Css 2nd Quarter Quest
Css 2nd Quarter Quest
A configuration design for a communications network optimizes efficiency by arranging software and
hardware for efficient transmission of voice, audio, and data between points.
Network Configuration
Client/server
2. is essentially a relationship between processes running on separate
computers interconnected by a computer network. The server process is the provider
of services and the client process a consumer, so there is a clear separation of
function, in terms of hardware and software.
Server Hardware
3. A server computer, a combination of hardware and software, is a personal computer or workstation
that serves multiple clients simultaneously, typically having a faster processor, memory, and storage
space.
Server Software
4. A server computer, running a specific operating system like Windows Server, Linux, or Unix, allows
users to share resources, access the Internet, and specialize in tasks or provide redundancy in case of
server failure.
Client
5. A type of computer, running an operating system like Windows XP, Vista, or 7, is a personal computer
with its software, enabling direct communication with servers and information processing, distinguishing
it from dumb terminals in centralized computing systems.
Network Services
6. It manages networks, including LAN/ WLAN management, unified communications, consulting, and
implementation, using software and connectivity tools. They offer advantages like quality control,
performance, and issue management
Remote Access
7. A functional server computer and software set up to handle users accessing a network remotely. It
typically includes a firewall server for security and a router for forwarding requests. It may work with
modem pool managers or be part of a VPN.
Domain Controller
8. It is a server that handles security requests from other Windows Server domains, including logging in
and checking permissions. Originating in Windows NT, it manages access to user and server resources
with usernames and passwords.
Web Services
9.It integrates Web-based applications using XML, SOAP, WSDL, and UDDI open standards over an
Internet protocol backbone. They allow businesses to communicate data without intimate knowledge of
each other's IT systems, facilitating data exchange between organizations.
Database Services
10.These are cloud computing models that offer users access to databases without the need for
hardware setup, software installation, or performance configuration where service providers handle
administrative tasks and maintenance, allowing users to use the database.
Proxy Server
11.It is a computer that enables clients to make indirect network connections to other network services.
It provides resources either by connecting to the specified server or serving them from a cache.
• File Server:
15.File servers centrally store user documents and files, offering easy management and backup. Ideal for
fast hard-disks, multiple processors, and redundant power supplies, they run FTP or SMBP protocols.
• Print Server:
16.Print Server, which redirects print jobs from client computers to specific printers.
• Mail Server:
17.Mail Servers transmit emails using SMTP protocols, exchange emails between domains, and are
commonly used with software products like Microsoft Exchange Server, SENDMAIL, Postfix, and Apache
James.
• Application Server:
18.It runs common computer programs for network users, controlling business logic and enabling access
to various applications from a central server, such as SAP ERP, Microsoft Dynamics, Oracle ERP Cloud, and
Ramco ERP.
• Database Server:
19.Database servers enable network clients to access, modify, and delete an organization's data stored in
a common database, using systems like Oracle, Microsoft, PostgreSQL, IBM, MySQL, and MongoDB.
• Directory Servers:
20.Directory Servers are central management tools that ensure the security, authentication,
authorization, and accounting of network users and resources.
23. What allows businesses to define, manage, access and secure network resources including files,
printer, people and applications?
• Directory Services
24. What Windows Server 2008 feature is a special installation option that creates a minimal
environment for running only specific service or roles?
• Server Core
25. You set up a network where each computer acts as a client and server in which each user share
other's resources, including printers. What do you call this set up?
• Peer-to-peer networking
26. What may be the problem if the shared folder could not be accessed? What will you do to resolve
the problem?
• Computer does not belong to the network • Check the network address and the workgroup
27. Aside from installing anti-virus software, how can you protect your server from viruses?
• Install firewall • Install updates
28. What are you going to do to access a server located far from the client computer which you are
troubleshooting?
• Remotely access the server using Remote Desktop Connection
29. What may be the reason why you cannot access and connect to other computers remotely? How
would you resolve the problem?
• Computer has no password • Assign password to that computer
30.After installing an anti-virus to your network, you cannot connect to other computers, what could be
the possible cause of it?
• Anti-virus is blocking network access • Configure the anti-virus so as not to block the network access
31. After logging, you noticed that you cannot change the IP address of other users, what could be the
possible cause?
• Password or Account is not an Administrator Account
32. What policies are you going to suggest to secure your server?
• Use Anti-virus software • Prohibit downloading unless authorized by Administrator • Restrict
administrative access.
33. What would you suggest in order to come up with strong admin password?
• Apply Kebreros • Use password that contains combination of letters, numbers, upper and lower case
letters and special characters
34. As an Administrator and security precaution, what type of account will you use in performing
ordinary tasks?
• Power user account • Limit the use of Administrator Account
36. Where would you find "Enable automatic updating and feedback" and "Download and install
updates".
