Server 2 End of Lesson Answers

In: Computers and Technology

Submitted By Mangus110
Words 6605
Pages 27
Lesson 5
Active Directory Administration
Key Terms access token Created when a user logs on, this value identifies the user and all of the user’s group memberships. Like a club membership card, it verifies a user’s permissions when the user attempts to access a local or network resource.

Anonymous Logon Special identity that refers to users who have not supplied a username and password.

authenticate To gain access to the network, prospective network users must identify themselves to a network using specific user accounts.

authentication Process of confirming a user’s identity using a known value such as a password, pin number on a smart card, or the user’s fingerprint or handprint in the case of biometric authentication. authorization Process of confirming that an authenticated user has the correct permissions to access one or more network resources.

batch file Files, typically configured with either a .bat extension or a .cmd extension, that can be used to automate many routine or repetitive tasks.

built-in user accounts Accounts automatically created when Microsoft Windows Server 2008 is installed. By default, two built-in user accounts are created on a Windows Server 2008 computer: the Administrator account and the Guest account.

Comma-Separated Value Directory Exchange (CSVDE) Command-line utility used to import or export Active Directory information from a comma-separated value (.csv) file.

Comma-Separated Values (CSV) Format that contains a comma between each value. The CSV format can be used to import and export information from other third-party applications.

distribution group Non-security-related groups created for the distribution of information to one or more persons.

domain account Accounts used to access Active Directory or network-based resources, such as shared…...

Similar Documents

Lesson 2 Review Question Answers

...Review Questions - ANSWERS Name ____________________________ Answer the following questions: 1) What is a resource? People, equipment & materials necessary to complete a task 2) Why aren't resources assigned to summary tasks? Summary tasks are simply a grouping for a set of related tasks. The indiv tasks require resources but the summary task is just a compilation of those resources. 3) What is the difference between Start, Prorated and End in association with costs? Start – cost applied at the beginning of the task Prorated – cost applied as work is completed End – cost applied when the task is completed 4) Give a real-world example of the difference between a fixed cost and a cost per use? Give a real-world example of the difference between a fixed cost and a cost per use? Fixed Cost: (buy equipment) company bids $500 to clean carpet, cost of airline ticket… Cost Per Use: (rent equipment) Hourly rate on moving van, rental of shampoo machine, landing fee each time plane lands… 5) Why is a fixed cost entered with the task and not the resource? Because the cost is the same no matter how many people, hours, materials used. Not dependent upon the amount of time or number of resources it takes to complete. 6) Why is the resource cost for the Wiring Contractor $0.00? Because the installation of the wiring is a fixed contractual price of $4000 – it will not matter how many hours the contractor takes – still......

Words: 283 - Pages: 2

2008 Server Answers

...included with Windows Server 2008? IIS 7.0 When examining the Workgroup Model, a Windows Server 2008 server that participates in a workgroup is referred to as a ____. stand-alone server You have a copy of Windows Server 2008 64-bit Standard edition, and are in the process of purchasing server equipment. What is the maximum amount of RAM you can install on the server? 32 GB Carl works as a system administrator for a medium sized corporation. Recent green-awareness meetings and funding cutbacks within the corporation have increased the need for resource consolidation. With an increase in demand for a reduction in environmental impact, Carl is looking to virtualize five separate servers and host them on a single server running Hyper-V.Carl receives a volume license copy of Windows Server 2008 32-bit Enterprise Edition. He installs it on a machine with the following specifications:Processor: 64-bit Xeon Quad core 2.66 GHz Memory: 16 GB Available disk space: 50 GB Additional Drives: DVD-ROM Hyper-V requires a 64-bit edition of Windows Standard or better File Server Resource Manager (FSRM) provides ____. storage reports, configuration of disk quotas, and use of filters for files users can store on the server A network interface is composed of two parts: Device driver software and network interface This server role provides automatic IP address assignment and configuration for client computers. Dynamic Host Configuration Protocol (DHCP) Windows Server 2008 Enterprise is......

