Professional Documents
Culture Documents
Global Catalog server is the server which keeps the stores the details of each object
created in the forest. Global Catalog is the master searchable index to all objects in forest
2. Can GC Server and Infrastructure place in single server? If not explain why?
No, As Infrastructure master does the same job as the GC. It does not work together.
3. What is the size of log file which created before updating into ntds.dit and the total
number of files?
Three Log files Names
Edb.log
Res1.log
Res2.log
Each initially 10 MB
7. What is the port number for SMTP, Kerberos, LDAP, and GC Server??
SMTP 25, Kerberos 88, GC 3268, LDAP 389
16. What are the new features in Windows 2003 related to ADS, Replication, and Trust?
ADS: Can more than 5000 users in the groups
24. How does the down-level clients register it names with DNS server?
Enable the WINS integration with DNS.
27. What is the process of DHCP clients for getting the ip address?
Discover – Order – Receive - Acknowledge
2. The boot device is found, the Master Boot Record (MBR) is loaded into memory, and
its program is run.
1. The Windows 2000 loader switches the processor to the 32-bit flat memory model.
3. The Windows 2000 loader reads the BOOT.INI file and displays the operating system
selections (boot loader menu).
4. The Windows 2000 loader loads the operating system selected by the user. If Windows
2000 is selected, NTLDR runs NTDETECT.COM. For other operating systems, NTLDR
loads BOOTSECT.DOS and gives it control.
5. NTDETECT.COM scans the hardware installed in the computer, and reports the list to
NTLDR for inclusion in the Registry under the
HKEY_LOCAL_MACHINE_HARDWARE hive.
6. NTLDR then loads the NTOSKRNL.EXE, and gives it the hardware information
collected by NTDETECT.COM. Windows NT enters the Windows load phases.
Active Directory is the directory service included in the Windows Server 2003 family.
Active Directory includes the directory, which stores information about network
resources, as well as all the services that make the information available and useful.
Active Directory is also the directory service included in Windows 2000.
The Active Directory schema defines objects that can be stored in Active Directory. The
schema is a list of definitions that determines the kinds of objects and the types of
information about those objects that can be stored in Active Directory. Because the
schema definitions themselves are stored as objects, they can be administered in the same
manner as the rest of the objects in Active Directory. Normally called schema object or
metadata.
6) Structure of AD in 2kX?
1)Physical structure
Sites ,Domain Controllers
2)Logical structures
Forest, Tree, Domain, OU, object
1)Mixed mode
2)Native mode
3)Interim mode
The global catalog is the central repository of information about objects in a tree or
forest. By default, a global catalog is created automatically on the initial domain
controller in the first domain in the forest. A domain controller that holds a copy of the
global catalog is called a global catalog server.
19) Where is the FRS logs stored in and what is the database engine name?
c:\windows\ntfrs\jet\log, The engine used is jet database engine. Ntfrs.jdb.
In a forest, there are at least five FSMO roles that are assigned to one or more domain
controllers. The five FSMO roles are
Schema Master:
The schema master domain controller controls all updates and modifications to the
schema. To update the schema of a forest, you must have access to the schema master.
There can be only one schema master in the whole forest.
The domain naming master domain controller controls the addition or removal of
domains in the forest. There can be only one domain naming master in the whole forest.
Infrastructure Master:
The infrastructure is responsible for updating references from objects in its domain to
objects in other domains. At any one time, there can be only one domain controller acting
as the infrastructure master in each domain.
PDC Emulator
The PDC emulator is a domain controller that advertises itself as the primary domain
controller (PDC) to workstations, member servers, and domain controllers that are
running earlier versions of Windows.
For example, if the domain contains computers that are not running Microsoft Windows
XP Professional or Microsoft Windows 2000 client software, or if it contains Microsoft
Windows NT backup domain controllers, the PDC emulator master acts as a Windows
NT PDC.
It is also the Domain Master Browser, and it handles password discrepancies. At any one
time, there can be only one domain controller acting as the PDC emulator master in each
domain in the forest
============================================================
Quicker Q&A
What are the required components of Windows Server 2003 for installing Exchange
2003? - ASP.NET, SMTP, NNTP, W3SVC
What must be done to an AD forest before Exchange can be deployed? - Setup
/forestprep
What Exchange process is responsible for communication with AD? - DSACCESS
What 3 types of domain controller does Exchange access? - Normal Domain Controller,
Global Catalog, Configuration Domain Controller
What connector type would you use to connect to the Internet, and what are the two
methods of sending mail over that connector? - SMTP Connector: Forward to smart host
or use DNS to route to each address
How would you optimise Exchange 2003 memory usage on a Windows Server 2003
server with more than 1Gb of memory? - Add /3Gb switch to boot.ini
What would a rise in remote queue length generally indicate? - This means mail is not
being sent to other servers. This can be explained by outages or performance issues with
the network or remote servers.
What would a rise in the Local Delivery queue generally mean? - This indicates a
performance issue or outage on the local server. Reasons could be slowness in consulting
AD, slowness in handing messages off to local delivery or SMTP delivery. It could also
be databases being dismounted or a lack of disk space.
What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP and Global
Catalog? - SMTP – 25, POP3 – 110, IMAP4 – 143, RPC – 135, LDAP – 389, Global
Catalog - 3268
Name the process names for the following: System Attendant? – MAD.EXE, Information
Store – STORE.EXE, SMTP/POP/IMAP/OWA – INETINFO.EXE
What is the maximum amount of databases that can be hosted on Exchange 2003
Enterprise? - 20 databases. 4 SGs x 5 DBs.
What are the disadvantages of circular logging? - In the event of a corrupt database, data
can only be restored to the last backup.
========================================================
1. What are the Default shares in Windows Server 2003?
By default, Windows automatically creates special hidden administrative shares that
administrators, programs, and services can use to manage the computer environment or
network. These special shared resources are not visible in Windows Explorer or in My
Computer, but you can use the Shared Folders tool in Computer Management to view
them. Depending on the configuration of your computer, you may see some or all the
following special shared resources listed in the Shares folder in Shared Folders:
•
DriveLetter$: Root partitions and volumes are shared as the drive letter name appended
with the $ character. For example, drive letters C and D are shared as C$ and D$.
•
ADMIN$: A resource that is used during remote administration of a computer.
•
IPC$: A resource that shares the named pipes that you must have for communication
between programs. Note that this resource cannot be deleted.
•
NETLOGON: A resource that is used on domain controllers.
•
SYSVOL: A resources that is used on domain controllers.
•
PRINT$: A resource that is used during the remote administration of printers.
•
FAX$: A shared folder on a server that is used by fax clients during fax transmission.
Note NETLOGON and SYSVOL are not hidden shares but are instead special
administrative shares. Generally, Microsoft recommends that you do not modify these
special shared resources. However, if you want to remove the special shared resources
and prevent them from being created automatically, you can do this by editing the
registry.
