Windows NT 4.0 Server and Enterprise Exam Notes

70-67

70-68

 

Module 1 – The Windows NT 4.0 Environment. *

Module 2 – Installing Windows NT *

Module 3 – Configuring the Windows NT Environment. *

Module 4- Managing System Polices *

Identify Troubleshooting. *

Module 5- Managing File Systems *

Module 6- Managing Partitions *

Module 7 - Managing Fault Tolerance *

Module 8 – Supporting Applications *

Module 9 – The Windows NT Networking Environment *

Module 10 – Configuring Windows NT Protocols *

Module 11 – Windows NT Network Services. *

Module 12- Remote Access Service *

Module 13 – Internetworking and Intranetworking *

Module 14 – Interoperability with Novell NetWare *

Module 15 – Implementing Network Clients *

Module 16 – Implementing Directory Replication *

Module 17 – The Windows NT Boot Process *

Module 18 – Troubleshooting Resources. *

Identifying Bottlenecks with Performance Monitor. *

 

Module 1 – The Windows NT 4.0 Environment.

 

  1. Identify the primary features of Windows 95 ?

 

  1. Identify the primary features of Windows NT 4.0 Workstation?

 

 

 

  1. Identity the primary features if Windows NT Server ?

 

  1. Identify the differences between USER MODE and KERNAL MODE.
  1. Applications and the subsystems that support them, run in user mode. User mode processes have the following limitations.

 

 

  1. Define the Windows NT Executive component of the Windows NT architecture.

A.

 

Q. Identify the Advantages & Disadvantages of the DOMAIN Model?

A. Centralised account and security information Requires at least one PDC

Q. Identify the Advantages & Disadvantages of the WORKGROUP Model?

A.

Advantages

Disadvantages

Does not require PDC

No centralised account management

Simple design and implementation

Inefficient for networks that have many computers

Convenient for a small network close together and on the same Subnet.

Limited centralised administration control.

 

  1. Identify the logging onto a computer process?

A.

    1. WINLOGON, enter username and password
    2. Sent to LSA (local security Authority)
    3. LSA checks with SAM ( Security Accounts Manager)
    4. If approved the LSA creates an access TOKEN.
    5. Sent back to WINLOGON
  1. Identify the logging onto a DOMAIN process?

A.

    1. WINLOGON, enter username and password
    2. Passes to client NETLOGON service
    3. NETLOGON passes it to the NETLOGON service on the DOMAIN Controller
    4. This passes it to the SAM
    5. SAM Approves it
    6. Passes it then to the DOMAIN NETLOGON
    7. Which passes it to the client NETLOGON
    8. NETLOGON Passes it to LSA
    9. LSA creates an access TOKEN and passes it to WINLOGON.
  1. Identify the creating a Computer account process ?

A.

 

Module 2 – Installing Windows NT

 

  1. Identify the Minimum Hardware requirements for installing Windows NT Workstation and Windows NT server on Supported Platforms.

A.

NT Workstation 4.0

NT Server 4.0

486/33

486/33

12MB RAM

16MB RAM

110 MB

125 MB

 

A. UPGRADING is not possible for Windows 95.

 

A. System Partition – Files needed to start the computer NTLDR etc

Boot Partition – All system files.

Q. Select the appropriate file systems to use for a Windows NT Installation.

A.

FAT

NTFS

For Dual booting to MS-DOS

NT only operating System.

 
  • File – level security. NT file compression required
  • Services for Macintosh

  • Permissions must be preserved while migrating for a Novell NetWare server

 

 

 

Primary Domain Controller

  • First NT server to be installed in a Domain – this creates a unique DOMAIN SID (Security Identifier)
  • Maintains master copy of the Directory Database (SAM) – Security Accounts Manager (READ/WRITE)
  • Validates users

Backup domain Controller

  • Contains a copy of the Database (READ ONLY)
  • Validates users.

  • Need a BDC for every 2000 users

Member Server

  • Provide file, print and application services.

  • Cannot be promoted to PDC/BDC without reinstalling Windows NT Server
  • The can move from one domain to another as they do not have a DOMAIN SID.

 

 

 

  1. Identify factors that affect domain structure.

A.

 

  1. Choose the correct licensing mode for a computer running Windows NT Server.

A.

Per Server

Per Seat

No of connections to the server

Each client has a license

 

  1. Create a distribution server for the Windows NT installation files.
  1. There are 2 ways
    1. Copy the files to the server and share the directory
    2. Mount the CD ROM and share it, this is slower but takes less hard disk space.

 

A. Winnt.exe (with no arguments) does the following, creates 3 setup disks, copies the installation files to a directory on the c:\ called $WIN_NT$.~LS.

 

/x Does not create the setup floppies

/ox Creates only the disks. Can be used for CDROM installation or for REPAIR

/b floppyless installation.

 

Q. Prepare a Unattended installation.

A. The use of Answer files (UNATTEND.TXT) and UDF’s (Uniqueness database files).

WINNT /U:answer_filename /UDF:ID[,database_filename]

 

  1. What are the Options for upgrading to Windows NT 4.0

 

Q. How do I upgrade from multiple servers

  1. Use WINNT32.EXE with /S

 

  1. What are Initial Parameter Files?
  1. These files contain information on how the install or upgrade will be performed. The are 2 files , one from the Text Based and the other from the graphical.

Q. Explain OEM Setup tools

A. This is the use of SYSDIFF utility

 

 

 

 

  1. How would you remove Windows NT?
  1. FAT – Sys the primary partition (c:\) with Windows 95 or MS-DOS and delete the following files

 

Module 3 – Configuring the Windows NT Environment.

Q. Describe the Purpose of the Windows NT Registry?

Q. What are the Registry Subtree?

HKEY_LOCAL_MACHINE

Configuration data about the local machine The User profiles and Policies merges data into these keys.

