AD interview Question
Top 20 active directory interview questions and answers
|
If
you need top 7 free ebooks below for your job interview, please visit: 4career.net
•
Free ebook: 75 interview questions and answers
•
Top 12 secrets to win every job interviews
•
13 types of interview quesitons and how to face them
•
Top 8 interview thank you letter samples
• Top 7 cover letter samples
•
Top 8 resume samples
•
Top 15 ways to search new jobs
|
Tell me about yourself?
|
|
|
This is probably the most
asked question in active directory
interview. It breaks the ice and gets you to talk about something you
should be fairly comfortable with. Have something prepared that doesn't sound
rehearsed. It's not about you telling your life story and quite frankly, the
interviewer just isn't interested. Unless asked to do so, stick to your
education, career and current situation. Work through it chronologically from
the furthest back to the present.
|
What
is Active Directory?
|
|||
|
Active Directory is a Meta Data. Active
Directory is a data base which stores a data base like your user information,
computer information and also other network object info. It has capabilities
to manage and administer the complete Network which connect with AD. |
||
What Can You Do for Us That Other
Candidates Can't?
|
|||
|
What makes you unique? This will take an
assessment of your experiences, skills and traits. Summarize concisely:
"I have a unique combination of strong technical skills, and the ability
to build strong customer relationships. This allows me to use my knowledge
and break down information to be more user-friendly." |
||
What
is LDAP?
|
|
|
Lightweight Directory
Access Protocol LDAP is the industry standard directory access protocol,
making Active Directory widely accessible to management and query
applications. Active Directory supports LDAPv3 and LDAPv2.
|
How
do I determine if user accounts have local administrative access?
|
||
|
You can use the net local
group administrators command on each workstation (probably in a login script
so that it records its information to a central file for later review). This
command will enumerate the members of the Administrators group on each
machine you run it on. Alternately, you can use the Restricted Groups feature
of Group Policy to restrict the membership of Administrators to
only those users you want to belong.
|
|
Why
am I having trouble printing with XP domain users?
|
||
|
In most cases, the
inability to print or access resources in situations like this one will boil
down to an issue with name resolution, either DNS or WINS/NetBIOS. Be sure
that your Windows XP clients’ wireless connections are configured with the
correct DNS and WINS name servers, as well as with the
appropriate NetBIOS over TCP/IP settings. Compare your wireless
settings to your wired LAN settings and look for any discrepancies that may
indicate where the functional difference may lie.
|
|
What
is the ISTG? Who has that role by default?
|
|
|
Windows 2000 Domain
controllers each create Active Directory Replication connection objects
representing inbound replication from intra-site replication partners. For
inter-site replication, one domain controller per site has the responsibility
of evaluating the inter-site replication topology and creating Active
Directory Replication Connection objects for appropriate bridgehead servers
within its site. The domain controller in each site that owns this role is referred
to as the Inter-Site Topology Generator (ISTG).
|
What
is LSDOU, LDP?
|
|
|
Its group policy
inheritance model, where the policies are applied to Local
machines, Sites, Domains and Organizational Units.
LDP: Label Distribution
Protocol (LDP) is often used to establish MPLS LSPs when traffic engineering
is not required. It establishes LSPs that follow the existing IP routing, and
is particularly well suited for establishing a full mesh of LSPs between all
of the routers on the network.
|
What
are the Groups types available in active directory ?
|
|
|
Security groups: Use Security groups for granting permissions to gain
access to resources. Sending an e-mail message to a group sends the message
to all members of the group. Therefore security groups share the capabilities
of distribution groups.
Distribution groups: Distribution groups are used for sending e-main
messages to groups of users. You cannot grant permissions to security groups.
Even though security groups have all the capabilities of distribution groups,
distribution groups still requires, because some applications can only read
distribution groups.
|
What
is REPLMON?
|
|
|
The Microsoft definition of
the Replmon tool is as follows; This GUI tool enables administrators to view
the low-level status of Active Directory replication, force synchronization
between domain controllers, view the topology in a graphical format, and
monitor the status and performance of domain controller replication.
|
What
is ADSIEDIT ?
