Free Essay

Intro to Server

In:

Submitted By bubbab
Words 767
Pages 4
1. Routing serve included WS2008 suited for: smaller networks
2. NWAccess Protection introduced w/ which OS WSERVERS2008
3. IPV4 address is commonly w type notation
4. Ipv6 option unavailable IPV4IP SECURITY
5. Each host TCP/IP network should be config# mandatory except :ROUTING METHOD
6. If a system will be a DHCP server which add should you set?: STATIC IP
7. ;rlcess of obtaining an IP address for a comp name is : Name resolution
8. What is made up of free space from multiple Physical disk: SPANNED VOLUME
9. _____ groups are non security related distribution of info: DISTRIBUTION
10. Which partition 2TB Disks/NTFS (No fucking clue what this said :D)
11. Boot enabled tcp/ip WS retrieves settings needed to run excluding WORKSTATION SETTINGS
12. Which of the following is not key benefit provided by DHCP for management tcp/ip decentralized admin
13. Sent by clients via broad to locate DHCP RFC2131 which msg may include option DHOPDISCOVER
14. What type of zone might DNS Server host? PRIMARY
15. Which of the following is NOT a FWD or PVSZONE INTEGRATED
16. WS2008 ds role is reffed to as a DOMAIN CONTROLLER
17. Process or KP E DC in synch w changes network called REPLICATION
18. AD create REPLICATION TOPOLOGY w the idea or write doman communicate AD
19. A DISTINGUISHED NAME references objects in AD directory by using hierarchical path
20. What command can be used to run AD Directory wizard DCPROMO
21. What is minimum amount of storage for AD 200MB
22. The READ ONLY DC contains copy of NTDS.dit file cannot be modified
23. APPLICATION DIRECTORY partitions are used to separate forests wide DNS info
24. How often intersite replication 15 MINUTES
25. When rep in for between sites designated a bridged server
26. What port is used by active directory to direct search requests to a global catalog server? ©3268
27. Which of the following is not a function performed by a global catalog server? ©Maintaining a backup of all data stored on a domain controller
28. How many FMSO roles does Active directory support? B 5
29. What is the process of confirming user’s identity by using a known value such as a pw pin or handprint in a case of biometric authentica ? B Authentication
30. Which zone enables a host to determine another hosts name based on its IP address? C reverse lookup zone
31. _____ groups are used to consolidate groups and account that either span multiple domains or entire forests? D Universal
32. What is a system of digital cert, cert auth and other reg author and auth the validity of each party involved in an electronic transaction thought use of public key crypto? PKI
33. A Starting address of 192.0.0.0 ending 223.255.255.255 is a member of which network class? A A class
34. What command line tool can be used with a standard user account to reducxe the risks associated with admin account? A Runas
35. password cracking can be accomplished by intel guessing- b dictionary attack
36. What process applices to group policy settings to various-linking
37. What policies work with folder redirection to provide the ability to cahce files D offline file
38. which of the following is not a GPO?
39. when implementing the ____ feature when folder redirect is also config, admins can control the amount of info that is stored? B disk quotas
40. what option is helping when deploying required application to pertinent users and computers? A assign
41. if you set the refresh interval at 0 the system attempted to update policy : B 7 seconds
42. to back up AD you must install what feature? C windows server backup
43. What mmc snap in provides a single access point to all aspects of group policy that were previously spread across other tools such as ad users, sites, services etc? B group Policy Management
44. What command line tools can be used to manually refresh group policy? D gpupdate
45. Microsoft windows server 2008 uses the windows installer w group msi
46. Modifications to msi files require transform files which have__)__ msi
47. When a gpo is selected in a gpm which lab allows admins to view the locations to which the policy is linked? Scope
48. gpo can act as templates when creating new gpos for your org? c starter
49. What is resp for managing changes to the AD database? A extensible storage engine
50. What manual process defrafs the AD in addition to reducing its size? D offline defragmentation

