|
INTERVIEW QUESTIONS
SERVERS
DETAILS
Question: How would you recover Exchange server when the log file is corrupted ?
Answer: Atomic: This ascertains that all of the required operations take place successfully or none of them will take place. Consistent: A transaction when committed to the database is responsible to bring it into consistent state. Isolated: If changes are done in one transaction, it will not affect the other transaction out of its scope. Also, changes will be visible only when transaction is committed to database. Durable: Even if the system crashes or any hardware failure occurs, the transactions that are committed to database will remain safe. A transaction will be committed to Extensible Storage Engine (ESE) database only when it passes the durability test. Moreover, a transaction must reach log file on disk by its transition from memory. Consider an example: An email from Inbox folder has to be moved into folder named "New". In this case, following logical operations will be processed by Exchange Server:
Delete email from Inbox Folder. Insert that email into New Folder. Update both the folders to reflect the changes. Now, this three step procedure of moving an email from folder to another will be counted as one transaction, In case any of the operations fail, no transaction will be logged in the memory or to the log file. This reflects the "Atomic" character of transaction that says either all operations will occur or none will occur.
|
|
|
Category |
Servers Interview Questions & Answers -
Exam Mode /
Learning Mode
|
Rating |
(0.3) By 6943 users |
Added on |
7/22/2016 |
Views |
69157 |
Rate it! |
|
|
Question:
How would you recover Exchange server when the log file is corrupted ?
Answer:
Atomic: This ascertains that all of the required operations take place successfully or none of them will take place. Consistent: A transaction when committed to the database is responsible to bring it into consistent state. Isolated: If changes are done in one transaction, it will not affect the other transaction out of its scope. Also, changes will be visible only when transaction is committed to database. Durable: Even if the system crashes or any hardware failure occurs, the transactions that are committed to database will remain safe. A transaction will be committed to Extensible Storage Engine (ESE) database only when it passes the durability test. Moreover, a transaction must reach log file on disk by its transition from memory. Consider an example: An email from Inbox folder has to be moved into folder named "New". In this case, following logical operations will be processed by Exchange Server:
Delete email from Inbox Folder. Insert that email into New Folder. Update both the folders to reflect the changes. Now, this three step procedure of moving an email from folder to another will be counted as one transaction, In case any of the operations fail, no transaction will be logged in the memory or to the log file. This reflects the "Atomic" character of transaction that says either all operations will occur or none will occur. Source: CoolInterview.com
If you have the better answer, then send it to us. We will display your answer after the approval.
Rules to Post Answers in CoolInterview.com:-
- There should not be any Spelling Mistakes.
- There should not be any Gramatical Errors.
- Answers must not contain any bad words.
- Answers should not be the repeat of same answer, already approved.
- Answer should be complete in itself.
|
|
Related Questions |
View Answer |
|
What is MIME & MAPI ?
|
View Answer
|
|
What is scope & super scope?
|
View Answer
|
|
What are FMSO Roles ?
|
View Answer
|
|
During the welding process, the two metal pieces being joined are subject to extreme temperatures and can cause the crystalline structure of the metal to pass through various metallurgical phases. As a result, hardening (and embrittlement) of the metal can occur to varying degrees (usually dependent on carbon content). Heat treatment is designed to reduce the hardness in the heat-affected zone of the metals and increase ductility in these sections. Various pressure vessel codes contain the specifics regarding the procedures for post-weld heat treatment. Heat is usually held for one hour per inch of thickness of the metal. The temperature used is based on the "P-number" of the metals. P-numbers are assigned based on the chemical composition of the metals. Holding temperatures can range from 1100-1350 ?F (593-732 ?C).
|
View Answer
|
|
What is Remote Backup ?
|
View Answer
|
|
What is Mirror Backup ?
|
View Answer
|
|
What are the types of backup?
|
View Answer
|
|
What are the ways to configure DNS & Zones?
|
View Answer
|
|
What is DHCP? How we configure DHCP?
|
View Answer
|
|
IS Stored Function Is Pre-Compiled as Stored Procedure ? If No Why
Posted by: Rahul Khandelwal on 6/18/2011
Contact Rahul Khandelwal
|
View Answer
|
|
How Can i convert the Columns In to Row in a oracle Select Query ?
Posted by: Rahul Khandelwal on 6/18/2011
Contact Rahul Khandelwal
|
View Answer
|
|
What is the order in which GPOs are applied ?
|
View Answer
|
|
What are Group Policy objects (GPOs)?
|
View Answer
|
|
How do you change the DS Restore admin password ?
|
View Answer
|
|
What is the ISTG? Who has that role by default?
|
View Answer
|
|
How to take backup of AD ?
|
View Answer
|
|
What is the ISTG? Who has that role by default?
|
View Answer
|
|
What is the SYSVOL folder?
|
View Answer
|
|
How can hexavalent chromium be removed from aqueous waste streams?
|
View Answer
|
|
What is Active Directory?
|
View Answer
|
Please Note: We keep on updating better answers to this site. In case you are looking for Jobs, Pls Click Here Vyoms.com - Best Freshers & Experienced Jobs Website.
View All Servers Interview Questions & Answers - Exam Mode /
Learning Mode
|