Free Essay

Deploying an Application Server

In:

Submitted By ademainfested
Words 697
Pages 3
Lesson 1
Deploying an Application Server
Knowledge Assessment
Fill in the Blank
Complete the following sentences by writing the correct word or words in the blanks provided. 1. The storage area networking technology supported by Windows Server 2008 as a lower cost alternative to Fibre Channel is called Internet Small Computer System Interface_(iSCSI). 2. The only server roles discussed in this lesson that are not included with the Windows Server 2008 product are __________ and __________. 3. DHCP and DNS are known as _Infrastructure_ services. 4. To create a searchable catalog of Web services on your network, you would install the Universal Description, Discovery, and Integration (UDDI) role. 5. To create Websites that people can use to collaborate on documents and tasks, you must install the sharepoint role. 6. The feature that enhances fault tolerance by providing multiple data paths to a single server storage device is called __Multipath I/O (MPIO) ___. 7. The Windows Server 2008 file server element that conserves disk space by eliminating duplicate copies of files is called __Single Instance Store (SIS)_. 8. The Application Server role is essentially a superset of the __Web Server (IIS)________ role. 9. To implement Windows Vista desktop themes on a Windows Server 2008 computer, you must install the __Desktop Experience_ feature. 10. The type of activation recommended by Microsoft for medium to large networks with volume licensing agreements is Key Management Service (KMS).
Multiple Choice
Select the correct answer for each of the following questions. Choose all answers that are correct.
1. Which of the following can not be installed from the command line by the ServerManagerCmd.exe utility?
a. Features
b. Applications
c. Roles
d. Role services

2. Which of the following provide(s) UNIX clients with Windows printing capabilities?
a. Internet Printing Client
b. Multipath I/O (MPIO)
c. LPR Port Monitor feature
d. LPD Service role service

3. Which of the following roles must you install with the Fax Server role on a Windows Server 2008 computer?
a. Active Directory Certificate Services
b. UDDI Services
c. Print Services
d. Web Server

4. When a client runs an application on a terminal server, which of the client computer’s resources does the application utilize?
a. The client computer’s memory resources
b. The client computer’s processor resources
c. The client computer’s hard drive resources
d. None of the above

5. Windows Server 2008 requires that you install which of the following features for the Application Server role.
a. NET Framework 3.0 feature
b. Network Load Balancing (NLB)
c. Windows System Resource Manager (WSRM)
d. Windows Process Activation Service (WPAS)

6. Which of the following is a true statement about limitations Microsoft places on the number of roles a Windows Server 2008 computer can support?
a. There are no limitations placed on the number of roles a Windows Server 2008 computer can perform.
b. The number of roles that a Windows Server 2008 computer can run is limited only to the amount of hardware resources available to the server.
c. A Windows Server 2008 computer can perform only one role.
d. None of the above.

7. Which of the following is not true in reference to using the Server Manager console?
a. The Add Roles Wizard and the Add Features Wizard are both accessible from the Server Manager.
b. You must run a separate instance of the Add Roles Wizard for each role you want to install.
c. Server Manager can install multiple roles at once.
d. You must download an update from the Microsoft Downloads Website to add the Streaming Media Services role to the Server Manager console.

8. Which feature(s) must you install when you install the Web Server (IIS) role?
a. Windows Process Activation Service (WPAS)
b. Telnet Client
c. Message Queuing
d. Peer Name Resolution Protocol (PNRP)

9. The TS Gateway role service enables clients on the Internet to access which type of server?
a. Windows Server 2008
b. SMTP Server
c. Telnet Server
d. Windows Server 2008 Terminal Server 10. Which of the following services does a Windows Deployment Services client computer use to locate a WDS server?
a. DHCP
b. DNS
c. Active Directory
d. WINS