Similar Documents

Premium Essay

Cloud Computing

...UploadSign inJoin BooksAudiobooksComicsSheet Music Editors' Picks Books Hand-picked favorites from our editors Editors' Picks Audiobooks Hand-picked favorites from our editors Editors' Picks Comics Hand-picked favorites from our editors Editors' Picks Sheet Music Hand-picked favorites from our editors Top Books What's trending, bestsellers, award-winners & more Top Audiobooks What's trending, bestsellers, award-winners & more Top Comics What's trending, bestsellers, award-winners & more Top Sheet Music What's trending, bestsellers, award-winners & more Categories Arts & Ideas Biography & Memoir Business & Leadership Children's Computers & Technology Cooking & Food Crafts & Hobbies Fantasy Fiction & Literature Happiness & Self-Help Health & Wellness History Home & Garden Humor LGBT Mystery, Thriller & Crime Politics & Economy Reference Religion Romance Science & Nature Science Fiction Society & Culture Sports & Adventure Travel Young Adult Categories Arts & Ideas Biography & Memoir Business & Leadership Children's Computers & Technology Cooking & Food Fantasy Fiction & Literature Happiness & Self-Help Health & Wellness History Home & Garden Humor LGBT Mystery, Thriller & Crime Politics & Economy Reference Religion Romance Science & Nature Science Fiction Society & Culture Sports & Adventure Travel Young Adult Categories Adaptations Children’s Crime & Mystery Fiction Humor Manga Nonfiction ...

Words: 1960 - Pages: 8

Premium Essay

It/244 Week 1

...Associate Level Material Appendix C Introduction Student Name: Philip J. McCarthy UNIVERSITY OF PHOENIX IT/244 INTRO TO IT SECURITY Instructor’s Name: JAMES SERSHEN Date: 04/18/2012 1. Introduction Due in Week One: Give an overview of the company and the security goals to be achieved. 1.1. Company overview As relates to your selected scenario, give a brief 100- to 200-word overview of the company. The Company I have chosen is, The Bloom Design Group. The Bloom Design Groups mission is to provide online interior design services to its customers. The company offers their customers interior design services. What sets this company apart from others is that they have a website that allows customers a chance to design and decorate their rooms to their liking in a virtual environment before spending their money. The option provided for their customers is a virtual decorating tool. With this tool customers can play around with various color schemes for each room’s floor and ceilings, as well as customizing furniture as well. Then employees are able to access the corporate network through a VPN collection to access their client files, in order to place electronic orders for the design materials and furniture. 1.2. Security policy overview Of the different types of security policies—program-level, program-framework, Issue-specific, and system-specific—briefly cover which type is appropriate to your selected business scenario and why. Program-Framework security...

Words: 924 - Pages: 4

Premium Essay

Google

...Intro Intro Swot BalancedScorecard Conclusion Corporate finance 2 Ngoc-Viet Vo Binh-Duong Doan Yuming Hao Huili Liu Noelia Martin Plaza Khurram Shahzad © 2010 - GMP IAE LYON 3 Intro Intro Swot BalancedScorecard Conclusion Plan Intro Swot Scorecard Conclusion Plus Introduction SWOT Analysis Balanced Scorecard Strategies & Indicators GMP Corporate Finance Plus Conclusion 2 Intro Intro Swot BalancedScorecard Conclusion introduction 3 Intro Intro Swot BalancedScorecard Conclusion Introduction Intro Swot Scorecard Conclusion Plus GMP Corporate Finance Plus Google is a global technology leader focused on improving the ways people connect with information. Incorporated in California in September 1998 and reincorporated in Delaware in August 2003. Headquarters are located at 1600 Amphitheatre Parkway, Mountain View, California 94043 4 Intro Intro Swot BalancedScorecard Conclusion Introduction Intro Swot Scorecard Conclusion Plus Mission: Google’s mission is to organize the world’s information and make it universally accessible and useful GMP Corporate Finance Plus Major Products: Google Web Search with Advanced Search Functionality Web Page Translation—supports 41 languages Integrated Tools—such as a spell checker, a calculator, a dictionary and currency and measurement converters Google image and book search Google Scholar Google Finance Google webmaster...

Words: 1119 - Pages: 5

Premium Essay

It/244 Final

...Information Security Policy Gennie Diamond Axia College of University of Phoenix IT/244 – Intro to IT Security October 10, 2010 Executive Summary The goals of this information security policy will be to state the principles and guidelines for protecting the confidentiality, integrity, and availability of sensitive information and resources for XYZ Energy. This policy will set forth requirements for securing the network’s confidential information and data communications infrastructure, in addition to defining detailed policies in the areas of physical security, access control, and network security. Assumptions of the security plan defines physical security at each site for the environment around the network including entry control at each facility, the need and responsibilities of security staff, and issues around security in common areas. Information system security defines workplace protection and guidelines for storage, protection, and maintenance of hardware and network equipment. Access control policies address user enrollment and all network access privileges, along with identification and authentication process policies. Finally, network policies are defined for granting and managing network access while still protecting sensitive company data. Project constraints can include, but are not limited to, availability of resources needed to provide appropriate security for each defined security goal; time restraints for meeting these goals;...

