100 operation and maintenance of common interview questions

1. CPU performance, the following indicators What does it mean? FSB: the reference frequency of the CPU, the synchronization between the CPU and the operation speed of the motherboard, which determines the operating speed of the entire board. FSB frequency: a direct impact on CPU and memory speed data exchange. 2. The Board's two chips are what chip, how to distinguish? What role have? North Bridge: near from the CPU, responsible for communication between the CPU, memory, graphics; Southbridge: away from the CPU, responsible for communication between the I / O bus. 3. BIOS What is it with CMOS What is the relationship? The BIOS is a basic input output system, the basic hardware information stored in the computer. BIOS settings are saved in a CMOS chip. 4. DESCRIPTION RAM and ROM, and what their characteristics. RAM: random access memory, read and write easily lost; ROM: read-only memory, non-writable read easily lost. 5. What is a virtual machine? Is a software program running on a computer, an analog computer hardware features a separate computer system environment for other software programs. 6. There are several virtual machine architecture? What are the characteristics of alien architecture: a software application installed on the operating system, you can install multiple operating systems on this architecture native application software: virtual machine software is installed directly on the computer hardware itself is a virtual machine operating system. 7. Please list the three virtual machines manufacturers, and their products and product architecture. (1) VmwareVMware Workstation alien architecture VMware vSphere native architecture (2) Microsoft Virtual PC sojourn architecture Virtual Server alien architecture Hyper-V native architecture (3) Citrix (Citrix) XenDesktop native architecture of XenServer native architecture 8. What is the operating system? Also known as OS, it is a computer software that provides access to computer hardware services for applications, provide effective hardware, software management. 9. What are the characteristics of virtual machine snapshots? You can easily restore the system to a specified state 10. There are several virtual machines through cloning? Linked clone, a full clone 11. What is TCP / IP protocol TCP / IP communication protocol is the most complete, the most widely supported communication protocol that allows different network architectures, communication between computers with different operating systems, is the Internet's standard communication protocol. 12. What are the three elements of communication between the host and the host have? IP address, subnet mask, IP routing 13. An IP address, composition, classification, default subnet mask? Action: to identify the network address of a node; Composition: 32 binary digits, in dotted decimal is represented by the network host bits + bits; classification: Class A: 1--127 network master + + + primary master 255.0 .0.0B categories: 128--191 mesh mesh + Major 255.255.0.0C main categories: 192--223 mesh mesh mesh 255.255.255.0D main categories: 224--239 multicast (multicast) class E: 240 --254 research 14. classification and private IP address range. Class A: 10.0.0.1 - 10.255.255.254B class: 172.16.0.1 - 172.31.255.254C class:. 192.168.0.1 - 192.168.255.2515 What is a gateway? Connecting a network gateway to another network. What 16. Windows system command line mode, check the IP address and MAC address to view the command? ipconfig, ipconfig / all or ipconfig / all17. workgroups and domains network What is the difference? Working Group drop prevention: a peer relationship, no centralized management; area networks: centralized management with a controller. 18. What are the features the computer name and role? Easy to remember; win within the same network should be unique; other hosts can be accessed by computers within the network name in the win. 19. What are the rules of the ALP local users to join a local group, and finally to the local group to assign permissions (meaning ALP rule) 20. What is a file system? I.e., the file organization method in an external storage device. 21. What are common file system? FAT, NTFS, EXT22. Advantages of NTFS file system What? Improve disk access capabilities; Reliability: encryption, access control lists; disk utilization: compression, disk with; AD requires NTFS support. 23. NTFS file system features what? Can be set for different user groups access rights; the user must have the appropriate access rights to access resources; resources to prevent illegal tampering with or deletion. twenty four. What are the rules NTFS permissions have? What are the characteristics of these rules? Permissions accumulation: the effective NTFS permissions of the user accumulated on the basis of rights that do not conflict on; refusal priority: denial than anything else; inherited permissions: The default sub-folders or subfolders will inherit permissions to the parent folder and subfolders can be canceled inherit parent folder permissions. 25. The final determination of how effective permissions share permissions and the NTFS? Share permissions and NTFS permissions 26. The intersection of three ways to access the shared folder through the "Internet" browser; through a UNC path; the necessary operations and command of three ways to map a network drive over 27. What? "Network" Browser: You must enable "Network discovery"; through a UNC path: \ server IP \ share name or \ server name \ share name mapped network drive: net use drive: \ server IP \ share name 28. What is the backup ? Also prepare a, in order to deal with file, data loss or damage and other unforeseen circumstances. 