in/>
powered by
<http://www.youtube.com>
<//www.blogger.com/rearrange?blogID=1201274026491600790&widgetType=VideoBar&widg
etId=VideoBar1&action=editWidget§ionId=crosscol>
This Blog
Linked From Here
SYSTEM ADMIN
OTHER STUFF
Network Admin
This Blog
SYSTEM ADMIN
OTHER STUFF
Network Admin
(d) acknowledgement.
2.
*I cant seem to access the Internet, dont have any access to the
corporate network and on ipconfig my address is 169.254.*.*. What
happened? *The 169.254.*.* netmask is assigned to Windows machines
running 98/2000/XP if the DHCP server is not available. The name for the
technology is APIPA (Automatic Private Internet Protocol Addressing).
3.
*Weve installed a new Windows-based DHCP server, however, the
users do not seem to be getting DHCP leases off of it. *The server must
be authorized first with the Active Directory.
4.
*How can you force the client to give up the dhcp lease if you
have access to the client PC?* ipconfig /release
5.
*What authentication options do Windows 2000 Servers have for
remote clients? *PAP, SPAP, CHAP, MS-CHAP and EAP.
6.
*What are the networking protocol options for the Windows clients
if for some reason you do not want to use TCP/IP? *NWLink (Novell),
NetBEUI, AppleTalk (Apple).
7.
*What is data link layer in the OSI reference model responsible
for? Data link layer is located above the physical layer, but below the
network layer.* Taking raw data bits and packaging them into frames. The
network layer will be responsible for addressing the frames, while the
physical layer is responsible for retrieving and sending raw data bits.
8.
*What is binding order?* The order by which the network protocols
are used for client-server communications. The most frequently used
protocols should be at the top.
9.
*How do cryptography-based keys ensure the validity of data
transferred across the network?* Each IP packet is assigned a checksum,
so if the checksums do not match on both receiving and transmitting
ends, the data was modified or corrupted.
10.*Should we deploy IPSEC-based security or certificate-based security?
*They are really two different technologies. IPSec secures the TCP/IP
communication and protects the integrity of the packets.
Certificate-based security ensures the validity of authenticated clients
and servers.
11.*What is LMHOSTS file? *Its a file stored on a host machine that is
used to resolve NetBIOS to specific IP addresses.
12.*Whats the difference between forward lookup and reverse lookup in
DNS?* Forward lookup is name-to-address; the reverse lookup is
address-to-name.
13.*How can you recover a file encrypted using EFS?* Use the domain
recovery agent.
_IIS QUESTIONS_
This came in the mail from the reader who recently went through a job
interview process. He didnt mention the company name.
1.
How would you remotely administer IIS?
2.
What is RAID? What is it used for?
3.
How would you go about securing IIS and MS-SQL Server?
_ _
_WINDOWS 2000 ADMINISTRATION QUESTIONS_
1.
are share names with a dollar sign ($) appended to their names.
Administrative shares are usually created automatically for the root of
each drive letter. They do not display in the network browse list.
2.
*How do the permissions work in Windows 2000? What
permissions does folder inherit from the parent?*When you combine NTFS
permissions based on users and their group memberships, the least
restrictive permissions take precedence. However, explicit Deny entries
always override Allow entries.
3.
*Why cant I encrypt a compressed file on Windows
2000?*You can either compress it or encrypt it, but not both.
4.
*If I rename an account, what must I do to make sure the
renamed account has the same permissions as the original one?*Nothing,
its all maintained automatically.
5.
*Whats the most powerful group on a Windows
system?*Administrators.
6.
*What are the accessibility features in Windows
2000?*StickyKeys, FilterKeys Narrator, Magnifier, and On-Screen Keyboard.
7.
*Why cant I get to the Fax Service Management console?
*You can only see it if a fax had been installed.
8.
*What do I need to ensure before deploying an application
via a Group Policy?*Make sure its either an MSI file, or contains a ZAP
file for Group Policy.
9.
*How do you configure mandatory profiles?*Rename
ntuser.dat to ntuser.man
10.
