MICROSOFT TECHNOLOGY ASSOCIATE. Student Study Guide. EXAM Windows Server Administration Fundamentals
|
|
|
- Dominick Jones
- 10 years ago
- Views:
Transcription
1 MICROSOFT TECHNOLOGY ASSOCIATE Student Study Guide EXAM Windows Server Administration Fundamentals
2 Preparing for MTA Certification MICROSOFT TECHNOLOGY ASSOCIATE (MTA) STUDENT STUDY GUIDE FOR IT PROS Windows Server Administration Fundamentals
3 Authors Michael Teske (Windows Server Administration and Security). Michael has been teaching in the Network Specialist Program for 10 years at Northeast Wisconsin Technical College and has been involved as an engineer for 15 years. He has a passion for both teaching and technology and loves helping people find happiness in a career. Mike believes that learning technology should be fun but recognizes that the networking field is continually changing and can challenge even the brightest students. Mike also works as an independent consultant for several small businesses in northeast Wisconsin and enjoys bringing that real-world experience to the classroom on a daily basis. Michael has become known as the Microsoft Guy on campus. Michael s goal is to continue to teach network technology with the same enthusiasm and passion for many years to come and to help his students find the same joy and passion he has found in an amazing industry and career. Mike is the author of the Windows Server Exam Review Kit in the MTA Exam Review Kit series. Patricia Phillips (Lead Author and Project Manager). Patricia taught computer science for 20 years in Janesville, Wisconsin. She served on Microsoft s National K-12 Faculty Advisory Board and edited the Microsoft MainFunction website for technology teachers for two years. For the past five years she has worked with Microsoft in a variety of roles related to K-12 curriculum development and pilot programs including Expression Studio web design and XNA game development. In her role as an author and editor, Patricia wrote several articles and a student workbook on topics including computer science, web design, and computational thinking. She is currently the editor of the Computer Science Teachers Association newsletter, the Voice. This content is only for use by or provision to students for their personal use. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. Microsoft and other trademarks listed at are trademarks of the Microsoft group of companies. All other marks are property of their respective owners Microsoft Corporation. All Rights Reserved. This content is provided as-is and Microsoft makes no warranties, express or implied.
4 Contents Introduction v Career Planning vi Exploring Job Roles viii Value of Certification x WINDOWS SERVER ADMINISTRATION FUNDAMENTALS CHAPTER 1 Understanding Server Installation /1/2 Understand device drivers; Understand services Understand server installation options CHAPTER 2 Understanding Server Roles Identify application servers Understand Web services Understand remote access Understand file and print services Understand server virtualization
5 CHAPTER 3 Understanding Active Directory Understand accounts and groups Understand organizational units (OUs) and containers Understand Active Directory infrastructure Understand group policy CHAPTER 4 Understanding Storage /4.2 Identify storage technologies; Understand RAID Understand disk types CHAPTER 5 Understanding Server Performance Management Identify major server hardware components Understand performance monitoring Understand logs and alerts CHAPTER 6 Understanding Server Maintenance Identify steps in the startup process Understand business continuity Understand updates Understand troubleshooting methodology iv Contents
6 Introduction MTA validates building-block technology concepts and helps students explore, discover and pursue successful careers in Information Technology (IT) in an exciting and rewarding way! As the first step in the Microsoft Technology Certification Series, this new, entry-level certification provides students with confidence, credibility, and differentiation. Explore IT career options without committing a lot of time and resources MTA exams validate the core technology knowledge that is in demand today by businesses around the world. Whether you want to explore becoming a network administrator, software engineer, web developer, or database analyst, MTA gets you started on the right path. Prepare to compete A little investment in IT can go a long way in today s job market. Becoming MTA certified helps you build a solid foundation to prepare for intermediate technology studies and for Microsoft Certified Technology Specialist (MCTS) certifications. It can also help you compete on college admissions and jumpstart your IT career planning! Empower yourself As the first step toward becoming an MCTS, MTA shows your commitment to technology while connecting you with a community of more than five million Microsoft Certified Professionals. Learn from them and show them what you know by becoming MTA certified! This MTA Student Study Guide serves as a study tool to help students prepare for their MTA certification exam. Students are challenged with real-life situations for each of the major topics covered in the exam. Although successful completion of the study guide exercises does not guarantee that you will pass your MTA exam, it is an excellent way to gauge your readiness to take the exam and build confidence that you know your stuff on exam day. I wish you all the best as you prepare for a successful career in technology! Victoria Pohto Victoria Pohto MTA Product Marketing Manager Introduction v
