To boot from an image transmitted over the network by a WDS server, a workstation must have a network adapter that supports _____. PXE – Pre-boot Execution Environment 9. The deployment scenario in which you save a workstation's user state data, wipe its disk, install Windows 7, and then restore the user state data is called the _____ scenario. Refresh of the computer 10. A _____ image enables a workstation to boot from a disk and connect to a WDS server.
1: What is the term used to describe a read-only copy of a user profile stored on a network share? A) Mandatory profile 2: When you create a new user account with the User Accounts control panel, you can only add it to which of the following groups? (Choose all that apply.) A) Administrators B) Users 3: When you log on to a newly installed Windows 7 computer for the first time, why can you not use the Administrator account? D) The Administrator account is disabled 4: Which of the following statements is true?
Lesson 2 knowledge Assessment Fill in the Blank 1. The primary tool used to configure the Windows environment and hardware is the control panel. 2. UAC is a feature that helps prevent a program making a change without you knowing about it. 3.
A. Sidebar C. Taskbar B. Notification area D. Desktop 10. What Windows 7 feature replaces the Security Center found in Windows Vista? A. BranchCache C. ReadyBoost B. Libraries D. Action Center 11.
Wadsworth, Michael 30 June 2011 IT104-Microsoft Network Operating System I Research Assignment Part 1 In this part of the research assignment, I will answer the following questions about the changes made to Windows Server 2008. The questions are as follows: 1. Why does Windows Server 2008 come in different versions? What is the significance of each version? Windows Server 2008 comes in different versions so that everyone has a variety to choose from depending on their individual needs.
What is windows registry, and what is its purpose? Windows registry is the main part where software and application keys / data / information are at. If messed windows won’t work. What are key requirements memory management should satisfy? Relocation, sharing, physical organization, protection logical.
Lesson 5 Connecting to a Network Knowledge Assessment Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a __________________. firewall 2. The __________________ tool provides a central access point for all of the network controls and connections on a computer running Windows 7.
Question 1 Which of the following is the most definitive feature of an event-driven programming environment? Answer | | Buttons for user input | | | Routines that perform calculations | | | Results that display on the screen | | | Text as the primary user interface | | | Program execution that varies based on user choices | 5 points Question 2 Which of the following statements is true concerning a Visual Basic.NET project? Answer | | A project is defined by its properties and methods. | | | A project contains at least one solution | | | You can use the Toolbox to add controls to a solution | | | A project will normally contain at least one form | | | A form will usually contain at least one solution. | 5 points Question 3 Which of the languages listed below is not available in Visual Studio.NET?
IS416: Week 5 Assignment 1: Windows Incident Handling Tools Learning Objectives and Outcomes You will learn about Windows incident handling tools and the ways to use them to manage a security incident. Assignment Requirements Responding to incidents in an efficient and repeatable manner depends on having the right tools in place before incidents occur. While there are many types of tools and utilities available for different purposes, some tools support incident handling tasks well. As a security administrator for Ken 7 Windows Limited, you have been given the task of evaluating various software tools for computer security incident response team (CSIRT) use. You should recommend at least one tool for each of the main CSIRT categories of functional needs.
10.10.0.10 Question 12 What value is configured in the DNS Servers: line? 10.10.0.10 Question 13 What is the default location for DHCP server backups? C:\windows\system32\DHCP\co-occurrence\ Question 14 What IP address is configured on the SEA-SVR2computer? 169.254.209.252 Question 15 What appears in the IP address text box? 10.10.0.55 Question 16 From which DHCP server are you receiving an IP address?