Professional Documents
Culture Documents
o RODC
o WDS instead of RIS
o Services have been changed as roles - server manager
o Introduction of hyper V- only on 64 bit versions
o Enhanced event viewer
o Bitlocker feature
o Server core installation without GUI
o MMC 3.0, with three pane view
o Key management services(KMS) to activate Windows OS without
connecting to Microsoft site
o Performance enhancement using technologies like Windows
SuperFetch,ReadyBoost and Readydrive
o Windows Aero user interface
o Instant search
o Support for IPv6 in DNS
2. ESX vs ESXi
o vCPU - 8 32
o vRAM - 256 1 TB
o VMs per host - 320 512
o RAM per host - 1TB 2TB
o USB 3.0 support
o vApp
5. FSMO roles
o Schema Master
o Domain naming master
o Infrastructure master
o PDC Emulator
o RID master
6. GPO
o GPO
o Templates (ADMX)
o Block inheritance
o Enforced
o Loopback policy
8. OSI layer
o Application Layer
o Presentation Layer
o Sessions Layer
o Transport Layer
o Network Layer
o DataLink layer
o Physical Layer
10.
HA 5.0
o Uses an agent called FDM - Fault domain manager
o HA now talks directly to hostd instead of using vcenter agent vpxa
o Master/slave concept
o Master
o Slave
o Datastore heartbeat
o Isolation response
11.
PowerOff
Leave Powered On
Shutdown
vMotion
o vMotion enables live migration of running virtual machines from one
host to another with zero downtime
o Prerequisites
1. Host must be licensed for vMotion
2. Configure host with at least one vMotion n/w interface
(vmkernel port group)
3. Shared storage (this has been compromised in 5.1)
4. Same VLAN and VLAN label
5. GigaBit ethernet network required between hosts
6. Processor compatibility between hosts
7. vMotion does not support migration of applications clustered
using Microsoft clustering service
8. No CD ROM attached
9. No affinity is enabled
10.
12.
RAID
o Redundant Array of Independent disks
o A category of disk drives that uses 2 or more drives in a
combination for redundancy and performance
13.
Backup types
o Backup types
1. Full backup - Will take the backup of all selected files and
reset the archive bit
2. Copy backup - Will take the backup of all selected files but
does not reset the archive bit
3. Incremental backup - Will take the backup of files whose
archive bits are set and resets it after backup
4. Differential backup - Will take the backup of files whose
archive bits are set but does not reset it after backup
14.
15.
16.
Global Catalog
17.
18.
RODC
o New feature in Windows 2008
o Only have the read only copy of directory database
o RODC will have all the objects of a normal DC in read only mode.
But this doesnt include passwords. RODC does not store password
of accounts.
o Updates are replicated to RODC by writable DC
19.
NAS vs SAN
o Both used as storage solution
o NAS can be used by any device connected using LAN whereas SAN
is used only by server class devices with SCSI
o NAS is file based whereas SAN is block based storage
o NAS is cheap while SAN is expensive
o SAN is comparatively faster than NAS
20.
21.
DRS prerequisites
o Shared storage
o Processor compatibility of hosts in the DRS cluster
o vMotion prerequisites
22.
23.
23.
25.
6. Loadbalancer vs Clustering
o Clustering
1. Cluster is a group of resources that are trying to achieve a
common objective, and are aware of one another.
2. Clustering usually involves setting up the resources (servers
usually) to exchange details on a particular channel (port)
and keep exchanging their states, so a resources state is
replicated at other places as well.
3. It usually also includes load balancing, wherein, the request is
routed to one of the resources in the cluster as per the load
balancing policy
ii.
Load Balancing
1.
Assign :
1. If you assign the program to a user, it is installed when the
user logs on to the computer. When the user first runs the
program, the installation is completed.
2. If you assign the program to a computer, it is installed when
the computer starts, and it is available to all users who log on
to the computer. When a user first runs the program, the
installation is completed.
ii.
Publish :
1. You can publish a program distribution to users.
2. When the user logs on to the computer, the published
program is displayed in the Add or Remove Programs dialog
box, and it can be installed from there.
ii.
msi packages are used for installation. Normal exe would not work.
iii.
Windows cannot install the software while the user is already logged
on. The user need to log off and log in
8. Group policy security filtering for users. Which all users are in
there by default. Members of Authenticated Users group
o Security filtering is a way of refining which users and computers will
receive and apply the settings in a Group Policy object (GPO)
o In order for the GPO to apply to a given user or computer, that user
or computer must have both Read and Apply Group Policy (AGP)
permissions on the GPO, either explicitly, or effectively through
group membership
o By default, all GPOs have Read and AGP both Allowed for the
Authenticated Users group.
o The Authenticated Users group includes both users and computers.