7 Career Planning Most IT solutions or infrastructure built on Microsoft technologies require proficiency with one or all of the following products, often referred to as The Microsoft Stack. Microsoft Windows Server as the data center or development platform Microsoft SQL Server as the data and business intelligence (BI) platform Microsoft Visual Studio as the suite of application life-cycle management tools MTA is the starting point of Microsoft technology certifications, providing aspiring technologists with the fundamental knowledge essential to succeed with continued studies and a successful career with technology. Preparing for and becoming MTA certified helps you explore a variety of career paths in technology without investing a lot of time and money in a specialized career path. When you find a path that is right for you, Microsoft learning products and certification can help you prepare and guide your longer-term career planning. If you already know that you want to start building a career in technology, MTA preparation and certification is the recommended entry point. Becoming MTA certified shows that you have a firm working knowledge of the fundamental IT concepts critical for success with intermediate learning and certifications such as Microsoft Certified Technology Specialist (MCTS). Moreover, Microsoft certifications demonstrate an individual s commitment of selfinvestment and confidence to take his or her knowledge and skills to the next level with an industry-recognized credential. MTA is not a career certification, meaning that employers recognize you as job ready, but it is the first step toward that career goal and can help differentiate you for an internship or to college admissions committees. As you prepare for your first job focusing on technology, be sure that you are equipped with an MCTS credential the intermediate level certification that validates Microsoft product and technology skills. The MTA Certification path on the next page shows you the MTA exams that are recommended prior to taking on some of Microsoft s intermediate technology certification, MCTS. vi Career Planning
8 Career Planning vii
9 Exploring Job Roles Choosing a career path is a big decision and it s not always easy, but you re not alone! Microsoft created a career site to help students understand the options and possibilities of pursuing a career in IT. The site also connects you with learning resources, student techie communities, and much more to help you prepare for a career in technology. To chart your career with Microsoft technology, visit career-org-charts.aspx. Server Administrator As a server administrator, you are in charge of implementing and managing some of the most important technology in your organization the servers. You use extensive monitoring and profiling tools to manage the network and tune systems so they perform at optimal levels. You are an expert in Active Directory, and you have an in-depth understanding of network protocols, and file and directory security. Database Administrator As a database administrator, you are in charge of important databases that span multiple platforms and environments. You are a strong team player who thrives in a fast-paced environment. You build complex, highly scalable databases that meet business needs and security requirements. You are an expert in optimizing, maintaining, and troubleshooting databases, but also in designing archival, data distribution, and highavailability solutions. Computer Support Technician Consider starting your IT career by becoming a consumer support technician. You don t need any formal work experience, but a company might require that you know how to install, administer, and troubleshoot operating systems in a home network environment that has desktop computers, laptops, and printers. As a consumer support technician, you ll also handle network, virus, malicious software, and hardware support issues. You ll typically find this position in small to medium-sized organizations. viii Exploring Job Roles
