System Administration Interview Questions And Answers
Download System Administrator Interview Questions and Answers PDF
Prepare comprehensively for your System Administrator interview with our extensive list of 73 questions. Each question is crafted to challenge your understanding and proficiency in System Administrator. Suitable for all skill levels, these questions are essential for effective preparation. Download the free PDF now to get all 73 questions and ensure you're well-prepared for your System Administrator interview. This resource is perfect for in-depth preparation and boosting your confidence.
73 System Administrator Questions and Answers:
System Administrator Job Interview Questions Table of Contents:
1 :: Explain Active Directory?
Active Directory provides a centralized control for network administration and security. Server computers configured with Active Directory are known as domain controllers. Active Directory stores all information and settings for a deployment in a central database, and allows administrators to assign policies and deploy and update software.
Read More2 :: Define Domain Controller?
A domain controller (DC) or network domain controller is a Windows-based computer system that is used for storing user account data in a central database. It is the centerpiece of the Windows Active Directory service that authenticates users, stores user account information and enforces security policy for a Windows domain.
Read More3 :: Explain Group Policy?
Group Policy allows you to implement specific configurations for users and computers. Group Policy settings are contained in Group Policy objects (GPOs), which are linked to the following Active Directory service containers: sites, domains, or organizational units (OUs).
Read More4 :: List the different kinds of group policy objects?
There are two kinds of Group Policy objects:
★ Local Group Policy objects, are stored on individual computers.
★ Non-local Group Policy objects, which are stored on a domain controller, are available only in an Active Directory environment.
Read More★ Local Group Policy objects, are stored on individual computers.
★ Non-local Group Policy objects, which are stored on a domain controller, are available only in an Active Directory environment.
5 :: Define LDAP?
LDAP (Light-Weight Directory Access Protocol) determines how an object in an Active Directory should be named. LDAP is the industry standard directory access protocol, making Active Directory widely accessible to management and query applications. Active Directory supports LDAPv2 and LDAPv3.
Read More6 :: Define GPOs (Group Policy Objects)?
A Group Policy Object (GPO) is a collection of settings that control the working environment of user accounts and computer accounts. GPOs define registry-based policies, security options, software installation and maintenance options, script options, and folder redirection options.
Read More7 :: Define SYSVOL folder?
The SYSVOL folder stores the server copy of the domain's public files that must be shared for common access and replication throughout a domain.
All AD databases are stored in a SYSVOL folder and it's only created in an NTFS partition. The Active Directory Database is stored in the %SYSTEM ROOT%NDTS folder.
Read MoreAll AD databases are stored in a SYSVOL folder and it's only created in an NTFS partition. The Active Directory Database is stored in the %SYSTEM ROOT%NDTS folder.
8 :: Define garbage collection?
Garbage collection is the online defragmentation of the Active Directory which happens every 12 hours.
Read More9 :: Define Domain?
A domain is defined as a logical group of network objects (computers, users, devices) that share the same Active Directory database. A tree can have multiple domains.
Read More10 :: What is DNS and which port number is used by DNS?
The Domain Name System (DNS) is used to resolve human-readable hostnames like www.golbalguideline.com into machine-readable IP addresses like 69.173.221.64.
DNS servers use UDP port 53 but DNS queries can also use TCP port 53 if the former is not accepted.
Read MoreDNS servers use UDP port 53 but DNS queries can also use TCP port 53 if the former is not accepted.
11 :: What are main email servers?
Email servers can be of two types:
★ Outgoing Mail Server (SMTP)
Most outgoing mail servers use SMTP (Simple Mail Transfer Protocol) for sending emails. The outgoing mail server can belong to your ISP or to the server where you setup your email account.
★ Incoming Mail Server (POP3, IMAP, HTTP)
The incoming mail server is the server associated with an email address account. There cannot be more than one incoming mail server for an email account. In order to download your emails, you must have the correct settings configured in your email client program.
Read More★ Outgoing Mail Server (SMTP)
Most outgoing mail servers use SMTP (Simple Mail Transfer Protocol) for sending emails. The outgoing mail server can belong to your ISP or to the server where you setup your email account.
★ Incoming Mail Server (POP3, IMAP, HTTP)
The incoming mail server is the server associated with an email address account. There cannot be more than one incoming mail server for an email account. In order to download your emails, you must have the correct settings configured in your email client program.
12 :: What are the main email ports?