Update the Server
Roles Summary
38. What option in Server Manager would you use to install Active Directory Domain Services on
Windows Server 2008 R2?
Add roles
39. What option in ICT/Customize This Server would you use to install Web Sever?
Add Features
40. What option in ICT/Customize This Server would you use to install .NET Framework 3.5.1 Features?
Security Information
41. To verify the data and time updates were installed on your Windows Server 2008 R2 system, what
option in Server Manager would you use.
trust relationship
46.Enables administration from a particular domain to grant access to their domain's resources to users
in other domains.
OU structure
47. Modeled after company's Organizational chart, departments and/or resource needs. security settings
of an OU is inherited by all child objects of the container.
delegation of control
50. Administration of an OU is tasked to a department supervisor or manager, thus allowing that person
to manage day-to-day resource access as well as more mundane tasks, such as resetting passwords.
Directory Services
What allows businesses to define, manage, access and secure the resources including files, printer,
people, and applications?
Server Core
What Windows Server 2008 is a special installation option that creates a minimal environment for
running only specific server or roles?
Site
What term Is used to define one or more IP subnets that are, connected by the fast links?
Get a LAN tester and check the cable Swap a good or working cable in place with the suspected cable
What would you do if you suspect that the cause of the trouble in the network is the cable?
Wrong IP address —
maybe some computer don't belong to the workgroup = wrong subnet mask
After replacing a good cable, still the computers cannot connect to each other, what are the possible
causes if the network is using static IP addresses?
Crossover cable
What type of cable will you use to connect two computers?
Workgroup name should be the same, IP addresses should have the same network address and host
address should be different; for subnet mask, computers in the same network or subnet should be the
same.
In order for computers to network, what are the things you are going to set or configure?
Create a folder using windows explorer. Right click the folder and click Sharing and Security
What should you do if you want to transfer file/files into another computer? How do you share a folder
name TESDA in DRIVEC?
What are the Container Objects that are found in Server 2008?
Forests Domain Trees Domains Organizational Units (OUs)
Forests
The largest container object with AD. Defines the fundamental security boundary with AD - a user can
access resources across an entire AD forest using a single logon/ password combination.
Directory Services
What allows businesses to define, manage, access and secure the resources including files, printer,
people, and applications?
Server Core
What Windows Server 2008 is a special installation option that creates a minimal environment for
running only specific server or roles?
BIOS
What do you call the computer software which you configure before installing the OS?
Torx Screwdriver
What type of screw driver will you use for small screws usually found in Compaq and Apple computers?
Replication
The process of keeping each domain controller in synch with changes that have been made elsewhere on
the network.
Outbound replication
Occurs when a domain controller transmits replication information to other domain controllers on the
network.
Inbound replication
occurs when a domain controller receives updates to the Active Directory database from other domain
controllers on the network.
Functional Levels
Designed to offer support for AD domain controllers running various supported operating systems by
limiting functionality to specific software versions. As legacy DCs are decommissioned, administrators
can modify the functional levels to expose new functionality within AD.
Loose Consistency
Individual DCs in an AD database may contain slightly different information, because it can take
anywhere from a few seconds to several hours for changes to replicate throughout a given environment.
Publish
An option that allows users to access network resources by searching the Active Directory database for
the desired resource.
Container Object
An object that is used to organize other objects.
Leaf object
An object that does not contain other objects and usually refers to a resource such as a printer, folder,
user, or group.
What are the Container Objects that are found in Server 2008?
Forests Domain Trees Domains Organizational Units (OUs)
Forests
The largest container object with AD. Defines the fundamental security boundary with AD - a user can
access resources across an entire AD forest using a single logon/ password combination.
Domain Tree
In AD, a logical grouping of network resources and devices that can contain one or more domains
configured in a parent-child relationship.
Domain
A grouping of objects in AD that can be managed together. A domain can function as a security boundary
for access to resources, such as computers, printers, servers, applications, and file systems.
OU structure
Modeled after company's Organizational chart, departments and/or resource needs. security settings of
an OU is inherited by all child objects of the container.
delegation of control
Administration of an OU is tasked to a department supervisor or manager, thus allowing that person to
manage day-to-day resource access as well as more mundane tasks, such as resetting passwords.
What is the Fourth Partition type, first introduced in Windows Server 2003?
Application Partition. Provides fine control in which administrators can direct where information is
replicated to a domain or forest.
object
An element in AD that refers to a resource.
Attributes
Characteristics associated with an object class in AD that make the object class unique within the
database.
Where are the attributes defined?
In the Schema, but the same attribute can be associated with more than one object class.
Schema
Master database that contains definitions of all objecta in the AD. It contains two components: object
classes and attributes.
Site
one or more IP subnets connect by fast links. Usually means all computers that are connect via a single
LAN.
Locator Service
AD DNS provides direction for network clients that need to know which server performs what function.