|
|
|
ADSIEDIT :ADSIEdit is a Microsoft Management Console (MMC)
snap-in that acts as a low-level editor for Active Directory. It is a
Graphical User Interface (GUI) tool. Network administrators can use it for
common administrative tasks such as adding, deleting, and moving objects with
a directory service. The attributes for each object can be edited or deleted
by using this tool. ADSIEdit uses the ADSI application programming interfaces
(APIs) to access Active Directory. The following are the required files for
using this tool: ADSIEDIT.DLL ADSIEDIT.
|
What
is REPADMIN?
|
|
|
This command-line tool
assists administrators in diagnosing replication problems between Windows
domain controllers.Administrators can use Repadmin to view the replication
topology (sometimes referred to as RepsFrom and RepsTo) as seen from the
perspective of each domain controller. In addition, Repadmin can be used to
manually create the replication topology (although in normal practice this
should not be necessary), to force replication events between domain
controllers, and to view both the replication metadata and up-to-dateness
vectors.
|
What
are the requirements for installing AD on a new server?
|
|
|
An NTFS partition with
enough free space.
An Administrator’s username and password. The correct operating system version. A NIC Properly configured TCP/IP (IP address, subnet mask and – optional – default gateway). A network connection (to a hub or to another computer via a crossover cable) . An operational DNS server (which can be installed on the DC itself) . A Domain name that you want to use . The Windows 2000 or Windows Server 2003 CD media (or at least the i386 folder) . |
How
to take backup of AD ?
|
|
|
For taking backup of active
directory you have to do this : first go START -> PROGRAM ->ACCESORIES
-> SYSTEM TOOLS -> BACKUP OR Open run window and ntbackup and take
systemstate backup when the backup screen is flash then take the backup of
SYSTEM STATE it will take the backup of all the necessary information about
the syatem including AD backup , DNS ETC.
|
What
are application partitions? When do I use them ?
|
|
|
AN application diretcory
partition is a directory partition that is replicated only to specific domain
controller.Only domain controller running windows Server 2003 can host a
replica of application directory partition.
Using an application directory partition provides redundany,availability or fault tolerance by replicating data to specific domain controller pr any set of domain controllers anywhere in the forest. |
How
do I use Registry keys to remove a user from a group?
|
|
|
In Windows Server 2003, you
can use the dsmod command-line utility with the -delmbr switch to remove a
group member from the command line. You should also look into the freeware
utilities available from www.joeware.net . ADFind and ADMod are indispensable
tools in my arsenal when it comes to searching and modifying Active
Directory.
|
Different
modes of AD restore ?
|
|
|
A nonauthoritative
restore is the default method for restoring Active Directory. To perform a
nonauthoritative restore, you must be able to start the domain controller in
Directory Services Restore Mode. After you restore the domain controller from
backup, replication partners use the standard replication protocols to update
Active Directory and associated information on the restored domain
controller.
An
authoritative restore brings a domain or a container back to the state
it was in at the time of backup and overwrites all changes made since the
backup. If you do not want to replicate the changes that have been made
subsequent to the last backup operation, you must perform an authoritative
restore. In this one needs to stop the inbound replication first before
performing the An authoritative restore.
|
What’s
the difference between transferring a FSMO role and seizing ?
|
|
|
Seizing an FSMO can be a
destructive process and should only be attempted if the existing server with
the FSMO is no longer available.
If you perform a seizure of
the FSMO roles from a DC, you need to ensure two things:
the current holder is actually dead and offline, and that the old DC will NEVER return to the network. If you do an FSMO role Seize and then bring the previous holder back online, you’ll have a problem.
An FSMO role TRANSFER is
the graceful movement of the roles from a live, working DC to another live DC
During the process, the current DC holding the role(s) is updated, so it
becomes aware it is no longer the role holder
|
What
is sites ? What are they used for ?
|
|
|
One or more well-connected
(highly reliable and fast) TCP/IP subnets.
A site allows administrators to configure Active Directory access and replication topology to take advantage of the physical network.
A Site object in Active
Directory represents a physical geographic location that hosts networks.
Sites contain objects called Subnets.
Sites
can be used to Assign Group Policy Objects, facilitate the discovery of
resources, manage active directory replication, and manage network link
traffic.
|
Explain Active Directory Schema ?
|
|
|
Windows 2000 and Windows
Server 2003 Active Directory uses a database set of rules called “Schema”.
The Schema is defines as the formal definition of all object classes, and the
attributes that make up those object classes, that can be stored in the
directory. As mentioned earlier, the Active Directory database includes a
default Schema, which defines many object classes, such as users, groups,
computers, domains, organizational units, and so on.