Similar Documents

Premium Essay

Deploying-Veritas-Backup-Exe

...PS Series Best Practices Deploying VERITAS™ Backup™ Exec 10 and Auto-Snapshot Manager Abstract This Technical Report describes how to back up and restore NTFS volumes, Microsoft Exchange e-mail, and SQL databases using VERITAS Backup Exec 10, the EqualLogic Auto-Snapshot Manager for Windows VSS provider, and PS Series storage arrays. Copyright © 2005 EqualLogic, Inc. August 2005 EqualLogic is a registered trademark of EqualLogic, Inc. All trademarks and registered trademarks mentioned herein are the property of their respective owners. Possession, use, or copying of the documentation or the software described in this publication is authorized only under the license agreement specified herein. EqualLogic, Inc. will not be held liable for technical or editorial errors or omissions contained herein. The information in this document is subject to change. PS Series Firmware Version 2.1 or later. ii Deploying VERITAS Backup Exec 10 and Auto-Snapshot Manager Table of Contents Technical Report and Software Revision Information......................................................... iv Introduction ............................................................................................................................1 Common Backup and Recovery Configurations ...................................................................2 Backup and Recovery Media .................................................................................................3 Backup to Disk...

Words: 9581 - Pages: 39

Free Essay

Cisco Ccnp Security Training

...Table of Contents Chapter 1 Evaluating the Cisco ASA VPN Subsystem .......................................3 Chapter 2 Deploying Cisco ASA IPsec VPN Solutions ............................. 42 Chapter 3 Deploying Cisco ASA AnyConnect Remote-Access SSL VPN Solutions..............................109 Chapter 4 Deploying Clientless RemoteAccess SSL VPN Solutions ................148 Chapter 5 Deploying Advanced Cisco ASA VPN Solutions .............................184 CCNP Security VPN 642-648 Quick Reference Cristian Matei ciscopress.com [2] CCNP Security VPN 642-648 Quick Reference About the Author Cristian Matei, CCIE No. 23684, is a senior security consultant for Datanet Systems, Cisco Gold Partner in Romania. He has designed, implemented, and maintained multiple large enterprise networks, covering the Cisco security, routing, switching, service provider, and wireless portfolios of products. Cristian started this journey back in 2005 with Microsoft technology and finished the MCSE Security and MCSE Messaging tracks. He then joined Datanet Systems, where he quickly obtained his Security and Routing & Switching CCIE, among other certifications and specializations, such as CCNP, CCSP, and CCDP. Cristian has been a Cisco Certified Systems Instructor (CCSI) since 2007, teaching CCNA, CCNP, and CCSP curriculum courses. In 2009, he received a Cisco Trusted Technical Advisor (TTA) award and became certified as a Cisco IronPort Certified Security Professional (CICSP) on E-mail...

Words: 52748 - Pages: 211

Premium Essay

Nt1330 Unit 1 Application Analysis Paper

...mainly in application delivery networks which consist of WAN Optimization Controllers (WOCs) and Application Delivery Controllers (ADCs). On the data center end Application Delivery Controllers are present to distribute the traffic among servers based on application specific criteria. In the branch office portion of Application Delivery Controllers, WDC are present that uses its advanced compression and flow optimization capabilities to provide application availability, security, visibility, and acceleration. WAN Optimization mitigates the latency and bandwidth limitations of the WAN to provide remote users with access to applications in the data center. IT departments have been trying to take initiatives to meet their business objectives to reduce costs and consolidate resources. WAN optimization...

Words: 587 - Pages: 3

Premium Essay

Silverlight Deployment

...interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording or otherwise), or for any purpose, without the express written permission of Microsoft. Microsoft may have patents, patent applications, trademarks, copyrights or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights or other intellectual property. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places and events depicted herein are fictitious, and no association with any real company, organization,...

