...specific system types. Each different version of Windows Server 2008 bring different features to the table for server management. Some of the popular versions of Windows server 2008 are Window Server – Datacenter, Windows Server – Enterprise, and Windows Server – Standard. (Microsoft.com) Datacenter is designed for large scale virtualization, with this it can help reduces costs on power consumption on the server and reduce infrastructure maintenance. Enterprise provides high levels of system uptime, giving the capability to have numerous services running in the office, offsite, and international. Windows Server standard edition allows the basic services provided by Windows Server 2008, being able to maintain a basic serviced server. (Microsoft.com) Windows Server 2008 has several new features and enhancements. Some of these are: IIS 7, Role-based installation, and Network access protection. Internet Information Server, is a group of internet servers with additional capabilities giving windows HTTP capability. (TechTarget) Role-based installation allows for scalability in large heavy email traffic.(GFI) With it being a less extreme version of server core gives a more simplistic adding and removing roles. Simply put pick what role the server is to be and it will be it. There are many difference between Server 2008 and 2003. One of the most significant differences is the introduction of Hyper-V. A 64-bit architecture is an advantage because it has the capability of having...
Words: 387 - Pages: 2
...Exams & Answer Keys Exams & Answer Keys Networking Application Services and Security Course Revision Table Footer Date: 09/30/07 10/10/07 Section: All All Reason for Change: New Curriculum QA Edits Implementation Date: December 2007 December 2007 © ITT Educational Services, Inc. Date: 10/10/07 Exams & Answer Keys [Exam I —Unit 6] DATE: ________________________________ STUDENT NAME: ________________________________ COURSE NUMBER: ________________________________ INSTRUCTOR: ________________________________ ITT COLLEGE: ________________________________ General Instructions: 1. This is a closed-book, closed-notes Exam. No reference material (including assignments and lab) will be permitted for use during the exam session. 2. The exam contains true/false and multiple choice types of questions. 3. Please use the separate answer sheet provided to you for marking your answers. 4. Each question is worth two points. Good luck! © ITT Educational Services, Inc. Date: 10/10/07 Exams & Answer Keys 1. The most common cause of security breaches is ______. a. no alarm system b. weak passwords c. untrained security guards d. poor perimeter lighting 2. Windows Server administrators should not use the Administrator account for everyday activity. They should use the ________ command, only when performing administrative functions. a. super user b. run as c. task manager d. power user 3. For organizations with wireless networks, deployment of ________ is necessary...
Words: 3277 - Pages: 14
...currently has three locations and sells high-end gourmet food to consumers. The business appears to be well run and is obtaining a profit a review of the business was commenced to determine if there are any deficiencies that need to be addressed. After a review of all departments it was determined that a deficiencies existed in the human resources department in combination with the Payroll Department. The deficiency is that currently employees manually have to record timesheets, have them reviewed by the Store Manager, faxed to Payroll and finally entered by hand into the Payroll System. To address this deficiency it has been determined that Kudler Fine Foods needs to implement a web-based timesheet tracker system. To implement any new information technology system in a business environment the entire system must be researched and considered to make the implementation as smooth as possible. In the previous needs document, Kudler Fine Foods was shown to have a need for a new web-based time sheet entry system. The needs documents also explained two use cases on how the technology could be used. The first use case was the timesheet entry. In this use case, the employee would complete a timesheet on the website and submit to store manager for approval. To build this system it is necessary to design throughly the system and account for every issue. Riordan will use the Unified Software Development Process (USDP) to design the system (www.technologyuk.net). USDP has four phases...
Words: 1391 - Pages: 6
...there is a clear need to maximize the available resources between employees then it is appropriate to add additional servers to facilitate the sharing of files as well as the configuration of remote access services to allow for remote and secure working. In order to complement the existing network scenario this proposal is based around the configuration and deployment of Microsoft Windows Server 2012 as the network operating system. This is a stable and secure server environment which will allow the designated services to be configured and will equally allow for scalability while at the same time decreasing the overall maintenance and administration to support the network and associated servers. Given the size of the current organization and the IT systems at present, Windows Server 2012 Standard edition would be the most appropriate version for deployment as this will also keep the up-front costs down to a minimum – there is no requirement for the Enterprise Edition whose features will not be required in this implementation. One of the critical roles for the new server implementations will be that of a File Server capability – this can be easily configured within the Ocper, Inc. network through a Static IP address being assigned to this machine and then the File Services role being added to the default configuration (see Figure 1). This will allow File Shares to be created with specific permissions assigned across various employees and there will also be the opportunity to...
