...Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http:// www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission...
Words: 139691 - Pages: 559
...Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http:// www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission...
Words: 139691 - Pages: 559
...Chapter 2 Solutions Review Questions 1. Your colleague is trying to upgrade from Windows Server 2003 Datacenter Edition to Windows Server 2008 Standard Edition, but the Setup program won’t allow the upgrade. Which of the following is the problem? Answer: c. Windows Server 2003 Datacenter Edition cannot be upgraded to Windows Server 2008 Standard Edition. 2. Your IT director heard about a fast but inexpensive new computer and purchased it to be the new Windows Server 2008 server on the network. When you attempt to install Windows Server 2008, the operating system won’t install because there seems to be a problem with the BIOS in the new computer. How might this dilemma have been avoided? Answer: d. The IT director should have checked to see if the computer hardware and BIOS were certified for Windows Server 2008. 3. You have installed Windows Server 2008, but when the computer reboots you only see a command-line screen. However, you intended to implement a full version of the operating system with the normal Windows GUI. What has happened? Answer: d. During the installation, you selected to install Server Core instead of the full installation. 4. Which of the following are roles that can be implemented in Windows Server 2008? (Choose all that apply.) Answer: b. Application Server, c. Fax Server, d. Terminal Services 5. You have installed Windows Deployment Services, but the installation does not properly work. Which...
Words: 3139 - Pages: 13
...INSTRUCTOR: RODNEY BROWN 1 DECEMBER 2014 TABLE OF CONTENTS CHAPTER 1 2 1.1 ORGANIZATION DESCRIPTION 2 1.2 NETWORK SERVERS 2 1.3 NETWORK PERSONNEL RESPONSIBILITIES 2 CHAPTER 2 4 2.1 NETWORK ARCHITECTURE 4 2.2 NETWORK DIAGRAM 5 CHAPTER 3 6 3.1 ORGANIZATION DESCRIPTION 2 3.2 NETWORK SERVERS 2 3.3 NETWORK PERSONNEL RESPONSIBILITIES 2 CHAPTER 4 # CHAPTER 5 # CHAPTER 6 # . 1.2 NETWORK SERVERS Main Server: Centos operating system and act as host running Virtual Box for the other servers Guest Server: Centos operating system used for project manager and Apache http web server. Web Server: Windows sever 2008 operating system functions as the Domain Name System (DNS) and Active Directory servers. 1.3 NETWORK PERSONNEL RESPONSIBLITIES Network personnel maintain and setup network equipment, servers, routers, and switches. Image computers, install software, and manage users’ accounts. CHAPTER 2 2.1 NETWORK ARCHITECTURE Network Components • satellite modem (that is also the router) • 5 switches (1- Cisco 24 port switch, 4- Linksys router configured to be switches, 3 configured to be wireless access points • 3 servers • Several work stations • Several peripheral devices The network is configured in a Star topology with 2 LAN segments. This was chosen for its cost, ease of installation and scalability. Primary components are satellite...
Words: 384 - Pages: 2
...Chapter 1: 1. Which of the following items is a valid leaf object in Active Directory? a. Domain b. User c. Application partition d. OU 2. Which of the following domain controllers can be joined to a forest that is currently set at the Windows Server 2008 forest functional level? a. Windows 2000 b. Windows Server 2003 c. Windows Server 2008 d. Windows NT 4.0 3. You are planning an Active Directory implementation for a company that currently has sales, accounting, and marketing departments. All department heads want to manage their own users and resources in Active Directory. What feature will permit you to set up Active Directory to allow each manager to manage his or her own container but not any other containers? a. Delegation of control b. Read-only domain controller c. Multimaster replication d. SRV records 4. The process of keeping each domain controller in synch with changes that have been made elsewhere on the network is called __________. a. Copying b. Osmosis c. Transferring d. Replication 5. The __________ Domain Controller contains a copy of the ntds.dit file that cannot be modified and does not replicate its changes to other domain controllers within Active Directory. a. Secondary b. Primary c. Read-Only d. Mandatory 6. What type of trust is new to Windows Server 2008 and is only available when the forest functionality is set to Windows Server 2008? a. Parent-child trust b. Two-way...
Words: 591 - Pages: 3
...PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2008 by Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. Library of Congress Control Number: 2008920571 Printed and bound in the United States of America. 1 2 3 4 5 6 7 8 9 QWT 3 2 1 0 9 8 Distributed in Canada by H.B. Fenn and Company Ltd. A CIP catalogue record for this book is available from the British Library. Microsoft Press books are available through booksellers and distributors worldwide. For further information about international editions, contact your local Microsoft Corporation office or contact Microsoft Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoft.com/mspress. Send comments to rkinput@microsoft.com. Microsoft, Microsoft Press, Active Directory, Internet Explorer, JScript, MSDN, Silverlight, SQL Server, Visual Basic, Visual Studio, Win32, Windows, Windows Media, Windows NT, Windows PowerShell, Windows Server, Windows Vista and Xbox are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners. The example companies, organizations, products, domain names, e-mail addresses, logos, people, places...