10 Exploring Job Roles Web Developer As a web developer, you are an expert in using the dynamic programming tools and languages that fuel the web. You might work independently or be part of a team that builds and integrates interactive web sites, applications, and services for both internal and public sites. Your role is to make it work, which means developing web applications and testing them on various browsers, enhancing and modifying them as necessary to ensure the best experience for the user. As a web developer, you might also architect websites, design data-driven applications, and find efficient clientserver solutions. You must have an in-depth understanding of the software development life cycle and be able to communicate project status, issues, and resolutions. Windows Developer As a Windows client developer, knowing how to optimize Windows code and track bugs is a given. But you also know how to use Microsoft Visual Studio and the Microsoft.NET framework to design, develop, test, and deploy Windowsbased applications that run on both corporate servers and desktop computers. Your key talents include understanding multiple Windows application models and n-tier applications, and knowing how to work with object-oriented programming, algorithms, data structures, and multithreading. Windows Developers have an in-depth understanding of software engineering principles, software life cycles, and security principles. Additional Online Resources for New Developers: Imagine Cup The Imagine Cup is the world s premier student technology competition where students from around the world can learn new skills, make new friends, and change the world. Competitions include Software Design, Embedded Development, Game Design, Digital Media and Windows Phone 7. The brightest young minds harness the power of technology to take on the world s toughest problems. Exploring Job Roles ix
11 Value of Certification Technology plays a role in virtually everything we do. In the 20-plus years since Microsoft has been certifying people on its products and technologies, millions of people have gained the knowledge, expertise, and credentials to enhance their careers, optimize business solutions, and create innovation within just about every business and social sector imaginable. Today s Information Technology (IT) hiring managers are more often using professional credentials, such as Microsoft certification, to identify properly skilled IT candidates. Certification becomes a way to easily differentiate qualified candidates in a sea of resumes. The job outlook for IT professionals, as reported in a study prepared by the U.S. Department of Labor s Bureau of Labor Statistics (BLS), is positive! The BLS indicates an increase that will be faster than the average for all occupations through 2014 for Computer Support Specialists, Systems Engineers, Database Administrators, and Computer Software Engineers. One significant message resulting from this study is that information and communications technology (ICT) skills are the entry ticket to the job market, regardless of the country, industry, or job function. Information Technology is clearly an area worth investing time, resources, and education in and technology certification is a key part of the education process, validating product and technology expertise as a result of their learning experiences. Microsoft IT Certifications provide objective validation of the ability to perform critical IT functions successfully for worldwide IT professionals, developers, and information workers. Microsoft certifications represent a rich and varied spectrum of knowledge, job roles, and responsibilities. Further, earning a specific certification provides objective validation of the candidate s ability to perform critical IT functions successfully. Embraced by industry professionals worldwide, Microsoft certification remains one of the most effective ways to help reach long-term career goals. x Value of Certification
12 MTA WINDOWS SERVER ADMINISTRATION FUNDAMENTALS
13
14 1 Understanding Server Installation IN THIS CHAPTER 1.1/1.2 Understand device drivers; Understand services 1.3 Understand server installation options
15
16 OBJECTIVE UNDERSTANDING SERVER INSTALLATION 1.1/1.2 Understand device drivers; Understand services SCENARIO: Maurice Taylor is the network administrator for Fabrikam, Inc. A workstation that he plans to image and roll out to production is having issues with the video display. The display worked initially when he first set up the system. After applying several system and driver updates, the video has degraded to standard VGA 640x800 and performance has really stunk. He knows this won t be acceptable. Maurice also is having an issue with the firewall service on his Windows Server 2008 R2 Web server. The service fails to start when the system starts; however, Maurice can start it manually after he logs in. Maurice does not want to manually start that service every time maintenance on the web server is required, and he realizes that he ll be in big trouble if he doesn t secure the web server by forgetting to turn on the firewall service. 1. What could be a possible reason for Maurice s video problems? a. Maurice installed the wrong video driver b. Maurice installed an incompatible or corrupted video driver c. the video adapter is not properly seated on the system board 2. Where should Maurice check to verify if he has a proper driver installed? a. Event Viewer b. Disk Management c. Device Manager 3. What can Maurice do with the web service to ensure that it will start after the other system services finish their startup? a. configure a delayed startup for the web service through the services.msc b. write a batch program to start the service as a scheduled task c. configure the service to restart after first failure Performance suffers if a service is failing to start. Understand device drivers; Understand services 5