This is how all authenticated users receive the settings of a new
GPO when it is applied to an organizational unit, domain or site
o Location : C:\Windows\System32\Drivers\etc
10.
L3 switch vs Routers
o L3 switches just have the ethernet ports only whereas the routers
have WAN interfaces
o QoS is not available with L3 switches whereas in routers it can be
enabled
o Routers have expansion slots and cards that allow them to use
different media types, like serial connections for T1 and T3 circuits
o Routers are more intelligent in handling packets
o L3 switches does not support NAT
11.
VLAN vs Subnet
o VLAN works at layer 2 while subnet is at layer 3
o Subnets are more concerned about IP addresses.
o VLANs bring more network efficiency
o Subnets have weaker security than VLANs as all the subnet uses the
same physical network
12.
13.
14.
Robocopy
o Microsoft tool used for copying files effectively
o It has plenty of options to manage the copy process
15.
How do you patch microsoft applications? Frequency of
patches released by Microsoft
16.
17.
o By setting CPU affinity for each VM, you can restrict the assignment
of VMs to a subset of available processors
o The main use of setting CPU affinity is when there are display
intensive workloads which requires additional threads with vCPUs.
o DRS will not work with CPU affinity
http://frankdenneman.nl/2011/01/11/beating-a-dead-horse-using-cpu-affinity/
18.
VMversion 4 vs VMversion 7
o Version 4
1. Runs on ESX 3.x
2. Max supported RAM 64 GB
3. Max vCPUs 4
4. MS cluster is not supported
5. 4 NICs/VM
6. No USB Support
ii.
1.
Version 7
Runs on vSphere 4.x
2. Max supported RAM 256 GB
3. Max vCPUs 8
4. MS cluster is supported
5. 10 NICs/VM
6. USB support
19.
What happens to the VMs if a standalone host is taken to
maintenance mode?
o In case of standalone servers , VMware recommends that VMs
should be powered off before putting the server in maintenance
mode
o If we put the standalone host in maintenance mode without
powering off the VMs, it will remain in the entering maintenance
mode state until the VMs are all shutdown
o When all the VMs are powered down, the host status changes to
under maintenance
http://pubs.vmware.com/vsphere-4-esxvcenter/index.jsp#using_drs_clusters_to_manage_resources/c_using_maintenanc
e_mode.html
20.
21.
How does the backup software recognize that a file has
changed since last backup?
o The files use a bit called archive bit for tracking any change in the
file.
o The backup softwares normally checks the archive bit of the file to
determine whether the file has to be backed up or not
22.
23.
ESXi 5.1
64
1 TB
64
1 TB
ESXi 5.0
ESXi 4.x
32
1 TB
8
255 GB
VMs
vCPU
RAM
vNIC
VMDK size
10
62 TB
10
1 TB
10
1 TB
10
2 TB for 8MB block
160
2 TB
256
64 TB
512
160
1 TB
256
64 TB
320
Hosts
Logical CPU
Memory
LUNs
LUN size
Virtual Machines
320
4 TB
256
64 TB
512
160
2 TB
256
64 TB
512
24.
What is the major difference between Windows server 2008
and windows server 2012 in terms of AD promotion?
1. What is vSAN?
o
Port binding is used in iSCSI when multiple VMkernel ports for iSCSI reside
in the same broadcast domain and IP subnet, to allow multiple paths to an
iSCSI array that broadcasts a single IP address.
Array Target iSCSI ports must reside in the same broadcast domain and IP
subnet as the VMkernel port.
All VMkernel ports used for iSCSI connectivity must reside in the same
broadcast domain and IP subnet.
All VMkernel ports used for iSCSI connectivity must reside in the same
vSwitch.
7. Which esxtop metric will you use to confirm latency issue of storage ?
o
These adapters will only become Active if the defined Active adapters
have failed.
Fixed
Round Robin
Jumbo Frames
80,443,902
Users assigned with the 'No Access' role for an object, cannot view or
change the object in any way
ESX Admins
vmware-cmd
esxtop
vmkfstools
8000
\var\log\vmware
No
vMotion
Management traffic
Major difference between ESXi 5.1 and ESXi 5.5 free versions
Till ESXi 5.1 free version there was a limit to the maximum physical
memory to 32 GB. But from 5.5 onwards this limit has been lifted.
o
o
In Server 2012, you can convert a server into DC using the server
manager console. Under Server Manager, add a new role "Active Directory
Domain Services"