Active Directory Interview Questions Technet

1) Mention what is Active Directory?An active directory is a directory structure used on Microsoft Windows based servers and computers to store data and information about networks and domains.

  • dcpromo (Domain Controller Promoter) with improved wizard: It allows you to view all the steps and review the detailed results during the installation process
  • Enhanced Administrative Center: Compared to the earlier version of active directory, the administrative center is well designed in Windows 2012. The exchange management console is well designed
  • Recycle bin goes GUI: In windows server 12, there are now many ways to enable the active directory recycle bin through the GUI in the Active Directory Administrative Center, which was not possible with the earlier version
  • Fine grained password policies (FGPP): In windows server 12 implementing FGPP is much easier compared to an earlier It allows you to create different password policies in the same domain
  • Windows Power Shell History Viewer: You can view the Windows PowerShell commands that relates to the actions you execute in the Active Directory Administrative Center UI
  • 10) Mention what is PDC emulator and how would one know whether PDC emulator is working or not?

  • Time is not syncing
  • User’s accounts are not locked out
  • Windows NT BDCs are not getting updates
  • If pre-windows 2000 computers are unable to change their passwords
  • What is the difference between a “requesting party” and a “federated partner”?

    “Requesting party” refers to the customer organization appealing to the DOI for a relying party trust. Once the requesting partys application has been approved and a trust has been created, it becomes a “federated partner.” A federated partner is trusted by the Federation Service to provide security tokens to its end users (that is, users in the account partner organization) so that they can access Web-based applications in the resource partner.

    A federation partner that is trusted by the Federation Service to provide security tokens to its end users (that is, users in the account partner organization) so that they can access Web-based applications in the resource partner.

    A claim of a named quality or characteristic inherent in or ascribed to someone or something.

    A statement from a verifier to a Relying Party (RP) that contains identity information about a subscriber. Assertions may also contain verified attributes.

    A defined sequence of messages between a claimant and a verifier that demonstrates that the claimant has possession and control of one or more valid authenticators to establish his/her identity. Secure authentication protocols also demonstrate to the claimant that he or she is communicating with the intended verifier.

    A defined sequence of messages between a claimant and a verifier that demonstrates that the claimant has possession and control of one or more valid authenticators to establish his/her identity. Secure authentication protocols also demonstrate to the claimant that he or she is communicating with the intended verifier.

    A statement that a server makes (for example, name, identity, key, group, privilege, or capability) about a client.

    What additional items will be requested of me prior to the production implementation?

    A Federated Application Onboarding Template Prod will be requested.

    Who can submit the ADFS Request Intake Form? Do I need to have a DOI account?

    A requesting party is required to hold an Active Directory account. Therefore, if an external vendor is requesting a Relying Party Trust (RPT) with the Department of the Interior, they are required to have a DOI Sponsor.

    Integrated Windows Authentication (IWA) is a term associated with Microsoft products that refers to the SPNEGO, Kerberos, and NTLMSSP authentication protocols with respect to SSPI functionality introduced with Microsoft Windows 2000 and included with later Windows NT-based operating systems. The term is used more commonly for the automatically authenticated connections between Microsoft Internet Information Services, Internet Explorer, and other Active Directory aware applications.

    Integrated Windows Authentication works with most modern web browsers, but does not work over some HTTP proxy servers. Therefore, it is best for use in intranets where all the clients are within a single domain. It may work with other web browsers if they have been configured to pass the users logon credentials to the server that is requesting authentication. Where a proxy itself requires NTLM authentication, some applications like Java may not work because the protocol is not described in RFC-2069 for proxy authentication.

    Source: Wikipedia Entry on Integrated Windows Authentication

    Top 50 Active Directory Interview Questions and Answers | Active Directory Interview Preparation

    Related Posts

    Leave a Reply

    Your email address will not be published. Required fields are marked *