Words: 65718 - Pages: 263
...Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA NT2580 NT2670 Introduction to Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to Security Auditing for Compliance Countermeasures Information Security Email and Web Services NT1230 NT1330 Client-Server Client-Server Networking I Networking II IS3230 IS3350 NT1230 NT1330 Issues Client-Server Client-Server SecurityContext in Legal Access Security Networking I Networking II NT1110 NT1210 Structure and Introduction to ComputerLogic Networking IS3120 IS3110 NT1210 Network Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...
Words: 2305 - Pages: 10
...used in examples herein are fictitious unless otherwise noted. Other than printing one copy for personal use, no part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purposes, without the expressed written consent of: UniPrint, a division of GFI Solutions Inc. 1 Eva Road, Suite 309 Toronto, Ontario Canada M9C 4Z5 (416) 503-9800 Toll Free: 1 (866) 488-3188 (North America only) www.uniprint.net Trademark Acknowledgements UniPrint is a trademark of UniPrint, a division of GFI Solutions Inc. United States Patent No. 7,064,856. Microsoft, Windows, Windows 2003/2008, Windows XP, Vista, Windows 7, Microsoft Access, Microsoft Word, Remote Desktop Protocol (RDP), ASP.NET and Active Directory are either registered trademarks or trademarks of Microsoft Corporation. Citrix, MetaFrame, Presentation Server, XenApp, and ICA (Independent Computing Architecture) are registered trademarks of Citrix Systems. Adobe,...
Words: 5311 - Pages: 22
...2011 Install SharePoint Server 2010 Installation and configuration for development This tutorial helps you to install SharePoint Server 2010. It shows you step-by-step how to setup requirements like Windows Server 2008 R2 including roles and features, administrative and service accounts as well as SQL Server 2008 R2. With these requirements installed you are able to deploy SharePoint Server 2010. Get more tutorials at http://sharepoint-tutorial.net/ Need a SharePoint book? http://sharepoint-book.net/ SharePoint resources http://andreasglaser.net/ Disclaimer THIS INFORMATION IS PROVIDED “AS IS” WITHOUT ANY WARRANTY OF ANY KIND. All trademarks are property of their respective owners. © Copyright 2011 Andreas Glaser Software Engineering GmbH Version: 1.1, 3/9/2011 Overview 1 Table of contents 1. Overview .............................................................................................................................. 2 1.1. 1.2. 2. 2.1. 2.2. 2.3. Hardware requirements .......................................................................................................... 3 Software requirements ........................................................................................................... 4 Installation ............................................................................................................................... 5 Updates ...............................................................................................
Words: 4069 - Pages: 17
...CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two or more computers that are linked together. D. the use of satellites linking computers together. Answer: C 2. Reference: Basic Network Anatomy Difficulty: Easy The three essential components of every computer system include all of the following EXCEPT: A. software. B. hardware. C. people. D. cables. Answer: D 3. Reference: Basic Network Anatomy Difficulty: Easy All of the following are advantages of using a computer network EXCEPT that it: A. reduces costs when hardware is shared. B. promotes independence so users have exclusive control over their own data and applications. C. saves money when software is shared. D. enables data sharing, increasing efficiency and productivity. Answer: B Reference: Basic Network Anatomy Difficulty: Easy Copyright © 2008 Prentice-Hall. All rights reserved. Chapter 8: Networking and Digital Communication 4. All of the following statements are true EXCEPT: A. Wireless networks are convenient. B. Wireless networks are generally slower than wired LANs. C. Wireless networks use radio transmitters. D. Wireless networks are generally faster than wired networks. Answer: D 5. Reference: Networks Near and Far Difficulty: Moderate A(n) ____________ broadcasts messages to all devices connected to a LAN. A. switch...
Words: 3749 - Pages: 15
...Chapter 1 Case Project 1-1 For Thrift Towne I would choose a peer-to-peer network because they only have four computers and it’s the simplest form of a network. This type of network is simple to configure, so that would be an advantage for the volunteers that will be working there with minimum experience. With a peer-to-peer network, the computers can directly communicate with each other, so there is no need to purchase any more equipment. With a peer-to-peer network, all of the computers will have the same roles. No computer will have more authority over the others. At Thrift Towne, their workstations will be sufficient with the hardware that they came with. Since they would be using the workstations for inventory and schedules, there would be no need for any upgrades at this time. Chapter 1 Case Project 1-2 The network service I would recommend for Scoops would be management services. Since they are having issues with overwhelming traffic and slow servers, this service will help monitor the activity and notify administrators when the network becomes overloaded. If Scoops decided they wanted to expand, network management would help them balance out the data and distribute the data evenly. By using this service, none of the devices will become overwhelmed. Hence the slow servers. Network management is a good service for this company because of how many workstations they have connected to the server. Network management will help with security as well as back up. This service...