Question: How many Zones in Windows 2000 server and Windows 2003 Server ?
Ans: In Windows 2000 there are mainly 3 zones
Standard Primary — zone information is written in Txt fileStandard Secondary — copy
of PrimaryActive Directory Integrated– Information stores in Active Directory
In Win2k3 one more zone is added that is Stub zone
–Stub is like secondary but it contains only copy of SOA records, copy of NS records,
copy of A records for that zone. No copy of MX, SRV records etc.,With this Stub zone
DNS traffic will be low
Question: What is Kerberos? Which version is currently used by Windows? How does
Kerberos work?
Answer: Kerberos is the user authentication used in Win2000 and Win2003 Active
Directory servers
Kerberos version in 5.0
Port is: 88
It’s more secure and encrypted than NTLM (NT authentication)
3:07 AM
===============================================================
Download This doc:
http://u-bm8g42kfs.urlcash.net
===============================================================
FSMO ROLES
1) While Active Directory is a distributed system, some servers only carry out specific
roles. If something happens to this server or you need a more substantial server to handle
a particular role, you must know which servers are handling each role.
There are five FSMO roles:•
PDC emulator (one per domain): This role allows Windows Server 2003 to act as a
Windows NT primary domain controller (PDC), and it provides replication support for
Windows NT-based backup domain controllers (BDCs). In addition, this role assists with
time and group policy synchronization. •
Infrastructure master (one per domain): This role is responsible for updating the group-to-
user references whenever the members of groups change or receive new names. •
Relative ID (RID) master (one per domain): This role ensures that every object created
has a unique identification number. •
Schema master (one per forest): This role is responsible for maintaining and modifying
the Active Directory schema. •
Domain naming master (one per forest): This role is responsible for the addition and
deletion of domains in a forest.
==============================
How can you determine which servers hold these roles in an Active Directory forest?
To find the PDC emulator, the infrastructure master, and the RID master, follows these
steps:
1. Go to Start Administrative Tools Active Directory Users and Computers.
2. Right-click the domain and select Operations Master. The resulting three tabs will
show you which server holds each respective role.
To find the schema master, follow these steps:
1. Go to Start Run.
2. Enter regsvr32 schmmgmt.dll in the Open text box, and click OK.
3. Go to Start Run.
4. Enter mmc in the Open text box, and click OK.
5. Go to File Add/Remove Snap-In, and click Add.
6. Click Active Directory Schema, click Add, click Close, and click OK.
7. Right-click Active Directory Schema and select Operations Master from the shortcut
menu.
Transferring the RID Master, PDC Emulator, and Infrastructure Masters via GUITo
Transfer the Domain-Specific RID Master, PDC Emulator, and Infrastructure Master
FSMO Roles:
1. Open the Active Directory Users and Computers snap-in from the Administrative
Tools folder.
2. If you are NOT logged onto the target domain controller, in the snap-in, right-click the
icon next to Active Directory Users and Computers and press Connect to Domain
Controller.
3. Select the domain controller that will be the new role holder, the target, and press OK.
4. Right-click the Active Directory Users and Computers icon again and press Operation
Masters.
5. Select the appropriate tab for the role you wish to transfer and press the Change button.
6. Press OK to confirm the change.7. Press OK all the way out
BOOTP- short for Bootstrap Protocol is a UDP network protocol used by a network
client to obtain its IP address automatically. This is usually done during the bootstrap
process when a computer is starting up. The BOOTP servers assign the IP address from a
pool of addresses to each client.
BOOTP/DHCP differencesThere are significant differences in the way in which BOOTP
and DHCP perform host configuration. The following table compares and contrasts the
features of the two protocols that vary.
DHCP Relay AgentThe DHCP Relay Agent component is a Bootstrap Protocol (BOOTP)
relay agent that relays Dynamic Host Configuration Protocol (DHCP) messages between
DHCP clients and DHCP servers on different IP networks. The DHCP Relay Agent is
compliant with RFC 1542. You cannot use the DHCP Relay Agent component on a
computer running the DHCP service. BOOTP is a host configuration protocol developed
before DHCP that was designed to configure diskless workstations with limited boot
capabilities
RAID types
RAID-0: RAID-0 is called disk "striping". All the data is spread out in chunks across all
the disks in the RAID set. RAID-0 has great performance, because you spread out the
load of storing data onto more physical drives. There is no parity generated for RAID-0.
Therefore there is no overhead to write data to RAID-0 disks. RAID-0 is only good for
better performance, and not for high availability, since parity is not generated for RAID-0
disks. RAID-0 requires at least two physical disks.
RAID-1: RAID-1 is called disk mirroring. All the data is written to at least two separate
physical disks. The disks are essentially mirror images of each other. If one of the disks
fails, the other can be used to retrieve data. Disk mirroring is good for very fast read
operations. It's slower when writing to the disks, since the data needs to be written twice.
RAID-1 requires at least two physical disks.
RAID-5: RAID-5 uses disk striping with parity. The data is striped across all the disks in
the RAID set, along with the parity information needed to reconstruct the data in case of
disk failure. RAID-5 is the most common method used, since it achieves a good balance
between performance and availability. RAID-5 requires at least three physical disks.
The Certificate Services database: This database contains certificates that a server
running Windows server 2003 uses to authenticate users. The Certificate Services
database is present only if the server is operating as a certificate server. System state data
contains most elements of a system's configuration, but it may not include all of the
information that you require recovering data from a system failure. Therefore, be sure to
backup all boot and system volumes, including the System State, when you back up your
server.
[boot loader]
timeout=30
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP
Professional" /fast detect
=============================================================
TYPES OF WINDOWS 2003
Standard Edition-4 processors with up to 4 GB RAM
Enterprise Edition-eight processors with up to 32 GB memory.
Datacenter Edition-32 processors with up to 64 GB RAM.
Web Edition-supports a maximum of 2 processors with support for a maximum of 2GB
of RAM
The Five IP Address Classes
Class A networks have a beginning octet of 1 - 126.
Class B networks have a beginning octet of 128-191.
Class C networks have a beginning octet of 192 - 223.
Class D networks have a beginning octet of 224 – 239.
Class E networks have a beginning octet of 224.0.0.0 - 255.255.255.255
What are the benefits of using DHCP?
A. DHCP provides the following benefits for administering your TCP/IP-based network:•
Reliable configuration
DHCP avoids configuration errors caused by the need to manually type in values at each
computer. Also, DHCP helps prevent address conflicts caused by a previously assigned
IP address being reused to configure a new computer on the network.•
Reduces configuration management
Using DHCP servers can greatly decrease time spent configuring and reconfiguring
computers on your network. Servers can be configured to supply a full range of
additional configuration values when assigning address leases. These values are assigned
using DHCP options.
