AD interview Question

 

 

 

 

Top 20 active directory interview questions and answers


 

 

If you need top 7 free ebooks below for your job interview, please visit: 4career.net

• Free ebook: 75 interview questions and answers
• Top 12 secrets to win every job interviews
• 13 types of interview quesitons and how to face them
• Top 8 interview thank you letter samples
• Top 7 cover letter samples
• Top 8 resume samples
• Top 15 ways to search new jobs

 

 

 

 

Tell me about yourself?


This is probably the most asked question in active directory  interview. It breaks the ice and gets you to talk about something you should be fairly comfortable with. Have something prepared that doesn't sound rehearsed. It's not about you telling your life story and quite frankly, the interviewer just isn't interested. Unless asked to do so, stick to your education, career and current situation. Work through it chronologically from the furthest back to the present.

 

 

 

 

 

What is Active Directory?




Active Directory is a Meta Data. Active Directory is a data base which stores a data base like your user information, computer information and also other network object info. It has capabilities to manage and administer the complete Network which connect with AD.

 














What Can You Do for Us That Other Candidates Can't?

What makes you unique? This will take an assessment of your experiences, skills and traits. Summarize concisely: "I have a unique combination of strong technical skills, and the ability to build strong customer relationships. This allows me to use my knowledge and break down information to be more user-friendly."

 

 

 

 

What is LDAP?


Lightweight Directory Access Protocol LDAP is the industry standard directory access protocol, making Active Directory widely accessible to management and query applications. Active Directory supports LDAPv3 and LDAPv2.

 

 

How do I determine if user accounts have local administrative access?



You can use the net local group administrators command on each workstation (probably in a login script so that it records its information to a central file for later review). This command will enumerate the members of the Administrators group on each machine you run it on. Alternately, you can use the Restricted Groups feature of Group Policy to restrict the membership of Administrators to only those users you want to belong.


Why am I having trouble printing with XP domain users?


In most cases, the inability to print or access resources in situations like this one will boil down to an issue with name resolution, either DNS or WINS/NetBIOS. Be sure that your Windows XP clients’ wireless connections are configured with the correct DNS and WINS name servers, as well as with the appropriate NetBIOS over TCP/IP settings. Compare your wireless settings to your wired LAN settings and look for any discrepancies that may indicate where the functional difference may lie.

 

 

 

What is the ISTG? Who has that role by default?


Windows 2000 Domain controllers each create Active Directory Replication connection objects representing inbound replication from intra-site replication partners. For inter-site replication, one domain controller per site has the responsibility of evaluating the inter-site replication topology and creating Active Directory Replication Connection objects for appropriate bridgehead servers within its site. The domain controller in each site that owns this role is referred to as the Inter-Site Topology Generator (ISTG).

 

 

 

 

 

 

What is LSDOU, LDP?


 Its group policy inheritance model, where the policies are applied to Local machines, Sites, Domains and Organizational Units.

LDP: Label Distribution Protocol (LDP) is often used to establish MPLS LSPs when traffic engineering is not required. It establishes LSPs that follow the existing IP routing, and is particularly well suited for establishing a full mesh of LSPs between all of the routers on the network.

 

 

 

 

 

 

What are the Groups types available in active directory ?


Security groups: Use Security groups for granting permissions to gain access to resources. Sending an e-mail message to a group sends the message to all members of the group. Therefore security groups share the capabilities of distribution groups.
Distribution groups: Distribution groups are used for sending e-main messages to groups of users. You cannot grant permissions to security groups. Even though security groups have all the capabilities of distribution groups, distribution groups still requires, because some applications can only read distribution groups.

 

 

 

What is REPLMON?


The Microsoft definition of the Replmon tool is as follows; This GUI tool enables administrators to view the low-level status of Active Directory replication, force synchronization between domain controllers, view the topology in a graphical format, and monitor the status and performance of domain controller replication.

 


 

 

 

What is ADSIEDIT ?


ADSIEDIT :ADSIEdit is a Microsoft Management Console (MMC) snap-in that acts as a low-level editor for Active Directory. It is a Graphical User Interface (GUI) tool. Network administrators can use it for common administrative tasks such as adding, deleting, and moving objects with a directory service. The attributes for each object can be edited or deleted by using this tool. ADSIEdit uses the ADSI application programming interfaces (APIs) to access Active Directory. The following are the required files for using this tool: ADSIEDIT.DLL ADSIEDIT.