Words: 439 - Pages: 2
...Briefly describe various server operating systems Summarize the features of several embedded operating systems Explain the purpose of several utility programs See Page 397 for Detailed Objectives Discovering Computers 2012: Chapter 8 2 System Software • System software consists of the programs that control or maintain the operations of the computer and its devices Operating systems Page 398 Utility Programs Discovering Computers 2012: Chapter 8 3 Operating Systems • An operating system (OS) is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources Start and shut down a computer Coordinate tasks Provide a user interface Manage programs Establish an Internet connection Control a network Manage memory Configure devices Monitor performance Provide utilities Pages 398 - 399 Automatically update Administer security 4 Discovering Computers 2012: Chapter 8 Operating Systems Pages 398 – 399 Figure 8-1 Discovering Computers 2012: Chapter 8 5 Operating System Functions • The process of starting or restarting a computer is called booting Cold boot • Turning on a computer that has been powered off completely Page 400 Figure 8-2 Warm boot • Using the operating system to restart a computer Discovering Computers 2012: Chapter 8 6 Operating System Functions Page 401 Figure 8-3 Discovering Computers 2012: Chapter 8 7 Operating System...
Words: 1834 - Pages: 8
...Chapter 2 REVIEW OF RELATED SYSTEMS This chapter presents the gathered existing systems that are relevant to the development of Barangay Information System. It includes the related system and the technical background of the system. Related System Barangay West Alangilan Information System a study focused on the improvement of the system employed in the barangay. The system was designed to provide an organized information system that store, keep record and to implement the development of technology by making the system used in touch screen devices. (Esguerra, et.al., 2008) The study has a similarity and differences to the developed system. This is similar to the system in a way that they both can keep and store the data or records. They both have a database that will be kept the information. And it’s difference in the implementation. The system that they developed was implemented through touch screen devices. The Integrated Human Resources Information System with Biometric Technology of the City Government of Tanauan is concern on how they can store, update, and retrieve files in the shortest possible time and to well-organized the reports of the Human Resource Department Office of the City Government of Tanauan. They developed the system in Microsoft Visual Basic 2008 and MS SQL Server 2008. (Barba et.al, March, 2010) The study conducted by Barba et.al is similar with developed system because they can store, update, and retrieve information. And...
Words: 870 - Pages: 4
...Chapter 2 Review Questions Joshua Archuleta 06/19/2013 Your colleague is trying to upgrade from Windows Server 2003, Datacenter Edition to Windows Server 2008 Standard Edition, but the Setup program won’t allow the upgrade. Which of the following is the problem? c. Windows Server 2003, Datacenter Edition cannot be upgraded to Windows Server 2008 Standard Edition. Your IT director heard about a fast but inexpensive new computer and purchased it to be the new Windows Server 2008 server on the network. When you attempt to install Windows Server 2008, the operating system won’t install because there seems to be a problem with the BIOS in the new computer. How might this dilemma have been avoided? d. The IT director should have checked to see if the computer hardware and BIOS were certified for Windows Server 2008. You have installed Windows Server 2008, but when the computer reboots you only see a command-line screen. However, you intended to implement a full version of the operating ...
Words: 827 - Pages: 4
...Chapter 15 Solutions Review Questions 1. Your server has some damaged disk areas and won’t boot or run chkdsk automatically when you try to boot. Which of the following options should you try to fix the disk? Answer: d. Boot from the Windows Server 2008 installation DVD and access the command prompt to run chkdsk. 2. You are training a new server administrator and are discussing common boot problems. Which of the following do you mention? (Choose all that apply.) Answer: a. disk read errors, b. corrupted boot file, c. corrupted partition table, and d. disk failure on a drive containing boot files 3. You’ve just added a new monitor and driver to your server, but when you reboot, the display on the monitor is unreadable and distorted. Which of the following can you do to help troubleshoot the problem? Answer: c. Re-boot into the Enable low-resolution video (640x480) mode. 4. Name three problem-solving strategies for addressing a problem with Windows Server 2008. Answer: Any three of: understanding how a server and the network interact, training your users to help you solve problems, solving problems step by step, and tracking problems and solutions 5. The security log contains hundreds of entries. However, you only want to track the audited logon activities of a single user. Which of the following can you use? Answer: a. Set up a filter. 6. Name five elements that compose system state data. What command-line command can...
Words: 3422 - Pages: 14