17 Answers 1. Maurice s video problem occurred because: b. Maurice installed an incompatible or corrupted video driver 2. Driver problems can be found in the: c. Device Manager 3. The interim solution to the web service is: a. configure a delayed startup for the web service through the services.msc. Maurice can open services.msc and configure the service for a delayed start for the startup type. This will allow the remaining services to finish starting. Maurice should investigate what possible services would be causing these issues. Essential details A device driver is a software component that permits an operating system to communicate with a device. A service is a long-running executable that performs specific functions and that is designed not to require user intervention. FAST TRACK HELP /3 6 CHAPTER 1: Understanding Server Installation
18 OBJECTIVE UNDERSTANDING SERVER INSTALLATION 1.3 Understand server installation options SCENARIO: On Thursday, Pat was tasked with setting up 10 servers and 20 workstations per specification. Pat is aware that if he sets up each one individually, he will be at work through the weekend, and he doesn t want to do that because he has plans to go to a concert with some friends. Pat knows the company uses Windows Deployment Services whenever a new workstation or server is rolled out. Pat would like to automate these installations with as little human interaction as possible. 1. What can Pat do to make sure he can make it to the concert this weekend? a. start his installations manually and hope they finish in time b. create one completed installation, setup and configuration of a server and a workstation and use those two copies to image the remaining systems using Windows Deployment Services and ImageX c. sell his tickets to his buddy it s not going to happen 2. What is ImageX? a. a picture editing utility b. a personal image enhancement service c. a system imaging software that takes a snapshot of an existing, configured server or workstation and creates an imaged or cloned version of that system and saves it to a file 3. What can Pat use to solve the last part of his problem, which requires as little human interaction as possible? a. have a robot do the installations b. use Windows System Image Manager to create an answer file that will automatically provide the answers to the setup questions throughout installation as well as configure and install any necessary software during the installation c. create a DVD that will contain all of the necessary software that will be installed on the servers and workstations Answer fi les have a variety of features that can be used through Windows Deployment Services to create a custom installation DVD. Understand server installation options 7
19 Answers 1. Pat can complete the installs if he: b. creates one completed installation, setup and configuration of a server and a workstation and use those two copies to image the remaining systems using Windows Deployment Services and ImageX. Creating the two images or clones will allow Pat to duplicate those installations by pushing those files (images) onto the hard drives of the remaining systems. 2. ImageX is: c. a system imaging software that takes a snapshot of an existing, configured server or workstation and creates an imaged or cloned version of that system and saves it to a file. ImageX can be copied to a bootable CD/DVD/USB and used to create image files of an existing system for duplicating or backup purposes. 3. Pat can eliminate interactions during the installs if he: b. uses Windows System Image Manager to create an answer file that will automatically provide the answers to the setup questions throughout installation as well as configure and install any necessary software during the installation. Essential details An unattended installation is a process of automating operating system installations by providing the setup/install file with a configuration file or answer file to perform and answer normal install tasks and questions. An answer file is an XML-based file that contains setting definitions and values to use during Windows Setup. In an answer file, you specify various setup options, including how to partition disks, the location of the Windows image to install, and the product key to apply. uct /3 FAST TRACK HELP CHAPTER 1: Understanding Server Installation
20 2 Understanding Server Roles IN THIS CHAPTER 2.1 Identify application servers 2.2 Understand Web services 2.3 Understand remote access 2.4 Understand file and print services 2.5 Understand server virtualization
21
