a) write memory b) copy tftp startup-config c) configure terminal d) copy running-config tftp 9. Which one of the following is a private IP networks, classified by RFC1918? a) 126.96.36.199 b) 188.8.131.52 c) 127.0.0.0 d) 192.168.254.0 10. Which Microsoft Windows IP networking command will display the status of current TCP connections? a) netstat -an b) ipconfig /tcp c) nslookup d) tracert 11.
What edition should you use? Datacenter Edition The Srv1 server on your network is currently being used as a file server. Srv1 runs Windows Server 2003 standard Edition. You decide to upgrade Srv1 to Windows Server 2008. You perform an upgrade on the server to Windows Server 2008 Enterprise Edition.
Susan Redfearn 01/10/14 CIST 2411 K. Simmons Lesson 1: Introducing Windows 7 - Answer and PAGE # 1. What is used with Windows Search to enable you to search Windows SharePoint sites, intranets, and specific Internet sites from the Windows Explorer interface. a. Federated Search (pg. 7) 2. What is an extension of Wake on LAN that works with wireless networks.
Suggested Resources: NMAP.Org - http://nmap.org/ Tenable Network Security - http://www.tenable.com/ Required Resources Internet access Submission Requirements Answer the questions in a 1-page Microsoft Word document; double-spaced; 12-pt. Times New Roman font. Cite all sources used. Unit 4 Assignment 1: SMTP Security Best Practices Course Objectives and Learning Outcomes * Configure Simple Mail Transfer Protocol (SMTP) to handle e-mail messages Assignment Requirements Evaluate the following scenario: In order to support mail traffic from your Web sites and servers, your Senior Administrator has assigned you the task of configuring and securing an SMTP server in your Windows Server 2008 environment. Make suggestions regarding SMTP server security.
Table for Individual Question FeedbackPoints Earned:1.0/1.0Correct Answer(s):C 3. __________ is the process of confirming a user’s identity, usually by requiring the user to supply some sort of token, such as a password or certificate. Table for Individual Question FeedbackPoints Earned:0.0/1.0Correct Answer(s):Authentication 4. SMTP server is essentially the Windows counterpart to the __________ program used by most UNIX Web servers. Table for Individual Question FeedbackPoints Earned:0.0/1.0Correct Answer(s):sendmail; Sendmail 5.
| Which of the following network components are typically capable of functioning as DHCP relay agents? | (b) | routers | | | (d) | Windows Server 2008 computers | | | | | 10. | Which of the following types of DHCP address allocation is the equivalent of a reservation in Windows Server 2008? | | | (d) | hybrid allocation | | | | | Review Questions | | | | | 1. | List the order in which DHCP messages are exchanged by the client and the server during a successful IP address assignment.DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK | | | 2.
COMP-2073 COMP-2073 Objectives * Get to know openssl * Get to know cryptography * Get to know linux Requirements * Three virtual machines in lab manager: Windows XP,7 and Linux * You can turn off all firewall rules for this lab * Please make sure to have your id in your screenshots * Please review the references below for encryption and so on * Sc means screenshot Lab 4 1. Use openssl on backtrack to encrypt and decrypt a file with symmetric
The following procedures describe how to add a native-boot virtual hard disk (VHD) to the boot menu using the BCDedit tool. If you are adding the VHD to a computer that already has a Windows® 7 installation, you will need to add a boot entry to the menu. If you are adding the VHD to a computer running an older version of Windows, for example Windows Server® 2008, you will need to update the system partition using the BCDboot tool and then edit the boot menu using the BCDedit tool. To update a BIOS-based computer to include a Windows 7 boot menu If you are deploying the VHD to a BIOS-based computer without a Windows 7 boot menu, for example, a computer using Windows Server 2008 as the running operating system, you will need to update the
Run lsof on your linux system 4. Use netcat as a listener on the windows xp machine and have it DOSd 5. Create a limited user on XP and/or 7 and have the user escalate privileges (with exploit) Lab Review Questions 1) In your own words, describe what you learned by completing this lab. A:) how vulnerable our systems can be if wrong ports are left listening, how to prevent attacks from the port numbers, how to DOS a system if its ports are left listening. how to find active connection from command line and a
Our rule host can handle Nslookup queries and resolve IP addresses and act exactly like a DNS server. References:  DNS on Wikipedia, http://en.wikipedia.org/wiki/Domain _Name_System#Authoritative_name _server ( accessed April 2012 ).  Nslookup on Wikipedia, http://en.wikipedia.org/wiki/Nslooku p ( accessed April 2012 ).  Hakuna Matata Blog, http://theos.in/desktop-linux/resolveconf-linux-example/ ( accessed April 2012 ).  The Computer Technology Documentation Project, http://www.comptechdoc.org/indepe ndent/networking/guide/netdns.html ( accessed April 2012 ).