★ POP3 - port 110
★ IMAP - port 143
★ SMTP - port 25
★ HTTP - port 80
★ Secure SMTP (SSMTP) - port 465
★ Secure IMAP (IMAP4-SSL) - port 585
★ IMAP4 over SSL (IMAPS) - port 993
★ Secure POP3 (SSL-POP) - port 995
Read More★ IMAP - port 143
★ SMTP - port 25
★ HTTP - port 80
★ Secure SMTP (SSMTP) - port 465
★ Secure IMAP (IMAP4-SSL) - port 585
★ IMAP4 over SSL (IMAPS) - port 993
★ Secure POP3 (SSL-POP) - port 995
13 :: Explain Forests, Trees, and Domains mean?
Forests, trees, and domains are the logical divisions in an Active Directory network.
★ A domain is defined as a logical group of network objects (computers, users, devices) that share the same active directory database.
★ A tree is a collection of one or more domains and domain trees in a contiguous namespace linked in a transitive trust hierarchy.
★ At the top of the structure is the forest. A forest is a collection of trees that share a common global catalog, directory schema, logical structure, and directory configuration. The forest represents the security boundary within which users, computers, groups, and other objects are accessible.
Read More★ A domain is defined as a logical group of network objects (computers, users, devices) that share the same active directory database.
★ A tree is a collection of one or more domains and domain trees in a contiguous namespace linked in a transitive trust hierarchy.
★ At the top of the structure is the forest. A forest is a collection of trees that share a common global catalog, directory schema, logical structure, and directory configuration. The forest represents the security boundary within which users, computers, groups, and other objects are accessible.
14 :: Explain lingering objects?
A lingering object is a deleted AD object that still remains on the restored domain controller in its local copy of Active Directory. They can occur when changes are made to directories after system backups are created.
When restoring a backup file, Active Directory generally requires that the backup file be no more than 180 days old. This can happen if, after the backup was made, the object was deleted on another DC more than 180 days ago.
Read MoreWhen restoring a backup file, Active Directory generally requires that the backup file be no more than 180 days old. This can happen if, after the backup was made, the object was deleted on another DC more than 180 days ago.
15 :: What domain controller allow?
A domain controller allows system administrators to grant or deny users access to system resources, such as printers, documents, folders, network locations, etc., via a single username and password.
Read More17 :: When we use WDS?
Windows Deployment Services is a server role used to deploy Windows operating systems remotely. WDS is mainly used for network-based OS installations to set up new computers.
Read More18 :: Why we use DHCP?
Dynamic Host Configuration Protocol assigns dynamic IP addresses to network devices allowing them to have a different IP address each time they are connected to the network.
Read More19 :: How to remove lingering objects?
Windows Server 2003 and 2008 have the ability to manually remove lingering objects using the console utility command REPADMIN.EXE.
Read More20 :: Do you know why should you not restore a DC that was backed up 6 months ago?
When restoring a backup file, Active Directory generally requires that the backup file be no more than 180 days old. If you attempt to restore a backup that is expired, you may face problems due to lingering objects.
Read More21 :: Define VOIP?
VOIP - Short for Voice Over Internet Protocol, a category of hardware and software that enables people to use the Internet as the transmission medium for telephone calls by sending voice data in packets using IP rather than by traditional circuit transmissions.
Read More22 :: Can you please explain the difference between NTFS & FAT?
★ NTFS is the current file system used by Windows. It offers features like security permissions (to limit other users' access to folders), quotas (so one user can't fill up the disk), shadowing (backing up) and many other features that help Windows.
★ FAT32 is the older Microsoft filesystem, primarily used by the Windows 9X line and Window could be installed on a FAT32 parition up to XP. In comparision, FAT32 offers none of what was mentioned above, and also has a maximum FILE (not folder) size of 4GB, which is kind of small these days, especially in regards to HD video.
Read More★ FAT32 is the older Microsoft filesystem, primarily used by the Windows 9X line and Window could be installed on a FAT32 parition up to XP. In comparision, FAT32 offers none of what was mentioned above, and also has a maximum FILE (not folder) size of 4GB, which is kind of small these days, especially in regards to HD video.
23 :: Explain Proxy Server?
A proxy server is a computer that acts as a gateway between a local network (e.g., all the computers at one company or in one building) and a larger-scale network such as the Internet. Proxy servers provide increased performance and security. In some cases, they monitor employees' use of outside resources.
Read More24 :: How to backup AD?
Backing up Active Directory is essential to maintain the proper health of the AD database.
Read More25 :: Explain loop back?
Loopback address is 127.0.0.1,
An address that sends outgoing signals back to the same computer for testing.
Read MoreAn address that sends outgoing signals back to the same computer for testing.