Words: 157037 - Pages: 629

System and Design End of Chapter Answers

...components- people, procedures, and data. People interface in some way with a system. The way we are supposed to interface with the information system is often documented in the form of procedures, and our interaction usually results in providing data to the system. 1.8 Name and describe each of the basic characteristics of an automated information system? Data are either input, stored, or output. A function is a business activity performed. Behavior is the observable effects of a request. 1.9 What are some of the problems associated with systems analysis and design? 1) Analysis problems, at their inception, have ill-defined boundaries and structure, and have a sufficient degree of uncertainty about the nature of the solution. 2) The solutions systems analysts come up with to solve the problems are artificial, and since they are designed by humans with different backgrounds, experiences, biases, and so on, there exists an endless variety of potential solutions. 3)Analysis problems are dynamic. 4) The solutions to analysis problems require interdisciplinary knowledge and skills, hence, the need for a team approach to information systems development. 5) The knowledge base of the systems analyst is continually evolving. 6) The process of analysis is primarily a cognitive activity. 1.10 What sociological and psychological factors play a role in systems analysis and design? Information systems involve people and, whenever people are involved in an......

Words: 9128 - Pages: 37

Server 2008 Chapter 2

...Chapter 2 1. Your colleague is trying to upgrade from Windows Server 2003, Datacenter Edition to Windows Server 2008 Standard Edition, but the Setup program won’t allow the upgrade. Which of the following is the problem? c. Windows Server 2003, Datacenter Edition cannot be upgraded to Windows Server 2008 Standard Edition. 2. Your IT director heard about a fast but inexpensive new computer and purchased it to be the new Windows Server 2008 server on the network. When you attempt to install Windows Server 2008, the operating system won’t install because there seems to be a problem with the BIOS in the new computer. How might this dilemma have been avoided? d. The IT director should have checked to see if the computer hardware and BIOS were certified for Windows Server 2008. 3. You have installed Windows Server 2008, but when the computer reboots you only see a command-line screen. However, you intended to implement a full version of the operating system with the normal Windows GUI. What has happened? d. During the installation, you selected to install Server Core instead of the full installation. 4. Which of the following are roles that can be implemented in Windows Server 2008? (Choose all that apply.) b. Application Server c. Fax Server d. Terminal Services 5. You have installed Windows Deployment Services, but the installation does not properly work. Which of the following might be the problem? (Choose all that apply.) a. No DHCP server is......

Words: 865 - Pages: 4

Lesson 2

...Lesson 2 By Denise Gamm June 14, 2010 EDU 371 Prof. Silver Miguel has been working with me for sometime. This week lesson we began to focus on words that contain an, en, in un and on. Since his first language in Spanish it has become evident that these combinations presented a challenge for him. I wanted him to comprehend the differences between these sounds. For homework I had Miguel to provide words for these letter combinations. Instinctively he wanted to have shared first letters, but as he soon found out that would not work; therefore, he was able to pronounce words using the above combination. Towards the end of the lesson he new his sounds combination of the letters and was able to provide a series of words; for example, an became ran, en became end, in became sin, un became sun and on became fond. The last really impress me because he added an additional letter. I was really excited to start the next lesson. We began with sounding out the ack, eck, ick, and uck. I made flashcards of these sounds and made Miguel focus on the sounds. Once I felt that he had accomplish the sounds, I ask Miguel to choose a letter, I wanted him to sound out the letter combination with any letter to see if that would make up a word. I was hoping providing a word game he would feel comfortable with the sounds, enough to make a word. Unfortunately it was a little frustrating for Miguel, because not all letters work with the letter combination. To make it easy for him I......

Words: 594 - Pages: 3

Client Server Networking 2

...Exercise 1 TASK You are setting up a new network for your company. You have a single location with approximately 145 hosts. Plans IT plans should accommodate 50% growth within the next 2 years. Growth 70 – 75 more hosts. What subnet range/s should be used? I would use a Classless addressing and start with a 172.16.0.0 Network address with a Subnet Mask of 255.255.255.0. This gives you 254 hosts per subnet which accommodates for your 50% growth over the next 2 years. For the time being you could use this one subnet and add another down the road if needed. If we add a second subnet down the road, and we are using DHCP, we would also setup a DHCP Relay Agent to relay the DHCP Broadcast messages across both subnets. Should IP addresses be dynamically or statically assigned? While you are setting this up, you can statically assign IP addresses for your servers, routers, firewalls, and printers. The rest of the computers and laptops should be setup to use dynamic IP addresses from DHCP. It should be standard security to have a firewall installed for your network to protect company information. You would have a router setup at access the internet for business purposes. If DHCP is used, should a router, firewall, or Windows Server be utilized and why? I would definitely setup a DHCP server to centrally manage your IP address pool. DHCP gives you a centralized administration point for dynamic IP configuration....