Words: 1790 - Pages: 8

Free Essay

It/240

...LAN Topologies IT/240 Intro to LAN Technologies 4/29/2014 Farooq Afzal Case 3-1 In my opinion a client/server system with an extended star topology would be the best choice for Old-Tech Corporation. I would replace the 10 Mbps Ethernet cord with an 100 Mbps Ethernet cord to ensure a faster more reliable connection. The extended star topology will allow each computer to have access to shared files and the administrator can delegate which computer has access to which information within the network. I would make sure that we when we do the upgrade the computers are all connected with wireless NIC. Case 3-2 EBiz.com should be upgraded to have a Switched Logical Topology using an extended star topology. This network should be server based with several servers, each server would have its own task. The network should have at a minimum of 250 computers and have room for upgrades of 50 or more computers. I would install more switches to accommodate each floor of the building. This would be done for each floor with the servers having a room of their own. Case 3-3 For this Case Project I would suggest that ENorm set up the system as a Server Based computer system with Mesh Topology. We could...

Words: 253 - Pages: 2

Free Essay

Virtualization Across the Board

...Strayer University Assignment 3: Virtualization Across the Board Dennis R. Roque CIS512: Advanced Computer Architecture Professor Amir Afzal 4 March 2013 Table of Contents 1. Compare & contrast the AMP & SMP architectures 3 2. Determine if hardware virtualization helps businesses and organizations in terms of: 3 Cost management 3 Systems performance and scalability 4 Systems management and administration 4 3. Determine if software virtualization helps businesses and organizations in terms of: 4 Cost management 4 Systems performance and scalability 4 Systems management and administration 5 4. Compare and contrast VMware, Microsoft, and Citrix in terms of:…………………………………….5 Market adoption 5 Technical architecture 6 Technical support 8 5. Determine which vendor you would recommend for a virtualization strategy and explain why: 8 References:……………………………………………………………………………………………………………………………9 1. Compare & contrast the AMP & SMP architectures While symmetric multiprocessing (SMP) plays an important role in multi-core systems, the packet processing performance curve in an SMP configuration can flatten after only a few cores, yielding diminishing returns as more system resources are allocated to networking tasks. Wind River’s asymmetric multiprocessing (AMP) technologies provide a clean separation of control plane and data plane functions, which enable greater efficiency of multiple processing cores. The data...

Words: 2359 - Pages: 10

Premium Essay

Cloud Computing

...University CIS 106 - Intro to Information Technology ______________________________________________________________________________ Assignment for Course: CIS 106- Intro to Information Technology Submitted to: Professor Christopher Davis Submitted by: Louey Carter Title of Assignment: Cloud Computing | Cloud Computing | | | By: Louey Carter | | | Cloud computing is computing that relies on sharing computing resources instead of having local servers or personal devices to handle applications and storage. In cloud computing, the term cloud, also known as “The Cloud”, refers to the Internet. Therefore, cloud computing is a type of internet based computing where different services such as applications, storage and servers are accessible by an organization’s computer system and other devices through the internet. With cloud computing, a data center is used to store and process data that can be accessed from any location and from any device with the capabilities of accessing the internet. By using cloud computing, businesses do not have to build and run their own data centers, which can be more expensive, especially if they are a small or midsized company (Knorr, G. 2008). Historically, deploying an application required a server with dedicated storage. Now, the physical connection between hardware and software can be separated or virtualized. This virtualization provides great flexibility of where you want the server centralized. With...

Words: 1581 - Pages: 7

Free Essay

Assignment 1: Accessing Oracle

...Assignment 1: Accessing Oracle Intro to Relational Dbase Management Sys Accessing the Strayer University Oracle Server is not a hard task to do with the proper instructions presented to you. I have broken down the steps in which accessing the database can be an easy experience even for those that are not experienced with Telnet sessions. The tool I used to take my screen shots is SnagIt 11 which is a great tool for capturing screen shots especially inside a telnet session or remote desktop. The program allows for capturing the image you want without have to crop it which would happen using the Ctrl-Print Screen option which will capture your entire desktop work space. The first steps in accessing the Strayer University Oracle server is making sure you have a good telnet session in which to remote into the server. As described in the Strayer University procedures I’ll be showing this telnet session using the program Putty. There are many other telnet programs available to advanced users such as IBM’s 3270 and Microsoft Telnet that can be used as well. First step to accessing an Oracle Server via a Telnet session is actually configuring the session to make the connection to the server happen. Below shows the setup within Putty to establish the connection: Configure the Host Name or IP address to the Oracle server and Port number are the biggest part of making the connection happen. Once this information has been setup you are able to create it as a saved session so...