22 OBJECTIVE UNDERSTANDING SERVER ROLES 2.1 Identify application servers SCENARIO: Cari is a systems administrator for Contoso, Ltd. She needs to develop a systems design so her company can use an messaging system that allows for message and calendar collaboration. Contoso, Ltd. uses Microsoft Office 2010 as their mainline office production suite. Her company also wants a collaboration server for their intranet. The collaboration server should support dynamic updating from the employees of Contoso, Ltd. Company officers would like to have the intranet monitored and protected with a threat management solution. 1. What would be Cari s best solution for their messaging system? a. use a third party provider and a custom developed calendaring program b. include Microsoft Exchange Server 2010 c. not recommend any solution because of the potential loss of production with an messaging system 2. What can meet the needs of the Contoso. Ltd. Intranet collaboration server? a. implement SharePoint Portal Server 2010 which uses Microsoft SQL as an option to support dynamic updating b. solicit bids from various web development firms to meet their intranet needs c. create a Microsoft Word document and send a link to it throughout the company and call it their messaging board 3. What would be the best fit to meet the company s needs so that they can manage their employees internet access through Active Directory? a. have all employees sign an internet usage contract and document the sites they visit and promise not to install any malicious software onto their systems b. recommend Microsoft s Threat Management Gateway, which provides integration with Microsoft Forefront antivirus and can grant or deny various types of internet behavior either by user name or group c. only allow internet access from one computer that employees can sign up to use in 30-minute increments Providing integrated solutions that will also integrate with existing applications provides fewer potential compatibility issues. Identify application servers 11
23 Answers 1. The best solution for their messaging system is to: b. include Microsoft Exchange Server Microsoft Exchange will integrate with the Contoso, Ltd. Existing core production suite with reduced learning curves for their employees. 2. The collaboration server needs can be met by: a. implementing SharePoint Portal Server 2010 which uses Microsoft SQL as an option to support dynamic updating 3. The best fit to meet the company s needs so they can manage their employee s internet access through Active Directory is: b. Microsoft s Threat Management Gateway, which provides integration with Microsoft Forefront antivirus and can grant or deny various types of internet behavior either by user name or group Essential details Active Directory is the central location for configuration information, authentication requests, and information about all of the objects that are stored within your forest. SharePoint provides a turnkey solution that will integrate with the existing core production suite as well as a communications server. Data will be stored with the inherent SQL application incorporated. FAST TRACK HELP /us/overview.aspx /CH aspx /3 12 CHAPTER 2: Understanding Server Roles
24 OBJECTIVE UNDERSTANDING SERVER ROLES 2.2 Understand Web services SCENARIO: Alicia is a server administrator for Tailspin Toys. Security personnel have contacted her to provide them with security information regarding her web exposed servers. They want to know which servers will have access from beyond the perimeter security appliance so that they can accommodate the incoming and outgoing traffic. Alicia responds that two of her three servers require perimeter access: First, the intranet server, which is running SharePoint, will need SSL access for the remote toy salespeople. Her second server is the company s web server, where online customers can buy their toys from the comfort of their own homes. Customer transactions must be secured in some fashion. Their web developers also request FTP access to the web server so that they can upload and download updated content. 1. The security people have asked for the ports Alicia wants available for the intranet server running Microsoft SharePoint. What will her response be? a. 445 b. 443 c Alicia wants all transactions to the storefront on their web server to be encrypted. What security protocol encrypts web traffic? a. Secure Socket Layer, SSL b. Point to Point Tunneling Protocol, PPTP c. Central Intelligence Agency, CIA 3. What does is FTP and what port(s) does it communicate on? a. FTP is File Transport Protocol, a fast, application-level protocol widely used for copying files to and from remote computer systems on a network using TCP/IP, such as the internet. It communicates on ports 20 and 21 b. FTP is File Tuning Package, which tunes the file packages and communicates on port You can assume you are using SSL if your web address starts with which is typical when performing any online transactions or authentications. c. FTP is a proprietary file protocol that only allows the transmission of encrypted files to and dfrom remote systems and uses port 20. Understand Web services 13
25 AnAnswers 1. The port Alicia needs open for SharePoint is: b The security protocol that encrypts web traffic is: a. Secure Socket Layer, SSL 3. FTP is: a. File Transport Protocol. It is a fast, application-level protocol widely used for copying files to and from remote computer systems on a network using TCP/IP, such as the internet. It communicates on ports 20 and 21. Essential details A port is an application-specific communications endpoint used by Transport Layer protocols of the Internet Protocol Suite. A specific port is identified by its number, commonly known as the port number, the IP address with which it is associated, and the protocol used for communication. SSL supports authentication of client, server, or both, as well as encryptions during a communications session. FAST TRACK HELP /3 14 CHAPTER 2: Understanding Server Roles
