Exercise 10.1 Knowledge Assessment (Page 104) Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. The two programs that make up the User State Migration Tool are called _____ and _____. Disk Image 2. The two programs that make up the User State Migration Tool are called _____ and _____.
The Windows 7 command-line utility that can tell you if the TCP/IP stack of another system on the network is functioning normally is called __________________. Ping.exe 7. The Windows 7 command-line utility that enables you to generate DNS request messages and then transmit them to specific DNS servers on the network is called __________________. Nslookup.exe 8. Most networks use __________________ to dynamically assign addresses and configure computers to use them.
a. Local users b. Domain users 7: Which of the following built-in Windows 7 accounts are special identities? (Choose all that apply.) b. Everyone c. Authenticated User 8: Under which of the following conditions are Windows 7 local user accounts required to use complex passwords?
Matching Complete the following exercise by matching the terms with their corresponding deﬁnitions. 1. credential prompt - b. displayed when a regular user requires administrative access 2. roaming user profile - e. enables users to access their desktops from any workstation 3. Admin Approval Mode - a. switches an account from the standard user token to the administrative token 4. special identity - i. placeholder for a collection of users with a similar characteristic 5. Authentication - c. confirmation of a user’s identity 6. elevation prompt - h. displayed when an administrator requires administrative access 7. mandatory user profile - j. a profile that multiple users can run simultaneously 8. secure desktop - d. suppresses the operation of all controls except the UAC prompt 9. Authorization - f. grants a user a specific degree of access to a resource 10. domain controller - g. hosts an AD DS domain Multiple Choice Select one or more correct answers for each of the following questions.
Prior to the introduction of the domain name system, computers use hosts files to map human readable names to ip addresses. A sub-net mask is used to separate the host address portion of an IP address from the network address. The sub-net mask within the TCP/IP configuration is used to distinguish the network address from the host address. In dotted-decimal notation, each Ipv4 address is broken into four octets. Server computers and other systems that need to be accessed reliably by network clients should be configured with a static IP address.
Increase fault border by change integrity DHCP orbital cavitys. 2. Balance the load on your DHCP host by using the 80/20 rule for scopes 3. countenance contrasted administration of DHCP hosts by comfiguring windows Firewall ports. Question 4 What is the name of the computer you are working from? SEA-SVR2 Question 5 What IP addressing settings are currently configured?
Create a .plan file in your home directory. Does finger display the contents of your .plan file? The answer is system dependent. 8. What is the result of giving the which utility the name of a command that resides in a directory that is not in your search path?
1. What technology provided by Microsoft is used to perform a network-based installation of Windows operating systems including Windows XP, Windows Vista, Windows Server 2003, and Windows Server 2008? a. IAS b. Server Core c. SIM d. WDS 2. What does the name of the answer file on a USB drive have to be to perform an automatic installation? a. autounattend.xml b. auto.xml c. auto.txt d. automatic.xml 3.
When all the documents are finish scanning, the user needs to upload them into the online storage of the system through the user interface by clicking on an “upload button”. The documents are then indexed with a metadata about that specific document being it date, title and other relevant information through either a dropdown box or a written description. The document is then tagged with a specific identification number for easy retrieval and access. The documents are then saved in the flat file system through the local server or remote server. A two way system of saving is used here.