Words: 551 - Pages: 3

Premium Essay

Domain Ssecurity Plan

...Intro to Information Security Project Part 1 Listed below are some of the different layers of security that a Network Administrator or Security Administrator could implement on different domains in order to increase the strength of the servers against attacks. Many of these are universal implementations and can be applied to multiple types of servers / domains. To increase the security of a User Domain at the user level an administrator should apply Group Policy settings in order to require end-users to use complex passwords. This increases the strength of the authentication process and helps prevent easy password cracking techniques such as Brute Force. To help prevent the extraction of data on the next layer, Workstation Domains, workstations should be setup to have important data encrypted on the drive. In the event of data extraction or theft of the drive, this would ensure that the data could not be utilized. On the next layer, LAN Domains, it is important to implement spam filters in order to intercept and “weed out” potentially malicious incoming packets, connections, & emails to the server. It is also important to set Group Policy settings to initiate session timeouts for active sessions on the LAN and also on the WAN Domains. This will provide an extra layer of security if users walk away from their active workstations for an extended period of time. It will also help to secure the sessions from outside attacks if accidentally left open. Also, a good Network...

Words: 367 - Pages: 2

Premium Essay

Introduction to Networking

...Intro to Networking Concepts-Chapter 1 Network protocols – first built in 1950’s for a way to effectively communicate with other computers and protocols are set. These computers can communicate through binary numbers with 0’s and 1’s. Numerous protocols are placed and it eventually evolved into a different term for the online use, this is called TCP/IP (Transmission Control Protocols/Internet Protocol). TP/IP networks are hierarchical fashion that allows for great flexibility and scalability; by subdividing the networks into smaller groups called subnets. TCP/IP networking are fundamentals of IP network addressing and the distinction between IPv4 and IPv6. Also basic concepts protocols are DHCP, DNS and routing the process of transferring data across a networking from one LAN to another. TCP/IP networks was first introduced in the 1960’s, these were called IPv4 and IPv6. IPv4 (Internet Protocol version 4) was first introduced and is most commonly used in modern networks. IPv6 (Internet Protocol version 6) is the latest version of the internet protocols and will be prevalence as the number of shortcoming to the IPv4. IPv4 uses 32 bits (four bytes or octets) thus giving a mathematical limit of 2³² possible addresses. As for IPv6 which was developed in the 1990’s that would threaten and even to exhaust the 4-billion-plus IP addresses available through IPv4. At the end, IP6 is the next generation of the TCP/IP protocol. DNS (Domain Name System) provides the mechanism for connecting...

Words: 462 - Pages: 2

Premium Essay

Resume

...Darius Murdock ------------------------------------------------- 2322 Saint Clair Drive, Temple Hills, MD 20748 ------------------------------------------------- 240-392-2369(home) 240-308-9360(cell) dariusm_murdock@hotmail.com, dmurdock114@email.itt-tech.edu SKILLS & ABILITIES Networking * TCP/IP /LAN/WAN / Cisco Router / OSI * Network Technology * GUI ApplicationsOperating Systems * Windows 2000/7/XP/8 * Windows Server 2008/2010 / Active Directory * Linux * VMwareHardware * Assemble/disassemble PC’s * Install, configure, troubleshoot and repair * Installation, testing and troubleshooting of cabling (Patch, Fiber, Twisted & Crossover)Software * Microsoft Word, Excel, PowerPoint, Outlook, Publisher, Visio * Exchange and Sendmail for E-mail servers * Install, and troubleshoot | Development * Intro Programming * Client Server General * Strong written and oral communication skills * Team building * Customer Service * Problem Solving * Reliable * Flexibility | EDUCATION  ITT Technical Institute – Springfield, Virginia- Present Associate of Applied Science Degree in Information Technology – Network Systems Administration Anticipated Graduation Date: Spring 2015 Suitland High School- Forestville, Maryland- 2009-2013 High School Diploma RELEVANT EXPERIENCE Save A Lot Grocery Store- Store Clerk July 2014-Present * Stock store product in the all the aisles. * Greet...