26 OBJECTIVE UNDERSTANDING SERVER ROLES 2.3 Understand remote access SCENARIO: Craig works for Fourth Coffee as their network administrator. Fourth Coffee provides coffee and coffee-making products throughout the United States. Fourth Coffee wants their salespeople, who manage their own regions of the country, to be able to have access to their enterprise resource management application so that they can update their sales numbers regardless of where they are located. This access needs to be secured. Craig also needs to provide remote support for their sales force. Fourth Coffee s server infrastructure is predominantly Microsoft Server 2008 R2 and their salespeople use Microsoft Windows 7 Professional on their laptops. 1. What is the most cost-effective and efficient method to provide remote support for their sales force? a. enable Remote Assistance for all of the salespeople, which will enable Craig to remote into their systems while they are logged on and simultaneously troubleshoot or monitor their activities. Remote Assistance is already a feature of Windows 7 at no additional cost. b. make sure all salespeople have their own mobile phones so that Craig can provide phone support for the salespeople c. purchase a third-party remote support software license for each laptop. This would require Craig to retrieve all remote laptops for installation and training purposes. 2. What can Craig do to provide secure access to Fourth Coffee s enterprise software? a. have their sales people all sales data three times a day to the corporate headquarters where the data can be input b. enable and configure Remote Desktop Services for Microsoft Windows Server 2008 R2 through Virtual Private Network (VPN) tunnel and push the enterprise software as a Remote Application c. install a third-party remote server on top of Windows Server 2008 R2 with additional licensing 3. By default, what communication port does Remote Desktop Protocol communicate on? a. 443 b. 445 c Remote Desktop Services is an inherent application in Microsoft Windows Server 2008 R2 and the Remote Desktop Client is an inherent service on Microsoft Windows 7 Professional. Understand remote access 15
27 Answers 1. The most cost-effective and efficient method is to: a. enable Remote Assistance for all of the salespeople, which will enable Craig to remote into their systems while they are logged on and simultaneously troubleshoot or monitor their activities 2. To provide secure access Craig can: b. enable and configure Remote Desktop Services for Microsoft Windows Server 2008 R2 through Virtual Private Network (VPN) tunnel and push the enterprise software as a Remote Application 3. By default, Remote Desktop Protocol communicates on port: c Essential details Remote Desktop is used for administration. Remote desktop is available on Windows 7 and Server 2008 R2 by enabling it through Advanced System Settings. It allows a user to remote into a system when enabled and take control. Right-click Computer->Properties Select Remote Settings on the left Click the radio button to Allow Connections Only From Computers Running Remote Desktop With Network Level Authentication as shown here: Remote Assistance is a technology in Windows that enables Windows users to help each other over the internet. FAST TRACK HELP /3 16 CHAPTER 2: Understanding Server Roles
28 OBJECTIVE UNDERSTANDING SERVER ROLES 2.4 Understand file and print services SCENARIO: Kern Sutton is the regional systems administrator for Wingtip Toys. The company has asked Kern to upgrade their existing file server to Microsoft Windows Server 2008 R2. They also want Kern to configure the new server to support print sharing as well. Kern eagerly accepts the challenge as he is excited to work with the new operating system. Kern must secure both the shares and folders using the appropriate rights and permissions. Kern discovers that this isn t an old-time Windows Server! 1. What Role(s) are required for Kern to accomplish his task? a. Microsoft File and Printer sharing b. File Services Role and Print and Document Services Role c. File Services for MacIntosh 2. Is there an alternate method to install the File Services Role? a. No, the role must be installed through the Add Roles Wizard b. Yes, when Kern initially shares a folder, the Role will be added automatically c. Yes, through a separate download from Microsoft 3. What tasks can be accomplished through the Print Management console? a. deploy printers and print servers, manage printers, update drivers, and manage print queues b. manage print queues only c. remove a printer from a user s desktop The Print Management console is a single landing zone for all print management needs. Understand file and print services 17
