Unit1 - Subjective Questions
INT249 • Practice Questions with Detailed Answers
Explain the key factors that must be considered when preparing an installation plan for a Windows Server.
An effective installation plan is crucial for a smooth deployment. Key factors include:
- Server Edition and Licensing: Deciding between Essentials, Standard, or Datacenter editions based on virtualization rights and user requirements.
- Installation Option: Choosing between Server Core (headless, more secure) and Desktop Experience (GUI-based).
- Hardware Compatibility: Verifying that the server hardware meets the minimum system requirements and appears on the Windows Server Catalog.
- Partitioning Scheme: Choosing between MBR (Master Boot Record) and GPT (GUID Partition Table) based on disk size and UEFI support.
- Naming Convention: Establishing a consistent hostname strategy for network identification.
- Network Configuration: Planning static IP addresses, subnet masks, gateways, and DNS server addresses beforehand.
Compare and contrast Server Core and Server with Desktop Experience installation options.
| Feature | Server Core | Desktop Experience |
|---|---|---|
| Interface | Command Line/PowerShell only. No GUI. | Full Graphical User Interface (GUI). |
| Resource Usage | Low disk space and RAM footprint. | Higher resource consumption due to GUI overhead. |
| Security | Reduced attack surface (fewer components, less patching). | Larger attack surface. |
| Management | Managed remotely or via PowerShell/Sconfig. | Managed via Server Manager and GUI tools locally. |
| Use Case | Ideal for infrastructure servers (DNS, DHCP, Hyper-V). | Ideal for apps requiring GUI or novice admins. |
Describe the hardware requirements necessary to set up a Windows Server, specifically focusing on the processor, RAM, and disk space.
To successfully install and run Windows Server, the hardware must meet specific minimum requirements:
- Processor:
- Minimum: 1.4 GHz 64-bit processor.
- Must support compatible instruction sets (x64) and features like NX and DEP.
- Must support CMPXCHG16b, LAHF/SAHF, and PrefetchW.
- RAM:
- Minimum: 512 MB (2 GB for Server with Desktop Experience).
- ECC (Error Correcting Code) type is recommended/required for production stability.
- Disk Space:
- Minimum: 32 GB for the absolute base installation.
- Additional space is required for the paging file, hibernation file, and dump files.
What is RAID? Explain the difference between RAID 1 and RAID 5 in the context of setting up server hardware.
RAID (Redundant Array of Independent Disks) is a technology that combines multiple physical disk drive components into one or more logical units for data redundancy, performance improvement, or both.
-
RAID 1 (Mirroring):
- Function: Writes exactly the same data to two drives simultaneously.
- Capacity: of total disk space (if using 2 drives).
- Pros: Excellent redundancy; if one drive fails, the other continues.
- Cons: High cost per usable gigabyte.
-
RAID 5 (Striping with Parity):
- Function: Stripes data across three or more drives and saves parity information to reconstruct data if a drive fails.
- Capacity: , where is the number of drives.
- Pros: Good balance of performance, storage efficiency, and redundancy.
- Cons: Slower write speeds due to parity calculation; requires at least 3 drives.
Detailed the step-by-step procedure to install the Windows Server operating system using a bootable media.
- Boot from Media: Insert the USB/DVD containing the Windows Server ISO and configure the BIOS/UEFI to boot from it.
- Language Selection: On the first screen, select the Language, Time/Currency format, and Keyboard method. Click Next > Install Now.
- Select Edition: Choose the Operating System edition (e.g., Standard or Datacenter) and the installation option (Desktop Experience or Server Core).
- License Agreement: Read and accept the End User License Agreement (EULA).
- Installation Type: Select Custom: Install Windows only (advanced) for a clean installation.
- Disk Partitioning: Select the drive where the OS will be installed. You can create new partitions or format existing ones here. Click Next.
- Copying Files: The installer will copy files, install features, and restart the server automatically.
- Post-Install Configuration: Upon reboot, you will be prompted to set the Administrator password.
- Login: Press
Ctrl+Alt+Deland log in with the Administrator credentials.
In the context of managing network cabling, distinguish between UTP and Fiber Optic cabling.
-
UTP (Unshielded Twisted Pair):
- Composition: Copper wires twisted together to cancel out electromagnetic interference (EMI).
- Usage: Standard Ethernet connections (Cat5e, Cat6) inside buildings.
- Distance: Limited to approximately 100 meters per segment.
- Cost: Low cost and easy to install.
-
Fiber Optic:
- Composition: Glass or plastic strands that transmit data as pulses of light.
- Usage: High-speed backbone connections and long-distance transmissions.
- Distance: Can span kilometers without signal degradation.
- Cost: Higher cost for cable and equipment; requires specialized tools for splicing.
Explain the concept of NIC Teaming and list its primary benefits.