*I cant get multiple displays to work in Windows 2000.
*Multiple displays have to use peripheral connection interface (PCI) or
Accelerated Graphics Port (AGP) port devices to work properly with
Windows 2000.
11.
*Whats a maximum number of processors Win2k supports?*2
12.
*I had some NTFS volumes under my Windows NT installation.
What happened to NTFS after Win 2k installation?*It got upgraded to NTFS 5.
13.
*How do you convert a drive from FAT/FAT32 to NTFS from the
command line? *convert c: /fs:ntfs
14.
*Explain APIPA.*Auto Private IP Addressing (APIPA) takes
effect on Windows 2000 Professional computers if no DHCP server can be
contacted. APIPA assigns the computer an IP address within the range of
169.254.0.0 through 169.254.255.254 with a subnet mask of 255.255.0.0.
15.
*How does Internet Connection Sharing work on Windows 2000?
*Internet Connection Sharing (ICS) uses the DHCP Allocator service to
assign dynamic IP addresses to clients on the LAN within the range of
192.168.0.2 through 192.168.0.254. In addition, the DNS Proxy service
becomes enabled when you implement ICS.
*_WHAT ARE THE DIFFERENCE IN WINDOWS NT SERVER, 2000SERVER AND 2003
SERVER AND NOW WIN SERVER2008_*
NT SAM database is a flat database. Where as in windows 2000 active directory da
tabase is a hierarchical database.
In Windows NT only PDC is having writable copy of SAM database but the BDC is on
ly read only database. In case of
Windows 2000 both DC and ADC is having write copy of the database
Windows NT will not support FAT32 file system. Windows 2000 supports FAT32
Default authentication protocol in NT is NTLM (NT LAN manager). In windows 2000
default authentication protocol is Kerberos V5.
Windows 2000 depends and Integrated with DNS. NT user NetBIOS names
24.
Name some OU design considerations.
25.
What is tombstone lifetime attribute?
26.
What do you do to install a new Windows 2003 DC in a Windows
2000 AD?
27.
What do you do to install a new Windows 2003 R2 DC in a
Windows 2003 AD?
28.
How would you find all users that have not logged on since
last month?
29.
What are the DS* commands?
30.
Whats the difference between LDIFDE and CSVDE? Usage
considerations?
31.
What are the FSMO roles? Who has them by default? What
happens when each one fails?
32.
What FSMO placement considerations do you know of?
33.
I want to look at the RID allocation table for a DC. What do
I do?
34.
Whats the difference between transferring a FSMO role and
seizing one? Which one should you NOT seize? Why?
35.
How do you configure a stand-by operation master for any
of the roles?
36.
How do you backup AD?
37.
How do you restore AD?
38.
How do you change the DS Restore admin password?
39.
Why cant you restore a DC that was backed up 4 months ago?
40.
What are GPOs?
41.
What is the order in which GPOs are applied?
42.
Name a few benefits of using GPMC.
43.
What are the GPC and the GPT? Where can I find them?
44.
What are GPO links? What special things can I do to them?
45.
What can I do to prevent inheritance from above?
46.
How can I override blocking of inheritance?
47.
How can you determine what GPO was and was not applied for a
user? Name a few ways to do that.
48.
A user claims he did not receive a GPO, yet his user and
computer accounts are in the right OU, and everyone else there gets the
GPO. What will you look for?
49.
Name a few differences in Vista GPOs
50.
Name some GPO settings in the computer and user parts.
51.
What are administrative templates?
52.
Whats the difference between software publishing and
assigning?
53.
Can I deploy non-MSI software with GPO?
54.
You want to standardize the desktop environments (wallpaper,
My Documents, Start menu, printers etc.) on the computers in one
department. How would you do that?
Shadow copy feature available in windows2003 server but not in windows2000 serve
r.A new tools to recover files.
There are 220 new group polices are added in windows2003 server over windows2000
server.
In windows2000 server support maximum 10 users access shared folders at a time t
hrough network, but windows2003 server no limitation.