HKEY_USERS

Contains system default settings

HKEY_CURRENT_USER

Details about the current logged on user The User profiles and Policies merges data into these keys.

HKEY_CLASSES_ROOT

Contains software configuration data

HKEY_CURRENT_CONFIG

Contain data about the active hardware profile.

  1. How do you configure Virtual Memory?

Module 4- Managing System Polices

 

Q. Describe User & Hardware profiles and System policies.

A.

 

  1. How do you implement ROAMING PROFILES.
  1. In USER MANAGER FOR DOMAINS, User Profile type \\PDC\PROFILES\%USERNAME%

 

Q. How do you create MANDATORY USER PROFILES?

Q. What can be controlled by the SYSTEM POLICY EDITOR?

A.

  1. What are the User-defined settings saved by User Profiles.

A.

Window NT Explorer

Mapped drives, types of files displayed

Control Panel

Screen appearance, mouse, keyboard

Printer Settings

Network Printer connections

Taskbar

 

Accessories

Clock, Calculator and Notepad

Window NT-based Applications

application settings

 

  1. What are the USER and GROUP Policy options?

A.

Control Panel

display settings, hiding screen saver and Appearance tabs

Desktop

Wallpaper and colour scheme

Shell

Hide Network Neighbourhood,

System

Disable registry editing tools, and run allowed windows programs

Windows NT Shell

 

Windows NT SYSTEM

 

 

 

 

Q. What parts of the Registry do they handle?

  1. HKEY_CURRENT_USER – configuration of the current user
  1. Define the functions & scope of system polices.
  1. Controls the users work environment. We are able to restrict and control desktops and its functionality . A Policy can be set for an individual user, group, computer(s) or all users on the network.

 

  1. Describe how System Polices work?
  1. A policy is a set of REGISTRY Settings that are merged into yours when you logon. When you logon the computer checks for the NTCONFIG.POL. This will hold settings for you, if any. It may be individual or for a group that you belong to. If there is a match then this registry is merged into yours and any restrictions will apply.

 

  1. Describe how a User and Computer policy is implemented when a user logs on to a domain.

A.

 

  1. Identify the features of System Policy Editor.
  1. Check Boxes -

 

 

  1. Describe how to use System Policy to Secure a computer.

 

Identify Troubleshooting.

 

Q. Downloading policies too slow.

  1. Due to too many simultaneous logins. Spread the policies to other servers. Enable "LOAD BALANCING" on Windows 95 computers. Use Replication to other BDC’s for NT machines.

Q. Polices load for Windows 95 but not NT.

  1. NTCONFIG.POL & CONFIG.POL

Q. Wallpaper does not appear on all NT machines.

  1. The actual wallpaper bitmap file may not reside on all NT machines.

 

NOTE The Administrators can implement System Polices

Module 5- Managing File Systems

 

 

Q. Describe the feature of the FAT file system.

 

  1. Describe the feature of the NTFS file system.

 

 

Q. Identify important considerations in NTFS implementation.

 

Q. How do you Convert FAT to NTFS?

A. There are 2 ways to do this

 

Compressed files can be seen in a different colour in Explorer.

Files that are open cannot be compressed.

 

 

 

Module 6- Managing Partitions

 

  1. Explain the difference between PRIMARY & EXTENDED Partitions.

A.

 

 

  1. Explain the Benefits and disadvantages of a Volume Set?
  1. A volume is an area of disk space that is a single entity that can be accessed by the file system (Say drive G:).

 

  1. What are the guidelines for Managing Volume Sets?
  1. Explain the Benefits and disadvantages of a Stripe Set?
  1. Stripe sets require at least 2 hard disks, and can include upto 32 disks. Free space on the physical disks is used to store data evenly across all disks in the stripe set. The amount of space that can be used on each disks is equal to the smallest space available in the set.

 

There is no FAULT TOLERENCE.!

 

  1. What are the guidelines for Managing Stripe Sets?

A.

 

  1. Describe hardware-related issues that affect Windows NT when adding additional hard disks.

A.

 

Module 7 - Managing Fault Tolerance

 

  1. Identify relevant RAID levels and features.
  1. Windows NT supports RAID Levels 1 & 5. These are Software implementations.

 

 

  1. Describe the disk mirroring function of RAID 1

DISK DUPLEXING is the same but using 2 DISK CONTOLLERS, in case one goes down.

Q. What is the name of the driver that makes sure 2 drives are mirrored?

A. FTDISK.SYS

  1. Describe the disk striping function of RAID 5

 

BOOT and SYSTEM partitions cannot be part of the Stripe set with Parity

  1. What do you have to do in DISK ADMINISTRTOR after making changes?

A. "Commit Changes now"

Q. Compare the features of RAID1 with features of RAID 5.

A.

Mirror Sets (RAID 1)

Striping W/P (RAID 5)

Supports FAT and NTFS

Supports FAT and NTFS

Can Mirror BOOT & SYSTEM partition

Cannot Stripe BOOT & SYSTEM partition

Requires 2 Hard disks

Requires minimum of 3 Hard disks

50% Utilisation

Lower cost per MB

Good READ/WRITE performance

Excellent READ performance

Moderate WRITE performance

Uses Less system memory

Require more system memory for parity calculation

 

Supports as many as 32 hard disks

 

 

  1. Recover a member of a Stripe Set with parity failure.

 

  1. Recover a member of a Mirror Set failure

 

Q. Creating a fault Tolerance Boot Disk

A. Format a floppy within Windows NT

Copy the following files

 

 

  1. Describe how Advanced RISC computing (ARC) paths identify partitions.
  1. Edit the BOOT.INI to point to the mirrored partition not the primary partition (BOOT & SYSTEM).

 

  1. Which RAID levels are supported through NT SERVER software.

A.

Module 8 – Supporting Applications

 

 

  1. Identify the subsystems that support applications under Windows NT
  1. Windows NT supports applications by using environment subsystems. An environment subsystem provides application programming interface (API) services to applications written for a specific environment or operating system.

