...Chapter 3 Solutions Review Questions 1. You have installed Windows Server 2008 and had to provide a new driver file for the disk drives in your computer. Now it seems like the disk drives are not responding as quickly as advertised. What can you do? Answer: b. Ensure that the DMA transfer mode is configured for the drives. 2. Each time that you access files on a disk, the monitor blinks or goes blank for several seconds. What might be the source of the problem and possible solution? Answer: d. There is an IRQ conflict and you need to use Device Manager to resolve the problem. 3. You have just used the servermanagercmd command to install two server roles. Which of the following commands can you use now to verify that the roles are installed? Answer: a. servermanagercmd -query 4. You want to confirm how space is allocated on the disk drives installed in your server. Which of the following tools enables you to do this? Answer: c. Server Manager 5. Which of the following can be installed using the Add Hardware Wizard? (Choose all that apply.) Answer: a. CD/DVD drive, b. keyboard, c. monitor, and d. disk drive 6. You’ve obtained a new driver from the Internet for your server’s NIC. What tool enables you to install the driver? Answer: a. Device Manager 7. You have noticed lately that your server is running very slowly, especially when switching between programs. You see that the C: partition is running low on space, limiting the...
Words: 2853 - Pages: 12
...Hana Laplant 4/12/12 Unit 4 Assignment 1&2 Enhance an existing it security policy framework Security policy planners must consider and the tasks they must complete to deploy an effective security audit policy in a network that includes computers running Windows 7 or Windows Server 2008 R2. Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them. To be well defined and timely, an auditing strategy must provide useful tracking data on an organization's most important resources, critical behaviors, and potential risks. In a growing number of organizations, it must also provide absolute proof that IT operations comply with corporate and regulatory requirements. Unfortunately, no organization has unlimited resources to monitor every single resource and activity on a network. If you do not plan well enough, you will likely have gaps in your auditing strategy. However, if you try to audit every resource and activity, you may find yourself with far too much monitoring data, including thousands of benign audit...
Words: 1876 - Pages: 8
...use Windows Server 2008 Group Policy to manage configurations for groups of computers and users, including options for registry-based policy settings, security settings, software deployment, scripts, folder redirection, and preferences. Group Policy preferences new in Windows Server 2008, are more than 20 Group Policy extensions that expand the range of configurable policy settings within a Group Policy Object (GPO). In contrast to Group Policy settings preferences are not enforced. Users can change preferences after initial deployment for information about Group Policy Preferences. By using Group Policy, you can significantly reduce an organization’s total cost of ownership. Various factors such as the large number of policy settings available, the interaction between multiple policies, and inheritance options can make Group Policy design complex. By carefully planning, designing, testing, and deploying a solution based on your organization’s business requirements, you can provide the standardized functionality, security, and management control that your organization needs. Overviewing Group Policy; it enables Active Directory–based change and configuration management of user and computer settings on computers running Windows Server 2008, Windows Vista, Windows Server 2003, and Windows XP. In addition to using Group Policy to define configurations for groups of users and computers, you can also use Group Policy to help manage server computers, by configuring many server specific...
Words: 377 - Pages: 2
...1. Your server has some damaged disk areas and won’t boot or run chkdsk automatically when you try to boot. Which of the following options should you try to fix the disk? Answer: d. Boot from the Windows Server 2008 installation DVD and access the command prompt to run chkdsk. 2. You are training a new server administrator and are discussing common boot problems. Which of the following do you mention? (Choose all that apply.) Answer: a. disk read errors, b. corrupted boot file, c. corrupted partition table, and d. disk failure on a drive containing boot files 3. You’ve just added a new monitor and driver to your server, but when you reboot, the display on the monitor is unreadable and distorted. Which of the following can you do to help troubleshoot the problem? Answer: c. Re-boot into the Enable low-resolution video (640x480) mode. 4. Name three problem-solving strategies for addressing a problem with Windows Server 2008. Answer: Any three of: understanding how a server and the network interact, training your users to help you solve problems, solving problems step by step, and tracking problems and solutions 5. The security log contains hundreds of entries. However, you only want to track the audited logon activities of a single user. Which of the following can you use? Answer: a. Set up a filter. 6. Name five elements that compose system state data. What command-line command can you use to backup system state data? Answer:...
Words: 297 - Pages: 2
...Performance Tuning Guidelines for Windows Server 2012 April 12, 2013 Abstract This guide describes important tuning parameters and settings that you can adjust to improve the performance and energy efficiency of the Windows Server 2012 operating system. It describes each setting and its potential effect to help you make an informed decision about its relevance to your system, workload, and performance goals. The guide is for information technology (IT) professionals and system administrators who need to tune the performance of a server that is running Windows Server 2012. For the most current version of this guide, see Performance Tuning Guidelines for Windows Server 2012. ------------------------------------------------- Disclaimer: This document is provided “as-is”. Information and views expressed in this document, including URL and other Internet website references, may change without notice. Some information relates to pre-released product which may be substantially modified before it’s commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. You bear the risk of using it. ------------------------------------------------- Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. ------------------------------------------------- This document does not provide you with any legal rights to any intellectual...