Windows 2003 server includes IIS in it.
*WINDOWS ADMIN INTERVIEW QUESTIONS
<http://technical-interviews.com/windows-admin-interview-questions/>*
1.
*Describe how the DHCP lease is obtained*.
Its a four-step process consisting of (a) IP request, (b) IP offer,
IP selection and (d) acknowledgement.
2.
*I cant seem to access the Internet, dont have any
access to the corporate network and on ipconfig my address is
169.254.*.*. What happened?**
*The 169.254.*.* netmask is assigned to Windows machines running
98/2000/XP if the DHCP server is not available. The name for the
technology is APIPA (Automatic Private Internet Protocol Addressing).
3.
*Weve installed a new Windows-based DHCP server, however,
the users do not seem to be getting DHCP leases off of it. *The server
must be authorized first with the Active Directory.
4.
*How can you force the client to give up the dhcp lease if
you have access to the client PC?**
*ipconfig /release
5.
*What authentication options do Windows 2000 Servers have
for remote clients?**
*PAP, SPAP, CHAP, MS-CHAP and EAP.
6.
*What are the networking protocol options for the Windows
clients if for some reason you do not want to use TCP/IP? *NWLink
(Novell), NetBEUI, AppleTalk (Apple).
7.
*What is data link layer in the OSI reference model
responsible for? Data link layer is located above the physical layer,
but below the network layer.*
Taking raw data bits and packaging them into frames. The network layer
will be responsible for addressing the frames, while the physical layer
is reponsible for retrieving and sending raw data bits.
8.
*What is binding order?**
*The order by which the network protocols are used for client-server
communications. The most frequently used protocols should be at the top.
9.
*How do cryptography-based keys ensure the validity of
data transferred across the network?*
Each IP packet is assigned a checksum, so if the checksums do not match
on both receiving and transmitting ends, the data was modified or
corrupted.
10.
*Should we deploy IPSEC-based security or certificate-based
security? *
They are really two different technologies. IPSec secures the TCP/IP
communication and protects the integrity of the packets.
Certificate-based security ensures the validity of authenticated clients
and servers.
11.
*What is LMHOSTS file?**
*Its a file stored on a host machine that is used to resolve NetBIOS to
specific IP addresses.
12.
*Whats the difference between forward lookup and reverse
lookup in DNS?*
17.
*If I delete a user and then create a new account with the
same username and password, would the SID and permissions stay the
same?* No. If you delete a user account and attempt to recreate it with
the same user name and password, the SID will be different.
18.
*What do you do with secure sign-ons in an organization with
many roaming users?* Credential Management feature of Windows Server
2003 provides a consistent single sign-on experience for users. This can
be useful for roaming users who move between computer systems. The
Credential Management feature provides a secure store of user
credentials that includes passwords and X.509 certificates.
19.
*Anything special you should do when adding a user that has
a Mac?* Save password as encrypted clear text must be selected on User
Properties Account Tab Options, since the Macs only store their
passwords that way.
20.
*What remote access options does Windows Server 2003
support?* Dial-in, VPN, dial-in with callback.
21.
*Where are the documents and settings for the roaming
profile stored?* All the documents and environmental settings for the
roaming user are stored locally on the system, and, when the user logs
off, all changes to the locally stored profile are copied to the shared
server folder. Therefore, the first time a roaming user logs on to a new
system the logon process may take some time, depending on how large his
profile folder is.
22.
*Where are the settings for all the users stored on a given
machine?* \Document and Settings\All Users
23.
*What languages can you use for log-on scripts?* JavaScipt,
VBScript, DOS batch files (.com, .bat, or even .exe)
24.
*Whats the difference between local, global and universal
groups?* Domain local groups assign access permissions to global domain
groups for local domain resources. Global groups provide access to
resources in other trusted domains. Universal groups grant access to
resources in all trusted domains.
25.
*I am trying to create a new universal user group. Why cant
I?* Universal groups are allowed only in native-mode Windows Server 2003
environments. Native mode requires that all domain controllers be
promoted to Windows Server 2003 Active Directory.