Words: 1178 - Pages: 5

Free Essay

Research Paper

...Federation Services is a highly secure, highly extensible, and Internet-scalable identity access solution that allows organizations to authenticate users from partner organizations. Using AD FS in Windows Server 2008, you can simply and very securely grant external users access to your organization’s domain resources. AD FS can also simplify integration between untrusted resources and domain resources within your own organization. Active Directory Lightweight Directory Service (AD LDS), formerly known as Active Directory Application Mode, can be used to provide directory services for directory-enabled applications. Instead of using your organization’s AD DS database to store the directory-enabled application data, AD LDS can be used to store the data. AD LDS can be used in conjunction with AD DS so that you can have a central location for security accounts (AD DS) and another location to support the application configuration and directory data (AD LDS). Using AD LDS, you can reduce the overhead associated with Active Directory replication, you do not have to extend the Active Directory schema to support the application, and you can partition the directory structure so that the AD LDS service is only deployed to the servers that need to support the directory-enabled application. Most organizations use certificates to prove the identity of users or computers, as well as to encrypt data during transmission across unsecured network connections. Active Directory Certificate Services...

Words: 791 - Pages: 4

Premium Essay

It Technicien

...account management, follow up, and sales. ➢ Ability to instruct users with computer and presentation skills. ➢ Ability to write engaging technical documents to assist users in software usage. ➢ Team player making significant contributions to team and individual success. ➢ Utilized thorough knowledge of Internet applications, web page design, and HTML programming to create and maintain interactive, multi-page web sites. Set up an operating system on a UNIX workstation. PROFESSIONAL EXPERIENCE IT SYSTEM ADMINISTRATOR SOGEST-CONSEILS. (February 2012 to July 2013) ➢ Responsible for supporting: Windows XP/Vista/Windows 7/ Office 2003 and 2007, Windows Server, Small Business Server 2003, Active Directory, Backup products, Anti-Virus products, DNS/DHCP, TCP/IP, Ethernet, wireless router and Firewall Configurations. ➢ Diagnosis of desktop, application, networking and infrastructure issues. ➢ Implementing and maintaining RAID-1(Mirror) ➢ Troubleshooting PC’s, laptops and mobile devices. ➢ Working closely with software suppliers to resolve operational issues. ➢ Deploying and Administering SQL SERVER 2008 linked with SAGE SAARI (Accounting and HR Software ) ➢ Performed data backups, restorations, scheduling, and documentation and offsite...

Words: 727 - Pages: 3

Premium Essay

Student

...1.WHAT IS THE PURPOSE OF THE GLOBAL NAMES ZONE IN WINDOWS SERVER 2008 DNS SERVERS? A: "GNZ is intended to aid the retirement of WINS, and it's worth noting that it is not a replacement for WINS. GNZ is not intended to support the single-label name resolution of records that are dynamically registered in WINS, records which typically are not managed by IT administrators. Support for these dynamically registered records is not scalable, especially for larger customers with multiple domains and/or forests. In GNZ, after the creation and enabling of the GlobalNames zone, the administrators must manually create, add, edit and, if required - delete, name records from that zone. GNZ does not support dynamic updates." Read more: http://wiki.answers.com/Q/What_is_the_purpose_of_the_Global_Names_Zone_in_Windows_Server_2008_DNS_servers#ixzz1kzD5eDgb EXPLAIN THE MODIFICATIONS NECESSARY TO DNS FOR ACCOMMODATING READ ONLY DOMAIN CONTROLLERS. HOW IS THIS DIFFERENT FROM THE WAYS DNS HANDLES ORDINARY DOMAIN CONTROLLERS? "Because the DNS server that runs on an RODC cannot directly register client updates, it has to refer the client to a DNS server that hosts a primary or Active Directory-integrated copy of the zone file. This server is sometimes referred to as a "writable DNS server." When a client presents a Find Authoritative Query, which is the precursor to an update request, the DNS server on the RODC uses the domain controller Locator to find domain controllers in the closest site...

