What is the main role of dns in a network

Assignment Help Computer Networking
Reference no: EM131286349 , Length: word count:2000

Assignment -1

Answer all the questions below. Keep your answers short and to the point. Type (do not handwrite) your answers. You need to get at least 10 of the questions correct to be judged competent in the task

1. Give two examples of technologies that implement biometric authentication

2. What is the name of the network service that provides authentication, authorisation and accounting services, and is commonly used to authenticate remote users connecting via a VPN?

3. List two protocols that can be used to implement a site-to-site VPN.

4. List two protocols that can be used to implement a remote access VPN.

5. What are the two main function of the Key Distribution Center (KDC) within the Kerberos protocol?

6. What are the two types of tickets issued to a Kerberos client once the client has been authenticated?

7. What is the main advantage of the CHAP (Challenge Handshake Authentication Protocol) over PAP (Password Authentication Protocol)?

8. When I install Microsoft Active Directory Certificate Services (AD CS), what are the two types of Certificate Authority (CA) that are supported (hint: one requires Active Directory to be installed, whereas the other does not) ?

9. What is the name of the list maintained by AD CS which has details of revoked certificates, and what information is stored in that list?

10. List three types of Windows logs that you can see in Windows 2012

11. What is the minimum amount of RAM you need on a server to install Windows 2012 Server R2?

12. List two advantages of using the Server Core installation option (as opposed to the GUI option) in Windows 2012 Server

13. What is the option in the sconfig utility in Windows 2012 that I would use to restore the GUI to a Windows 2012 Server that was running a Server Core installation?

14. What is the name of the disk virtualization technology in Windows 2012 Server that allows you to combine storage from multiple physical drives into a pool of storage?

15. What are three pieces of information I might want to document about an installed server?

16. I want to set up a Windows 2012 Server as a domain controller. What type of IP address do I need to allocate to the server so it can function as a domain controller?

17. What is the PowerShell command I use to install the Active Directory Domain Services role on a Windows 212 Server running Server Core?

18. On a Windows 2012 Server, where are the local user accounts stored?

Part -2:

Assignment

Answer all the questions below. Keep your answers short and to the point. Type (do not handwrite) your answers. You need to get at least 10 of the questions correct to be judged competent in the task

1. What is the main role of DNS (Domain Name System) in a network?

2. List the FTP commands that I would use to (i) list files available in an FTP directory and (ii) copy a file from an FTP server to my computer running the FTP client.

3. What is the main purpose of the Network Time Protocol (NTP) in a network?

4. List two file systems that can be used by the Windows 2012 operating system

5. What is the command I would enter from the Windows command line to (i) start the Windows service called "Workstation" ; (ii) stop the Windows service called "Workstation"

6. Give one advantage of journaling in file systems.

7. Briefly explain how Task Scheduler be used to help administer server backups.

8. Give two examples of counters that can be used on Performance Monitor to monitor disk performance on a server.

9. What do the PowerShell commaciil. s Get-Process and Stop-Process do? How can they assist in troubleshooting server problems?

10. List three types of Windows logs that you can see in Windows 2012

11. What is the minimum amount of RAM you need on a server to install Windows 2012 Server R2?

Reference no: EM131286349

Questions Cloud

Which method is better suited for recording warranties : You have just been asked to take over recording the warranties for the company's product. Currently, your company is using the cash basis for recording warranty expenses. Should that method continue to be used or is the accrual method better? Which m..
Describe the steps in developing an advertising campaign : Describe the steps in developing an advertising campaign. What is a creative brief? What is meant by the appeal, execution format, tonality, and creative tactics used in an ad campaign?
Companies are required to record compensated absences : Companies are required to record compensated absences (like vacations and sick days) on the books as liabilities. Several potential accounting issues can stem from recording these liabilities. Do you think that GAAP should be adjusted so that vacatio..
How do marketers use web site advertising : How do marketers use branded entertainment and support media such as directories, out-of-home media, and place-based media to communicate with consumers?
What is the main role of dns in a network : What is the main role of DNS (Domain Name System) in a network and list the FTP commands that I would use to (i) list files available in an FTP directory and (ii) copy a file from an FTP server to my computer running the FTP client.
What was the character of the gain : Sandra owned a rental apartment building in her sole name for four years. After her business advisors suggested that she conduct her rental activity in corporate form, she promptly transferred the apartment building to ABC Rental Corporation, a newly..
How do marketers pretest their ads : What is media planning? How do media planners use reach, frequency, gross rating points, and cost per thousand in developing effective media schedules? What are continuous, flighting, and pulsing media schedules?
Discuss the concept of judicial review : Discuss the concept of judicial review. How laws or regulations affect your present job or industry. Describe various forms of Alternative Dispute Resolution (ADR) and discuss how this is different from the court system.
What is the purpose of public relations : What is the purpose of public relations? What is a crisismanagement plan? What are the some of the objectives of PR? Describe some of the activities that are part of PR.

Reviews

Write a Review

Computer Networking Questions & Answers

  Creating a product prototype

Creating a Product Prototype-In this article review, you will describe the one thing about prototyping that surprised you the most

  Cyber crime research

Conduct an Internet search of cyber crimes. Find a cyber crime, a crime where a computer is used to commit a majority of the crime that has occurred in the last three months. Write a 1 ½ to 2 page synopsis of the crime, using APA style formatting.

  Analyse the network and enlist all vulnerabilities found

CSI 3207/CSI 5212 (Term 161) Major Assignment. You are required to produce the following deliverables as part of your contract: Analyse the network and enlist all vulnerabilities found. The vulnerabilities identified in the network architecture from ..

  Choose to run over tcp rather than udp

Describe why an application developer might choose to run over TCP rather than UDP. Suppose host A is sending host B a large file over a TCP connection. If the acknowledge number for a segment of this connection is y, then the acknowledge number for ..

  1 potential malicious attacksthree specific potential

1. potential malicious attacksthree specific potential malicious attacks that could be carried out against the

  Using your knowledge of pcs, local area networks

Using your knowledge of PCs, local area networks

  The learning objectives of the security plan assignment are

the learning objectives of the security plan assignment are for you to recognise the threats to information assets that

  How rdp file includes settings you configured in client

How can you tell from this experience that the RDP file includes the settings you configured in the client before you created the RDP file?

  Network consultation proposal and consultation presentation

This assignment contains two (2) Sections: Network Consultation Proposal and Network Consultation Presentation. You must submit both sections as separate files In order to complete this assignment.

  Incident and crime scene procedures

Compare and contrast collecting evidence at a private-sector incident scene and processing a law enforcement crime scene. Compare the differences and similarities of evidence seizure and storage procedures for these two types of investigations.

  Analyze the network protocols and security mechanisms

Analyze the network protocols and security mechanisms in wireless networks

  Explain digital multiplexing

Explain digital multiplexing, the digital T(X), and SONET hierarchy. Explain the differences between the American and European systems

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd