She needs to start the NNTP service manually and then configure it to start automatically 17. a. Paths to internal server files 18. b. Delivery 19. d. Configure your Exchange server to use Transport Layer Security (TLS) when it connects to the mail server at Northwind Traders. Ask Don Hall to configure the Exchange servers at Northwind Traders in the same way. 20. a.
Explain how Network Access Protection (NAP) creates a security architecture that allows administrators to control access to critical resources and assist users in meeting security requirements. ANSWERS: 1. The function of the following Windows Server 2008 services is as follows: a. Active Directory Federation Services – this is a component in the Windows Server 2008 operating system that provides Web single-sign-on (SSO) technologies to authenticate a user to multiple Web applications over the life of a single online session. b.
If the user exists in web server then he/she should be directed to proper html page with welcome message. Practical No 11: Write the following application. The initial page is called Validator.aspx and it has 7 text boxes representing (Name, Family Name, Address,City, Zip Code, Phone and e-mail address), and a Check button. Display the page that usergets after clicking on Check button. The required validation actions are: name different from family name, address at least 2 letters, city at least 2 letters, zip-code 5 digits, phone according to the format XX-XXXXXXX or XXX-XXXXXXX, e-mail is a valid
What numeric range is commonly referred to as well-known ports? * 0-1023 9. What numeric port range is commonly used by clients in a client-server communication session? * 49152–65535 10. What do you believe would be the result of installing and configuring a web server to “listen” on ports other than 80 and 443?
2. a) What technology components (cover the categories of software, hardware and networks) do we need at FastFit to interact with our customers on the web? (use a table) b) At what location within FastFit would you place these technology components and why? (use a table) A) Hardware | Software | Networks | Personal Computers | * World Wide Web * VOIP software | Access to the Internet | Servers | Electronic Mail | Internet | Bar Code | Database with reliable information | Internet | Modem | Security Firewall to control outsiders’ access | Internet | B) Location to place Technology Components | Why? | Headquarters | All the operations must be controlled from headquarters, so the right placement of these components is HQ. The store
Unit 4 Problem Set 1 - Unit 4 Problems Exercise 1 – User-Profile Scenario Matching a. Switches an account from the standard user token to the administrative token b. Displayed when a regular user requires administrative access c. Confirmation of a user’s identity d. Suppresses the operation of all controls except the UAC prompt e. Enables users to access their desktops from any workstation f. Grants a user a specific degree of access to a resource g. Hosts and AD DS domain h. Displayed when an administrator requires administrative access i. Placeholder for a collection of users with a similar characteristic j. A profile the multiple users can run simultaneously 1. A Credential prompt 2. E roaming user profile 3.
| 17. Take a screen shot of the Group Policy Management console displaying all of the policy settings you configured in this exercise by pressing Alt+Prt Scr and then paste the resulting image into the Lab 8 worksheet file in the page provided by pressing Ctrl+V. Exercise 7.2 | Testing Internet Explorer Policies | Overview | In this exercise, you will confirm the Internet Explorer settings that are configured with a GPO are deployed to a client computer. | Mindset | When troubleshooting problems, you will need to ensure that settings that you configure with a GPO are actually deployed to the clients. |
Research Assignment II: 1. What is the purpose of the Global Names Zones in Windows Server 2008 DNS Servers? The Global Names Zones is a new function from Windows Server 2008 which offers an organization move to a DNS only environment, eliminating the need of having a WINS Server in the network. If an user request a resource in the NETBIOS Name by adding only the Domain Suffix, the request is send to the DNS Server. If the Global Name Zone had the name, it will respond back to the user but if it doesn’t had the query then the authoritative zone will check for the name.