Words: 260 - Pages: 2

Answers to End-of Chapter Questions and Exercises

...ANSWERS TO End-of chapter QUESTIONS AND exercises Answers to Questions for Review 1. (Explicit and Implicit Costs) Amos McCoy is currently raising corn on his 100-acre farm and earning an accounting profit of $100 per acre. However, if he raised soybeans, he could earn $200 per acre. Is he currently earning an economic profit? Why or why not? Amos McCoy is not currently making an economic profit, despite the fact that he is making an accounting profit. This is so, because the accounting profit calculation does not take into account an important implicit cost—the opportunity cost of not raising soybeans. Actually, McCoy is experiencing an economic loss. According to our theory, he should get out of the corn business and begin growing soybeans. This question highlights the important distinction between accounting profit and economic profit. 2. (Explicit and Implicit Costs) Determine whether each of the following is an explicit cost or an implicit cost: a) Payments for labor purchased in the labor market b) A firm’s use of a warehouse that it owns and could rent to another firm c) Rent paid for the use of a warehouse not owned by the firm d) The wages that owners could earn if they did not work for themselves a) explicit; b) implicit; c) explicit; d) implicit 3. (Alternative Measures of Profit) Calculate the accounting profit or loss as well as the economic profit or loss in each of the following situations: ...

Words: 3245 - Pages: 13

Client Server 2

...ITT Technical Institute 3825 West Cheyenne Avenue, Suite 600 North Las Vegas, Nevada 89032 NT1330 Client-Server networking II Name: ____________________________________________________ Date: _______________________ NT1330 Week 1 Unit 1 Assignment 1 Instructions: 1. Complete this assignment and submit it prior to the beginning of the next class meeting. 2. Completely fill in the bubble for the correct answer(s), any other mark such as an X or just a line through it will be marked as incorrect. True/False Indicate whether the statement is true or false. 1. IPv6 uses 128 bits, or 16 bytes, for addressing, thus providing 2128 (about 340 billion) unique addresses. A True B False 2. Dynamic IP addresses can be assigned when administering TCP/IP hosts. These addresses must be configured and maintained manually. A B True False 3. Using DHCP relay agents eliminates the need to have a DHCP server on every subnet. A True B False 4. One benefit of the hierarchical structure of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy. A B True False 5. ICS turns your computer into a router so that other computers on the local network can access its Internet connection. A B True False 6. If you inappropriately allowed network discovery in a public network environment (for example, an Internet café), you would allow total strangers to see and access any file shares on your system. A B True...

Words: 1872 - Pages: 8

Answers to Lessons 4&5

... 1. Digitally signed P 137 2. Fragmentation P 126 3. ExFAT P111 4. Partitions, volumes P 107 5. FAT32 P 111 6. Checksum P 137 7. DiskPart P125 8. Administrators or Backup Operators P 122 9. MBR P 111 10. Widows Hardware Quality Lab P 139 TRUE/FALSE 1. FALSE 2. FALSE 3. TRUE 4. FALSE 5. TRUE 6. FALSE 7. TRUE 8. TRUE 9. FALSE 10. TRUE REVIEW QUESTIONS 1. Both spanned volumes and striped volumes utilize storage space of 2 to 32 disks. The difference between the two is that spanned volumes fill up the space on one disk at a time, while striped volumes write one strip at a time to each disk in sequence. Neither method provides fault tolerance because there is no redundant data. However, striped volumes provide better performance than spanned volumes because the sequential disk reads and writes are more efficient than those on a single drive. P 110 versions, 2. Manufacturers typically release driver updates to address problems with previous driver, enhance device performance, or add new features. 137 CASE Scenarios Because you can’t see the display, the only thing you can do is turn off the computer and restart it .Press F8 as the computer starts and select Safe Mode from the boot menu. This loads the operating system with a genic VGA display driver that enables you to at least see the interface. Open Device Manager and use the Roll Back feature on the Driver tab of the video adapter’s Properties sheet to remove the...