Words: 630 - Pages: 3
...knows how to get it to work? Options: Reply•Quote Re: 404 Error Page when try to start LocalHost/phpMyAdmin Posted by: yfastud (Moderator) Date: September 12, 2011 11:58PM Make sure no other program conflict Wamp such as IIS, Microsoft Web Deploy, SQL, Skype, Zonealarm, firewall/antivirus, NOD32, Eset, any web related program including Remote Desktop, Teamviewer or Apache, MySQL, PHP outside wamp folder (ie. in Program Files or System32 folder) ... IIS and Apache/Wamp are both web server and might conflict in some way, so you have to disable IIS in order for Wamp to work Disable IIS in Vista/W7: Control Panel, Uninstall Programs, Turn Widows Features On or Off, uncheck Internet Information Services Disable IIS in XP: Control Panel, Add/Remove Programs, Add/Remove Windows Components, uncheck Internet Information Services (IIS) Restart computer, then restart Wamp 1 of 3 16/01/2013 18:40 - PHP, Apache, MySQL, Windows : WampServer http://forum.wampserver.com/read.php?2,77471,77478 Also, in folder C:\WINDOWS\System32\drivers\etc, open file hosts and delete anything in this file and have only this line below and nothing else 127.0.0.1 localhost If using Skype, open...
Words: 598 - Pages: 3
...sell T320 tower server series is good choice. 2. Most Web server software runs on Microsoft Windows Server products, Linux, or other UNIX-based operating systems such as FreeBSD. They have both advantages and disadvantages. ----- | advantages | disadvantages | Microsoft | Simpler for their information systems staff to learn and use than UNIX-based systems. | Security weaknesses | Linux | An open-source operating system, Fast, efficient, easy to install. Downloaded free from web, user-friendly like Microsoft, Secure and stable | Compatibility | UNIX | Secure and stable operating system | user-friendly is not good, need type the command code, | I will recommend Amy choose Linux because it is an open-source operating system. Linux can be downloaded free from the Web. For some small and medium-sized companies, they don’t need to buy window. Linux system security is very high, unlike Windows system often update and close loophole. Especially, LAMP is very popular combination for Web server computer construction today. That means Linux + Apache + MySql + PhP. 3. The two commonly used Web server programs is Apache Http Server and Microsoft Internet Information Server (IIS). The NetCraft Web server surveys show that...
Words: 462 - Pages: 2
...Matthew Klutts NT2670 2/21/2016 Project part 1 I do this IIS or Internet Information Services is the best choice for an application server. This is because it is a windows system. It provides a secure, easy to manage, modular and extensible platform for hosting websites, services and applications. With IIS you can maximize web security with a reduced server foot print and automatic application isolation. IIS 7.0 and up have a modular architecture. Modules, also called extensions, can be added or removed individually so that only modules that are required for specific functions are installed. IIS in my opinion will be the best choice for this server, because of all the information that I provided above, and the fact that I’m more comfortable with windows based systems. The ports that need to be open to host ftp, http, https, and streaming media are listed below. 1. FTP a. The default port range is 1024-5000, but the upper range can be changed. 2. HTTP b. Port 80 or port 8530 3. HTTPS c. Port 443 or port 8531 4. Streaming media d. Windows Media server uses TCP in ports to accept an incoming HTTP connection (80), RTSP connection (554), MMS connection (443). e. Windows Media Server uses UDP out ports 1024-5000 and 5004. Due to the design of IIS and its security features I don’t see many security concerns with having all these ports open on the same server. Although there is no way for any system to be completely safe...
