Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

HP Interview Questions
Questions Answers Views Company eMail

what is call centre Job? What is voice and non voice? Who is an eligioble candidate to get Job In call Centers for voice and non voice.

4 10683

. If the product isn’t liquidating else is dumped in dealer how you’ll liquidate?

3 6062

If there isn’t demand of product what you’ll do and what step you’ll going to take?

11 13903

To avoid screen resolution problem while recording,

1 8893

what is BPO? Why shouldyou want to join bpo?

8 17524

What is meant by line item?

5 10143

What tools do we use in documentation in BBP phase?What are the steps in documentation?

3127

Technical Interview Questions – Exchange 2003 1. Tell me a bit about the capabilities of Exchange Server. 2. What are the different Exchange 2003 versions? 3. What's the main differences between Exchange 5.5 and Exchange 2000/2003? 4. What are the major network infrastructure for installing Exchange 2003? 5. What is the latest Exchange 2003 Service Pack? Name a few changes in functionality in that SP. 6. What are the disk considerations when installing Exchange (RAID types, locations and so on). 7. You got a new HP DL380 (2U) server, dual Xeon, 4GB of RAM, 7 SAS disks, 64-bit. What do you do next to install Exchange 2003? (you have AD in place) 8. Why not install Exchange on the same machine as a DC? 9. Are there any other installation considerations? 10. How would you prepare the AD Schema in advance before installing Exchange? 11. What type or permissions do you need in order to install the first Exchange server in a forest? In a domain? 12. How would you verify that the schema was in fact updated? 13. What type of memory optimization changes could you do for Exchange 2003? 14. How would you check your Exchange configuration settings to see if they're right? 15. What are the Exchange management tools? How and where can you install them? 16. What types of permissions are configurable for Exchange? 17. How can you grant access for an administrator to access all mailboxes on a specific server? 18. What is the Send As permission? 19. What other management tools are used to manage and control Exchange 2003? Name the tools you'd use. 20. What are Exchange Recipient types? Name 5. 21. You created a mailbox for a user, yet the mailbox does not appear in ESM. Why? 22. You wanted to change mailbox access permissions for a mailbox, yet you see the SELF permission alone on the permissions list. Why? 23. What are Query Based Distribution groups? 24. What type of groups would you use when configuring distribution groups in a multiple domain forest? 25. Name a few configuration options for Exchange recipients. 26. What's the difference between Exchange 2003 Std. and Ent. editions when related to storage options and size? 27. Name a few configuration options related to mailbox stores. 28. What are System Public Folders? Where would you find them? 29. How would you plan and configure Public Folder redundancy? 30. How can you immediately stop PF replication? 31. How can you prevent PF referral across slow WAN links? 32. What types of PF management tools might you use? 33. What are the differences between administrative permissions and client permissions in PF? 34. How can you configure PF replication from the command prompt in Exchange 2003? 35. What are the message hygiene options you can use natively in Exchange 2003? 36. What are the configuration options in IMF? 37. What are virtual servers? When would you use more than one? 38. Name some of the SMTP Virtual Server configuration options. 39. What is a Mail Relay? Name a few known mail relay software or hardware options. 40. What is a Smart Host? Where would you configure it? 41. What are Routing Groups? When would you use them? 42. What are the types of Connectors you can use in Exchange? 43. What is the cost option in Exchange connectors? 44. What is the Link State Table? How would you view it? 45. How would you configure mail transfer security between 2 routing groups? 46. What is the Routing Group Master? Who holds that role? 47. Explain the configuration steps required to allow Exchange 2003 to send and receive email from the Internet (consider a one-site multiple server scenario). 48. What is DS2MB? 49. What is Forms Based Authentication? 50. How would you configure OWA's settings on an Exchange server? 51. What is DSACCESS? 52. What are Recipient Policies? 53. How would you work with multiple recipient policies? 54. What is the "issue" with trying to remove email addresses added by recipient policies? How would you fix that? 55. What is the RUS? 56. When would you need to manually create additional RUS? 57. What are Address Lists? 58. How would you modify the filter properties of one of the default address lists? 59. How can you create multiple GALs and allow the users to only see the one related to them? 60. What is a Front End server? In what scenarios would you use one? 61. What type of authentication is used on the front end servers? 62. When would you use NLB? 63. How would you achieve incoming mail redundancy? 64. What are the 4 types of Exchange backups? 65. What is the Dial-Tone server scenario? 66. When would you use offline backup? 67. How do you re-install Exchange on a server that has crashed but with AD intact? 68. What is the dumpster? 69. What are the e00xxxxx.log files? 70. What is the e00.chk file? 71. What is circular logging? When would you use it? 72. What's the difference between online and offline defrag? 73. How would you know if it is time to perform an offline defrag of your Exchange stores? 74. How would you plan for, and perform the offline defrag? 75. What is the eseutil command? 76. What is the isinteg command? 77. How would you monitor Exchange's services and performance? Name 2 or 3 options. 78. Name all the client connection options in Exchange 2003. 79. What is Direct Push? What are the requirements to run it? 80. How would you remote wipe a PPC? 81. What are the issues with connecting Outlook from a remote computer to your mailbox? 82. How would you solve those issues? Name 2 or 3 methods 83. What is RPC over HTTP? What are the requirements to run it? 84. What is Cached Mode in OL2003/2007? 85. What are the benefits and "issues" when using cached mode? How would you tackle those issues? 86. What is S/MIME? What are the usage scenarios for S/MIME? 87. What are the IPSec usage scenarios for Exchange 2003? 88. How do you enable SSL on OWA? 89. What are the considerations for obtaining a digital certificate for SSL on Exchange? 90. Name a few 3rd-party CAs. 91. What do you need to consider when using a client-type AV software on an Exchange server? 92. What are the different clustering options in Exchange 2003? Which one would you choose and why.

3 11223

i want mcp 290 latest dumps and ccna dumps plse help me can tell me website i will download dump plse give reply

4 11542

If DG runing time Neutral earth connection Dissconect what will be the effect in load and equipments.

3 8017

If DG runing time neutral is disconnected what will be the effect in Engine and Electricial panel.

2 5907

What is transformer break down voltage.And what is flash oil flash point.

1 5167

Why dc Supply used in Control circuit.

12 28021

what phase and neutral.

3 6268

why used in starter in tube ligtht circuit.

4 8521

Post New HP Interview Questions


HP Interview Questions


Un-Answered Questions

In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

2151


What is the use of a date object in javascript?

708


What is the Value of [(3x+8y)/(X-2y)]; If X/2y=2?

796


What is action in google analytics?

119


Types of test in Switchgears, MCC, NGR and DB's how it should be procced. Can anyone give me the details here or email me to pasuvaraj.k@gmail.com

1791






I need a Technical evaluation between Oracle and SAP ? please do a need ful.

1659


What is a quality stage in datastage tool?

773


What are the difference between soft delete & delete in laravel?

465


What is the correct declaration of main?

840


how to use notes pane?

181


What is JDBC Savepoint? How to use it?

808


What is spark database?

249


Why the trigger fires multiple times in single login?

868


What is collection in backbone.js?

5


Which collection allows null values?

605