 

  1. Describe how Windows NT supports Win-32 based applications.
  1. Multithreaded Applications – can simultaneously execute multiple threads. e.g. the SETUP program

 

  1. Describe the components of an NTVDM (NT Virtual Dos Machine)
  1. Each MS-DOS applications runs in a NTVDM, Each NTVDM has it’s own thread and address space. So no other failed NTVDM can affect it.

 

  1. Describe the components of the WOW (Windows on Windows) Environment
  1. Win16 on Win32 allows Win16 applications to run in a Win32 environment.

 

  1. Identify the advantages and disadvantages or running Win16 applications in Multiple NTVDM’s.
  1. When an Win16 application is started a NTVDM is created, but if that applications is configured to use its own address space then an WOW application environment is created within that NTVDM.

 

Advantages

 

Disadvantages

 

Additional memory usage.

 

Lack of interoperability – Only if they do not follow the OLE & DDE specifications.

 

  1. Explain the function and purpose of DCOM (Distributed Component Object Model)
  1. Allows applications to communicate across a network. E.g. would the AEAT LEWIS program of authorizing jobs.

 

  1. Prioritize applications running under Windows NT
  1. Windows NT prioritizes applications and distributes processing time among them. The base priority can be adjusted to enhance or inhibit performance.

 

Start /high "

Module 9 – The Windows NT Networking Environment

 

  1. Describe the Components that make up the Windows NT Network architecture

A.

 

  1. Define the function of Network Driver Interface Specification (NDIS) compatible network adapter card drivers.

Q. Explain the function of NDIS 4.0.

A.

    1. NDIS 4.0 defines the software interface used by protocols to communicate with network adapter card DRIVERS.

 

  1. Identify the protocols included in Windows NT.

 

  1. Explain the function of the TDI (Transport Driver Interface)?

TDI is a boundary layer that provides an interface between the File system drivers

 

  1. Identify the file system drivers included in Windows NT
  1. Used to access files using Redirectors and Servers.

 

Each NT machine has redirectors and Servers.

 

  1. Explain the function of Distributed Applications.
  1. Explain the IPC (Interprocess Communications Mechanisms) mechanisms that enable client/server connections
  1. Identify the Windows NT file and print sharing components supported by Windows NT.

A.

 

 

 

 

 

 

  1. Describe how a computer running Windows NT can access file and Print resources shared on a network.

A.

  1. A request is made to open a file.
  2. The I/O manager then passes it to the redirector with the assistance of the MPR and MUP (MUP will have the UNC of the remote network resource) (The I/O manager checks to see if the file is on the local machine or on a network resource)
  3. RDR passes it to the lower level network drivers.
  4. The SVR receives the request
  5. The SVR passes it to the I/O manager
  6. The I/O manager passes it to the local file system driver (SVR or RDR ?)
  7. The local file system driver calls lower level disk device drivers to access the file.

 

 

 

 

Module 10 – Configuring Windows NT Protocols

 

  1. What is TCP/IP?
  1. Is a collection of protocols developed in conjunction with the internet. TCP and IP are only two of the protocols developed in the early 70’s to tie the Internet together.

 

  1. What is the OSI Network Model?
  1. They manage different portions of a networks task.

 

OSI Model

TCP/IP Core Transport protocols

Transport

TCP UDP

(connection-orientated service) (Connectionless service)

Network

ICMP ARP

(provide Error Message) IP (Maps IP address to MAC Addresses)

 

TCP – connection-orientated, reliable service (Like making a Telephone call)

UDP – Connectionless Datagram service and provides no inbuilt reliability.

 

The choice for programmers to choose depend on reliability and speed. TCP is reliable (for Domain Logins) but UDP is faster (for Domain broadcasts)

 

NOTE : A common analogy for TCP and IP is that TCP provides connection-orientated services like a telephone connection and IP provides connectionless service like the Post office.

 

ARP – Maps IP address to the Media Access Control (MAC) address.

  1. What API can the Microsoft TCP/IP suite use to access the Transport Layer?

A.

 

Q. Define the purpose and function of Microsoft TCP/IP.

A.

 

Q. Identify the components of the Microsoft TCP/IP protocol suite.

A.

Simple Network management protocol (SNMP)

 

Windows Sockets (WinSOCK) – 2 way interface, uses IP addresses

 

NetBIOS over TCP/IP (NetBT) – Applications that use NetBIOS names

 

User Datagram protocol (UDP) – a connectionless protocol used for Datagram, i.e. postoffice

 

Internet Protocol (IP) – used to route packets across a internetwork.

 

Address Resolution Protocol (ARP) – maps IP addresses to MAC addresses of a NIC

 

  1. What are the TCP/IP Diagnostic Utilities?

A.

 

 

  1. Configure TCP/IP Manually

A.

IP Address

A logical 32-bit address used to identify a TCP/IP host. Each address has two parts: a network ID & a host ID. The network ID identifies all hosts on the physical network.

The Host ID identifies a host on the network. .i.e. 131.107.2.200

Network ID 131.107

Host ID 2.200

Subnet Mask

A Subnet is a network in a multiple network environment that uses IP addresses derived from a single network ID. Subnets allow an organization to divide a large network into multiple physical networks, and to connect them with routers.

A Subnet mask blocks out part of the IP address, so that TCP/IP can distinguish the network ID from the host ID.

When TCP/IP hosts try to communicate, the Subnet mask determines whether the destination host is on a local or remote network.

To communicate on a network, computers must have the same Subnet mask.

 

Default Gateway

For communication with a host on another network, an IP address should be configured for the default gateway. TCP/IP sends packets for remote networks to default gateway if no other route is configured.