The DHCP lease renewal process helps assure that where client configurations need to be
updated often (such as users with mobile or portable computers who change locations
frequently), these changes can be made efficiently and automatically by clients
communicating directly with DHCP servers.
Backing up the DHCP databaseMaintaining a backup of the DHCP database protects you
from data loss if the DHCP database is lost (for example, due to hard disk failure) or
becomes corrupted.
There are three backup methods supported by the DHCP Server service:•
Synchronous backups that occur automatically. The default backup interval is 60
minutes.• Asynchronous (manual) backups, performed by using the Backup command on
the DHCP console. For more information about asynchronous backups, see back up the
DHCP database. • Backups using Windows Backup (ntbackup.exe) or non-Microsoft
backup software. For more information about Windows Backup, see Backup.To move a
DHCP database to another serverThis topic provides details on how to move a DHCP
database from one server computer (the source server) to another server computer (the
destination server).
A DNS query is the process of a computer or networking device making an inquiry to get
an IP address for a DNS name such as w3.org The client computer will send a DNS query
to one of their internet service provider's DNS servers. The DNS server looks in it's DNS
database to tell whether it can answer the query authoritatively. If the DNS server can
answer authoritatively, the DNS server answers the query and the DNS query process is
complete.
If the server cannot answer the query authoritatively it will look in its DNS cache of
previous queries. If the DNS server finds a matching entry in its cache, it will answer the
query with a non-authoritative answer based on the information in its cache and the DNS
query process is complete.
If the ISP DNS server did not have the DNS information in its DNS database or its DNS
cache the DNS query process will use recursion to complete the DNS query. The ISP
DNS server will use its root hints file to find information to contact other DNS servers.
The root hints file specified DNS servers that are authoritative for the DNS domain root
and top level domains in the DNS system. This includes the .com, .org, .net, .gov and
other domain types. If the query is for www.w3.org the ISP DNS server would contact an
authorititative server for the top level "org" domain and send an iterative query to the org
DNS server asking for information about the authoritative server for w3.org. The org
domain DNS server responds with the the nameserver information including IP address
of the nameserver for w3.org. Then the ISP DNS server sends a query to the w3.org DNS
server asking for the IP address of www.w3c.org. The w3.org DNS server sends an
authoritative answer back to the ISP DNS server which is cached in the ISP DNS server
cache and also sent to the client computer.
If another client computer later does a request for information about www.w3.org the ISP
DNS server has the information in its cache and will not neet to ask other DNS servers
for additional information.
===============================================================
==============
comments (0)
TOP
2:42 AM
============================================
Download this doc:
http://u-1l4bipltl.urlcash.org
=============================================
Availability:
Server clusters provide a highly available platform for deploying applications. A Server
cluster ensures that applications continue to run in the event of planned downtime due to
maintenance or unplanned downtime due to failures. Server clusters protect against
hardware failures, failures of the Windows operating system, device drivers or
application software. Server clusters allow operating system and application software to
be upgraded across the cluster without having to take down the application.
Manageability:
Server clusters allow administrators to quickly inspect the status of all cluster resources
and move workloads around onto different servers within the cluster. This is useful for
manual load balancing, and to perform "rolling updates" on the servers without taking
important data and applications offline.
Scalability:
Applications that can be partitioned can be spread across the servers of a cluster allowing
additional CPU and memory to be applied to a problem. As the problem size increases,
additional servers can be added to the cluster. A partitioned application is one where the
data (or function) can be split up into independent units. For example, a customer
database could be split into two units, one covering customers with names beginning A
thru L and the other for customers with names beginning M thru Z.
Pro
Good for clusters that are supporting heavy-weight1 applications such as databases. This
configuration ensures that in the event of failure, two applications will not be hosted on
the same node.
Pro
Very easy to plan capacity. Each node is sized based on the application that it will need to
host (just like a 2-node cluster hosting one application).
Pro
Effect of a node failure on availability and performance of the system is very easy to
determine.
Pro
Get the flexibility of a larger cluster. In the event that a node is taken out for
maintenance, the buddy for a given application can be changed dynamically (may end up
with standby policy below).
Con
In simple configurations such as the one above, only 50% of the capacity of the cluster is
in use.
Con
Administrator intervention may be required in the event of multiple failures.
Pro
Good for clusters that are supporting heavy-weight applications such as databases. This
configuration ensures that in the event of a single failure, two applications will not be
hosted on the same node.
Pro
Very easy to plan capacity. Each node is sized based on the application that it will need to
host, the spare is sized to be the maximum of the other nodes.
Pro
Effect of a node failure on availability and performance of the system is very easy to
determine.
Con
Configuration is targeted towards a single point of failure.
Con
Does not really handle multiple failures well. This may be an issue during scheduled
maintenance where the spare may be in use.
Server clusters support standby servers today using a combination of the possible owners
list and the preferred owners list. The preferred node should be set to the node that the
application will run on by default and the possible owners for a given resource should be
set to the preferred node and the spare node.
N+I
Standby server works well for 4-node clusters in some configurations, however, its ability
to handle multiple failures is limited. N+I configurations are an extension of the standby
server concept where there are N nodes hosting applications and I nodes spare.
Pro
Good for clusters that are supporting heavy-weight applications such as databases or
Exchange. This configuration ensures that in the event of a failure, an application
instance will failover to a spare node, not one that is already in use.
Pro
Very easy to plan capacity. Each node is sized based on the application that it will need to
host.
Pro
Effect of a node failure on availability and performance of the system is very easy to
determine.
Pro
Configuration works well for multiple failures.
Con
Does not really handle multiple applications running in the same cluster well. This policy
is best suited to applications running on a dedicated cluster.
Server cluster supports N+I scenarios in the Windows Server 2003 release using a cluster
group public property AntiAffinityClassNames. This property can contain an arbitrary
string of characters. In the event of a failover, if a group being failed over has a non-
empty string in the AntiAffinityClassNames property, the failover manager will check all
other nodes. If there are any nodes in the possible owners list for the resource that are
NOT hosting a group with the same value in AntiAffinityClassNames, then those nodes
are considered a good target for failover. If all nodes in the cluster are hosting groups that
contain the same value in the AntiAffinityClassNames property, then the preferred node
list is used to select a failover target.
Failover Ring
Failover rings allow each node in the cluster to run an application instance. In the event
of a failure, the application on the failed node is moved to the next node in sequence.
Pro
Good for clusters that are supporting several small application instances where the
capacity of any node is large enough to support several at the same time.
Pro
Effect on performance of a node failure is easy to predict.
Pro
Easy to plan capacity for a single failure.
Con
Configuration does not work well for all cases of multiple failures. If one Node 1 fails,
Node 2 will host two application instances and Nodes 3 and 4 will host one application
instance. If Node 2 then fails, Node 3 will be hosting three application instances and
Node 4 will be hosting one instance
Con
Not well suited to heavy-weight applications since multiple instances may end up being
hosted on the same node even if there are lightly-loaded nodes.