Words: 5692 - Pages: 23

Premium Essay

Cersions of Windows Server 2008

...William Walbuck IT221 Research Assignment Part 1 Windows server 2008 comes in different versions because different versions have different features and price ranges to satisfy individual customer needs and wants. Each version has significant features so that customer may choose which one best suits their business needs. For example; Windows Server 2008 Datacenter delivers an enterprise-class platform for deploying business-critical applications and large-scale virtualization on small and large servers. Improve availability, enhance power management, and integrate solutions for mobile and branch workers. Windows Server 2008 Enterprise is an advanced server platform that provides more cost-effective and reliable support for mission-critical workloads. Windows Server 2008 Standard is the most robust Windows Server operating system to date. With built-in, enhanced Web and virtualization capabilities, it is designed to increase the reliability and flexibility of your server infrastructure while helping save time and reduce costs. Windows Web Server 2008 is a powerful Web application and services platform. Featuring Internet Information Services (IIS) 7.5 and designed exclusively as an Internet-facing server, it offers improved administration and diagnostic tools to help reduce infrastructure costs when used with a variety of popular development platforms. Windows HPC Server 2008 , the Microsoft third-generation HPC solution, provides a comprehensive and cost-effective solution...

Words: 874 - Pages: 4

Premium Essay

Meeeerw

...informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Server, Windows Vista, Windows Live, OneCare, MSDN, and the Windows logo and are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Microsoft Corporation • One Microsoft Way • Redmond, WA 98052-6399 • USA Contents Introduction 3 What Is In Service Pack 3 4 Previously Released Functionality 5...

Words: 2299 - Pages: 10

Free Essay

E-Marketing

...Technology provides several opportunities and different channels for businesses to market to products services. Deploying an effective targeted e-marketing campaigns an important strategic decision for businesses to stay competitive and to increase profitability. The three e-business marketing strategies are: e-commerce website, e-marketing and web services using underlying web technologies including Extensible Markup Language, Simple object Access protocol, Web Services Description Language and Universal Descript on, Discovery and International specification using NuSOAP Web Services Toolkit for PHP, HTML, My SQL, HTTP etc. We evaluate the effectiveness of the web technologies used and recommend further functionalities that can improve speed, performance and security. INTRODUCTION E-marketing can be considered to be equivalent to Internet marketing. Most in the industry would look at it this way. However, E-marketing is sometimes considered to have a broader scope since it refers to digital media such as web, e-mail and wireless media, but also includes management of digital customer data and electronic customer relationship management systems (E-CRM systems). Extending these channels to include electronic marketing or e-marketing activities requires proper planning and effective implementation. Small business face more challenges than large business when deploying offline marketing activities due to limited resources, such as huge cost of advertising on magazine, TV, Radio...

Words: 1556 - Pages: 7

Premium Essay

Window Server 2008

...1. Why Windows server 2008 comes in different versions? What is the significance of each version? • Windows server 2008 comes in different versions for different people different Business and different likes or dislikes for each Editions. • The significance of each version is that it fits the needs for each Individual Person are Business, for example a Business with many Cluster would most likely use Windows HPC Server 2008. 2. What are the new features or enhancements made to Windows Server 2008? How is Windows Server 2008 different from Windows 2003? • Technical, security, management and administrative features new to Windows Vista such as the rewritten networking stack (native IPv6, native wireless, speed and security improvements); improved image-based installation, deployment and recovery; improved diagnostics, monitoring, event logging and reporting tools; new security features such as Bit-Locker and ASLR; improved Windows Firewall with secure default configuration; .NET Framework 3.0 technologies, specifically Windows Communication Foundation, Microsoft Message Queuing and Windows Workflow Foundation; and the core kernel, memory and file system improvements. Processors and memory devices are modeled as Plug and Play devices, to allow hot-plugging of these devices. • 2008 has self-healing NTFS file system 2003 do not, In 2003 session creation was a serial operation but with 2008 its parallel.2008 has a better Clean service shutdown.In WS2K8, that 20-second...