29. What category backup object have? What are the characteristics of each category? System Backup: backup for the entire operating system; when the operating system is damaged or fails to start, backed up by rapid recovery. Data backup: backup for user data files, applications, databases; when these data loss or corruption, but also through backup and recovery. 30. What is the cold / hot backup? What are their respective advantages and disadvantages? Cold backup: The way to perform a backup in case the document needs to be backed not occupied; for example, shut down the database software, make a backup of the database data. The advantage is simple, fast, easy to restore to a point in time, easy to maintain; the disadvantage is only restored to a point in time during the backup data inconvenience normal use. Hot backup: The backup does not affect the way the document normally used when performing a backup; such as database software is running, make a backup of the database data. The advantage is short backup time, it does not affect the use of data, up to second-level recovery; drawback is that all operations are synchronized, including deleted. 31. What are the prerequisites to achieve a bond reduction have? After a key to restore what are the consequences or after-effects? Made available in advance of system backup file (usually .gho format); increased after the data is lost. 32. What is a domain? The network computer logic tissue together, centralized management, centralized management of such an environment is called a domain. 33. What is a domain controller? In the field, there is at least one domain controller, the domain controller holds the user account and security database for the entire domain, installed a computer Active Directory domain controller, each domain the domain administrators can control the user's behavior . 34. What is Active Directory? Directory is a database that stores the entire windows objects in a network of relevant information, but also a service that can perform various operations on the data in Active Directory. 35. Active Directory What are the advantages? Centralized management, easy access to network resources, a prerequisite for scalability 36. What are the installation of DC? Local Administrator rights, Operating System version must meet the windows server version, there are TCP / IP settings, you have enough free disk space, at least one NTFS partition, you need DNS support. 37. What command can test DNS? nslookup38. What type of domain group? what's the effect? Security group: users set access permissions; distribution: for e-mail communication, contains contacts and user accounts. 39. What are the scope of the group? What are the scope and characteristics? Local groups: Scope: This domain local groups created for the resources of the region. Global groups: Use: the whole forest and trust domains typically use global groups to manage directory objects requires routine maintenance, such as user accounts and computer accounts. Universal groups: Use: the whole forest and domain trust identity information recorded in the global catalog, query speed. 40. universal groups and global groups What is the difference? In the multi-domain environment, the identity of the universal group membership information is recorded in the global catalog, but in each domain global group membership information is stored. In a multi-domain environment, comparatively speaking, universal group membership login or queries faster. 41. What is Open local security policy of command? secpol.msc42. the local security policy to take effect, or restart the computer in what order is? gpupdate43. What is the strategy to force a refresh command? gpupdate / force44. What is Group Policy? What open the Local Group Policy command? A collection of Group Policy, run gpedit.msc45. What is a domain group policy? It has to do with the local group policy? A collection of policies, there is no relationship with the local group policy. 46. ​​What are the advantages of group policies have? Reduce management costs, reduce the possibility of a separate user configuration errors, specific policies can be set for specific objects. 47. What is GPO? What role have? AD is a particular object, all the configuration information of the storage group policies. 48. The description of each group policy application rules and the rules of the contents. Policy inheritance and prevent lower-level container can be inherited or set a policy to block GPO application of its parent container of forced entry into force of the lower-level container enforce its parent container GPO to set policies accumulate and accumulate more conflicts GPO settings without conflicting applications such as post-conflict group policy application order into effect: LSDOU local group policy site domain OU such as OU OU conflict with the child, the child OU take effect if the link more than one GPO on the same OU, then follow the links one by one application in descending order, were: the link order, respectively, 1 and 2, the link order for the GPO 1 of the last application to take effect, will cover the first application of group policy with the highest priority. Filtering to block a user or computer within the container application that GPO settings 49. What is DNS? 50. DNS Domain Name System default port number is how much? 5351. DNS What is the role? The domain name to an IP address; resolves IP addresses to domain names. 