Words: 300 - Pages: 2

Premium Essay

Xbis 219

...global internet market. The services Amazon has added so far include Simple Storage Service (S3), which allows businesses to store data and applications on Amazon disk drives, Amazon charges 15 cents per gigabyte per month. Elastic Compute Cloud (EC2) is a service in which Amazon rents out processing power starting at 10 cents per hour. Some businesses use both of these services together saving the companies both money and time. The third service Amazon has added is called Mechanical Turk, this service combines processing power with networks of people who are paid to recognize inappropriate content in images or transcribing audio. Companies post work to Mechanical Turk and pay for this service and Amazon gets a 10 percent commission (Intro to Information Systems). Each of these new services has the same potential data management issues. Data management issues could include corrupted files infecting the entire...

Words: 593 - Pages: 3

Premium Essay

Accessing Oracle

...Running head: ACCESSING ORACLE Accessing Oracle Intro to Relational Database Management Systems CIS111 Professor Rachelle Howard October 21, 2012 Accessing Oracle Accessing Strayer University UNIX server is an information technology tool that assists the completion of curricula activities and student lab assignments designed to expand the knowledge base in relational database management systems. For the first assignment, the following steps were taken to accomplish access to Oracle: 1. The first step to get to the Oracle server, Click on Start-> Programs -> Putty, was simple and easy. 2. After typing in the host name, UNIX-online.strayer.edu, I ensured the port was set to 22 and that the radio button was set for SSH. After entering Student Unix Server in the Saved Sessions box I selected “open” instead of going to the next step of selecting Category, which caused me to have to start over. 3. In the Category area on the left I selected Window. In the Columns and Rows boxes I entered 120 and 60 respectively to set the initial window size when opening the terminal window. Under Lines of scrollback, I enter 20000 and verified the remaining boxes. 4. I experienced dificulty with setting the colours. Under the Categories\Window to select Colours I selected ANSI Blue and typed in the values in the illustration before I selected Modify. I changed the colour to yellow and selected OK. This caused me to start the initial setup from step 1. I repeated this...

Words: 471 - Pages: 2

Premium Essay

Tech 140

...HW 1-Intro to Networking True/False - Indicate whether the statement is true or false. ____ 1. The simplest form of a network is a client/server network. ____ 2. Clients on a client/server network share their resources directly with each other. ____ 3. Hands-on experience to improve networking hardware and software skills is important when attempting to enter the networking field. Multiple Choice - Identify the choice that best completes the statement or answers the question. ____ 1. Which statement describes an advantage of networks? |a. |Networks require decentralized management. | |b. |Isolating network devices decreases costs. | |c. |Isolating network devices allows implementation of the sneakernet file sharing method. | |d. |Networks enable multiple users to share resources. | ____ 2. Which network model ensures that no computer on the network has more authority than another? |a. |client/server |c. |peer-to-peer | |b. |stand alone |d. |distributed | ____ 3. A common way of sharing resources on a peer-to-peer...

Words: 648 - Pages: 3

Free Essay

Informatique

...Administration système et sécurité sous LINUX La configuration de base du réseaux Enseignant: Arafet BOUSSAID arafet.boussaid@gmail.com 1 Service intro Prot ocol e http Port RFC Client Serveur Couche 3 TCP, UDP (httpdata) TCP Web 80 / 443 2616 Firefox, opera, chrom, Apache, IIS, Lighthttpd VSftpd, Role FTP, Filezilla server Postfix-dovecot eXchange, Lotus Domino BIND, Role DNS Vlc-server Transfert de fichier ftp 20 / 989 21 /990 959 FileZilla FlashFXP CuteFTP Messagerie Smtp 25 Pop 110 / 995 Imap 143 / 993 Resolution de nom streaming DNS 53 2821 Outlook, Thenderbird, Evolution 1034 Resolver TCP TCP UDP c/s TCP s/s UDP Rtp rtcp rtsp 5004, 5005 Vlc 2 Service intro à Admin distance Proto Port cole telnet Ssh 23 22 RFC 854 Client Serveur Telnetd openSSH Couche 3 TCP Cmd Shell linux 4253 Putty WinSCP 2131 système Auto Dhcp configuratio n IP Contrôleur de domaine Surveillanc e réseaux Ldap 67 Role dhcp Dhcpd OpenLdap, ActiveDiractory UDP 389 2251 Client/ serveur messgerie, OS client 2573 Nagios Cacti Zabbix système Tcp/udp Snmp 161 Snmp 162 -trap Agent SNMP Tcp/udp Synchronis ation du temps Ntp 123 NTPd UDP 3 /etc/services intro Description : Les candidats doivent être capables d'examiner, de changer et de vérifier les paramètres de configuration de la pile TCP/IP côté client Termes, fichiers et utilitaires utilisés : – /etc/hostname...

Words: 1178 - Pages: 5