29 Answers 1. Required Roles include: b. File Services Role and Print and Document Services Role. Microsoft File and Printer service has now been split into separate roles. 2. There is an alternate method: b. yes, when Kern initially shares a folder, the Role will be added automatically. Adding the Role through the Add Role Wizard is a preferred method of installation 3. The tasks that can be accomplished include: a. deploy printers and print servers, manage printers, update drivers, and manage print queues Essential details A print server is a workstation that is dedicated to managing printers on a network. The print server can be any station on the network. NTFS rights apply to a folder or file regardless of how it is being accessed. Share permissions apply to the resource when it is being accessed over the network. The effective right of a resource being accessed over the network is based on the most restrictive permission or right that is applied. FAST TRACK HELP /3 18 CHAPTER 2: Understanding Server Roles
30 OBJECTIVE UNDERSTANDING SERVER ROLES 2.5 Understand server virtualization SCENARIO: Molly Dempsey s company, Northwind Traders, has more than 50 servers that are due to be upgraded. Molly must determine the most cost-effective method of upgrading these servers. She has several options that she must consider to make her decision. Northwind Traders has several older applications that are part of the problem because they are only supported on the existing legacy operating systems. Molly also has a desire to simplify her backup and disaster recovery procedures. Molly is considering virtualization to address these various needs. 1. What appears to be Molly s best solution for the legacy applications? a. only upgrade the hardware the applications are running on and install the legacy operating system b. virtualize the legacy systems by performing a physical to virtual migration and run these systems on a host Microsoft Hyper-V solution c. keep the legacy systems running on their legacy operating systems on the legacy hardware, which would ensure her legacy at this current, soon-to-be legacy employer 2. How can virtualization help simplify Molly s disaster recovery needs? a. allows for application portability and flexibility across hardware platforms b. can t help simplify her situation it will only complicate her procedures c. can help simplify her procedures there isn t a need for disaster recovery when utilizing virtualization technologies because they perform virtual backups 3. What are the additional benefits that Northwind Traders will realize when they implement virtual technologies? a. no additional benefits will be realized by using server virtualization b. they will not benefit from server virtualization but rather lose out as the costs of virtualization are dramatically underestimated c. they will be able to consolidate their servers and reduce the number of physical computers they will have to support Most entry-level server virtualization platforms are free to the end user. Costs are added if the user requires additional management features. Understand server virtualization 19
31 Answers 1. Molly s best solution is to: b. virtualize the legacy systems by performing a physical to virtual migration and run these systems on a host Microsoft Hyper-V solution 2. Virtualization can help simplify her disaster recovery needs by: a. allowing for application portability and flexibility across hardware platforms. The system archives the virtual system or file. The virtual system is not dependent on the hardware platform it is running on. 3. The additional benefits that Northwind Traders will realize when they implement virtual technologies include: c. they will be able to consolidate their servers and reduce the number of physical computers they will have to support. They will also reduce their carbon footprint because of reduced energy needs, making their company a greener company. They can also reduce the number of people needed to support their large number of servers. Essential details Server virtualization is the ability to run a full operating system on a platform so that the operating system performs as though it were a real system. Physical to virtual (P2V) is a process in which an existing physical computer is converted into a virtual machine. Virtual to physical (V2P) is a process in which an existing virtual machine is converted or deployed to one or more physical computers. FAST TRACK HELP /3 20 CHAPTER 2: Understanding Server Roles
32 3 Understanding Active Directory IN THIS CHAPTER 3.1 Understand accounts and groups 3.2 Understand organizational units (OUs) and containers 3.3 Understand Active Directory infrastructure 3.4 Understand group policy
33