Failover rings are supported by server clusters on the Windows Server 2003 release. This
is done by defining the order of failover for a given group using the preferred owner list.
A node order should be chosen and then the preferred node list should be set up with each
group starting at a different node.
Random
In large clusters or even 4-node clusters that are running several applications, defining
specific failover targets or policies for each application instance can be extremely
cumbersome and error prone. The best policy in some cases is to allow the target to be
chosen at random, with a statistical probability that this will spread the load around the
cluster in the event of a failure.
Configuration has pros and cons:
Pro
Good for clusters that are supporting several small application instances where the
capacity of any node is large enough to support several at the same time.
Pro
Does not require an administrator to decide where any given application should failover
to.
Pro
Provided that there are sufficient applications or the applications are partitioned finely
enough, this provides a good mechanism to statistically load balance the applications
across the cluster in the event of a failure.
Pro
Configuration works well for multiple failures.
Pro
Very well tuned to handling multiple applications or many instances of the same
application running in the same cluster well.
Con
Can be difficult to plan capacity. There is no real guarantee that the load will be balanced
across the cluster.
Con
Effect on performance of a node failure is not easy to predict.
Con
Not well suited to heavy-weight applications since multiple instances may end up being
hosted on the same node even if there are lightly-loaded nodes.
The Windows Server 2003 release of server clusters randomizes the failover target in the
event of node failure. Each resource group that has an empty preferred owners list will be
failed over to a random node in the cluster in the event that the node currently hosting it
fails.
Customized control
There are some cases where specific nodes may be preferred for a given application
instance.
Configuration has pros and cons:
Pro
Administrator has full control over what happens when a failure occurs.
Pro
Capacity planning is easy, since failure scenarios are predictable.
Con
With many applications running in a cluster, defining a good policy for failures can be
extremely complex.
Con
Very hard to plan for multiple cascaded failures.
Server clusters provide full control over the order of failover using the preferred node list
feature. The full semantics of the preferred node list can be defined as:
The diagram shows two clusters sharing a single storage controller. Each cluster is in its
own zone. The LUNs presented by the storage controller must be allocated to individual
clusters using fine-grained security provided by the storage controller itself. LUNs must
be setup so that every LUN for a specific cluster is visible and accessible from all nodes
of the cluster. A LUN should only be visible to one cluster at a time. The cluster software
itself takes care of ensuring that although LUNs are visible to all cluster nodes, only one
node in the cluster accesses and mounts the disk at any point in time.
The multi-cluster device test used to qualify storage configurations for the multi-cluster
HCL list tests the isolation guarantees when multiple clusters are connected to a single
storage controller in this way.
Q. Can a cluster server boot from a SAN?
A. Yes, however, there is a set of configuration restrictions around how Windows boots
from a storage area network. For more information, see article 305547 in the Microsoft
Knowledge Base (http://go.microsoft.com/fwlink/?linkid=67837).
Server clusters require that the startup disk, page file disk and system disk be on a
different storage bus to the cluster server disks. To boot from a SAN, you must have a
separate HBA for the boot, system and pagefile disks than the cluster disks. You MUST
ensure that the cluster disks are isolated from the boot, system and pagefile disks by
zoning the cluster disks into their own zone.
Q. Can I use multiple paths to SAN storage for high availability?
A. Microsoft does not provide a generic driver that allows multiple paths to the storage
infrastructure for high availability; however, several vendors have built their own
proprietary drivers that allow multiple HBAs and SAN fabrics to be used as a highly
available storage infrastructure. For a Server cluster that has multi-path drivers to be
considered supported, the multipath driver MUST appear as part of the complete cluster
solution on the Cluster Hardware Compatibility List (HCL). NOTE: The driver version is
VERY important and it MUST match the qualified version on the HCL.
Q. Can the startup disk, pagefile disks and the cluster disks be on the same SAN fabric?
A. No, in Windows Server 2003, there is a registry key that allows the startup disk,
pagefile disks, and cluster disks to be on the same bus. This feature is enabled by a
registry key, which helps ensure that it is not accidentally enabled by customers who do
not understand the implications of this configuration. It is intended for OEMs to ship
qualified and tested configurations and not for a typical end-user or administrator to set
up in an ad hoc manner.
In the original release of Windows Server 2003, the registry key is:
HKLM\SYSTEM\CurrentControlSet\Services\ClusSvc\Parameters\ManageDisksOnSyste
mBuses 0x01
In Windows Server 2003 with Service Pack 1 (SP1), the registry key is:
HKLM\SYSTEM\CurrentControlSet\Services\ClusDisk\Parameters\ManageDisksOnSyst
emBuses 0x01
In Windows Server 2003 SP1, the key path was changed to use “Clusdisk” as a subkey
instead of “ClusSvc.” This change was made to avoid issues during setup. However, the
change is backward compatible, and systems that use the old key locations do not need to
be modified.
Q. Can serverless backup be performed against cluster disks?
A. No, the cluster disk arbitration mechanism uses SCSI reserve and release operations.
Once a server arbitrates for a cluster disk, that disk cannot be accessed by any other
server on the storage network.
Network Attached Storage (NAS) questions
Q. What is Network Attached Storage (NAS)?
A. Network attached storage (NAS) is an alternative way to connect storage to servers
that is built using standard network components such as Ethernet or other LAN
technologies. The application servers access storage using file system functions such as
open file, read file, write file, close file, etc.. These higher-level functions are
encapsulated in protocols such as CIFS, NFS or AppleShare and run across standard IP-
based connections.
Q. Can Server clusters use NAS for the shared storage?
A. Yes, providing the applications can store data on file shares and the file shares are
accessible to the applications as they failover across the cluster, there is no reason why
NAS cannot be used as the storage solution in a cluster.
There is currently no support in Windows to use NAS as the quorum resource.
In Windows Server 2003, we are providing a new quorum resource Majority Node Set
that can be used to remove the need for a shared disk for the quorum resource. If you
combine NAS storage with Majority Node Set quorum, you can build a failover cluster
that does not require shared disks in the traditional sense of SCSI or SAN.
Highly Available File Servers
Q. Can I have an active/active file server?
A. The Windows 2000 resource kit contains a tool ClusTool that can be used to migrate
file share settings from a single node to a cluster environment.
Q. Can FRS be used to replicate clustered file shares?
A. No, the file replication service (FRS) provided by Windows cannot be used to
replicate a clustered file share. This means that clustered file shares cannot be the source
or target for redundant links in a DFS tree. See the online documentation for DFS for
more details.