26.
*What is LSDOU?* Its group policy inheritance model, where
the policies are applied to *L*ocal machines, *S*ites, *D*omains and
*O*rganizational *U*nits.
27.
*Why doesnt LSDOU work under Windows NT?* If the
/NTConfig.pol/ file exist, it has the highest priority among the
numerous policies.
28.
*Where are group policies stored?*
%SystemRoot%System32\GroupPolicy
29.
*What is GPT and GPC?* Group policy template and group
policy container.
30.
*Where is GPT stored?*
%SystemRoot%\SYSVOL\sysvol\domainname\Policies\GUID
31.
*You change the group policies, and now the computer and
user settings are in conflict. Which one has the highest priority?* The
computer settings take priority.
32.
*You want to set up remote installation procedure, but do
not want the user to gain access over it. What do you do?* gponame>
User Configuration> Windows Settings> Remote Installation Services>
Choice Options is your friend.
33.
*Whats contained in administrative template conf.adm?*
Microsoft NetMeeting policies
34.
*How can you restrict running certain applications on a
machine?* Via group policy, security settings for the group, then
Software Restriction Policies.
35.
*You need to automatically install an app, but MSI file is
not available. What do you do?* A /.zap/ text file can be used to add
applications using the Software Installer, rather than the Windows
Installer.
36.
*Whats the difference between Software Installer and
Windows Installer?* The former has fewer privileges and will probably
require user intervention. Plus, it uses .zap files.
37.
*What can be restricted on Windows Server 2003 that wasnt
there in previous products?* Group Policy in Windows Server 2003
determines a users right to modify network and dial-up TCP/IP
properties. Users may be selectively restricted from modifying their IP
address and other network configuration parameters.
38.
*How frequently is the client policy refreshed?* 90 minutes
give or take.
39.
*Where is */*secedit*/*?* Its now /gpupdate/.
40.
*You want to create a new group policy but do not wish to
inherit*. Make sure you check *Block inheritance* among the options when
creating the policy.
41.
*What is tattooing the Registry?* The user can view and
modify user preferences that are not stored in maintained portions of
the Registry. If the group policy is removed or changed, the user
preference will persist in the Registry.
42.
*How do you fight tattooing in NT/2000 installations?* You
cant.
43.
*How do you fight tattooing in 2003 installations? *User
Configuration - Administrative Templates - System - Group Policy enable - Enforce Show Policies Only.
*_WHAT IS THE DIFFERENCE BETWEEN X86 AND I386 COMPUTER_*
X86 Is A Hardware Architecture Used By Intel Based CPU s While I386 Is
The File Folder Resides In Windows Installation CD, Contains All The
Necessary Windows Installation Files.
x86 refers to a popular set of instructions most commonly used in
processors <http://www.geekinterview.com/question_details/63147> from
Intel, AMD, VIA, and others. It usually implies a binary compatibility
with the 32-bit instruction set of the 80386 (a.k.a. i386).
i386 (as eluded to above) is the common name for the Intel386 (or 80386)
based PCs. It is sometimes emphasized as x86-32 (for 32-bit) and x86-64
(also called x64 - for 64-bit).
*INTERRUPT "TRAP" WHAT IS THIS TRAP?*
There are two hinderances to a process. Interrupt and trap.
Interrupt is when the process needs some I/O services whereas trap
occurs due to some fault or exception in the code.
How does multithreading take place on a computer with a single CPU
The operating system s task scheduler allocates execution time to
multiple tasks. Byquickly switching between executing tasks, it creates
the impression that tasks executesequentially.