NIC Teaming (also known as Load Balancing and Failover - LBFO) allows administrators to group multiple physical network adapters into a single logical interface.
Benefits:
- Bandwidth Aggregation: Combines the bandwidth of multiple adapters to increase overall throughput.
- Traffic Load Balancing: Distributes network traffic across the adapters to prevent bottlenecks.
- Failover/Redundancy: If one physical NIC or cable fails, the traffic is automatically rerouted through the remaining active adapters in the team, ensuring continuous network connectivity.
Derive the formula for calculating the number of usable hosts in a subnet and calculate the usable hosts for a Class C network with a default subnet mask.
Formula Derivation:
In binary IP addressing, if is the number of bits allocated for the host portion of the address, the total combinations are . However, two addresses are reserved:
- The Network Address (all host bits set to 0).
- The Broadcast Address (all host bits set to 1).
Therefore, the formula for usable hosts is:
Calculation for Class C:
- A default Class C subnet mask is
255.255.255.0. - This means the first 24 bits are for the network, and the remaining 8 bits are for the host ().
- Here, .
What are the advantages of IPv6 over the traditional IPv4 addressing scheme?
IPv6 was developed to address the exhaustion of IPv4 addresses. Its advantages include:
- Larger Address Space: IPv6 uses 128-bit addresses compared to IPv4's 32-bit, providing approximately addresses.
- Simplified Header: The packet header is streamlined for more efficient processing by routers.
- No NAT Requirement: The abundance of addresses eliminates the need for Network Address Translation (NAT), restoring end-to-end connectivity.
- Built-in Security: IPsec support is mandatory in the IPv6 design (though implementation varies), whereas it is an add-on for IPv4.
- Auto-configuration: Supports SLAAC (Stateless Address Auto-configuration), allowing devices to generate their own addresses without a DHCP server.
Explain the role of DNS and DHCP as critical network infrastructure services.
DNS (Domain Name System):
- Role: Acts as the phonebook of the internet/network.
- Function: It translates human-readable domain names (e.g.,
www.server.com) into machine-readable IP addresses (e.g.,192.168.1.10). Without DNS, users would have to memorize IP addresses to access resources.
DHCP (Dynamic Host Configuration Protocol):
- Role: Automates network configuration.
- Function: It automatically assigns IP addresses, subnet masks, default gateways, and DNS server addresses to clients when they join the network. This prevents IP conflict errors and significantly reduces the administrative burden of manually configuring every device.
Describe the post-installation configuration steps required for a Windows Server using the Sconfig utility.
Sconfig is a command-line interface tool often used in Server Core (but available in Desktop Experience) for initial setup. Key steps include:
- Domain/Workgroup: Join the server to a domain or set a workgroup name.
- Computer Name: Rename the server to match the naming convention.
- Local Administrator: Add a local administrator or change the password.
- Remote Management: Configure Remote Management (WinRM) to allow remote administration.
- Windows Update: Configure update settings (Automatic/Manual) and search for updates.
- Network Settings: Set a static IP address, subnet mask, gateway, and DNS servers.
- Date and Time: Ensure the server time is synchronized, which is critical for authentication protocols like Kerberos.
Define Virtualization and explain the role of a Hypervisor.
Virtualization:
Virtualization is the process of creating a software-based (or virtual) representation of something, such as virtual applications, servers, storage, and networks. It allows multiple operating systems to run on a single physical computer simultaneously.
Hypervisor:
A Hypervisor (or Virtual Machine Monitor - VMM) is the software layer that sits between the physical hardware and the virtual machines.
- Role: It abstracts the physical hardware resources (CPU, RAM, Disk) and dynamically allocates them to the virtual machines.
- Types:
- Type 1 (Bare Metal): Installs directly on hardware (e.g., Microsoft Hyper-V, VMware ESXi).
- Type 2 (Hosted): Runs as an application inside an OS (e.g., VMware Workstation, VirtualBox).
What is Hyper-V? List the prerequisites required to install the Hyper-V role on Windows Server.
Hyper-V is Microsoft's hardware virtualization product. It lets you create and run a software version of a computer, called a virtual machine.
Prerequisites:
- OS: Windows Server (Standard or Datacenter) or Windows 10/11 Pro/Enterprise.
- Processor: A 64-bit processor with SLAT (Second Level Address Translation) capabilities.
- Virtualization Support: CPU support for VM Monitor Mode Extension (Intel VT-x or AMD-V) enabled in BIOS/UEFI.
- Memory: Enough RAM to run the host OS plus the memory assigned to VMs (minimum 4 GB usually recommended).
- Data Execution Prevention: Hardware-enforced DEP must be enabled (Intel XD bit or AMD NX bit).