52. In addition to DNS, domain name resolution can also be carried out by what means? What are the disadvantages? hosts file, the disadvantage is easy to repeat the name, file size resolution efficiency drop, single point of management failure hosts easily. 53. DNS What is the structure of space? Spatial hierarchical structure is the first layer -> Root Domain: Layer -> top-level domains. "": Organizational domain (com, net), countries or regions (CN, JP), the inversion domains (IN- addr-arpa) a third layer -> two domains: The baidu.com, sohu.com, 163.com fourth layer -> host: as www.baidu.com, www.sohu.com, www.163 .com54. in DNS, host name, also known Why? Hostname. = FQDN domain name is the fully qualified domain name -55. DNS What are the two analytical methods? How to resolve? Forward Analysis: find the IP address of the domain name; reverse lookup: Find the domain name by the IP address. 56. DNS What are two ways to search? What are the characteristics? Recursive query: the client get the result can only be a success or failure iterative query: server to answer the best results. 57. How to reduce the load on a single DNS server? The same content stored in the plurality of DNS zone DNS servers, load balancing area transmission. 58. What is DNS backup or redundant? Primary DNS server to establish the main area, the secondary DNS server resume aid area, and jointly safeguard the DNS resource records, any one DNS server failure will not affect the use. 59. Please describe the DNS zone transfer process. Replicated from the primary zone file on the DNS server to the secondary DNS server. 60. One main area can have a number of secondary zone? There may be a plurality of secondary regions, and the region may also be further auxiliary auxiliary area. 61. What is a subdomain? Create a sub-domain behavior in the region to expand the domain name space. 62. What is a delegate? The subdomain delegated to another server maintenance behavior. 63. What is the difference with the subdomain is delegated? Resources subdomain in the parent zone file, they share a single zone file, the authoritative server is authoritative server for sub-domains parent zone; appoint a separate zone file, specify the new domain to the new authoritative server. 64. What is FTP? FTP is an application layer protocol. 65. FTP What is the structure? C / S structure 66. FTP runs in that layer? 67. FTP application layer using a layer which any agreement? TCP68. FTP default port number of the transport layer is the number? 21 FTP access through a browser and 2069. command format. FTP: // IP or domain name at 70. The command line mode, FTP upload, download what order is? get: download a single file; mget: download more than one file; put: upload a single file; mput: upload multiple files. What two anonymous 71. FTP username and password? anonymous: the password is blank; ftp: password ftp72 What is the virtual directory.? Other ways to mount the alias directory under the site's root virtual directory 73. What are the advantages? Facilitate the development and maintenance, respectively; moving position does not affect the logical structure of the site. 74. In web services, web hosting what is? Multiple Web sites running on the server; 75 virtual hosts What are the three ways? Use a different IP address; the same IP address, different port number; the same IP address and port number, different host name. 76. Windows Firewall There are several types of network location? What are they? Three kinds; public network; private network; domain network. 77. What are the two elements of encryption technology is? Algorithm; key. 78. What is the key? Is an algorithm for data coding and decoding. 79. The data encryption overall divided into several categories? What are they? Symmetric encryption; asymmetric encryption. 80. Network troubleshooting common thinking and action of each step or purpose. Ping the loopback address, check the TCP / IP driver is normal; ping any other host network segment, the network communication check is normal; then ping the default gateway, the routing is normal check outlet; ping any other segments of other hosts, remote connectivity check sex. 81. Description of the following HTTP status returned represent what it means. 200: successful, the server has successfully processed the request. 307: Temporary Redirect. 400: Bad Request, the server does not understand the syntax of the request. 401: authentication error, this page requires authorization. 403: Prohibition, the server rejects the request. 404: Not Found, web server can not find the request. 500-505: internal server error occurred while trying to process the request, these errors could be wrong server itself. 82. explain under what circumstances, will receive the results of the ping request is returned. Request timed out: the other off; address does not exist; not on the same network segment and routes can not find each other. ICMP filter, such as a firewall. Destination host Unreachable: each other with their different subnets, and did not set the default route; cable fault; Bad IP address: can not resolve the IP or IP address does not exist; Source quench received: the other party or halfway server is busy and can not respond; Unknown host : domain name server failure; the name is not correct; between the administrator and the remote host system line fault. No answer: center console is not running; local or central host network is not configured correctly; local or central router does not work; communication line is faulty; Center host routing problems exist. No route to host: the card is not working properly. Transmti failed error code 10043: network card driver is not normal. Unknown host name: DNS is not configured correctly. 