By quickly switching among executing tasks, it creates the impression
that the tasks execute *simultaneously*. If it didn t switch among the
tasks, they would execute sequentially.
multi-threading has two forms, theory and reality. In theory,
multi-threading is suppose to be the same as "multi-tasking" which means
do two different task at the same time. Not possible on a single CPU
unless you consider GPU and ALU which generally we do not (consider
them). In reality, multi-threading does more than create an illusion, it
allows computers to shut down a program in infinite loop by creating
another thread so CPU executes one iteration of the loop, switch to the
kill thread and terminates the loop. Multi-tasking was suppose to do
3569962427&target=blog>Share
to Twitter
<http://www.blogger.com/share-post.g?blogID=1201274026491600790&postID=284392125
3569962427&target=twitter>Share
to Facebook
<http://www.blogger.com/share-post.g?blogID=1201274026491600790&postID=284392125
3569962427&target=facebook>Share
to Pinterest
<http://www.blogger.com/share-post.g?blogID=1201274026491600790&postID=284392125
3569962427&target=pinterest>
10 comments:
1.
AnonymousApril 23, 2012 at 1:07 PM
<http://mcitptips.blogspot.com/2011/11/windows-admin-interview-questions.htm
l?showComment=1335211649200#c1626196345191908737>
Thanks a lot it was very handy and informative
Reply <javascript:;>Delete
<http://www.blogger.com/delete-comment.g?blogID=1201274026491600790&postID=1
626196345191908737>
2.
Ganesan K <http://www.blogger.com/profile/07198998305999289415>July
27, 2012 at 9:02 PM
<http://mcitptips.blogspot.com/2011/11/windows-admin-interview-questions.htm
l?showComment=1343448121402#c8024512332676690722>
Very good Article.
DHCP Interview Question Answers
<http://techgane.in/dhcp-interview-question-answers/>
Reply <javascript:;>Delete
<http://www.blogger.com/delete-comment.g?blogID=1201274026491600790&postID=8
024512332676690722>
3.
mohsin4u <http://www.blogger.com/profile/00677494767593410955>August
21, 2012 at 3:32 AM
<http://mcitptips.blogspot.com/2011/11/windows-admin-interview-questions.htm
l?showComment=1345545177253#c601114508657839527>
really it is a very good data thanks alot,
Reply <javascript:;>Delete
<http://www.blogger.com/delete-comment.g?blogID=1201274026491600790&postID=6
01114508657839527>
4.
Ramesh Singupurapu
<http://www.blogger.com/profile/15656792790352541941>October 17,
2013 at 4:40 AM
<http://mcitptips.blogspot.com/2011/11/windows-admin-interview-questions.htm
l?showComment=1382010008036#c5060667519002293298>
Nice Collection..but Updates are required. i mean 2008 R2,2012
Reply <javascript:;>Delete
<http://www.blogger.com/delete-comment.g?blogID=1201274026491600790&postID=5
060667519002293298>
5.
AnonymousOctober 26, 2013 at 6:08 AM
<http://mcitptips.blogspot.com/2011/11/windows-admin-interview-questions.htm
l?showComment=1382792926193#c597850689193629626>
Very informative . it would be more usefull if there are any
scenario based troubleshooting steps . Like if we get any error on
server how to troubleshoot them.....
Reply <javascript:;>Delete
<http://www.blogger.com/delete-comment.g?blogID=1201274026491600790&postID=5
97850689193629626>
6.
Balaji <http://www.blogger.com/profile/07906766857055685353>December
26, 2013 at 10:05 PM
<http://mcitptips.blogspot.com/2011/11/windows-admin-interview-questions.htm
l?showComment=1388124359975#c5397587189199911292>
good post, keep update.
Reply <javascript:;>Delete
<http://www.blogger.com/delete-comment.g?blogID=1201274026491600790&postID=5
397587189199911292>
7.
TechieBird
<http://www.blogger.com/profile/06109442462931010374>January 11,
2014 at 11:19 PM
<http://mcitptips.blogspot.com/2011/11/windows-admin-interview-questions.htm
l?showComment=1389511184640#c8694838979886988707>
For TOP interview Q&A visit www.techiebird.com
Reply <javascript:;>Delete
<http://www.blogger.com/delete-comment.g?blogID=1201274026491600790&postID=8
694838979886988707>
8.