Q. What file system types are supported in a cluster?
A. All partitions on clustered disks should be formatted with NTFS.
Q. Does client-side caching (offline folders) work with Server clusters?
A. Yes, in Windows Server 2003, you can select client-side caching (also know as offline
folders) for clustered file shares.
Q. Is the Encrypting File System (EFS) supported on cluster disks?
A. With Windows Server 2003, the encrypting file system (EFS) is supported on
clustered file shares. To enable EFS on a clustered file share, you must perform a number
of tasks to configure the environment correctly:
· EFS can only be enabled on file shares when the virtual server has Kerberos enabled. By
default, Kerberos is not enabled on a virtual server. To enable Kerberos you must check
the Enable Kerberos Authentication check box on the network name resource that will be
used to connect to the clustered file share. NOTE: Enabling Kerberos on a network name
has a number of implications that you should ensure you fully understand before
checking the box.
· All cluster node computer accounts, as well as the virtual server computer account, must
be trusted for delegation. See online help for how to do this.
· To ensure that the users private keys are available to all nodes in the cluster, you must
enable roaming profiles for users who want to store data using EFS. See online help for
how to enable roaming profiles.
Once the cluster file shares have been created and the configuration steps above carried
out, users data can be stored in encrypted files for added security.
Q. How many file shares can be hosted on a cluster?
A. The number of file shares in a cluster depends on the number of nodes in the cluster
and the failure scenarios that you are trying to protect against. A single server has a limit
for the number of file shares it can support so you need to take that into account when
planning your cluster.
In a 2-node cluster, if one node fails, the remaining node must pick up all of the file
shares. Therefore, to ensure the highest availability, the cluster should host the maximum
number of shares that can be hosted by a single node.
Note
2-node Server clusters are focused on high availability, not scale-out, therefore you
should not expect to hold more shares on a 2-node cluster than a single node.
In a 4-node cluster, you have other options that may be more appropriate, depending on
the failure scenarios that you wish to protect against. For example, if you wish to survive
one node failing at any point in time, you can configure the shares so that if one node
fails, its work is spread across the remaining three nodes. This means that each node
could be loaded to 66% of the maximum number of shares and still be within the
maximum limit of a single node in the event of a single failure. In this case, the cluster
can host three times the number of shares that a single server can host. If you wish to
survive two nodes failing, then a 4-node cluster can hold twice as many shares (since if
two nodes fail, the remaining two nodes need to pick up the load from the two failed
servers) and so on.
In general, as the number of nodes in a cluster increases, the more options you have and
the more you can use server clusters to scale-out a highly available infrastructure.
Q. What is the maximum capacity of a cluster disk?
A. Server cluster does not impose any restrictions on the size of a volume supported.
Q. How many disks can Server cluster support?
A. In Windows 2000, each clustered disk had to have a drive letter assigned to it,
therefore the maximum number of clustered disks in a single cluster was limited to 23
volumes (26 letters of the alphabet minus A and B [Floppy drives] and C [system/boot
drive]).
In Windows Server 2003, there is no longer a requirement for a clustered disk to have a
driver letter assigned, therefore the number of disks is limited by the number that can be
physically attached and the number supported by the underlying operating system.
Note
Applications can access disks with no drive letters in one of two ways a) directly using
the object name associated with the disk or more likely b) by using mount points to link
multiple disks together that can be accessed using a single drive letter.
Q. How can a cluster support more disks than there are drive letters?
A. Using file system mount points. For more information about using mount points with
clustered disks see the online help for Windows Server 2003.
Q. Why can I browse shares owned by different virtual servers?
A. File shares are not scoped by the virtual server name that is hosting them. If you use a
browsing tool (e.g. the NET VIEW command) you will see all the shares that are
currently hosted on the physical node.
Highly Available Print Servers
Q. How do I cluster a printer?
A. Printers can be clustered using the Print Spooler cluster resource. The Windows 2000
and the Windows Server 2003 online help both give specific examples and the steps
necessary to create a highly available print server.
Q. Can I have active/active print servers?
A. Yes, it is possible to host multiple print spoolers on a single Server cluster. The
spoolers can be failed over independently and can run concurrently on multiple nodes in
the cluster.
Q. How do I migrate printer settings from a single server to a cluster?
A. Microsoft provides a tool (Print Migrator) as part of the ResKit that can be used to
migrate printer settings from one node to another or from one node to a Server cluster.
Q. How many printer resources can be hosted on a cluster?
A. The number of printers is limited by the number of resources the cluster can support,
however, as the number of printers increases, so will the time to failover.
Removing all Single Points of Failure
Q. What other services does the server cluster rely on?
A. The cluster service itself relies on being able to authenticate and sign communications
traffic between the cluster nodes. It uses the domain infrastructure to authenticate using
the cluster service account. In an environment with Server clusters installed, you must
ensure that the domain infrastructure is highly available; any disruption to the
infrastructure can result in the clusters becoming unavailable.
Q. What other services do I need to think about?
A. In order for applications to remain highly available in a clustered environment, any
services that the application requires external to the cluster must also be highly available.
Many of these services have mechanisms such as replication or being made cluster-aware
themselves to protect against failures. Examples of services that you should think about
include WINS, DNS, DHCP, the domain infrastructure, firewalls, etc.
Q. What other single points of failure should I protect against?
A. Server clusters are a mechanism that protects applications against hardware, operating
system and application failures. There are some types of hardware failure that you should
think about:
· Disk failures you should use RAID or mirroring to protect against disk failures
· Hardware failures multiple hot swap fans in the server, redundant power supplies etc.
· Network failures redundant networks that do not have any shared components
· Site failures disaster recovery plans
Active Directory, DNS and Domain Controllers
Q. Is Kerberos authentication possible for services hosted on a cluster?
A. Yes, in Windows 2000 SP3 and above and Windows Server 2003, the cluster service
publishes a computer object in Active Directory. This provides the infrastructure with
sufficient state to allow Kerberos authentication against applications and services hosted
in a virtual server.
For more information about Kerberos and how it works, see the TechNet web site
(http://go.microsoft.com/fwlink/?linkid=67842).
Q. Can cluster servers also be domain controllers?
A. Yes, however, there are several caveats that you should fully understand before taking
this approach. We recommend that Server cluster nodes are not domain controllers and
that you co-locate a domain controller on the same subnet as the Server cluster public.
If you must make the cluster nodes into domain controllers, consider the following
important points:
· If one cluster node in a 2-node cluster is a domain controller, all nodes must be domain
controllers. It is recommended that you configure at least two of the nodes in a 4-node
Datacenter cluster as domain controllers.
· There is overhead that is associated with the running of a domain controller. A domain
controller that is idle can use anywhere between 130 to 140 megabytes (MB) of RAM,
which includes the running of Windows Clustering. There is also replication traffic if
these domain controllers have to replicate with other domain controllers within the
domain and across domains. Most corporate deployments of clusters include nodes with
gigabytes (GB) of memory so this is not generally an issue.