 

 

What is REPADMIN?


This command-line tool assists administrators in diagnosing replication problems between Windows domain controllers.Administrators can use Repadmin to view the replication topology (sometimes referred to as RepsFrom and RepsTo) as seen from the perspective of each domain controller. In addition, Repadmin can be used to manually create the replication topology (although in normal practice this should not be necessary), to force replication events between domain controllers, and to view both the replication metadata and up-to-dateness vectors.

 

 

What are the requirements for installing AD on a new server?


An NTFS partition with enough free space.
An Administrator’s username and password.
The correct operating system version.
A NIC Properly configured TCP/IP (IP address, subnet mask and – optional – default gateway).
A network connection (to a hub or to another computer via a crossover cable) .
An operational DNS server (which can be installed on the DC itself) .
A Domain name that you want to use .
The Windows 2000 or Windows Server 2003 CD media (or at least the i386 folder) .

 

 

 

How to take backup of AD ?



For taking backup of active directory you have to do this : first go START -> PROGRAM ->ACCESORIES -> SYSTEM TOOLS -> BACKUP OR Open run window and ntbackup and take systemstate backup when the backup screen is flash then take the backup of SYSTEM STATE it will take the backup of all the necessary information about the syatem including AD backup , DNS ETC.



 

What are application partitions? When do I use them ?

 

AN application diretcory partition is a directory partition that is replicated only to specific domain controller.Only domain controller running windows Server 2003 can host a replica of application directory partition.
Using an application directory partition provides redundany,availability or fault tolerance by replicating data to specific domain controller pr any set of domain controllers anywhere in the forest.

 

 

 

 

How do I use Registry keys to remove a user from a group?

 

In Windows Server 2003, you can use the dsmod command-line utility with the -delmbr switch to remove a group member from the command line. You should also look into the freeware utilities available from www.joeware.net . ADFind and ADMod are indispensable tools in my arsenal when it comes to searching and modifying Active Directory.

 

 

 

 

Different modes of AD restore ?

 

A nonauthoritative restore is the default method for restoring Active Directory. To perform a nonauthoritative restore, you must be able to start the domain controller in Directory Services Restore Mode. After you restore the domain controller from backup, replication partners use the standard replication protocols to update Active Directory and associated information on the restored domain controller.

An authoritative restore brings a domain or a container back to the state it was in at the time of backup and overwrites all changes made since the backup. If you do not want to replicate the changes that have been made subsequent to the last backup operation, you must perform an authoritative restore. In this one needs to stop the inbound replication first before performing the An authoritative restore.

 

 

 

 

 

What’s the difference between transferring a FSMO role and seizing ?

 

Seizing an FSMO can be a destructive process and should only be attempted if the existing server with the FSMO is no longer available.
If you perform a seizure of the FSMO roles from a DC, you need to ensure two things:
the current holder is actually dead and offline, and that the old DC will NEVER return to the network. If you do an FSMO role Seize and then bring the previous holder back online, you’ll have a problem.
An FSMO role TRANSFER is the graceful movement of the roles from a live, working DC to another live DC During the process, the current DC holding the role(s) is updated, so it becomes aware it is no longer the role holder

 

 

 

What is sites ? What are they used for ?

 

One or more well-connected (highly reliable and fast) TCP/IP subnets.
A site allows administrators to configure Active Directory access and replication topology to take advantage of the physical network.
A Site object in Active Directory represents a physical geographic location that hosts networks. Sites contain objects called Subnets.

Sites can be used to Assign Group Policy Objects, facilitate the discovery of resources, manage active directory replication, and manage network link traffic.
Sites can be linked to other Sites. Site-linked objects may be assigned a cost value that represents the speed, reliability, availability, or other real property of a physical resource. Site Links may also be assigned a schedule.

 

 

 

 

 

Explain Active Directory Schema ?

