Get ready for your next interview with our comprehensive question library
A workgroup is a peer-to-peer network where each computer manages its own security and user accounts locally. There's no centralized authentication, and each machine maintains its own user database. Workgroups are suitable for small networks (typically under 20 computers).
A domain is a centralized network where a domain controller manages authentication, security policies, and user accounts. All computers in the domain trust the domain controller for authentication. Domains provide centralized management, better security, and scalability for larger organizations.
Key differences:
Common Windows Server roles include:
Each role can be installed and configured based on organizational needs.
NTFS (New Technology File System):
FAT32 (File Allocation Table 32):
NTFS is preferred for Windows systems due to its advanced features and security capabilities.
Active Directory (AD) is Microsoft's directory service that stores information about network resources and enables administrators to manage them. It provides authentication and authorization services in Windows domains.
Main components:
PowerShell is a task automation and configuration management framework from Microsoft, consisting of a command-line shell and scripting language built on .NET Framework.
Key differences from Command Prompt:
PowerShell:
Command Prompt:
Example: In PowerShell, Get-Process returns process objects with properties and methods. In CMD, tasklist returns text output that requires parsing.
PowerShell cmdlets follow a consistent Verb-Noun syntax structure, making them intuitive and predictable.
Common verbs:
Syntax structure:
Verb-Noun -Parameter Value -Switch
Examples:
Get-Service -Name "Spooler"
Set-Location -Path "C:\Windows"
New-Item -ItemType Directory -Name "TestFolder"
Stop-Process -Name "notepad" -Force
Parameters: Modify cmdlet behavior
Switches: Boolean parameters (present or not)
Pipeline: Cmdlets can be chained using the pipe operator (|)
User Account Control (UAC) is a Windows security feature that helps prevent unauthorized changes to the system by requiring administrative approval for actions that could affect system security.
How UAC works:
UAC levels:
Benefits: Reduces impact of malware, prevents accidental system changes, promotes principle of least privilege.
Upgrade to Premium to see the answer
Upgrade to PremiumUpgrade to Premium to see the answer
Upgrade to PremiumUpgrade to Premium to see the answer
Upgrade to PremiumUpgrade to Premium to see the answer
Upgrade to PremiumUpgrade to Premium to see the answer
Upgrade to PremiumUpgrade to Premium to see the answer
Upgrade to PremiumUpgrade to Premium to see the answer
Upgrade to PremiumUpgrade to Premium to see the answer
Upgrade to PremiumUpgrade to Premium to see the answer
Upgrade to PremiumUpgrade to Premium to see the answer
Upgrade to PremiumUpgrade to Premium to see the answer
Upgrade to PremiumUpgrade to Premium to see the answer
Upgrade to PremiumUpgrade to Premium to see the answer
Upgrade to PremiumAccess all premium content - interview questions, and other learning resources
We regularly update our features and content, to ensure you get the most relevant and updated premium content.
1000 monthly credits
Cancel anytime