Compare Generation 1 and Generation 2 Virtual Machines in Hyper-V.
| Feature | Generation 1 VM | Generation 2 VM |
|---|---|---|
| Boot Architecture | BIOS-based architecture. | UEFI-based architecture. |
| Hardware Emulation | Emulates legacy hardware (IDE controller, legacy NIC). | Uses synthetic hardware and software-based devices. |
| Boot Volume | Can boot from IDE controllers (VHD/VHDX). | Can boot from SCSI controllers (VHDX only). |
| Security Features | Does not support Secure Boot. | Supports Secure Boot and vTPM (Trusted Platform Module). |
| OS Support | Supports older 32-bit and 64-bit OS. | Supports only newer 64-bit Guest OS versions. |
| PXE Boot | Requires Legacy Network Adapter. | Supported natively on the standard Network Adapter. |
Explain the detailed procedure to create a Virtual Machine in Hyper-V Manager.
- Open Manager: Open Hyper-V Manager from the Tools menu in Server Manager.
- New VM Wizard: In the Actions pane, click New > Virtual Machine. Click Next.
- Name and Location: Specify the VM name and the storage location for the VM configuration files.
- Generation: Choose Generation 1 (Legacy/BIOS) or Generation 2 (UEFI). Note: This cannot be changed later.
- Assign Memory: Specify the amount of startup RAM. Optionally check Use Dynamic Memory.
- Configure Networking: Select a Virtual Switch to connect the VM to the network (or leave disconnected).
- Connect Virtual Hard Disk:
- Create a virtual hard disk (Name, Location, Size).
- Use an existing virtual hard disk.
- Attach a virtual hard disk later.
- Installation Options: Choose how to install the OS (e.g., Install from a bootable ISO image file).
- Summary: Review settings and click Finish.
- Start: Right-click the new VM and select Start, then Connect to interact with the console.
What is a Virtual Switch? Describe the three types of Virtual Switches available in Hyper-V.
A Virtual Switch is a software-based layer-2 network switch that allows Virtual Machines to communicate with each other and with the physical network.
Types of Virtual Switches:
- External Virtual Switch:
- Binds to a physical network adapter on the host.
- Allows VMs to access the physical network (LAN/Internet) and communicate with the Host.
- Internal Virtual Switch:
- Does not bind to a physical adapter.
- Allows communication between VMs and the Host OS only.
- VMs cannot access the physical network/Internet.
- Private Virtual Switch:
- Allows communication only between Virtual Machines connected to the same switch.
- Isolates traffic completely from the Host OS and the external network.
Distinguish between VHD and VHDX virtual hard disk formats.
| Feature | VHD (Virtual Hard Disk) | VHDX (Virtual Hard Disk v2) |
|---|---|---|
| Maximum Size | Limited to 2 TB. | Supports up to 64 TB. |
| Resilience | Susceptible to corruption during power failures. | Includes internal log to protect against corruption during power failures. |
| Performance | Standard performance. | Optimized for modern storage hardware (4KB sector alignment). |
| Compatibility | Compatible with older Windows Servers (2008 and earlier). | Compatible with Windows Server 2012 and later only. |
| Features | Basic storage. | Supports online resizing (shrink/expand) and custom metadata. |
Explain the difference between Fixed Size and Dynamically Expanding virtual hard disks.
-
Fixed Size:
- Allocates the full amount of storage space on the physical disk immediately upon creation.
- Pros: Better performance (less fragmentation), predictable storage usage.
- Cons: Consumes space even if the VM isn't using it yet; takes longer to create initially.
-
Dynamically Expanding:
- Starts small and grows as data is written to the virtual disk, up to the maximum specified size.
- Pros: Efficient use of physical storage space; quick creation.
- Cons: Slightly lower performance due to the overhead of expanding the file; requires monitoring to prevent physical storage exhaustion.
Why is Partitioning important when setting up server hardware? Discuss MBR vs. GPT.
Partitioning divides a physical hard drive into logical sections, allowing the OS to manage data efficiently and separate system files from user data.
MBR (Master Boot Record):
- Legacy standard.
- Supports disks only up to 2 TB.
- Supports a maximum of 4 primary partitions.
- Stores boot data in one place (higher risk of corruption).
GPT (GUID Partition Table):
- Newer standard associated with UEFI.
- Supports disks larger than 2 TB (up to 18 EB).
- Supports 128 primary partitions on Windows.
- Stores redundant copies of partition headers (better reliability).
Describe the function of the MAC Address in configuring Network Interface Cards.
The MAC (Media Access Control) Address is a unique physical identifier assigned to a Network Interface Card (NIC) by the manufacturer.
- Structure: It is a 48-bit hexadecimal address (e.g.,
00-1A-2B-3C-4D-5E). - Layer 2 Communication: It functions at the Data Link Layer (OSI Layer 2). Switches use MAC addresses to determine which port to forward data frames to.
- Configuration: While burnt-in physically, MAC addresses can be spoofed or changed in software settings (locally administered addresses) for specific networking requirements, such as in NIC teaming or virtual machine identification.