Zunaid Khan
<http://www.blogger.com/profile/05834060546744871677>February 25,
2014 at 12:30 PM
<http://mcitptips.blogspot.com/2011/11/windows-admin-interview-questions.htm
l?showComment=1393360258059#c2457463674783803123>
its good :)
Reply <javascript:;>Delete
<http://www.blogger.com/delete-comment.g?blogID=1201274026491600790&postID=2
457463674783803123>
9.
wap exp <http://www.blogger.com/profile/13183709891482879966>March
24, 2014 at 12:26 AM
<http://mcitptips.blogspot.com/2011/11/windows-admin-interview-questions.htm
l?showComment=1395645999196#c6105408120345535273>
It is genuinely unpredictable to analyze benefits of all
endorsements as there are numerous classes yet we can t deny their
importance in the relevant field of work. A vast part of the
specialists are harmonized on the essentialness of being affirmed
without any mistrust as it opens entryway towards triumph as it is
powered by
<//www.blogger.com/rearrange?blogID=1201274026491600790&widgetType=CustomSearch&
widgetId=CustomSearch1&action=editWidget§ionId=sidebar-left-1>
SYSTEM ADMIN
* Introduction of Network
<http://mcitptips.blogspot.com/2010/09/introduction-of-network.html>
* Types of Networks
<http://mcitptips.blogspot.com/2010/09/types-of-networks.html>
* Network Devices
<http://mcitptips.blogspot.com/2010/10/network-devices.html>
* Topology <http://mcitptips.blogspot.com/2010/10/topology.html>
* History of Microsoft Network O/s
<http://mcitptips.blogspot.com/2010/10/history-of-microsoft-network-os.html>
* IP-Address <http://mcitptips.blogspot.com/2010/10/ip-address.html>
* Active Directory
<http://mcitptips.blogspot.com/2010/10/active-directory.html>
* Installation of AD
<http://mcitptips.blogspot.com/2010/10/installation-of-active-directory.html
>
* Removal of AD
<http://mcitptips.blogspot.com/2010/10/removal-of-active-directory.html>
* Addittional DC
<http://mcitptips.blogspot.com/2010/10/addittional-domain-controller.html>
* Active Directory Component
<http://mcitptips.blogspot.com/2010/10/active-directory-component.html>
* Practical Steps for Site
<http://mcitptips.blogspot.com/2010/10/practical-steps-for-site.html>
* Ntds.Dit <http://mcitptips.blogspot.com/2010/10/ntdsdit.html>
* FSMO ROLES <http://mcitptips.blogspot.com/2010/10/fsmo-roles.html>
* Transfer of Roles
<http://mcitptips.blogspot.com/2010/10/transfer-of-roles.html>
* Global Catalog
<http://mcitptips.blogspot.com/2010/10/global-catalog.html>
* Installing Child Domain
<http://mcitptips.blogspot.com/2010/10/installing-child-domain.html>
* New Domain Tree in Existing Forest
<http://mcitptips.blogspot.com/2010/10/new-domain-tree-in-existing-forest.ht
ml>
* Trust Relationship
<http://mcitptips.blogspot.com/2010/10/trust-relationship.html>
* Member Server <http://mcitptips.blogspot.com/2010/10/member-server.html>
* User Management
<http://mcitptips.blogspot.com/2010/10/user-management.html>
* Editing Policies
<http://mcitptips.blogspot.com/2010/10/editing-polices.html>
* Sharing <http://mcitptips.blogspot.com/2010/10/sharing.html>
* Profiles <http://mcitptips.blogspot.com/2010/10/profiles.html>
* Offline Folder
<http://mcitptips.blogspot.com/2010/10/offline-folder.html>
* Distributed File System
<http://mcitptips.blogspot.com/2010/10/dfs-distributed-file-system.html>
* Disk Quotas <http://mcitptips.blogspot.com/2010/10/disk-quotas.html>