 

Windows 2000 and Windows Server 2003 Active Directory uses a database set of rules called “Schema”. The Schema is defines as the formal definition of all object classes, and the attributes that make up those object classes, that can be stored in the directory. As mentioned earlier, the Active Directory database includes a default Schema, which defines many object classes, such as users, groups, computers, domains, organizational units, and so on.
These objects are also known as “Classes”. The Active Directory Schema can be dynamically extensible, meaning that you can modify the schema by defining new object types and their attributes and by defining new attributes for existing objects. You can do this either with the Schema Manager snap-in tool included with Windows 2000/2003 Server, or programmatically.

 

Useful job interview materials:


If you need top free ebooks below for your job interview, please visit: 4career.net

• Free ebook: 75 interview questions and answers
• Top 12 secrets to win every job interviews
• Top 36 situational interview questions
• 440 behavioral interview questions
• 95 management interview questions and answers
• 30 phone interview questions
• Top 8 interview thank you letter samples
• 290 competency based interview questions
• 45 internship interview questions
• Top 7 cover letter samples
• Top 8 resume samples
• Top 15 ways to search new jobs

 

 

 

 

 

 






Top 6 tips for job interview









Tip 1: Do your homework
You'll likely be asked difficult questions during the interview. Preparing the list of likely questions in advance will help you easily transition from question to question.

Spend time researching the company. Look at its site to understand its mission statement, product offerings, and management team. A few hours spent researching before your interview can impress the hiring manager greatly. Read the company's annual report (often posted on the site), review the employee's LinkedIn profiles, and search the company on Google News, to see if they've been mentioned in the media lately. The more you know about a company, the more you'll know how you'll fit in to it.

Ref material: 4career.net/job-interview-checklist-40-points

Tip 2: First impressions
When meeting someone for the first time, we instantaneously make our minds about various aspects of their personality.
Prepare and plan that first impression long before you walk in the door. Continue that excellent impression in the days following, and that job could be yours.
Therefore:
·       Never arrive late.
·       Use positive body language and turn on your charm right from the start.
·       Switch off your mobile before you step into the room.
·       Look fabulous; dress sharp and make sure you look your best.
·       Start the interview with a handshake; give a nice firm press and then some up and down movement.
·       Determine to establish a rapport with the interviewer right from the start.
·       Always let the interviewer finish speaking before giving your response.
·       Express yourself fluently with clarity and precision.

Useful material: 4career.net/top-10-elements-to-make-a-good-first-impression-at-a-job-interview
Tip 3: The “Hidden” Job Market
Many of us don’t recognize that hidden job market is a huge one and accounts for 2/3 of total job demand from enterprises. This means that if you know how to exploit a hidden job market, you can increase your chance of getting the job up to 300%.

In this section, the author shares his experience and useful tips to exploit hidden job market.

Here are some sources to get penetrating into a hidden job market: Friends; Family; Ex-coworkers; Referral; HR communities; Field communities; Social networks such as Facebook, Twitter…; Last recruitment ads from recruiters; HR emails of potential recruiters…

 

 

Tip 4: Do-It-Yourself Interviewing Practice
There are a number of ways to prepare for an interview at home without the help of a professional career counselor or coach or a fee-based service.

You can practice interviews all by yourself or recruit friends and family to assist you.

Useful material: 4career.net/free-ebook-75-interview-questions-and-answers

 











Tip 5: Ask questions
Do not leave the interview without ensuring that you know all that you want to know about the position. Once the interview is over, your chance to have important questions answered has ended. Asking questions also can show that you are interested in the job. Be specific with your questions. Ask about the company and the industry. Avoid asking personal questions of the interviewer and avoid asking questions pertaining to politics, religion and the like.

Ref material: 4career.net/25-questions-to-ask-employers-during-your-job-interview





Tip 6: Follow up and send a thank-you note
Following up after an interview can help you make a lasting impression and set you apart from the crowd.
Philip Farina, CPP, a security career expert at Manta Security Management Recruiters, says: "Send both an email as well as a hard-copy thank-you note, expressing excitement, qualifications and further interest in the position. Invite the hiring manager to contact you for additional information. This is also an excellent time to send a strategic follow-up letter of interest."

Ref material: 4career.net/top-8-interview-thank-you-letter-samples






 

Comments

Popular posts from this blog

Troubleshooting Netlogon Error Codes

Service Principal Names (SPNs) SetSPN Syntax (Setspn.exe)

Troubleshooting AD Active Directory Replication Error 8456 or 8457: "The source | destination server is currently rejecting replication requests"