What is the difference
between these two?
Application Pool is created the each and every website.
Application Domain is created to one domain Purpose.
What is the properties of App Pool in IIS?
1.Recycling
2.Perfomance
3.Health
4.Identity
How do I stop and restart Internet services?
By using the “IISRESET” command
How can I confirm that a server certificate is attached to a
Web site?
1.In IIS Manager, right-click the Web site, and click
Properties.
2.Click the Directory Security tab.
3.Under Secure communications, if the View Certificate
button is activated, there is a certificate attached to the Web site. If the
button is not activated, you must attach a server certificate to the site to
use the Secure Sockets Layer (SSL) features.
Comments
Post a Comment