 

  1. Test the TCP/IP configuration, and then validate the connections to other computers.

 

  1. What is NWLink IPX/SPX Compatible Transport?
  1. The purpose of this protocol is to route packets across an internetwork.

 

  1. What is needed on a NT Server to talk to a NetWare server?

Q. Describe the features of the NWLink IPX/SPX compatible transport.

A.

Windows Sockets (WinSOCK)

Supports existing NetWare Applications written to comply with the NetWare IPX.SPX Sockets interface.

 

NetBIOS over IPX

Implemented as NWLink NetBIOS, supports communication between a NetWare client running NetBIOS, and a computer running Windows NT and NWLink NetBIOS.

 

The Frame Type and Internal Network Number are the only things that need to be configured on a NT Server.

 

Routing Information Protocol - By using RIP over IPX, a computer running Windows NT Server can act as an IPX router. A RIP router is a computer or other type of hardware that broadcasts routing information, such as network addresses. As a router becomes aware of any change in the internetwork layout – for example, a router that is offline – it broadcasts the information to neighboring routers.

 

 

Module 11 – Windows NT Network Services.

 

  1. Installing Network Services, What are they?

A.

 

  1. Explain the function of DHCP?
  1. Describe the differences between manual IP address configuration and automatic configuration by using DHCP.

Manual – too much administration

 

  1. How does Microsoft TCP/IP minimise problems resulting from duplication.

Q. List the requirements for using DHCP

A.

Server

 

Client

 

  1. Explain how DHCP assigns an IP address?
  1. ROSA

 

  1. Creating and configuring a SCOPE.
  1. A scope is a range of address that are available in a POOL It also keeps the exclusion range. And the lease period.

 

  1. Identify other DHCP options.

DHCP can be used to set other options for clients.

 

Global Options

Apply to all DHCP Scopes. Used when all clients need the same information.

Scope Options

Apply only to specified Scopes, different scope for each Subnet.

Client Options

Apply to a specific client

 

 

  1. Explain the function of WINS (Windows Internet Name Service)

 

 

 

 

 

  1. Explain how NetBIOS name registration Works.

Q. What is a LMHOSTS File?

Problems: Each client needs to have a LMHOSTS file

The LMHOSTS file needs to be updated regularly

 

Q. WINS as an Alternative to LMHOSTS files?

Q. How can the DHCP and WINS server be used in companion?

Q. Explain the WINS Server database?

A.

[00h] Workstation (Client) Service

[03h] Messenger Service

[20h] Server Service

  1. List the requirements for using WINS

A.

 

Server

 

 

  1. Describe the purpose of the DNS Server service?
  1. Explain the advantages of integrating WINS and DNS

WINS

DNS

Resolves NetBIOS names to IP addresses

Resolves Internet addresses (Host Names) to IP Addresses

Only Translates the NetBIOS name to the IP address

Can do reverse lookup, translating the IP address to a Host name

Dynamic database – automatic update

Static Database – manually updated

Keeps all names in a FLAT name space and only shares them with configured replication partners

Keeps the names in hierarchical structures called "fully qualified domain name" that registered and recognised throughout the Internet

Used for name resolution for clients using Microsoft operating systems.

Used for clients running Microsoft operating Systems and clients and hosts that are not running Microsoft operating systems, such as UNIX-based computers and mainframes using TCP/IP

Each client can only register the name once but may have the 16th character different to describe their function on the network.

Lets the administrator create different aliases for the same host.

Facilitates domain related functions like browsing and logging on to domain.

 

 

 

 

  1. Identify the roles a computer running Windows NT can perform in the browser process.

A.

Domain Master browser

Collects and maintains the master list of available network computers, and names of other domains and workgroups that can share network resources. When a computer logs onto the network it sends a "announcement packet" to the DMB.

It distributes the list to the Master browser of each Subnet in the Windows NT domain.

There is only one domain master browser in a Windows NT domain, and it’s the primary domain controller (PDC)

Master browsers

Collects and maintains the master list of available network servers in its workgroup or Subnet.

It receive information from the Domain master browser

It distributes the list to the backup browsers.

Backup browser

Receives list from the Master browser and distributes the list to clients on request.

It’s main job is to offload work from the Master Browser. ALL BDC’s are backup browser’s.

For every 32 computers in a domain, a BB is required. Otherwise Potential browsers will become backup browsers.

Potential Browser

Not a browser but can be one upon the request of the master browser. It depends on the number of computers on the network.

Non-browser

Configured to be a browser

 

 

 

 

 

 

 

 

  1. Explain How the Windows NT browser services locates available servers on the network.

A.

  1. All computers running the server service announce their presence to the master browser
  2. When a client needs a network resource it contacts the master browser for a list of backup browsers
  3. The client then requests the network server list form a backup browser. The backup browser responds with a list of domains and workgroups and a list of servers local to the client’s domain or workgroup.
  4. The user at the client selects the server.

 

  1. Describe how the browser election process ensures continuos browser service.
  1. If a client cannot locate a "Master Browser" then a new master browser must be elected. The election process ensures that there is only one master browser per workgroup or segment in a domain.

 

    1. Windows NT Server
    2. Windows NT Workstation
    3. WFW or Windows 95.
    4. The operating system version 3.1, 3.11
    5. The configured role of the browser i.e. Browser, potential browser, non-browser

 

  1. How is browsing done within an Enterprise Network?

A.

  1. How are Browser failures handled?
  1. When a computer shuts down it sends a message to the "Master Browser" that its to shut down. The problems occur when that machine is not shutdown properly. i.e. Power turned off without logging off. The master browser still thinks its turned on.

 

For the computer to be dropped off the list it has to MISS 3 ACCOUNCEMENT PERIODS. Browser periods occur every 12 minutes so it could take 36 minutes to drop off + say 15 minutes to update the backup browsers.

 

If the backup browser fails then an election is forced immediately.