These objects are also
known as “Classes”. The Active Directory Schema can be dynamically
extensible, meaning that you can modify the schema by defining new object
types and their attributes and by defining new attributes for existing
objects. You can do this either with the Schema Manager snap-in tool included
with Windows 2000/2003 Server, or programmatically.
|
Useful job interview materials:
If you need top free ebooks
below for your job interview, please visit: 4career.net
• Free ebook: 75 interview
questions and answers
• Top 12 secrets to win every
job interviews
• Top 36 situational
interview questions
• 440 behavioral interview
questions
• 95 management interview
questions and answers
• 30 phone interview
questions
• Top 8 interview thank you letter
samples
• 290 competency based
interview questions
• 45 internship interview
questions
• Top 7 cover letter samples
• Top 8 resume samples
• Top 15 ways to search new
jobs
Top 6 tips for
job interview
Tip 1: Do your homework
|
|||
![]() |
You'll likely be
asked difficult questions during the interview. Preparing the list of likely
questions in advance will help you easily transition from question to
question.
Spend time
researching the company. Look at its site to understand its mission statement,
product offerings, and management team. A few hours spent researching before
your interview can impress the hiring manager greatly. Read the company's
annual report (often posted on the site), review the employee's LinkedIn
profiles, and search the company on Google News, to see if they've been
mentioned in the media lately. The more you know about a company, the more
you'll know how you'll fit in to it.
Ref material:
4career.net/job-interview-checklist-40-points
|
||
Tip 2: First
impressions
|
|||
![]() |
When
meeting someone for the first time, we instantaneously make our minds about
various aspects of their personality.
Prepare
and plan that first impression long before you walk in the door. Continue
that excellent impression in the days following, and that job could be yours.
Therefore:
·
Never arrive late.
·
Use positive body language and turn on your charm right from the
start.
·
Switch off your mobile before you step into the room.
·
Look fabulous; dress sharp and make sure you look your best.
·
Start the interview with a handshake; give a nice firm press and then
some up and down movement.
·
Determine to establish a rapport with the interviewer right from the
start.
·
Always let the interviewer finish speaking before giving your
response.
·
Express yourself fluently with clarity and precision.
Useful
material:
4career.net/top-10-elements-to-make-a-good-first-impression-at-a-job-interview
|
||
Tip 3: The
“Hidden” Job Market
|
|||
![]() |
Many of us don’t recognize
that hidden job market is a huge one and accounts for 2/3 of total job demand
from enterprises. This means that if you know how to exploit a hidden job
market, you can increase your chance of getting the job up to 300%.
In this section, the author
shares his experience and useful tips to exploit hidden job market.
Here are some sources to get penetrating into a hidden job market: Friends; Family; Ex-coworkers; Referral; HR communities; Field communities; Social networks such as Facebook, Twitter…; Last recruitment ads from recruiters; HR emails of potential recruiters… |
||
Tip 4: Do-It-Yourself
Interviewing Practice
|
|
![]() |
There are a number of ways
to prepare for an interview at home without the help of a professional career
counselor or coach or a fee-based service.
You can practice interviews
all by yourself or recruit friends and family to assist you.
Useful material:
4career.net/free-ebook-75-interview-questions-and-answers
|
Tip 5: Ask
questions
|
|
![]() |
Do not leave the interview
without ensuring that you know all that you want to know about the position.
Once the interview is over, your chance to have important questions answered
has ended. Asking questions also can show that you are interested in the job.
Be specific with your questions. Ask about the company and the industry.
Avoid asking personal questions of the interviewer and avoid asking questions
pertaining to politics, religion and the like.
Ref material:
4career.net/25-questions-to-ask-employers-during-your-job-interview
|
Tip 6: Follow
up and send a thank-you note
|
|
![]() |
Following up after an
interview can help you make a lasting impression and set you apart from the
crowd.
Philip Farina, CPP, a
security career expert at Manta Security Management Recruiters, says:
"Send both an email as well as a hard-copy thank-you note, expressing
excitement, qualifications and further interest in the position. Invite the
hiring manager to contact you for additional information. This is also an
excellent time to send a strategic follow-up letter of interest."
Ref material:
4career.net/top-8-interview-thank-you-letter-samples
|
Comments
Post a Comment