Words: 593 - Pages: 3

Lesson 2 Knowledge Assessment

...Lesson 2 knowledge Assessment Fill in the Blank 1. The primary tool used to configure the Windows environment and hardware is the control panel. 2. UAC is a feature that helps prevent a program making a change without you knowing about it. 3. Every computer in a network should have a unique computer name assigned to it. 4. A domain is a logical unit of computers that share the same security database and is usually associated with Microsoft’s Active Directory. 5. Romote Desktop allows you to connect to a server remotely to run programs just as if you were sitting in front of the computer. 6. For many security mechanisms to work, your computer needs to have the correct data and time. 7. Drivers are programs that control a device and act as a translator between the device and the operating sustem and programs that use the device. 8. Plug and play allows you to install or connect a device, and the operating system will automatically recognize, configure, and install the appropriate drivers for the device. 9. A Signal driver is a device driver that includes a digital signature proving who published the device driver and whether the device driver has been altered. 10. Device manager provides you with a graphical view of the hardware that is installed in your computer and gives you a way to manage and configure your devices. Multiple Choice 1. Which tool allows support personnel to interact with your session to help troubleshoot problems? B. Remote......

Words: 499 - Pages: 2

It 109 Lesson 1 Answers

...• As a control program it serves two major functions: (1) supervision of the execution of user programs to prevent errors and improper use of the computer, and (2) management of the operation and control of I/O devices 1.2 What are the main differences between operating systems for main frame computers and personal computers? Operating systems for batch systems have simple requirements than for personal computers. Batch systems do not have to be concerned with interacting with a user as much as a personal computer. As a result, an operating system for a PC must be concerned with response time for an interactive user. Batch systems do not have such requirements. A pure batch system also may have not to handle time sharing, whereas an operating system must switch rapidly between different jobs. 1.3. List the four steps that are necessary to run a program on a completely dedicated machine. (a. Reserve machine time. (b. Manually load program into memory. (c. Load starting address and begin execution (d. Monitor and control execution of program from console. 1.4 We have stressed the need for an operating system to make efficient use of the computing hardware. When is it appropriate for the operating system to forsake this principle and to “waste” resources? Why is such a system not really wasteful? Answer: Single-user systems should maximize use of the system for the user. A GUI might “waste” CPU cycles, but it optimizes the user’s interaction with the......

Words: 1190 - Pages: 5

Itt Tech Lesson 2

...Lesson 2 Installing Microsoft Windows Server 2008 Knowledge Assessment Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. The ability to use the installation process to fix problems with an existing Windows Server system is called ___ _______. 2. Installation of just the necessary components for a particular server role, without the GUI and other software features, is called _________ 3. The ____ ______ screen appears by default when the Windows Server 2008 operating system is first installed. 4. A(n) ___ _____ offers the best performance of any multi-disk configuration option within the Disk Management MMC, but does so at the expense of fault tolerance. 5. The feature that allows users on different computers to access the Internet through a single connection is called___ _______. 6. The ___ _______ provides a single point of administration to configure networking and firewall configuration tasks on a Windows Server 2008 computer. 7. The setting describing the network environment, such as home or public network, is called the ____ ______. 8. Unsolicited inbound traffic can be blocked through the use of the ____ ___. 9. The network location setting controls the behavior of __________. 10. Once a disk is converted from a basic disk to a(n) __ _____, it can only be accessed only by......