Module 12- Remote Access Service

 

  1. Describe RAS and Dial-Up networking?

 

  1. Explain WAN support in RAS
  1. Remote clients can connect to a RAS server through the following

 

 

  1. Explain PPTP?

PPTP is a protocol that allows access to the RAS Server via the Internet.

  1. What are the Advantages of PPTP?

A.

 

 

 

 

 

 

  1. Identify the remote access protocols of RAS

RAS supports 2 kinds of protocols.

 

 

 

 

  1. What is PPP Multilink Protocol.

A.

  1. Explain the function of the NetBIOS gateway and routers
  1. NT RAS can act as a gateway or router in several situations.

 

 

 

  1. Explain the security features of RAS

A.

 

 

    1. Allow any encryption including clear text – for client operating systems that do not support encrypted password authentication. They used the PAP protocol

    2. Require encrypted authentication – Used for computers running other operating systems (UNIX etc). This will enable the CHAP protocol.

    3. Require Microsoft encrypted authentication – The Default – The clients must encrypt with MS-CHAP (Microsoft Challenge Handshake Protocol). This means that only Microsoft clients can log on (Windows 95, NTW, NT Server)

 

 

 

 

 

 

  1. Describe the functions of TAPI
  1. The Windows NT Telephony API (TAPI) provides a standard way for communications applications to control telephony functions for

 

 

  1. Identify TAPI settings.

 

    1. Locations – AREA (or city) code, Country Code, Outside Line, Preferred calling card

    2. Calling Cards – The number is entered and then is scrambled for security

    3. Drivers – AKA TAPI Service Providers (TSPs) are S/W components that control TAPI hardware such as PBX, Voice mail card, phone system etc)

 

 

Q. Installing and configuring RAS

  1. When RAS is installed the following information is needed

 

 

 

  1. Configuring a RAS Server
  1. First step to specify the hardware and port.
  1. Configuring Protocols on the Server

A.

Dial out protocols

Select the protocols to use when dialling out to a remote access server. If you do not select a protocol in the Dial Out Protocols box, you will be unable to select that protocol later when you configure a phone book entry for dialling out.

If no ports are configured for dial out, the Dial out Protocols box appears dimmed.

Server settings

Protocols the RAS server will use for servicing remote clients

Encryption Settings

  • Allow any authentication including clear text
  • Require encrypted authentication
  • Requite Microsoft encrypted authentication

Enable Multilink

For the use of combining multiple modems

 

  1. Configuring a RAS Server to Use NetBEUI.
  1. If NetBEUI protocol is installed, the RAS Setup program enables NetBEUI and the NetBIOS gateway by default.

 

Q. Configuring a RAS Server to use TCP/IP

A.

Allow remote TCP/IP clients to access:

  • Entire Network
  • This computer only

Use DHCP to assign remote TCP/IP client address

Let DHCP assign the IP address

Use static Address Pool

Begin & End, and Exclusion range

Allow remote clients to request a predetermined IP address

At the client end the IP address will be entered.

  1. Configuring a RAS Server to use IPX

A.

Allow remote IPX clients to access:

  • Entire Network
  • This computer only

Allocate network numbers automatically

An IPX network number not currently in use is determined by the RAS server and assigned to the RAS client.

Allocate network numbers

 

.

Ranges of IPX network numbers can be given to a RAS server for assignment to clients. Allocated IPX address pools are useful if you want to identify RAS clients on the network by number.

Provide the beginning network number in the From box. RAS automatically determines the number of available ports and calculates the end number

Assign same network number to all IPX clients

 

 

Select this check box to assign the same network number to all IPX clients. This will reduce the size of RIP announcements on the network. If this box is selected, only one network number is added to your routing table for all active RAS clients. If this box is not selected, a network number is added to your routing table for each active RAS client.

Allow remote clients to request IPX node number

 

 

Select this check box to allow the remote client to request its own IPX node number rather than use the node number provided by the RAS server. Allowing remote clients to specify their own node number is a potential security threat to your network. Choosing their own node number allows a client to impersonate a previously connected client and access network resources accessed by the other client.

 

  1. Install Dial-Up networking
  1. This is installed when

 

 

  1. Configuring Phonebook Entries
  1. A phonebook entry stores all the settings needed to connect to a particular remote network.

 

TAB

USE THIS TAB

Basic

Configure the name for the phone book entry

The phone number

Specify and configure the device (i.e. Dial-Up networking Serial Cable between 2 PC’s)

  • BPS
  • Hardware features
  • Disable modem speaker

Use another port if busy – here is where you configure the client to use Multilink and multiple modems.

Server

Dial-Up server type – PPP, SLIP or other RAS protocol

Network protocols, TCP/IP, IPX, NetBEUI

  • TCP/IP – here is where you select if IP address is server assigned, Specify an IP address, specify name servers (DNS, WINS)

 

Data compression

Script

To specify a terminal windows or script file if manual intervention is needed before or after dialling to establish a remote access session.

Security

To select level of authentication, this will match the level set on the RAS server

X.25

-

 

 

 

 

 

 

  1. Use Dial-Up Networking to log on to a Windows NT domain.
  1. Windows NT includes an login option that enables users to log on to a domain using Dial-Up Networking. With this option users can select a Dial-Up Networking phonebook entry that they will use to log on. Dial Up Networking then establishes a connection to the RAS Server so that a domain controller for the specified domain can validate the logon request.

 

TAB

USE THIS TAB TO

Dialling

Number of redial attempts

Seconds between redial

Idle seconds before hanging up.

Call-back

Configure the server to disconnect and to call the client back following authentication. This reduces telephone charges and increases security. Depends also what is set in the Remote Access Admin.

Appearance

Preview phone numbers etc.

Phonebook

Specify which phone book to use.

  • The system phonebook
  • This alternate phonebook.