* Delegate Control
<http://mcitptips.blogspot.com/2010/10/delegate-control.html>
* Group Policy <http://mcitptips.blogspot.com/2010/10/group-policy.html>
* Software Deployment
<http://mcitptips.blogspot.com/2010/10/software-deployment.html>
* Folder Redirection
<http://mcitptips.blogspot.com/2010/10/folder-redirection.html>
* Scripts <http://mcitptips.blogspot.com/2010/10/scripts.html>
* Backup <http://mcitptips.blogspot.com/2010/10/backup.html>
* Restoration <http://mcitptips.blogspot.com/2010/10/restoration.html>
<//www.blogger.com/rearrange?blogID=1201274026491600790&widgetType=LinkList&widg
etId=LinkList1&action=editWidget§ionId=sidebar-left-1>
OTHER STUFF
* Windows admin interview questions
<http://mcitptips.blogspot.com/2011/11/windows-admin-interview-questions.htm
l>
* OS Interview Questions
<http://mcitptips.blogspot.com/2011/11/os-interview-questions.html>
* 2008 Requirements
<http://mcitptips.blogspot.com/2011/11/windows-server-2008-enterprise-editio
n.html>
* Active Directory FAQ
<http://mcitptips.blogspot.com/2011/11/active-directory-faq.html>
* FAT & NTFS
<http://mcitptips.blogspot.com/2010/11/difference-between-fat-and-ntfs.html>
* Windows shortcut keys
<http://mcitptips.blogspot.com/2010/12/windows-shortcut-keys.html>
<//www.blogger.com/rearrange?blogID=1201274026491600790&widgetType=LinkList&widg
etId=LinkList3&action=editWidget§ionId=sidebar-left-1>
Total Pageviews
78,171
<//www.blogger.com/rearrange?blogID=1201274026491600790&widgetType=Stats&widgetI
d=Stats1&action=editWidget§ionId=sidebar-left-1>
Search on Web
<//www.blogger.com/rearrange?blogID=1201274026491600790&widgetType=HTML&widgetId
=HTML2&action=editWidget§ionId=sidebar-right-1>
Network Admin
* Domain Name Service
<http://mcitptips.blogspot.com/2010/12/domain-name-service-dns.html>
* Dynamic Host Configuration Protocol
<http://mcitptips.blogspot.com/2010/12/dhcp-dynamic-configuration-host.html>
* File Transfer Protocol
<http://mcitptips.blogspot.com/2010/12/ftp-file-transfer-protocol.html>
* Groups <http://mcitptips.blogspot.com/2010/12/groups.html>
* Routing <http://mcitptips.blogspot.com/2010/12/routing.html>
* Disk Management
<http://mcitptips.blogspot.com/2010/10/disk-management.html>
* Storage <http://mcitptips.blogspot.com/2010/10/storage.html>
* Advanced <http://mcitptips.blogspot.com/2010/10/advanced.html>
* Backup <http://mcitptips.blogspot.com/2010/11/backup.html>
* Internet Information Service
<http://mcitptips.blogspot.com/2010/12/internet-information-services-iis.htm
l>
* Exchange Server Interview Questions and Answers
<http://exchangeservertipsandtricks.blogspot.com/>
<//www.blogger.com/rearrange?blogID=1201274026491600790&widgetType=LinkList&widg
etId=LinkList2&action=editWidget§ionId=sidebar-right-1>
[NetworkedBlogs] <http://networkedblogs.com/>
Follow this blog
<http://networkedblogs.com/blog/server_administration/?ahash=33b66c280f4dcc9757a
f1357a0f04e79>
<//www.blogger.com/rearrange?blogID=1201274026491600790&widgetType=HTML&widgetId
=HTML1&action=editWidget§ionId=sidebar-right-1>
Feedjit
<//www.blogger.com/rearrange?blogID=1201274026491600790&widgetType=HTML&widgetId
=HTML3&action=editWidget§ionId=sidebar-right-1>
<http://www.histats.com>
<//www.blogger.com/rearrange?blogID=1201274026491600790&widgetType=HTML&widgetId
=HTML6&action=editWidget§ionId=footer-1>