· If the cluster nodes are the only domain controllers, they each have to be DNS servers as
well, and they should point to each other for primary DNS resolution, and to themselves
for secondary DNS resolution. You have to address the problem of the ability to not
register the private interface in DNS, especially if it is connected by way of a crossover
cable (2-node only). For information about how to configure the heartbeat interface refer
to article 258750 in the Microsoft Knowledge Base (http://go.microsoft.com/fwlink/?
LinkID=46549). However, before you can accomplish step 12 in KB article 258750, you
must first modify other configuration settings, which are outlined in article 275554
(http://go.microsoft.com/fwlink/?LinkID=67844).
If the cluster nodes are the only domain controllers, they must each be Global Catalog
servers, or you must implement domainlets.
· The first domain controller in the forest takes on all flexible single master operation
roles (refer to article 197132 at http://go.microsoft.com/fwlink/?LinkID=67847). You can
redistribute these roles to each node. However, if a node fails over, the flexible single
master operation roles that the node has taken on are no longer available. You can use
Ntdsutil to forcibly take away the roles and assign them to the node that is still running
(refer to article 223787 at http://go.microsoft.com/fwlink/?LinkID=67851). Review
article 223346 at http://go.microsoft.com/fwlink/?LinkID=19807) for information about
placement of flexible, single master operation roles throughout the domain.
· If a domain controller is so busy that the Cluster service is unable to gain access to the
Quorum drive as needed, the Cluster service may interpret this as a resource failure and
cause the cluster group to fail over to the other node. If the Quorum drive is in another
group (although it should not be), and it is configured to affect the group, a failure may
move all group resources to the other node, which may not be desirable. For more
information regarding Quorum configuration, please refer to the article 280345 listed in
the "Reference" section (http://go.microsoft.com/fwlink/?LinkID=67855).
· Clustering other programs such as SQL Server or Exchange Server in a scenario where
the nodes are also domain controllers, may not result in optimal performance due to
resource constraints. You should thoroughly test this configuration in a lab environment
prior to deployment.
· You may want to consider making cluster nodes domain controllers (refer to KB article
171390 at http://go.microsoft.com/fwlink/?LinkID=67857 for more information), but if a
domain controller is already local, or there is a reliable high-speed connectivity to a
domain controller available, Microsoft does not recommend implementing them on
cluster nodes.
Note
You must promote a cluster node to a domain controller by using the Dcpromo tool prior
to installing Windows Clustering.
· You must be extremely careful when demoting a domain controller that is also a cluster
node. When a node is demoted from a domain controller, the security settings and the
user accounts are radically changed (user accounts are demoted to local accounts for
example).
Q. Are virtual servers published in active directory?
A. Yes, in Windows 2000 SP3 and above and in Windows Server 2003, each virtual
server has the option of being published in active directory.
Although the network name server cluster resource publishes a computer object in active
directory, that computer object should NOT be used for administration tasks such as
applying Group Policy. The ONLY role for the virtual server computer object in
Windows 2000 and Windows Server 2003 is to allow Kerberos authentication and
delegation and for cluster-aware, active directory-aware services (such as MSMQ) to
publish service provider information.
Q. Is the cluster configuration stored in active directory?
A. No, at this time there is no cluster information other than the computer objects for
virtual servers published in Active directory.
Q. Do Server clusters make domain controllers highly available?
A. No, domain controllers use replication across a set of servers to achieve high
availability.
Q. How should my DNS server be configured to work with Server clusters?
A. The cluster service account needs to be able to publish records. In a secure, DNS
backed zone, the DNS administrator can chose to restrict the access rights for users. The
cluster service account must be granted permission to create records or alternatively, the
records can be pre-created. If the records are pre-created, you should not set the zone to
dynamic update.
Security Considerations (Server Clusters: Frequently Asked Questions for Windows 2000
and Windows Server 2003)
Q. How do I update the cluster service account password?
A. The cluster service account on ALL nodes in the cluster must match to ensure that the
intra-cluster communication can be successfully authenticated. The cluster service itself
sends messages between cluster nodes under a variety of conditions and if any of those
communications fail, the cluster node will be removed from the cluster (i.e. the cluster
service will be stopped). It is not possible to determine when the cluster service will
establish communication and therefore there is no clear window that allows the cluster
service account to be changed in a reliable way while ensuring that the cluster remains
running.
Windows 2000
On Windows 2000, the cluster account password can only be reliably changed using the
following steps:
1. Stop the cluster service on ALL nodes in the cluster
2. Change the password of the cluster service account at the domain controller
3. Update the service control manager password on ALL cluster nodes
4. Re-start the cluster service on all the cluster nodes
Windows Server 2003
The cluster.exe command on Windows Server 2003 has the ability to change the cluster
account password dynamically without shutting down the cluster service on any of the
nodes. The cluster.exe command changes the domain account password and updates the
service control manager account information about all nodes in the cluster.
Cluster
/cluster:cluster_name1[,cluster_name2,]/changepassword[:new_password[,old_password]
] [/skipdc] [/force] [/options]
For more information refer to the online help for Windows Server 2003.
Q. What other security considerations and best practices do I need to worry about for
Server clusters?
A. For security best practices, see the online help for Windows Server 2003.
In-the-box HA Services
Q. What highly available operating system services are provided on the Windows
release?
A. Server clusters following highly available services by default in the Windows
operating system:
· IP Address and Network Name: highly available network configuration to allow clients
to location independent and failover unaware
· DHCP: Highly available DHCP server
· MSDTC: Highly available distributed transaction coordinator
· IIS: Highly available web server and FTP server*
· File Share: Highly available file share service and DFS
· Message Queue: Highly available MSMQ service
· MSMQ triggers: Highly available MSMQ trigger service (new for Windows Server
2003)
· Print Spooler: Highly available printer service
· WINS: Highly available WINS service
*In Windows Server 2003, IIS is made cluster-aware using the generic script resource
and the scripts provided. There is no specific IIS resource type.
Q. Are MSMQ triggers supported in a Server cluster?
A. Yes, in Windows Server 2003, the MSMQ trigger service can be made highly
available using Server clusters.
Q. Is IIS cluster-aware?
A. Yes, in Windows 2000, IIS web sites and FTP services can be made highly available
using the IIS Server Instance resource type. In Windows Server 2003, the IIS Server
Instance resource type was replaced with a set of generic scripts provided in the Windows
Server 2003 release (see the online help for more information about converting IIS web
servers and FTP servers from Windows 2000 to Windows Server 2003).
Although IIS web servers can be made highly available by failover using Server
clustering, Microsoft recommends that you use a load balancing cluster such as provided
by Network Load Balancing (NLB), another cluster mechanism provided by the
Windows operating system to make IIS highly available and to scale-out a web service or
web farm.