 

 

 

 

  1. User profiles with Dial-Up networking.
  1. The same logon process is used by Windows NT for logging on to a LAN directly or through Dial-Up networking. The reason this process is identical for direct and remote is that a copy of a user’s profile is cached on the client each time the user logs off. Consider using the locally-cached user profile rather than the server-based profile when logging on through Dial-Up Networking.

 

  1. Explain the AutoDial feature?
  1. RAS AutoDial maps and maintains network addresses to RAS phonebook entries, allowing them to be automatically dialled when referenced¾whether from an application or from the command line. A network address can be an Internet host name, an IP address, or a NetBIOS server name.

 

 

There are two possible scenarios when AutoDial attempts to make a connection:

 

 

  1. Troubleshooting RAS

A.

 

Event viewer

If Dial-Up client fails to connect

RAS server fails to start etc

Problems with PPP connections

User has problems authenticating over PPP, a PPP.LOG is created to provide debugging information.

Authentication problems.

If having authentication problems then try with the lowest authentication options and increase each time to see where it fails.

 

i.e. clear text, then logon encryption and the Microsoft encryption.

Dial-Up Networking Monitor

In system tray, shows connection detail, time. Data transferred, number of errors etc.

Multilink and Call-back.

If call-back is used and Multilink is also used, The RAS server can hold only 1 call-back number. Therefore the functionality of Multilink is lost.

 

If the link between the client and RAS server is made by using ISDN with two channels that have the same telephone number then Multilink will work with call-back.

AutoDial Occurs During Logon

Any persistent connections within Windows Explorer, AutoDial will try and make connections. Avoid this by removing persistent connections and shortcuts.

 

Module 13 – Internetworking and Intranetworking

 

  1. Explain the functions of IIS (Internet Information Server) and PWS (Peer Web Services)?

 

  1. Describe the features of IIS and PWS?

A.

File Publication

Publish existing file form Windows NT

Network Management

Monitor and record network activity and provide clients access to valuable network resources such as HTML pages, shared files and printers.

Security

Configure clients for secure access

Support for common internet Standards

Enable development of WEB pages using languages as CGI and PERL

Microsoft Internet Explorer

A way of gaining access to the Web.

Scalability

Multiple platforms

Support for Microsoft BackOffice applications, such as SQL & SNA Sever

 

 

 

 

  1. Explain how to secure Internet and Intranet Sites?
  1. Windows NT security Helps protect Internet and intranet sites by requiring as assigned user account in order for a user to gain access to a site.

 

 

Many internet servers, access is anonymous; the client requests does not contain a user name and password. If anonymous connections to the WWW, Gopher and FTP services are allowed, Windows NT uses the user name and password configured for the service to make an anonymous connection..

 

(Basically NT will use the NT User/Password to connect to IIS but then use Anonymous Connections to the Internet Sites)

 

The internet guest account is created during installation.

 

IUSR_computername i.e. IUSR_PDC

 

Require a User Name and password

 

Can be configured to require a username and password. There are 2 types of authentication

 

Basic authentication does not encrypt transmissions between client and server, so names and password are sent in clear text. Not very secure and can be sniffed.

 

Windows NT Challenge/Response automatically encrypts user names and passwords. Internet Explorer version 2.0 and later supports this password authentication scheme. (HIGHEST LEVEL)

 

 

Note: At least one option must be selected.

  1. How do configure Virtual Directories and Virtual Servers.

A.

 

  1. How do you Create a Virtual Server?

A.

 

Guidelines for securing an Internet/Intranet site.

 

 

Module 14 – Interoperability with Novell NetWare

 

  1. Explain the function of CSNW (Client Services For NetWare)

 

 

 

  1. Explain the function of GSNW (Gateway Services for NetWare)
  1. When would you use GSNW?

 

  1. What are the benefits of using GSNW?

 

Q. How do you install GSNW?

A.

 

 

 

  1. How do you enable the Gateway

A.

 

 

Q. Explain the function of FPNW (File and Print Services for NetWare)?

A.

  1. What is the connection with FPNW and Migration tool for NetWare?

A.

If FPNW is installed on the NT Server then the Login Scripts can also be migrated.

  1. Explain the function of DSMN (Directory Service Manager for NetWare)

DSMN is an add-on and is not included on the NT CD-ROM.

 

  1. Describe the Migration Tool for NetWare?
  1. What Items can be Migrated

A.

 

  1. What Items can not be Migrated

A.

 

 

 

  1. What are the configuration User options for Migration

A.

 

 

  1. By default which files and directories are not migrated

A.

 

 

NOTE: If you migrate files to a FAT partition instead of an NTFS partition, your NetWare file permissions will not migrate.

 

The destination of the Source NetWare files and directories can be specified.

 

  1. What are the options for logging errors.
  1. An error files is used called LOGFILE.LOG.

 

 

Module 15 – Implementing Network Clients

 

  1. Describe a CAL (Client Access License)?
  1. What are the Types of Client Connections?

A.

 

 

 

  1. Describe the Per Server and Per Seat licensing modes?

A.

Per Server

Per Seat

CALs are assigned to a specific Server. The number of CALs determine the number of connections.

 

Used for

 

  • Clients only connect one occasional use or special purpose server
  • If client do not need to connect at the same time

A CAL is purchased for each client. Can access resources on any computer running windows NT Server on the network.

Used for

 

  • If client connect to multiple servers.

 

 

NOTE:

 

There is a ONE TIME conversion for PER SERVER to PER SEAT. If PER SEAT is chosen during installation then NT Server needs to be re-installed to get to PER SERVER.

 

 

 

  1. Describe License Replication?
  1. Describe the role of License Manager?

Another tool for tracking licensing data and replicating the license data to a centralized database.

 

 

Client S/W Included with Windows NT Server

 

A computer that is used to access computers running Windows NT must have client software installed and configured.