83. The loopback address range. 127.0.0.1 ~ 127.0.0.25484. 169.254.XX What is the address? What configuration that? Temporary IP address; when not using DHCP service, and there is no manual configuration of IP addresses, the system will automatically configure the address. 85. MAC address is what? Physical address of the device. 86. Please list the type commonly used dynamic disks and disk corresponding to the desired number, disk utilization, performance characteristics, redundancy. Simple volume, a disk utilization rate of 100%, no change in performance, there is no redundancy; spanned, 2-32 disks, 100% utilization, performance unchanged, there is no redundancy; striped, 2-32 disks, 100% utilization, enhance read and write performance, there is no redundancy; mirrored, two disks, 50% utilization, reduce read and write performance, redundancy; RAID5,3-32 disks, disk usage = -1, with a reduced read and write can do, redundant. 87. Open two ways remote desktop tools. Start -> All Programs -> Windows Components -> Remote Desktop tool; win + R -> Run: mstsc -> Open Remote Desktop tool. 88. What image file to .iso image file to end with the end of .gho most basic difference is? .gho is GHOST image file, GHOST clone file is backed up, when the ghost is to restore the system using the backup files to a hard disk or a disk partition; .iso file is equivalent to a CD. 89. What letter is for? It is DOS, WINDOWS system identifier of the disk storage devices. 90. What is the most basic feature is the letter? What are the default drive letter there? Letter can not be repeated; A and B represent letter floppy; C generally represents a first disk partition or said default system partition. 91. The top-level domain, the domain name on behalf of what? gov: Government; com: commercial sector; edu: the education sector; net: Network Services architecture mil: military; org: civil society organizations. 92. Combined with DNS queries, please explain the full DNS resolution process. Enter the domain name you want to access in the browser, the browser first visit if your hosts file mapping relationship exists, exists as a direct call to complete resolution, as there is no access request will be sent to the local domain name server, domain name server in the local reception check their records to the cache after the request, as there is a record, the process directly returns a result, the recording does not exist as a local domain name server sends the request to a root name server, root domain name server receives the request returns the basis of the top-level domain corresponding to IP address of the top-level domain server, the local domain name server receives top-level domain name server returns the IP address, the request is sent to the top-level domain server, the top-level domain name server receives a request query caching own records, such as can not be resolved, it will again subordinate domain name server returns the address to the local domain name server, the local domain name server upon receiving the address, the above operation is repeated until the query to the domain name server address request. Local domain name server after receiving the resolution records, first of all on their own copy of the cache, and then parse the results will be sent to the client, the client receives the results can directly access the web page under the domain name. 93. There are several cable connection? What are they? Two types of direct cross. 94. The production standard network cable There are several? What is? T568A, T568B95. Above the standard line order is how arranged? T568A: white and green, green, orange and white, blue, white, blue, orange, white brown, brown; T568B: white orange, orange, green, white, blue, white, blue, green, white brown, brown. 96. Application of the rule straight-line and cross-line. Different devices are connected by straight; same cross equipment. 97. PC case more quickly to install all PC operating systems What methods can be used? Know the result of at least one. 98. Why PXE batch installed inside the classroom PC IP address is automatically acquired at the beginning of 172.60, in the case does not belong to a private IP address can still be used normally? IP addresses into public IP and private IP, but the use of the process, as long as the format of an IP address conform to the rules, the device can successfully set up, using the internal network. Private IP addresses are not recognized in the public network, all IP addresses within the private IP address range, you can not use as a public IP address. The public IP address, such as intranet use, it will not affect the public, as long as the IP address is not repeated in the same network, you can use. 99. There is a web server, and one day a customer complaints above a site is slow, if you are an administrator, knowledge learned so far, what ideas you will find out why, please list the ideas and troubleshooting steps and reasons . (Assuming an arbitrary server operating system and software) server first detected state, and to exclude the hardware system failure; then check the status of the underlying network, such as the Internet, the delay, traffic, and the network card fault exclusion; final check of the operation of the web server software.

Published 52 original articles · won praise 1 · views 1692

Guess you like

Origin blog.csdn.net/wx25051/article/details/103599723