You want to capture all LDAP traffic to and from a server between 10:00 p.m. and 11:00 a.m. Which of the following actions should you perform? D. Create a scheduled task that runs the NMCap.exe command. 2. Which of the following filters is used with Network Monitor when you want to capture all DHCP packets that pass between a client computer called PC1 (MAC address 00-20-C4-15-22-C1) and a DHCP server called Server1 (MAC address 00-18-31-C3-23-CD and IP address of 192.168.1.1)?
a. Everyone b. Network c. Interactive d. Anonymous Logon Prior to Windows Server 2003, the Anonymous Logon group was a member of the Everyone group, which had the potential to create significant security liabilities. Beginning in Windows Server 2003, anonymous access must be configured separately from access granted to the Everyone group. 2.
b a. Information b. Admin c. Warning d. Critical 2. Which of the following logs from the Applications and Services Logs folder in the Event Viewer console are disabled and hidden by default? a,c a. Analytic b. Admin c. Debug
Lab 6 – Introduction to Exchange Server 1. What server roles and components are installed if you select Typical Exchange Server Installation from the Installation Type page? Mailbox Role, Client Access Role, Hub Transport Role, Unified Messaging Server Role, and Management Tools. 2. What will be automatically created on your Mailbox role after selecting yes in the previous step?
Setting | Value | Network Discovery | Turned off | File and printer sharing | Turned off | Public folder sharing | Turned off | Media streaming | Choose media streaming options | File sharing connections | Use 128-bit encryption | Table 3-1 Exercise 3.2 | Enabling Network Map | Overview | In Exercise 3.2, you use local Group Policy to disable Network Map (which displays a diagram of the network in the work profile). In order to increase the security of your network, employees should not be able to display a map of the network. In this Exercise we will disable the ability to display network maps in the private network. | Completion time | 10 minutes | 12. Take a screen shot of the Network Map window by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab03_worksheet file in the page provided by pressing Ctrl + V. * Exercise 3.3 | Manually Configuring TCP/IP | Overview | Because the lab network you are constructing for Contoso, Ltd. must be isolated from the production network, you do not want lab computers to obtain their TCP/IP settings from the DHCP servers on the production network.
Dedicated digital circuits 3. c. Routers use Layer 3 and ignore Layers 1 and 2. d. Routers discard old data-link headers and insert new data-link headers as part of their logic, which treats each interface’s lower-layer details as independent from each other. 4. b. As a transport service to deliver IP packets to the next IP router 5. b. Star 6. c. 64 Kbps, 1.544 Mbps, and any speed in between d. No literal distance limitation 7. a. A patch cable with RJ-48 8. c. The switches map the T1 customer lines to one of 28 different frequencies in the T3 trunks.
Enables a database application to access specific records in a database file stored on a SAN drive array B. Identifies specific devices in a drive array C. Installed by default in Windows Server 2008 D. Provided with some SAN drive arrays E. Supports copper and fiber optic media F. Requires redundant drives and redundant host adapters G. Fibre Channel topology H. Hard drive installed inside a computer I. Maintains a database of targets and initiators J. Disk array that does not use RAID Multiple Choice: Select one or more correct answers for each of the following questions. 1. Which of the following statements are true of striped volumes?
Ports 1 to 1023 4. Identify the port numbers for the following applications a. Telnet 23 b. HTTP 80 c. FTP 20, 21 d. DNS 53 e. DHCP 67, 68 5. Define the purpose of a connection oriented protocol. Give an example. It establishes the network connection, manages the data transfer, and terminates the connection.
Joe Smith IT222 Homework 1.1 PG 19 Fill in the Blank 1-10 1) The active directory database is stored on each domain controller in a file called _____. • ntds.dit 2) The active directory _______ is considered the security boundary for an active directory environment. • Forest 3) To provide fault tolerance, active directory utilizes a _______ replication model. • multimaster 4) To create a trust relationship with an NT4 domain, you will configure an ______. • External trust 5) The ______ naming context is replicated across the domain.
A ____ query creates a new table using the query results. a.|make-table|c.|create-table| b.|new-table|d.|merge-table| D 20. The ____ command within relational algebra takes a vertical subset of a table. a.|SELECT|c.|PROGRAM| b.|DELETE|d.|PROJECT| B 21. The ____ command within relational algebra includes the word OVER followed by a list of the columns to be included.