Words: 769 - Pages: 4
...design that interconnects the following considerations: ◾DesignIT plans to relocate three (3) servers already configured as follows: ◦1 Web Server – Microsoft IIS Server ◦1 File Server – Microsoft Server 2008 ◦1 Server – Server 2008 Small Business Server ◾DesignIT has requested that the design include the following: ◦High speed Internet access ◦Firewall ◦Antivirus / malware protection ◦Six (6) computers ◦Three (3) color laser printers ◦Wireless access for portable devices ◾DesignIT has requested the consideration of all interconnected devices and wiring, along with speeds, for best performance. Section 1: Network Consultation Proposal (Microsoft Word) Create a cost analysis, and develop a proposal for the company. 1.Write an five to seven (5-7) page proposal in which you: a.Recommend one (1) suitable network design. b.Suggest one (1) network architecture. c.Suggest LAN and Wireless LAN (WLAN) wiring considerations. d.Recommend hardware options and costs. e.Suggest security considerations for: i.Firewall ii.Antivirus software f.Recommend software options and costs. g.Outline the labor costs, equipment costs, and service costs for your suggested design in table format. h.Identify the single point of failure, and recommend potential mitigation strategies. i.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Section 1 of your assignment must follow these formatting...
Words: 513 - Pages: 3
...Chapter 8 Case 2: Random Walk Shoe 1 .Determine the features and capacities (RAM, disk storage, processor speed) that Amy should include in the Web server computer that she will need for her site. Summarize your purchase recommendation in a one-page memorandum to Amy. You may include information from vendor's site (such as Dell, Hewlett Packard, or Sun) as an approach to your memorandum. Amy Lawrence have paid to education by decorating sneaker her used hand painted designs and started as collect her education, it is a successful of business her now plan to open an c-commerce a website where to expects to get wider audience and customers can choose their own design-shoes combinations. Website would be to uploaded, host and maintain by Amy Lawrence web server computers of different kinds exist in the order to make the right choice it all depends on what hardware, operating system the web server software you choose. What exactly your web server can be either the hardware to computer or software the computer application that helps deliver web content that can be accessed through to internet. The hosting a website can be made from almost any computer with help of special hardware the website can become more efficient. If you have when choose to host your website power at your hands and rapid updates are made to the website without have hiring of an external company. The web users have a low tolerance the show page loads many will simply press to back button or close the...
Words: 750 - Pages: 3
...LAB 1 Questions Exercise 1.1 1. Remove the File 2. Check to make sure that the drive is installed correctly in the PC and then if it still occurs you need to reformat the drive to work with the windows server. Exercise 1.2 Roles on the Server Manager are File Services and Web Server (IIS) 3. The conditions that the upgrade option is not available during the windows server 2012 installation process is when it is a new hard drive with no previous version of windows. 4. An example of a compatibility note that will stop the upgrade process and force you to take action before restarting the installation would be when the previous version of windows installed is not able to be upgraded to windows server 2012. Using server manager determine which roles are installed on the server and make a note of them in the space on your worksheet. File and Storage Services and Web Server (IIS) 5. The proof that you would have that the procedure just completed has upgraded the operating system on the computer and not just performed a new, clean installation is to check to see if previous users are still available. Exercise 1.3 6. You cannot install the Server Migration tools to the Server running Windows Server 2008 using the Add Roles and Features Wizard on your server because you must Register Windows Server Migration Tools on source computers that are running older releases of Windows Server than your destination server. That would be Windows Server 2012, Windows...
Words: 269 - Pages: 2
... Network Consultation Proposal In order to design and deliver a reliable and secure network for DesignIT, many critical factors must be considered such as the network topology and architecture, the selection of hardware and software components designed to meet the client’s requirements, and also appropriate security services. DesignIT has decided to upgrade from a temporary workplace to a permanent office space. The new space measures 56’ x 36’ giving DesigntIT over 2000 square feet of dedicated space. This new space contains four cubicles, one executive office, one server room, one reception desk, and one conference room and allows DesignIT to hire two full time designers and a receptionist. As stated in the Request for Proposal (RFP) issued by DesignIT, the design must incorporate the following considerations: * Relocation of three servers configured as follows: * One (1) Web Server – Microsoft IIS Server * One (1) File Server- Microsoft Server 2008 * One (1) Server – Server 2008 Small Business Server Furthermore, DesignIT has stated the design must also include the following deliverables: * High speed internet access * Firewall * Antiviurs/Malware protection * Six (6) computers * Three (3) color laser printers * Wireless access for portable devices A critical first step in designing a network to meet DesignIT’s requirements is designating the network topology. A network topology is both the logical...
