Technical Interview Questions – Exchange 2003 1. Tell me a bit about the capabilities of Exchange Server. 2. What are the different Exchange 2003 versions? 3. What's the main differences between Exchange 5.5 and Exchange 2000/2003? 4. What are the major network infrastructure for installing Exchange 2003? 5. What is the latest Exchange 2003 Service Pack? Name a few changes in functionality in that SP. 6. What are the disk considerations when installing Exchange (RAID types, locations and so on). 7. You got a new HP DL380 (2U) server, dual Xeon, 4GB of RAM, 7 SAS disks, 64-bit. What do you do next to install Exchange 2003? (you have AD in place) 8. Why not install Exchange on the same machine as a DC? 9. Are there any other installation considerations? 10. How would you prepare the AD Schema in advance before installing Exchange? 11. What type or permissions do you need in order to install the first Exchange server in a forest? In a domain? 12. How would you verify that the schema was in fact updated? 13. What type of memory optimization changes could you do for Exchange 2003? 14. How would you check your Exchange configuration settings to see if they're right? 15. What are the Exchange management tools? How and where can you install them? 16. What types of permissions are configurable for Exchange? 17. How can you grant access for an administrator to access all mailboxes on a specific server? 18. What is the Send As permission? 19. What other management tools are used to manage and control Exchange 2003? Name the tools you'd use. 20. What are Exchange Recipient types? Name 5. 21. You created a mailbox for a user, yet the mailbox does not appear in ESM. Why? 22. You wanted to change mailbox access permissions for a mailbox, yet you see the SELF permission alone on the permissions list. Why? 23. What are Query Based Distribution groups? 24. What type of groups would you use when configuring distribution groups in a multiple domain forest? 25. Name a few configuration options for Exchange recipients. 26. What's the difference between Exchange 2003 Std. and Ent. editions when related to storage options and size? 27. Name a few configuration options related to mailbox stores. 28. What are System Public Folders? Where would you find them? 29. How would you plan and configure Public Folder redundancy? 30. How can you immediately stop PF replication? 31. How can you prevent PF referral across slow WAN links? 32. What types of PF management tools might you use? 33. What are the differences between administrative permissions and client permissions in PF? 34. How can you configure PF replication from the command prompt in Exchange 2003? 35. What are the message hygiene options you can use natively in Exchange 2003? 36. What are the configuration options in IMF? 37. What are virtual servers? When would you use more than one? 38. Name some of the SMTP Virtual Server configuration options. 39. What is a Mail Relay? Name a few known mail relay software or hardware options. 40. What is a Smart Host? Where would you configure it? 41. What are Routing Groups? When would you use them? 42. What are the types of Connectors you can use in Exchange? 43. What is the cost option in Exchange connectors? 44. What is the Link State Table? How would you view it? 45. How would you configure mail transfer security between 2 routing groups? 46. What is the Routing Group Master? Who holds that role? 47. Explain the configuration steps required to allow Exchange 2003 to send and receive email from the Internet (consider a one-site multiple server scenario). 48. What is DS2MB? 49. What is Forms Based Authentication? 50. How would you configure OWA's settings on an Exchange server? 51. What is DSACCESS? 52. What are Recipient Policies? 53. How would you work with multiple recipient policies? 54. What is the "issue" with trying to remove email addresses added by recipient policies? How would you fix that? 55. What is the RUS? 56. When would you need to manually create additional RUS? 57. What are Address Lists? 58. How would you modify the filter properties of one of the default address lists? 59. How can you create multiple GALs and allow the users to only see the one related to them? 60. What is a Front End server? In what scenarios would you use one? 61. What type of authentication is used on the front end servers? 62. When would you use NLB? 63. How would you achieve incoming mail redundancy? 64. What are the 4 types of Exchange backups? 65. What is the Dial-Tone server scenario? 66. When would you use offline backup? 67. How do you re-install Exchange on a server that has crashed but with AD intact? 68. What is the dumpster? 69. What are the e00xxxxx.log files? 70. What is the e00.chk file? 71. What is circular logging? When would you use it? 72. What's the difference between online and offline defrag? 73. How would you know if it is time to perform an offline defrag of your Exchange stores? 74. How would you plan for, and perform the offline defrag? 75. What is the eseutil command? 76. What is the isinteg command? 77. How would you monitor Exchange's services and performance? Name 2 or 3 options. 78. Name all the client connection options in Exchange 2003. 79. What is Direct Push? What are the requirements to run it? 80. How would you remote wipe a PPC? 81. What are the issues with connecting Outlook from a remote computer to your mailbox? 82. How would you solve those issues? Name 2 or 3 methods 83. What is RPC over HTTP? What are the requirements to run it? 84. What is Cached Mode in OL2003/2007? 85. What are the benefits and "issues" when using cached mode? How would you tackle those issues? 86. What is S/MIME? What are the usage scenarios for S/MIME? 87. What are the IPSec usage scenarios for Exchange 2003? 88. How do you enable SSL on OWA? 89. What are the considerations for obtaining a digital certificate for SSL on Exchange? 90. Name a few 3rd-party CAs. 91. What do you need to consider when using a client-type AV software on an Exchange server? 92. What are the different clustering options in Exchange 2003? Which one would you choose and why.
3 11098Post New HP Engineering AllOther Interview Questions
What does none type mean in python?
What is dagger and explain dependency injection?
what particular feild in zoology would you say is the most challenging feild
How can sap security be improved?
What was the previous name of Microsoft Azure?
Do you know what is user defined datatypes and when you should go for them?
Why is _jspservice () method starting with an '_'?
How will you write a file using node?
What is the composition of ferroin?
In which language apache kafka is written?
Can the amount of available energy in a given tropic level to be larger than the available energy in inferior tropic levels? What does that condition means to the conformation of the energy pyramids?
Reason for capillary type dp level transmitter fluctuation
I have a "webb app" in Tomcat that serves only HTML, and
I'd like to make the path component of the URL case-
insensitive. So if the client navigates to
http://
4 down vote favorite share [g+] share [fb] share [tw] I am developing my site using server side sessions using redis as backend for saving the session. Now the issue which is bothering me is of user leaving the website without logging out. I mean user simply closes the browser which causes the cookie to be deleted. Now session of that user still exists on the server and will not be used again as new login requires creating a new session due to security reasons. To avoid the case where hacker steals the old cookie and use it after user login again with same old session id. In essence user leaves the website without explicitly logging out and his session will be deleted after certain time limit of inaccessibility. I am thinking time limit of 30-60 minutes. Also with every new request from user his cookie will also be updated to keep track of when the user last time accessed the site. But nowadays, people let site remain open for long time without accessing it. For example users open facebook and gmail in new tabs and forget about them for 2-3 hours and still they are not asked to login again. Is letting a 2-3 hours old cooke access the session secure? My concern is someone steals user cookie and use it 2-3 hours later. Thinking on this topic has also forced me to question how facebook manages security if user can use a session where they are not accessing it for long periods of time and still they remain logged in. Or is it not secure for me to keep logged in when am not accessing the site session for longer period of time? It can be the case also there is some pinging mechanism using which sites keep track of user having their site open in a browser and when browser closes they are notified and can work accordingly. My website is a social network and needs all those security and usage features which a social network may need. I am new to web security and web development in general and may be the case where my above questions may seem a little basic. If you feel that is the case kindly point to some good reference where I can read and find answers to my question.
What is the pic clause for the any bll cell type of data fields?