Binary Global
10+ CIEL HR Interview Questions and Answers
Q1. What is authorative and non authorative restore mode.
Authoritative restore mode is used to restore the entire Active Directory while non-authoritative restore mode is used to restore individual objects.
Authoritative restore mode restores the entire Active Directory to a specific point in time and marks it as the current version.
Non-authoritative restore mode restores individual objects from a backup and allows replication to update the restored object.
Authoritative restore mode is used when the entire Active Directory needs to ...read more
Q2. How can we log genrate for logon logout users.
User logon and logout can be logged by enabling auditing and configuring security policies.
Enable auditing in group policy settings
Configure security policies to audit logon and logoff events
View logs in Event Viewer
Use third-party tools for more advanced logging and analysis
Q3. How we can integrate Sophos with AD server.
Sophos can be integrated with AD server using Sophos Central or Sophos Enterprise Console.
Install Sophos Central or Sophos Enterprise Console on the AD server.
Configure the AD synchronization settings in Sophos.
Create a synchronization account in AD with read-only access to user and group information.
Configure the synchronization account in Sophos.
Verify the synchronization settings and run a synchronization test.
Configure the AD authentication settings in Sophos.
Configure th...read more
Q4. What is upstream and downstream in WSUS Server.
Upstream refers to the WSUS server that is the source of updates, while downstream refers to the WSUS servers that receive updates from the upstream server.
Upstream WSUS server is the source of updates
Downstream WSUS servers receive updates from the upstream server
Downstream servers can be configured to synchronize with the upstream server at regular intervals
Upstream server can be configured to download updates from Microsoft Update or another upstream server
Q5. What is logical and physical part of Server.
The logical part of a server refers to the software and how it operates, while the physical part refers to the hardware components.
Logical part includes operating system, applications, and services
Physical part includes CPU, RAM, hard drives, and network interfaces
Logical and physical parts work together to provide functionality and performance
Examples of logical and physical parts working together include virtualization and load balancing
Q6. How does DORA Process works in DHCP.
DORA process is used by DHCP to allocate IP addresses to clients.
DORA stands for Discover, Offer, Request, and Acknowledge.
Client sends a broadcast Discover message to find available DHCP servers.
Server responds with an Offer message containing IP address and lease duration.
Client sends a Request message to request the offered IP address.
Server sends an Acknowledge message to confirm the allocation of IP address to client.
DORA process ensures efficient allocation of IP addres...read more
Q7. How can we capture packet in Sophos.
Sophos provides packet capture through its built-in packet sniffer tool.
Sophos has a built-in packet sniffer tool called 'Packet Capture' which can be accessed through the web interface.
Packet Capture allows users to capture packets on specific interfaces or VLANs.
Users can also apply filters to capture specific types of traffic.
Captured packets can be downloaded in PCAP format for further analysis.
Q8. What is filter or WMi policy in GPO.
Filter or WMI policy in GPO is used to apply specific settings to a targeted group of computers or users.
Filtering allows administrators to apply GPOs to specific groups of users or computers based on criteria such as operating system, group membership, or hardware configuration.
WMI filters allow administrators to apply GPOs based on the results of a WMI query, which can provide more granular targeting options.
For example, a GPO with a WMI filter could be applied only to comp...read more
Q9. What is OU and Group in AD.
OU stands for Organizational Unit and is used to organize objects in Active Directory. Group is a collection of users with common attributes.
OU is a container object used to group and organize other objects in AD
Group is a collection of users with common attributes such as access permissions or job roles
OU can be used to delegate administrative control over a subset of objects in AD
Group can be used to simplify the management of access permissions and distribution lists
OU can...read more
Q10. How does Dns works.
DNS translates domain names into IP addresses to enable communication between devices on the internet.
DNS stands for Domain Name System.
It works by translating human-readable domain names into IP addresses that computers can understand.
DNS servers store information about domain names and their corresponding IP addresses.
When a user types a domain name into their browser, the browser sends a request to a DNS server to resolve the domain name into an IP address.
DNS uses a hiera...read more
Q11. What is FSMO rules.
FSMO (Flexible Single Master Operations) roles are specialized domain controller tasks in Active Directory.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
Schema Master: responsible for updating the Active Directory schema.
Domain Naming Master: responsible for adding or removing domains in a forest.
RID Master: responsible for allocating RIDs (Relative Identifiers) to domain controllers.
PDC Emulator: responsible ...read more
Interview Process at CIEL HR
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month