 

 

  1. Explain how Microsoft Network Client 3.0 for MS-DOS and Windows supports network clients running MS-DOS.

 

  1. Supports the following protocols

 

 

Q. Identify the protocols included with the LAN Manager 2.2c Client

A. Supports

 

 

LAN Manager 2.2c for DOS

LAN Manager 2.2c for OS/2

NetBEUI

NetBEUI

TCP/IP – Supports DHCP but not DNS/WINS.

TCP/IP – DOES not support DNS/WINS

DLC

OS/2 1.x

NetWare Connectivity

OS/2 2.x

RemoteBoot Service

 

 

 

 

 

 

 

 

 

  1. Describe how to use Network Client Administrator to install and update network clients

A.

 

Make Network Installation Startup Disk

Create an MS-DOS network installation disk that can be used to automatically install the following clients. The files are copied to the server and shared.

  • Client 3.0 for MS-DOS
  • Windows 95.
  • Windows NT Workstation
  • Windows NT Server

Make Installation Disk Set

Create disk set for installing the following clients manually

  • Client 3.0 for MS-DOS
  • Remote Access.
  • LAN Manager for MS-DOS
  • LAN Manager for OS/2
  • TCP/IP-32 for WFW

Copy Client-based Network admin Tools

Copy and install Domain admin tools to a Windows 95 or NT Workstation computer

View RemoteBoot Client Information

NT service that allows NT to start computers running MS-DOS, Windows 3.x and Windows 95 over the network.

Control Panel

For diskless workstations

 

  1. What configurations are needed for a Network Startup disk

A.

 

 

  1. Identify the benefits provided by Services for Macintosh

A.

  1. Enables clients running Microsoft operating systems and Macintosh clients to share file, print, admin and other network resources.

 

 

 

 

 

 

  1. Identify the requirements for running Services for Macintosh in a Windows NT Server environment.

A.

 

NT Server

Macintosh Clients

  • 2 MB of disk space available on a NTFS partition for Macintosh-accessible volumes.
  • Mac operating system 6.0.7 or later
  • Appleshare (Networking software)
  • Version 6.x or later of the LaserWriter printer driver
  • AppleTalk Filing Protocol versions 2.0 and 2.1

 

 

  1. Installing Services for Macintosh

A.

 

After Services for Macintosh is installed, a MacFile menu is added to Server Manager and File Manager (Winfile). Use the MacFile menu to create Macintosh-accessible volumes.

 

To make folders stored on a Macintosh-accessible volume also available to Windows and MS-DOS based network clients, it is necessary to share the folder from which the volume was created.

 

NOTE:

 

Mac computers have a maximum partition size of 2GB. If Mac clients access a computer running Windows NT Server with an NTFS partition of more than 2GB, the users may get a message, indicating that there are 0 (zero) bytes available.

 

The following ate installed automatically with Services for Macintosh

 

Module 16 – Implementing Directory Replication

 

Q. Describe the purpose of Directory Replication?

Q. Identify the directory replication components?

A.

The Export computer (MASTER and NT Server Only)

The Import Computer(s). (NT Server and NT Workstations only)

Export & Import Directories. (must be in sub directories)

  1. Outline the Directory replication process?

C:\winnt\system32\repl\export

 

C:\winnt\system32\repl\import

 

NOTE : The actual process – not well explained in notes !!

 

  1. Create directories under c:\winnt\system32\repl\export on the export server, usually the PDC.
  2. Create an account called "REPL" and make it a member of "BACKUP OPERATORS" & "REPLICATORS".
  3. ALSO make it a member of "LOG ON AS A SERVICE". (In USER MANAGER FOR DOMAIN, "Polices" then "User Rights". Click on "Show Advanced user Rights" and from the list selects "Log on as a service". ADD "REPL" to this group.
  4. From "SERVER MANAGER" select "SERVICES", find "Directory Replicator" service. Click "STARTUP". Set to "Automatic" and "This Account". Click on (…) and find "REPL" and enter an password.
  5. Any changes in the EXPORT server will be replicated to the importers.

Module 17 – The Windows NT Boot Process

 

  1. Identify the files that are necessary to boot Windows NT?

A.

 

  1. Identify common Windows NT boot process errors.

A.

File Missing

Error Message

Ntldr

Boot: Couldn’t find NTLDR

Please Insert another disk

Ntdtect.com

NTDETECT V4.0 Checking Hardware…

NTDETECT failed

Ntoskrnl.exe

(It could also be that the BOOT.INI is missing because it tells us the active WINNT partition. If missing it goes to the possible incorrect default.

Windows NT could not start because the following file is missing or corrupt:

\winnt root\system32\ntoskrnl.exe

Please re-install a copy of the above file.

Bootsect.dos

I/O Error accessing boot sector file

Multi(0)disk(0)rdisk(0)partition(1)\\bootss

 

  1. Explain the function of the BOOT.INI
  1. The boot.ini file is a read only system file that sits in the root of the active partition.

 

[boot loader]

timeout=30

default=multi(0)disk(0)rdisk(0)partition(1)\WINNT

[operating systems]

multi(0)disk(0)rdisk(0)partition(1)\WINNT="Windows NT Server Version 4.00"

multi(0)disk(0)rdisk(0)partition(1)\WINNT="Windows NT Server Version 4.00 [VGA mode]" /basevideo /sos

C:\="Microsoft Windows"

 

 

 

 

  1. Creating a Windows NT boot disk

A.

    1. Format a floppy on a Windows NT machine
    2. Copy the following files to the disk

 

 

Q. Creating an Emergency Repair disk.

A. Use the RDISK.EXE command and has two options

 

 

RDISK /s will backup the SAM and security files aswell.

 

The SETUP.LOG file is used to check the validity of the Windows NT files on the system.

 

  1. How do you use the Repair disk?
  1. Use the 3 install floppy disk and choose the Repair "R" option.

 

  1. What can be repaired with the Repair disk?

A.