Words: 50142 - Pages: 201
...PowerShell for the IT Administrator, Part 1 Student Lab Manual (v1.1) Microsoft | Services © 2012 Microsoft Corporation Microsoft Confidential ITOE Educate Conditions and Terms of Use Microsoft Confidential - For Internal Use Only This training package is proprietary and confidential, and is intended only for uses described in the training materials. Content and software is provided to you under a Non-Disclosure Agreement and cannot be distributed. Copying or disclosing all or any portion of the content and/or software included in such packages is strictly prohibited. The contents of this package are for informational and training purposes only and are provided "as is" without warranty of any kind, whether express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. Training package content, including URLs and other Internet Web site references, is subject to change without notice. Because Microsoft must respond to changing market conditions, the content should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. Unless otherwise noted, the companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address...
Words: 37959 - Pages: 152
...perpetrates crimes on others. The computer forensics field is a relatively new investigative tool but enjoys continual advances in procedures, standards, and methodology which is making the identification, preservation, and analyzing of digital evidence a powerful law enforcement apparatus. The job of the cyber forensic professional is to look for clues the attacker left behind on web sites, servers, and even the e-mail message itself that will unravel their sometimes carefully woven veil of secrecy. Attackers come in all forms and from a variety of different circumstances. For instance, an attacker can begin a phishing scam with only a web server they control with very little programming experience and a way to send a lot of e-mail messages. (Jones 4) In order to combat the waves of cyber-attackers, we must utilize Open Source Community applications to combat the continual onslaught of infections, exploitations, and trickery employed everyday against our systems and networks. Today's attacker uses a variety of technologies to employ their methods and understanding those abilities is integral to preparing for an investigation. While dial up modems would seem pretty much a thing of the past, there are still a significant number of people accessing the Internet via these devices. Cable or DSL modems are now the in-vogue conduit to the Internet and offer the vulnerability of always being "on-line." Criminal activity comes in many different forms including, spam...
Words: 2742 - Pages: 11
...Final Exam CIS145 – Introduction to Client/Server Technology Name: Gail Jamison Configuring Search Options Windows Search is the native file and index searching program used in the Windows operating system. Windows Search checks for keyword matches between a word specified by the user and the contents of files or the file name itself. Configuring Windows Search allows the user to specify what types of files are searched, as well as modifying index settings. Windows Search options are found in the Indexing Options portion of the Control Panel in all current Windows operating systems. Click the Windows "Start" button. Select "Control Panel" from the options. Click "Indexing Options" in Windows 7. For Windows Vista or XP, click "System and Maintenance" then "Indexing Options. Click the Advanced" option and provide permission when prompted. Configure any of the options in the current tab and "File Types" tab. Click "OK" once you are finished. Windows Search is now configured. Deploying and Managing WSUS The first step in the deployment of Windows Server Update Services (WSUS) is to make important decisions, such as deciding the WSUS deployment scenario, choosing a network topology, and understanding the system requirements. The following checklist describes the steps that are involved in preparing for your deployment. Synchronization is the process by which a WSUS server obtains the updates. WSUS is 3.0n SPI...
Words: 1131 - Pages: 5
...Chapter 15 Solutions Review Questions 1. Your server has some damaged disk areas and won’t boot or run chkdsk automatically when you try to boot. Which of the following options should you try to fix the disk? Answer: d. Boot from the Windows Server 2008 installation DVD and access the command prompt to run chkdsk. 2. You are training a new server administrator and are discussing common boot problems. Which of the following do you mention? (Choose all that apply.) Answer: a. disk read errors, b. corrupted boot file, c. corrupted partition table, and d. disk failure on a drive containing boot files 3. You’ve just added a new monitor and driver to your server, but when you reboot, the display on the monitor is unreadable and distorted. Which of the following can you do to help troubleshoot the problem? Answer: c. Re-boot into the Enable low-resolution video (640x480) mode. 4. Name three problem-solving strategies for addressing a problem with Windows Server 2008. Answer: Any three of: understanding how a server and the network interact, training your users to help you solve problems, solving problems step by step, and tracking problems and solutions 5. The security log contains hundreds of entries. However, you only want to track the audited logon activities of a single user. Which of the following can you use? Answer: a. Set up a filter. 6. Name five elements that compose system state data. What command-line command can...
Words: 3422 - Pages: 14
...Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http:// www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission...
Words: 139691 - Pages: 559
...Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http:// www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission...