Depending on the access characteristics, you may choose either Server clusters or
Network Load Balancing clusters to provide highly available FTP servers. Server
clustering is good for FTP sites with high update rates or where you want to have a single
copy of the FTP content. Network Load Balancing is good for mainly read-only FTP
Servers.
Q. How is the IIS metabase kept consistent across the cluster?
A. The Windows operating system comes with a tool (IISSync) that allows the IIS
metabase to be kept in sync across the nodes in the cluster. For more details see the
online help.
Geographically Dispersed Clusters
Q. Can Server clusters span multiple sites?
A. Yes, Server clusters support a single cluster spanning multiple sites. This is known as
a geographically dispersed cluster. All qualified geographically dispersed cluster
solutions appear on the Microsoft Hardware Compatibility list (HCL)
(http://go.microsoft.com/fwlink/?LinkID=67738). Only cluster solutions listed on the
HCL are supported by Microsoft.
Q. How is a geographically dispersed cluster defined?
A. A geographically dispersed cluster is a Server cluster that has the following attributes:
1. Has multiple storage arrays, at least one deployed at each site. This ensures that in the
event of failure of any one site, the other site(s) will have local copies of the data that
they can use to continue to provide the services and applications.
2. Nodes are connected to storage in such a way that in the event of a failure of either a
site or the communication links between sites, the nodes on a given site can access the
storage on that site. In other words, in a two-site configuration, the nodes in site A are
connected to the storage in site A directly and the nodes in site B are connected to the
storage in site B directly. The nodes in site A con continue without accessing the storage
on site B and vice-versa.
3. The storage fabric or host-based software provides a way to mirror or replicate data
between the sites so that each site has a copy of the data. Different levels of consistency
are available.
The following diagram shows a simple two-site cluster configuration.
The disks that make up the majority node set could, in principle be local disks physically
attached to the nodes themselves or disks on a shared storage fabric. In the majority node
set implementation that is provided as part of Server clusters in Windows Server 2003,
every node in the cluster uses a directory on its own local system disk to store the quorum
data. If the configuration of the cluster changes, that change is reflected across the
different disks. The change is only considered to have been committed (i.e. made
persistent), if that change is made to:
(/2) + 1
This ensures that a majority of the nodes have an up-to-date copy of the data. The cluster
service itself will only start up, and therefore bring resources on line, if a majority of the
nodes configured as part of the cluster are up and running the cluster service. If there are
fewer nodes, the cluster is said not to have quorum and therefore the cluster service waits
(trying to restart) until more nodes try to join. Only when a majority or quorum of nodes,
are available, will the cluster service start up the resources be brought online. This way,
since the up-to-date configuration is written to a majority of the nodes, regardless of node
failures, the cluster will always guarantee that it starts up with the latest and most up-to-
date configuration.
Cluster-Aware Applications
Q. What is a Cluster Aware Application?
A. A cluster-aware application is an application that calls the cluster APIs to determine
the context under which it is running (such as the virtual server name etc.) and can
failover between nodes for high availability.
Can applications that were not written for a cluster be made highly available?
Yes, Server clusters provide a plug-in environment that allows resource dlls to provide
the necessary control and health monitoring functions to make existing applications
highly available.
Server clusters provide a set of generic resource types that can be used to make existing
applications failover in a cluster. In Windows 2000 there are two generic resource types:
Generic application
allows any application to be started, stopped and monitored by the cluster service
Generic Service
allows an existing Windows Service to be started, stopped and monitored.
These generic services provide very rudimentary health monitoring (for example, is the
process that was started still a valid process on the system). It does not check that the
application is servicing requests since this requires specific knowledge of the application.
The generic resources can be used to make applications failover relatively quickly;
however, to provide a more appropriate health check, Microsoft recommends that you
build an application-specific resource dll.
In Windows Server 2003, we have provided an additional resource type (Generic Script)
that allows the start/stop and health monitoring functions to be implemented as scripts
rather than using C or C++. This makes the job of building application-specific resource
plug-ins much more manageable and easier.
Q. How do I build a cluster-aware application?
A. Server clusters provides a rich API set that allows applications to recognize and utilize
the cluster environment. These APIs are fully documented in the Platform SDK.
Q. Should I use the Generic Service or Generic Application resource to make my
application highly available?
A. The generic services provide very rudimentary health monitoring (for example, is the
process that was started still a valid process on the system). It does not check that the
application is servicing requests since this requires specific knowledge of the application.
The generic resources can be used to make applications failover relatively quickly;
however, to provide a more appropriate health check, Microsoft recommends that you
build an application-specific resource dll.
Q. Does Microsoft validate or logo software products that work with Server clusters?
A. Yes, Server clustering is an optional component of the Windows Advanced Server
logo program. Applications can be logoed as working on a Server cluster.
Q. What Microsoft Applications are cluster-aware?
A. The following services shipped as part of the Windows operating system are cluster-
aware:
· DHCP Highly available DHCP server
· MSDTC Highly available distributed transaction coordinator
· IIS Highly available web server and FTP server*
· File Share Highly available file share service and DFS
· Message Queue Highly available MSMQ service
· MSMQ triggers Highly available MSMQ trigger service (new for Windows Server
2003)
· Print Spooler Highly available printer service
· WINS Highly available WINS service
The following additional Microsoft Products are cluster-aware:
· SQL Server 6.5, 7.0, 2000 and upwards
· Exchange Server 5.5 and upwards
· Services for Unix 3.0 and upwards
Q. Does Exchange 2000 support active/active clusters?
A. Yes, there are some caveats to supporting Exchange 2000 in an active/active
configuration.
Q. Does SQL Server support active/active clusters?
A. Yes, SQL Server allows the following:
· Multiple nodes in a cluster hosting different databases. Each database can be failed over
independently.
· Multiple nodes in a cluster hosting partitions of a single database using database views
to tie the different instances into a single logical database from a client perspective.
Q. Where do I find information about writing cluster-aware applications?
A. The cluster concepts and APIs are fully documented in the Platform SDK. In addition,
there are several examples in the Platform SDK that can be used to demonstrate Server
cluster integration.
Q. Is Services for Macintosh (SFM) supported in a Server cluster?
A. No, Services for Macintosh is not supported in a Server cluster.
Q. Is Services for Unix (SFU) supported in a Server cluster?
A. Yes, Services for Unix supports highly available NFS shares in SFU 3.0.
Miscellaneous Topics
Q. Can Server clusters and Network Load Balancing be used on the same set of servers?
A. No, Microsoft Server clusters (MSCS) and Network Load Balancing (NLB) are not
supported on the same set of nodes. Both Server clusters and Network Load Balancing
clusters control and configure network adapters. Since they are not aware of each other,
configuring one can interfere with the other.
