Mouse | b. Monitor | c. Telephone set | d. Modem | 3. Which of the following is a famous and commonly Use web Browser | | | a. MSN | b. Internet explorer | c. Mozilla | d. Yahoo | 4. Which Language is used to create web pages. | | | a. FoxPro | b.
Why is 64-bit architecture an advantage? 4. Explain the new features of Windows Server 2008, such as server core, Virtualization, and PowerShell. What is the role of these features and how will they improve efficiency in administrative Windows? 5.
IIS 7 provides the basic Web server functionality that enables you to publish a standard Website on the Internet or on a private network. 2. The activities performed for network clients by a Windows Server 2008 are known as __________. A. services B. roles C. domains D. functions
Chapters 7-9 70-643 Chapter 7 Matching A. Application hosting technology that launches a separate for each request is Common Gateway Interface (CGI.) B. The Internet Server Application Programing Interface(ISAPI) provides the interface between IIS and ASP.NET in IIS7’s Classic mode. C. The first Web technology to enable servers to process code in HTML files is Server Side Includes (SSI).
Explain how Network Access Protection (NAP) creates a security architecture that allows administrators to control access to critical resources and assist users in meeting security requirements. ANSWERS: 1. The function of the following Windows Server 2008 services is as follows: a. Active Directory Federation Services – this is a component in the Windows Server 2008 operating system that provides Web single-sign-on (SSO) technologies to authenticate a user to multiple Web applications over the life of a single online session. b.
| 17. Take a screen shot of the Group Policy Management console displaying all of the policy settings you configured in this exercise by pressing Alt+Prt Scr and then paste the resulting image into the Lab 8 worksheet file in the page provided by pressing Ctrl+V. Exercise 7.2 | Testing Internet Explorer Policies | Overview | In this exercise, you will confirm the Internet Explorer settings that are configured with a GPO are deployed to a client computer. | Mindset | When troubleshooting problems, you will need to ensure that settings that you configure with a GPO are actually deployed to the clients. |
5. You can use the __LDIFDE__ command-line utility to create and modify Active Directory objects. 6. When users log on to Active Directory, they receive a(n) _access token_ consisting of all of their security group memberships. 7.
It displays the name of the directory that appears in the View pane. It can be displayed either iconic or texual. g, Nautilus – Is a browser tool. This component gives you two ways to work with files: the traditional File Browser view and the Spatial view, which is the default view with Fedora/RHEL h, Workspace – This is a subdivision of the desktop and how it is displayed. It can hold up to four displays, i, Workspace switcher
Just click Delete because we can always bring the graph up again later. Save your project. You can expand and review other graphs at this point if you desire. You will find that the VO Engineer can access both the web server and the Database Server, and that the Online Shopper can access the web
Answer: Ping.exe 7. The Windows 7 command-line utility that enables you to generate DNS request messages and then transmit them to specific DNS servers on the network is called __________________. Answer: Nslookup.exe 8. Most networks use __________________ to dynamically assign addresses and configure computers to use them. Answer: Dynamic Host Configuration Protocol (DHCP) 9.