Words: 139691 - Pages: 559
...PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2008 by Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. Library of Congress Control Number: 2008920571 Printed and bound in the United States of America. 1 2 3 4 5 6 7 8 9 QWT 3 2 1 0 9 8 Distributed in Canada by H.B. Fenn and Company Ltd. A CIP catalogue record for this book is available from the British Library. Microsoft Press books are available through booksellers and distributors worldwide. For further information about international editions, contact your local Microsoft Corporation office or contact Microsoft Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoft.com/mspress. Send comments to rkinput@microsoft.com. Microsoft, Microsoft Press, Active Directory, Internet Explorer, JScript, MSDN, Silverlight, SQL Server, Visual Basic, Visual Studio, Win32, Windows, Windows Media, Windows NT, Windows PowerShell, Windows Server, Windows Vista and Xbox are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners. The example companies, organizations, products, domain names, e-mail addresses, logos, people, places...
Words: 65718 - Pages: 263
...vemulapalli@gmail.com ------------------------------------------------- 256-604-3898 Over 6 years of experience in IT industry, with the focus in Quality Assurance Testing of Client/Server, Mainframe and Web based applications. Hands on experience in HP/Mercury products ( Test Director, Quality Center) and Rational Tools (Test Manager, Robot, Clear Quest and RequisitePro). 0 Extensive experience with Retail e-Commerce, Healthcare and Banking applications experience in Quality Assurance, with solid expertise in testing software applications on Microsoft, java platforms using Manual and Automation tools - Mercury Tools (Win Runner, QTP, Quality Center, Test Director and Load Runner), IBM Rational Tools (Rational Clear Quest, Rational Clear Case) for Client Server and Web based applications. 1 Proficient in Analyzing System & Functional Specifications, Use Cases, Business Requirements, Business Rules to Identify Test Requirements, track the requirements (Bi-Directional traceability matrix) 2 Prepared Test Plans, Risk Management plans (Risk based Testing), Testing Strategy, Documenting the Testing Procedures, Design Test Cases, Test Scripts, Test Scenarios, Test Data, and Execute Test Runs. 3 Experience working under Waterfall and Agile Methodologies. 4 Have extensive experience in Windows, UNIX – examining log files, developing and executing batch, shell scripts. 5 Have experience in new, enhancement and maintenance projects. 6 Have good Experience on...
Words: 1916 - Pages: 8
...Server Overview O B J E C T I V E D O M A I N M AT R I X SKILLS/CONCEPTS Installing Windows Server 2008 R2 Introducing Server Roles Comparing Physical Servers and Virtual Servers Selecting Server Hardware Identifying Methods to Install Windows Servers MTA EXAM OBJECTIVE Understand server installation options. Identify application servers. Understand server virtualization. Identify major server hardware components. Understand Windows updates. LE SS ON 1 MTA EXAM OBJECTIVE NUMBER 1.3 2.1 2.5 5.1 6.3 LICENSED PRODUCT NOT FOR RESALE KEY TERMS BIOS clean installation disk cloning drives firmware motherboard network connections ports power supply processor RAM server Server Core server features server role system preparation tool unattended installation upgrade installation virtual server Windows activation Windows Deployment Services (WDS) Windows updates You just got hired at the Acme Corporation. They have several Windows Server 2003 and Windows Server 2003 R2 Servers and a Windows Server 2008 Server. While talking to your management team, you determine that you need to upgrade all of the servers to Windows Server 2008 R2 and you need to create a web farm consisting of three new web servers and a single back end SQL server, also running Windows Server 2008 R2. You need to figure out the best way to accomplish your goal. 1 2 | Lesson 1 ■ Understanding What a Server Does With today’s computers, any computer on the network can provide services or request...
Words: 14221 - Pages: 57
...Abeywardena COURSE COORDINATOR Mr. Kevin Tan Pooi Soo EXTERNAL COURSE ASSESSOR Associate Professor Norhaziah Md Salleh PRODUCTION Editor: Mr. Terence Too Yang-Yau In-house Editor: Ms. Jeanne Chow Graphic Designers: Ms. Patsy Yap and Ms. Leong Yin Ling Wawasan Open University is Malaysia’s first private not-for-profit tertiary institution dedicated to adult learners. It is funded by the Wawasan Education Foundation, a tax-exempt entity established by the Malaysian People’s Movement Party (Gerakan) and supported by the Yeap Chor Ee Charitable and Endowment Trusts, other charities, corporations and members of the public. The course material development of the university is funded by Yeap Chor Ee Charitable and Endowment Trusts. © 2008 Wawasan Open University First revision S1 2011 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission from WOU. Wawasan Open University Jalan Sultan Ahmad Shah, 10050 Penang. Tel: (604) 2180333 Fax: (604) 2279214 Email: enquiry@wou.edu.my Website: www.wou.edu.my UNIT 1 C Introduction to computers Contents Unit 1 Introduction to Computers Course overview Unit overview Unit objectives 1.1 Computer concepts Objectives Introduction History of computers Computer defined Computer capabilities Hardware and...
Words: 26839 - Pages: 108