Words: 731 - Pages: 3
...Chapter 4 Review Questions 1. Your company has four departments: Marketing and Sales, Manufacturing, Product Research, and Business. Which of the following Active Directory container design plans might you use to best manage the user accounts and network access needs of each department? a. Create four trees. b. Create four parent domains in one site. c. Create four OUs in one domain. d. Create four trees and map them to four domains. 2. Using the example in Question 1, what Active Directory capability can you use to establish different account lockout policies for each of the four departments? a. fine-grained password policies b. lightweight group policies c. password distribution groups d. shadow password files 3. Your colleague is trying to create a universal security group for the three administrators of the single stand-alone server in his company. The problem is that he can’t find an option to create a universal security group. What is the problem? a. He must first create the administrators’ personal accounts before it is possible to create a universal group. b. He needs to put the account creation tool into the Advanced Features mode. c. He must create a universal distribution group first and then create the universal security group. d. He cannot create a universal security group on a stand-alone server and must instead create a local security group. 4. One of the DCs in your company reports that it has an Active Directory error. You need to...
Words: 1179 - Pages: 5
...A website has to be hosted on a web server before it can be accessed by online users from the Internet. There is a wide range of web servers running on different platform to choose from within the web hosting market today. According to Netcraft, a company that keeps statistics on the leading web servers and the platforms on the Internet, the most popular platforms and web servers are: * Unix and Linux running Apache web server (60.17%) * Window NT/2000 running Internet Information Server (IIS) (30.78%) Other web servers include SunONE, Zeus, WebLogic, iPlanet and etc. Given the widespread popularity of Apache (closed to 60% market share) and Microsoft IIS (approximately 30%), you can almost guarantee you can find these two platforms are supported by most of the web hosting providers. All computers require an operating system (an important piece of software) to be installed before it can function properly. For example, most of the personal computers today have installed Microsoft Windows operating system: Win98, WinXP or Win2000. Likewise, all web servers need operating system to perform different functionalities and different web servers run on different operating systems (or so called platforms). One of the most commonly found platform is UNIX that comes in various varieties that are popular with web hosts, including FreeBSD, NetBSD, OpenBSD and Linux. Another popular platform that has gained strong ground as a platform for web hosting market is Microsoft Windows...
Words: 347 - Pages: 2
...Code Red was a computer worm observed on the Internet on July 15, 2001. It attacked computers running Microsoft's IIS web server. The Code Red worm was first discovered and researched by eEye Digital Security employees Marc Maiffret and Ryan Permeh. They named it "Code Red" because Code Red Mountain Dew was what they were drinking at the time. Although the worm had been released on July 13, the largest group of infected computers was seen on July 19, 2001. On this day, the number of infected hosts reached 359,000. The worm exploited a vulnerability in the indexing software distributed with IIS, described in Microsoft Security Bulletin MS01-033. The worm spread itself using a common type of vulnerability known as a [[buffer overflow]]. It did this by using a long string of the repeated character 'N' to overflow a buffer, allowing the worm to execute arbitrary code and infect the machine. Kenneth D. Eichman was the first to discover how to block it. Days 1-19: Trying to spread itself by looking for more IIS servers on the Internet. Days 20–27: Launch [[denial of service]] attacks on several fixed [[IP address]]es. The IP address of the [[White House]] web server was among those. Days 28-end of month: Sleeps, no active attacks. When scanning for vulnerable machines, the worm did not test to see if the server running on a remote machine was running a vulnerable version of IIS, or even to see if it was running IIS at all. The worm's payload is the string following the last 'N'. Due...
Words: 383 - Pages: 2
...The primary reason for using networks is to enable clients to communicate and share resources efficiently. Most networks rely on server that exceeds the minimum hardware requirements suggested by the software vendor. To determine the optimal hardware for your servers, be sure to ask the following questions: • What kinds of applications will run on the server? • How many clients will connect to the server? • How much storage space will each user need? • How much downtime, if any, is acceptable? • What can the organization afford? Out of these questions the first one is the most important. For example, use can purchase an inexpensive, low-end server that runs Linux adequately and suffices for resource sharing and simple application services. However, to perform more advanced functions and run resources-intensive applications on your network, you would need to invest in a server that has significantly more processing power and memory. Every application comes with different processor, RAM, and storage requirements. Explain what network operating system you would suggest. The network operating system that I have chosen is The Window Server 2008 is the latest version of Microsoft’s NOS, released in February 2008. It’s an enhancment of its predecessor, Window Server 2003, though many of the older NOS’s features remain in the newer version. Windows-based NOSs are known for their intuitive graphical user interface (GUI), multitasking capabilities, and compatibility...
Words: 711 - Pages: 3