 

 

 

 

 

  1. You receive a call from a user who tells you that he forgot the Administrators password and used the Emergency Repair disk to restore it. Now no one else can log on to the system.

 

 

  1. The user by using the repair disk has got the system to a stage at initial installation. By doing so all the SAM details have been lost. What he should have done is used RDISK /s on a regular basis to backup the SAM and security information.

 

 

Module 18 – Troubleshooting Resources.

 

  1. What are the four main areas of NT Troubleshooting?

A.

 

Q. Identify and use the diagnostic tools available with Windows NT.

A.

 

  1. Describe the contents and options of Event Viewer?

 

Q. Use log files to analyse system information.

NT records events in 3 types of log files :

 

 

  1. Interpret events using Event Details.
  1. Each event can be viewed to get more detail. This gives the following information

 

 

 

 

 

 

  1. View system information through Windows NT Diagnostics

Shows hardware and operating system information as stored in the registry.

 

  1. Describe the use of Performance Monitor to troubleshoot performance related problems

Use PM for the following tasks

 

 

Identifying Bottlenecks with Performance Monitor.

 

Four main Area that cause bottlenecks

 

 

Memory

 

 

OBJECT

COUNTER

DESCRIPTION

Memory

Available Bytes

Virtual memory available for system use

< 4MB indicates a need for more RAM

Memory

Pages/sec

Number of pages being written between physical memory and paging file.

This number should be below 20.

Memory

Committed Bytes

Memory that is allocated and currently being used by applications.

Should be less that the physical memory installed on your computer.

Memory

Page Faults/sec

Sustained > 5% then a problem

 

CPU

OBJECT

COUNTER

DESCRIPTION

System

%Processor Time

If consistently at or above 80%, consider upgrading the processor.

System

Processor Queue Length

Consistent processor length > 2, the processor causing a problem.

 

Disk Access

 

OBJECT

COUNTER

DESCRIPTION

Physical Disk

%Disk Time

If Over 90% then disk is the bottleneck

Physical Disk

Current Disk Queue length

If Over 2 then disk is the bottleneck

Logical Disk

Avg. Disk sec/Transfer

 

 

Network Access

OBJECT

COUNTER

DESCRIPTION

Network Segment

%Network Utilisation

Should below 40% in Ethernet

Should below 80% in Token Ring

 

 

 

  1. How do you find memory Bottlenecks?

RAM is the resource where most bottlenecks occur.

 

Sustained hard page faults rates – over 5% are a clear indicator of a memory bottle neck..

 

  1. What are Views available through Performance Monitor?

A.

Chart

Default view and shows the system in Real time. 2 mode

  • Graph
  • Histogram

 

The Settings of the chart can be saved.

The Update period can also be changed in seconds

Alert

Create system alerts when counters reach and pass thresholds. Must specify

  • Computer
  • Object
  • Counter
  • Threshold Value

 

The Alerts will be entered in the Alert Screen but you can also set it to send an ALERT to a machine

Log

Used to save data to a file to be used as a "Baseline"

Report

Allows you to display real-time Performance Mon. statistics in a report format.

 

 

 

  1. How can you Optimise NT Server?

A.

 

 

Minimise memory Used

If you have under 10 users

Balance

If you have 10-64 users

Maximise Throughput for File Sharing

64+ users- Max memory is allocated to file-sharing applications.

Maximise Throughout for Network Applications

Servers supporting distributed applications that used memory caching – for e.g. SQL Server

 

 

 

  1. Explain Task Manager?
  1. With Task manager you can see

 

Applications currently in use

You End tasks and open new ones

Processes that are currently running on your computer

See all processes that are running and CPU usage, can also end processes here.

General information regarding your computers performance

General overview of the computers performance.

  • CPU usage
  • Memory usage
  • Totals for handles thread and processes
  • Physical memory statistics
  • Commit charge memory statistics (memory allocated to programs or the system)
  • Kernel memory statistics

 

 

 

 

  1. Describe the use of Network Monitor to troubleshoot network-related problems
  1. NM captures, filters and analyses the frames or packets sent over a network. Each frame or packet contains the following information. (* only on the full version with SMS)

 

 

  1. What can Network Monitor Capture with the version supplied with NT4?

A.

 

  1. What does promiscuous mode mean you slapper?

A.

 

  1. How do you capture data using NM?

A.

    1. Run Network Monitor
    2. Select Start from the capture menu
    3. Allow to run for 1-2 minutes and stop the capture

 

The data will go into the computers memory

.

 

 

  1. What are the 4 main sections that are on view?

A.

  1. What is the default path where the Data is stored?

A.

\SYSTEM32\NETMON\CAPTURES with the extension .CAP

 

  1. Using the Filtering Capability what can be filtered?

A.

  1. How does Network Monitor use passwords?
  1. The network Monitoring Agent (In Control Panel) uses dual-level password to control

 

 

  1. How can you Check if someone else is Also using Network Monitor?
  1. It is important to know who else is using NM as they can view the contents of packets.

 

  1. What information does the NM detection process give?

A.

 

 

 

Q. Use System recovery to capture information generated by Stop errors.

The Recovery box has the following options –

 

 

Q. What is the Repair process for restoring missing/corrupt boot files?

A.

    1. Create a Emergency repair Disk (ERD) (RDISK /s)
    2. Boot with the Windows NT Setup disk 1 & 2 (You create these by WINNT /OX)
    3. Choose R for repair
    4. Insert the Windows NT disk 3
    5. Insert the ERD when requested
    6. Select "Verify Windows NT system files"
    7. Choose components you want to restore

 

  1. What do you do if you have PPP problems (RAS)?
  1. Change the registry setting to make a log file on disk.

 

  1. What File and resource Access problems might you encounter

A.

 

 

  1. How do you backup the Registry?
  1. Use the following programs

 

 

  1. What does Advanced Resolution Include?

A.

Q. What are the additional resources for troubleshooting?

A.