The maximum amount of system memory supported by Windows 7 enterprise is 192 GB. Lesson 2 1. Windows Easy Transfer supports to types of migrations, called wipe-and-load migration and side-by-side migration. 2. When a serious problem occurs with Windows 7, you might be able to repair it by starting the Windows PE operating system and running diagnostic tools.
Default Server Setting 9. What are the port numbers for HTTP and HTTPS? 80 / 443 10. What does the Internet Information Services (IIS) Manager in Windows Server 2008 use to configure individual modules rather than tabbed dialog boxes? icons 11.
Matching 1) Multi-factor authentication uses : Passwords plus smartcards 2) These are potentially destructive software: Malware 3) Automated password guessing is known as : Brute force 4) What is the standard for smart card support : PIV 5) Decrypts data encrypted with a certificate: Private Key 6) Standard for fingerprint scanners and other devices: Windows Biometric Framework 7) Windows authorization mechanism: User rights 8) What firewall rule requires IPsec: Authenticated exception 9) This key is stored in a digital certificate: Public key 10) Firewall exceptions are called: Rules Multiple Choice 1) Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing captured packets? Disable the Store Passwords Using Reversible Encryption policy. 2) Which of the following mechanisms is most often used in firewall rules to allow traffic on to the network? Port Numbers 3) Which of the following NTFS features is incompatible with EFS encryption? Compression 4) Which of the following command-line parameters will prevent a program executed using Runas.exe from accessing the elevated user’s encrypted files?
Enables a database application to access specific records in a database file stored on a SAN drive array B. Identifies specific devices in a drive array C. Installed by default in Windows Server 2008 D. Provided with some SAN drive arrays E. Supports copper and fiber optic media F. Requires redundant drives and redundant host adapters G. Fibre Channel topology H. Hard drive installed inside a computer I. Maintains a database of targets and initiators J. Disk array that does not use RAID Multiple Choice: Select one or more correct answers for each of the following questions. 1. Which of the following statements are true of striped volumes?
File permissions is used by allowing individual users and groups access to files based on a set of security settings for each file and directory. Linux uses a system of user IDs and group IDs to protect access to files, directories, and devices. Linux stores information about user accounts in the /etc/passwd file, and information about groups in the /etc/group file. Each user is assigned a unique numeric user ID, along with a text login name to identify the user in the system. Groups are also assigned unique numerical group IDs, and text group names.
If your PC was shipped with a bunch of stuff you’ll never use, get rid of that software. Generally, you can go to Start | Control Panel | Programs and Features and remove software you no longer plan to use. If the software adds items to the startup process, getting rid of it will make the PC start faster and, ultimately, perform better overall. 4. Keep viruses and spyware off your system If you’re running Windows, you need to be running an anti-malware program to keep viruses and spyware off your system.
Lab 3 worksheet CONFIGURING NETWORK CONNECTIONS Exercise 3.1 | Using the Network and Sharing Center | Overview | On a Windows 7 computer, the Network and Sharing Center provides access to most of the operating system’s networking tools and configuration parameters. In Exercise 3.1, you examine the current Sharing and Discovery settings on one of the computers that will become part of the lab network. | Completion time | 10 minutes | * 8. In Table 3-1, note the current state of the advanced Sharing and Discovery settings. Setting | Value | Network Discovery | Turned off | File and printer sharing | Turned off | Public folder sharing | Turned off | Media streaming | Choose media streaming options | File sharing connections | Use 128-bit encryption | Table 3-1 Exercise 3.2 | Enabling Network Map | Overview | In Exercise 3.2, you use local Group Policy to disable Network Map (which displays a diagram of the network in the work profile).
5. What is the value of the Group Policy in an enterprise environment? • We can use Group Policy on the enterprise to allow or prohibit their users from accessing the Windows Store, control the automatic download of updates for apps obtained from Windows Store, and allow or prevent the side-loading of apps. 6. What are some of the reasons that an organization would need to document their existing GPO settings?
Joe Smith IT222 Homework 1.1 PG 19 Fill in the Blank 1-10 1) The active directory database is stored on each domain controller in a file called _____. • ntds.dit 2) The active directory _______ is considered the security boundary for an active directory environment. • Forest 3) To provide fault tolerance, active directory utilizes a _______ replication model. • multimaster 4) To create a trust relationship with an NT4 domain, you will configure an ______. • External trust 5) The ______ naming context is replicated across the domain.
a. Everyone b. Network c. Interactive d. Anonymous Logon Prior to Windows Server 2003, the Anonymous Logon group was a member of the Everyone group, which had the potential to create significant security liabilities. Beginning in Windows Server 2003, anonymous access must be configured separately from access granted to the Everyone group. 2.