Words: 803 - Pages: 4

Gbs132 Lesson 2: Exercise

...GBS132 Lesson 2: Exercise Click Link Below To Buy: http://hwcampus.com/shop/gbs132-lesson-2-exercise/ GBS132 Lesson 2: Exercise Part 1 Mary Sky's banker has asked her to submit a personal balance sheet as of June 30, 2010, in support of an application for a $3,000 home improvement loan. She comes to you for help in preparing the balance sheet. So far, she has made the following list of her assets and liabilities as of June 30, 2013: Cash on hand $ 70 Balance In checking account 180 Balance in money market deposit account with Southwest Savings 650 Bills outstanding: Telephone $ 20 Electricity 70 Charge account balance 190 Visa 180 MasterCard 220 Taxes 400 Insurance 220 1,300 Condo and property 68,000 Condo mortgage loan 52,000 Automobile: 2006 Honda Civic 10,000 Installment loan balances: Auto loans 3,000 Furniture loan 500 3,500 Personal property: Furniture 1,050 Clothing 900 1,950 Investments: U.S. government savings bonds 500 Stock of Safeco Corporation 3,000 3,500 Review the balance sheet and determine Mary's (a) solvency, (b) liquidity, and (c) equity in her dominant asset. Part 2 Over the past several years, Joyce Chen has been able to save regularly. As a result, she has $54,188 in savings and investments. She wants to establish her own business in five years and feels she will need $100,000 to do so. If she can earn 6% on her money, how much will her $54,188 in savings/investments be worth in five years? Will Joyce have the......

Words: 529 - Pages: 3

Gbs132 Lesson 2: Exercise

...GBS132 Lesson 2: Exercise Click Link Below To Buy: http://hwcampus.com/shop/gbs132-lesson-2-exercise/ GBS132 Lesson 2: Exercise Part 1 Mary Sky's banker has asked her to submit a personal balance sheet as of June 30, 2010, in support of an application for a $3,000 home improvement loan. She comes to you for help in preparing the balance sheet. So far, she has made the following list of her assets and liabilities as of June 30, 2013: Cash on hand $ 70 Balance In checking account 180 Balance in money market deposit account with Southwest Savings 650 Bills outstanding: Telephone $ 20 Electricity 70 Charge account balance 190 Visa 180 MasterCard 220 Taxes 400 Insurance 220 1,300 Condo and property 68,000 Condo mortgage loan 52,000 Automobile: 2006 Honda Civic 10,000 Installment loan balances: Auto loans 3,000 Furniture loan 500 3,500 Personal property: Furniture 1,050 Clothing 900 1,950 Investments: U.S. government savings bonds 500 Stock of Safeco Corporation 3,000 3,500 Review the balance sheet and determine Mary's (a) solvency, (b) liquidity, and (c) equity in her dominant asset. Part 2 Over the past several years, Joyce Chen has been able to save regularly. As a result, she has $54,188 in savings and investments. She wants to establish her own business in five years and feels she will need $100,000 to do so. If she can earn 6% on her money, how much will her $54,188 in savings/investments be worth in five years? Will Joyce have the......

Words: 529 - Pages: 3

Chapter 2 Study Lesson

...CHAPTER 2 Pastor: Connie, open our meeting with prayer, please. Connie: Lord, we meet in Jesus' name. We believe you're present with us. You know we're concerned about our church, and we ask you to help us to know your will and be obedient to it. You know I struggle with a lot of things going on around here. So help us all to understand what this all means. Amen Pastor: Thanks, Connie. I appreciate the word, struggle, that you used. It probably describes where a lot of us seem to be these days. All week long I've had Yvonne's comment rattling around in my head. Yvonne: Did I say something wrong? What? Pastor: Well, you didn't say anything wrong, Yvonne. But what you did say was a heads-up to me about the way we've been taught to think about the church. Yvonne: So what did I say? Pastor: You don't remember? I can't forget it. You said something like, 'All I want to know is who stole my church. I'd like it back'. Ernie: I remember what Yvonne said. I told Gretchen about it, and she said she felt the same way. Pastor: Well, I suppose a lot of us could say the same thing. Maybe we all have the feeling that our church, at least the version of the church we like the most, has been hijacked. EVERYONE SPEAKING AT ONCE------ Varying opinions about whether the word steal was appropriate. Stan: (in a loud enough voice to bring everyone back together) If the people who stole the church-----Yvonne's word, not mine---are......

Words: 2240 - Pages: 9

Advertising Preferences | [MYLF] Brooklyn Chase - Fuck The Pain Away (30 11 2018) rq mp4 | Dragon Ball – Bảy Viên Ngọc Rồng chap 43