Q. Can I use antivirus software with a Server cluster?
A. Yes, you should make sure that the vendor has tested their solution in a Server cluster
environment. Antivirus software typically layers into the storage stack as a disk driver.
This can have an impact on the clusters ability to failover a disk if the driver does not
support the required features.
Q. Does Microsoft provide a Distributed Lock Manager (DLM)?
A. No, at this time, Microsoft has no plans to release a distributed lock manager,
however, that may change if there is sufficient customer demand for a DLM service.
Note
Do not confuse a distributed lock manager with a cluster file system. A cluster file system
can be built in a number of ways, using a lock manager is one of them. However, just
providing a lock manager does not solve the cluster file system problem.
Q. Will Microsoft provide a shared disk cluster file system?
A. Microsoft is continually looking at ways to improve the services it provides on the
Windows operating system. A shared disk cluster file system is a way to provide a
number of attributes in a cluster:
· A single file system namespace visible to all applications on all nodes in the cluster
· High speed access to disks from any node in the cluster
Q. How do Server clusters and Fault tolerant servers relate?
A. Server clusters address a number of availability issues:
· Hardware failures
· Operating system failures
· Application failures
· Site failures
· Operating system and application upgrades
Fault tolerant servers provide an extremely reliable server platform that addresses
hardware failures by providing redundancy at the hardware level. In some cases, fault
tolerant servers can be used to address site failures.
In and of themselves, fault tolerant servers do not address issues relating to operating
system and application monitoring and failure recovery, nor do they address upgrading
the operating system or applications without taking the service down.
In summary, Server clusters are about providing high availability, fault tolerant servers
provide high reliability. By combining highly reliable, fault tolerant servers with Server
clusters, you get the best of both worlds; a set of reliable servers that can provide high
availability in the face of operating system and application failures and upgrades.
Q. How do I find Server cluster KB Articles?
A. All cluster KB articles can be found at http://go.microsoft.com/fwlink/?LinkID=538
· All Windows NT 4.0 related articles have keyword "MSCS"
· All Windows 2000 articles have keyword "W2000MSCS"
This should allow easy selection of Server cluster related articles
comments (0)
TOP
9:46 PM
A person is defined in three ways: (1) who he is right now, (2) what he has done in the
past, and (3) what he will become in the future.
So, here is how you answer: (1) I am a [the job title for which you are applying or
something very close.] (2) I have [how many years of experience] in [what field, what
subject]. (3) I want to be [a job title that is a couple or a few levels above the current
position for which you are applying in 5 to 10 years.]
Close your answer with an affirmative question: "Is there anything else you want to
know?"
Here are more suggestions for answering this very common interview question.
• You should be very straight forward and honest in replying to this question. The
interviewer wants to check if what you have mentioned in your resume is correct
or not.
• I would answer the question based on who is interviewing me? If it's a sales
manager/Technical Manager/Human resources manager? Depending on the
person's field I'll have to mend the answer to please him...I feel that everyone's
goals are different...so anlayse that and then answer.
• Answer this question with your 30 second "elevator speach" about yourself. The
standard format for this speech is... "I am a (BLANK), who does (WHAT)." In
my case... I am a PROJECT MANAGER, who PROVIDES QUALITY
MANAGEMENT SOLUTIONS, Blah, Blah, Blah. (you get the idea).
• The Answer can Start like this: "I have 10 years' sales rep experience, working in
a variety of industries, from retail to advertising. For the past two years I have
been working in the food industry. In addition to my successful sales techniques, I
have a great record for forming long-standing relationships with customers. I'm a
team player who thrives on challenge."
• Let me share what my recruiting office tells its candidates as they head out for
that crucial face-to-face interview. When asked to "tell me about yourself," say, "I
will gladly answer that question, but may I first ask you a question? (They
ALWAYS say yes) So that I may better focus my answer, what are the issues you
want me to address should you hire me? Once they share with you what they need
to have you do, then proceed to address how your training, education, skills, and
experience can best resolve these issues. By answering in this fashion, you have
proven that you know how to focus ... and that you have what's needed to fix the
issues they need to have fixed. It's always a winner ... and beats the heck out of,
"Well, let's see, I was born on a small farm in Idaho ..."
• I am a self-starter dedicated, hard-working person who works well with other,
punctual, detail oriented a team player, great organizational and interpersonal
skills.
Answer
Tell Me About Yourself
It's one of the most frequently asked questions in an interview: Tell me about yourself.
Your response to this request will set the tone for the rest of the interview. For some, this
is the most challenging question to answer, as they wonder what the interviewer really
wants to know and what information they should include.
Eleanor dreaded this question. When it was the first one asked at her interview, she
fumbled her way through a vague answer, not focusing on what she could bring to the
job.
"I'm happily married and originally from Denver," she began. "My husband was
transferred here three months ago, and I've been getting us settled in our new home. I'm
now ready to go back to work. I've worked in a variety of jobs, usually customer service-
related. I'm looking for a company that offers growth opportunities."
The interview went downhill after that. She had started with personal information and
gave the interviewer reason to doubt whether she was an employee who would stay for
very long.
* She's married, and when her husband gets transferred that means she has to leave; she
did it once and can do it again.
* She has some work experience with customers but didn't emphasize what she did.
* She is looking to grow. What about the job she is applying for? Will she stay content
for long?
The secret to successfully responding to this free-form request is to focus, script and
practice. You cannot afford to wing this answer, as it will affect the rest of the interview.
Begin to think about what you want the interviewer to know about you.
Focus
List five strengths you have that are pertinent to this job (experiences, traits, skills, etc.).
What do you want the interviewer to know about you when you leave?
Eleanor is strong in communications and connecting with people. She has a strong
background and proven success with customer relationships. Her real strength is her
follow-through. She prides herself on her reputation for meeting deadlines.
Scripting
Prepare a script that includes the information you want to convey. Begin by talking about
past experiences and proven success:
"I have been in the customer service industry for the past five years. My most recent
experience has been handling incoming calls in the high tech industry. One reason I
particularly enjoy this business, and the challenges that go along with it, is the
opportunity to connect with people. In my last job, I formed some significant customer
relationships resulting in a 30 percent increase in sales in a matter of months."
"My real strength is my attention to detail. I pride myself on my reputation for following
through and meeting deadlines. When I commit to doing something, I make sure it gets
done, and on time."
"What I am looking for now is a company that values customer relations, where I can join
a strong team and have a positive impact on customer retention and sales."
Practice
Practice with your script until you feel confident about what you want to emphasize in
your statement. Your script should help you stay on track, but you shouldn't memorize it
-- you don't want to sound stiff and rehearsed. It should sound natural and conversational.
Even if you are not asked this type of question to begin the interview, this preparation
will help you focus on what you have to offer. You will also find that you can use the
information in this exercise to assist you in answering other questions. The more you can
talk about your product -- you -- the better chance you will have at selling it.