SRV Records
The locator records within DNS that allow clients to locatw an AD domain controller or global catalog.
Rolling Upgrades
Upgrade strategy based on functional levels that allows enterprises to migrate their AD DCs gradually,
based on the need and desire for the new functionality.
What are the three domain functional levels supported in Windows Server 2008?
Windows 2000 Native Windows Server 2003 Windows Server 2008
What is the default forest functionality enabled when Windows Server 2008 DC is introduced into the
network?
Windows 2000
shortcut trust
A manually created no transitive trust that allows child domains in separate trees to communicate more
efficiently by eliminating the tree-walking of a trust path.
tree-walking
the trust path up a domain tree through the child domains and parent domains to the root domain and
then down the other parent domain to the desired child domain"
external trust
A one-way, nontransitive trust that is established with a Windows NT domain or a Windows 2000
domain in a separate forest.
cross-forest trust
Transitive Trust type (one-way or two-way) that allows resources to be shared between AD forests.
What is the term used for software which is not part of the OS?
• Third party software/installer
What do you call a bootable disk that contains a full usable OS?
• Live CD/DVD
Why there are different executable programs running in task Manager when you start a Remote App
from a full desktop?
• Remote App and full desktop use different shells and logon mechanisms • Full desktop uses
EXPLORER.EXE whereas Remote App uses RDINIT.EXE (equivalent of USERINIT.EXE used on full desktop
sessions) • EXPLORER.EXE and RDINIT.EXE both launch RDPSHELL.EXE and updates the client-side taskbar
and handles logoff logic
Do you still need to lock down the server when you use RemoteApp programs?
• Absolutely YES • RemoteApp are for display convenience and not for security feature • Users can get to
the file system and run any executable they have access so there's a need to lock down the server •
AppLocker (or Software Restriction Policies), NTFS Permissions and Group Policy can be used to lock
down servers
Can you configure a server to permit users only to connect via RemoteApp and block users from
connecting to the desktop?
• NO. This option is not supported.
What contains the rules and definitions that are used for creating and modifying object classes and
attributes within the Active Desktop?
• Schema
What allows businesses to define, manage, access and secure network resources including files, printer,
people and applications?
• Directory Services
What Windows Server 2008 feature is a special installation option that creates a minimal environment
for running only specific service or roles?
• Server Core
What is the minimum amount of storage space required for the Active Directory installation files?
• 200MB
You set up a network where each computer acts as a client and server in which each user share other's
resources, including printers. What do you call this set up?
• Peer-to-peer networking
What special identity group contains all authenticated users and domain guest?
• Everyone
What do you call the group that you cannot manually modify or view its membership?
• Special Identity Group
What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the
schema, if necessary?
• LDIFDE
What may be the problem if the shared folder could not be accessed? What will you do to resolve the
problem?
• Computer does not belong to the network • Check the network address and the workgroup
Aside from installing anti-virus software, how can you protect your server from viruses?
• Install firewall • Install updates
If one of the users forgot his/her password, how are you going to change the password? Enumerate the
steps in resetting a password using GUI
• Reset the password • Log in as administrator • Click start and right click Manage • Click Local Users and
groups • Double click Users folder • Select and right click the username • Select Set password
What are you going to do to access a server located far from the client computer which you are
troubleshooting?
• Remotely access the server using Remote Desktop Connection
What may be the reason why you cannot access and connect to other computers remotely? How would
you resolve the problem?
• Computer has no password • Assign password to that computer
After installing an anti-virus to your network, you cannot connect to other computers, what could be the
possible cause of it?
• Anti-virus is blocking network access • Configure the anti-virus so as not to block the network access
After logging, you noticed that you cannot change the IP address of other users, what cold be the
possible cause?
• Password or Account is not an Administrator Account
What would you suggest in order to come up with strong admin password?
• Apply Kebreros • Use password that contains combination of letters, numbers, upper and lower case
letters and special characters
As an Administrator and security precaution, what type of account will you use in performing ordinary
tasks?
• Power user account • Limit the use of Administrator Account
What windows edition is available in Windows Server 2008 R2, but not in Windows Server 2008.
Foundation
Where would you find "Enable automatic updating and feedback" and "Download and install updates".
Update the Server
Roles Summary
What option in Server Manager would you use to install Active Directory Domain Services on Windows
Server 2008 R2?
Add roles
What option in ICT/Customize This Server would you use to install Web Sever?
Add Features
What option in ICT/Customize This Server would you use to install .NET Framework 3.5.1 Features?
Security Information
To verify the data and time updates were installed on your Windows Server 2008 R2 system, what option
in Server Manager would you use.
Windows Server 2012 R2 system need to launch Start Manager and need to first switch to Start screen.
How would you?
Hover mouse over lower-left corner of screen and click Start title or Press Windows logo key on
keyboard.