Words: 1129 - Pages: 5

Premium Essay

It 255

...Hana Laplant 4/12/12 Unit 4 Assignment 1&2 Enhance an existing it security policy framework Security policy planners must consider and the tasks they must complete to deploy an effective security audit policy in a network that includes computers running Windows 7 or Windows Server 2008 R2. Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them. To be well defined and timely, an auditing strategy must provide useful tracking data on an organization's most important resources, critical behaviors, and potential risks. In a growing number of organizations, it must also provide absolute proof that IT operations comply with corporate and regulatory requirements. Unfortunately, no organization has unlimited resources to monitor every single resource and activity on a network. If you do not plan well enough, you will likely have gaps in your auditing strategy. However, if you try to audit every resource and activity, you may find yourself with far too much monitoring data, including thousands of benign audit...

Words: 1876 - Pages: 8

Premium Essay

Cloud Computing

...to be. In reality, it is merely a culmination of smarter ways of computing and data analysis. IT managers and enthusiasts have been talking about dynamic IT for over 10 years now and finally technology has progressed enough to induce a dynamic IT environment by deploying a smart mix of hardware, software and services. The involvement of software in traditional data centers aims to address the biggest business demands of IT – speed, cost, scale and richest variety of business solutions. Cloud computing is basically a software alternative that provides infrastructure, network, storage and management services to businesses by leveraging connectivity. The basic server infrastructure in data centers can be compared to a virtual server environment existing over the internet. The applications provided by processors and servers can all be networked through the internet making it a software environment. Some of the key attributes that characterize a cloud service include: shared/standard service, self-service, elastic scaling, use-based pricing and leveraging internet standards. The idea of a ‘cloud’ goes beyond convenience and has multiple silver linings. By reducing the traditional costs and labor associated with deploying, maintaining and upgrading business technology, IT departments have the potential to become free to devote their limited resources to projects more strategic to the business. Having defined the silver lining there is no denying the fact that the technology itself...

Words: 616 - Pages: 3

Free Essay

Deploying Application Firewall in Defense in Depth Principle

...Deploying Application Firewall in Defense in Depth Principle Abstract Information security should be a priority for businesses, especially when they are increasingly involved in electronic commerce. With the understanding that securing an operating system successfully requires taking a systematic and comprehensive approach, security practitioners have recommended a layered approach called defense-in-depth. The cost and complexity of deploying multiple security technologies has prevented many organizations from achieving their information security goal. In view of these constraints and in compliance with recent with recent corporate and industry regulations like Sarbanes-Oxley Act and Payment Card Industry Data Security Standard, businesses now deploy application firewalls as security measures. Based on the foregoing, the author has recommended the use of application firewalls as a single platform for achieving layered security through network protection, application protection and data protection. This paper commences by examining the defense in depth theory and the types of application firewall and the author concludes by citing the Institute for Computing Applications (IAC) of the Italian National Research Council (CNR) as an example of an organization which engaged application firewalls in resolving its network security problem. Research Analysis/ Body The development of Information security is of paramount importance to organizations that have online presence...

Words: 1701 - Pages: 7

Free Essay

Active Directory Design Scenario

...implementing a new AD DS infrastructure there are many business-related questions that need answered in order to accurately design a domain hierarchy. Below is what we need to know to effectively accomplish this, including the number of DCs, geographical placement, number of domains/forests etc. Ideally, all servers should run the latest version of windows and take advantage of all the advanced features available with the newest software. DC deployment configuration Decisions to make- Deploy a separate forest without any trusts? Deploy a new forest with federation? Deploy a new forest with Windows Server Active Directory forest trust for Kerberos? Extend Corp forest by deploying a replica DC? Extend Corp forest by deploying a new child domain or domain tree? Factors to consider- Security- what is your security plan? Compliance- is there any compliance codes or concerns? Cost- what is the budget? Resiliency and fault-tolerance- is there any implemented? Application compatibility- software and hardware compatibility Geographical Placement There can be a central location where all servers are located and use WAN links for sites to query DCs and DNS servers for network resources. Also, you may place DCs at sites if bandwidth utilization is at a premium. Needed to determine the number of DCs Collect the network info Plan domain controller placement Create a site design Create a site link design Create a site link bridge Example Figure 1: Hierarchy of Active...

Words: 265 - Pages: 2