34 OBJECTIVE UNDERSTANDING ACTIVE DIRECTORY 3.1 Understand accounts and groups SCENARIO: Sara Davis is the helpdesk manager for Wide World Importers (WWI). WWI has asked Sara to provide procedures and training for her helpdesk staff that will allow them to be more proficient at normal day-to-day administrative tasks, including creating domain and local user accounts, managing group memberships, and understanding what s under the hood as it relates to managing user accounts. This includes technical details such as the location of the user database for both local and domain systems, acceptable naming conventions, and what characters are not allowed. 1. What is the name and location of the file that contains the local user and group objects? a. userdb: c:\userdb.mdb b. Security Accounts Manager Database: %systemroot%\system32\config c. ntds.dit: c:\windows\ntds 2. Which of the following is an unacceptable user account name? a. Abercrombie?kim b. Mu.Han c. MPatten 3. What is the rule related to nesting domain and local groups? a. domain groups can contain local groups, but local groups cannot contain domain groups b. domain groups and local groups cannot be nested c. local groups can contain domain groups, but domain groups cannot contain local groups The local users and groups security boundary is limited to the system they are created on. Understand accounts and groups 23
35 Answers 1. The name and location of the file that contains the local user and group objects is: b. Security Accounts Manager Database: %systemroot%\system32\config. The Active Directory Domain Services database is named ntds.dit. The file is located by default in %systemroot%\ntds. 2. An unacceptable user account name is: a. Abercrombie?kim / \ [ ] : ; =, + *? < are not accepted characters for user accounts. 3. The rule related to nesting domain and local groups is: c. local groups can contain domain groups, but domain groups cannot contain local groups Essential details The Security Accounts Manager (SAM) is a database present on servers running Windows Server 2008 R2 that stores user accounts and security descriptors for users on the local computer. The following steps create a local user account and add it to the Power Users group through the command line: Start->All Programs->Command Prompt Type: net user WHarp myp@ssword /fullname: Walter Harp /comment: A member of the Power Users Group /logonpasswordchg:yes /add FAST TRACK HELP /3 24 CHAPTER 3: Understanding Active Directory
36 OBJECTIVE UNDERSTANDING ACTIVE DIRECTORY 3.2 Understand organizational units (OUs) and containers SCENARIO: Victoria Flores is the Directory Services administrator for Humongous Insurance. Humongous Insurance is a large insurance company with offices throughout the country. The IT needs and wishes of various branches vary greatly and it is a challenge to manage it all. The company wants to design its Active Directory structure to better suit these various needs and allow for easier management of the various computers and departments. They have asked Victoria to create an organizational unit design that will fit their goals. One of their main goals is to create a model with which they can maintain consistency and usability. They also want to be able to manage each department without granting particular users complete administrative privileges. 1. What can Victoria do to solve the administration issue? a. give the domain administrator password to the employee assigned to manage each departmental organizational unit b. simply perform all the administrative tasks herself c. delegate control to the employee assigned to manage each departmental organizational unit and grant specific administrative rights for that container 2. How can an organizational unit be created? a. Active Directory Users and Computers, PowerShell, command line, Active Directory Administrative Center b. User Manager for Domains c. organizational units can only be created through Active Directory Users and Computers 3. Which command creates an OU called Marketing in the domain HUMONGOUS.LOCAL? a. dsadd ou ou=marketing,dc=humongous,dc=local b. makeou=marketing.humongous.local c. ou=marketing,dc=humongous,dc=local Delegation of control grants specifi c admini-strative tasks such as resetting passwords to individual users or groups without making them domain administrators. Understand organizational units (OUs) and containers 25
37 Answers 1. Victoria can solve the administration issue if she: c. delegates control to the employee assigned to manage each departmental organizational unit and grants specific administrative rights for that container 2. An organizational unit can be created through: a. Active Directory Users and Computers, PowerShell, command line, Active Directory Administrative Center 3. An OU is created with the command: a. dsadd ou ou=marketing,dc=humongous,dc=local Essential details Organizational units are Active Directory containers into which you can place users, groups, computers, and other organizational units. Organizational units can be structured to meet various needs. They can be structured based on geographic location, business structure (departments), organizational need, specific role or function, operating system version, or platform and any combination mentioned. FAST TRACK HELP /3 26 CHAPTER 3: Understanding Active Directory
38 OBJECTIVE UNDERSTANDING ACTIVE DIRECTORY 3.3 Understand Active Directory infrastructure SCENARIO: Andrew Ma is the systems administrator for Coho Winery. Recent changes in the business and in advertising strategies have increased the popularity of Coho wines beyond expectations. Because of the meteoric rise of Coho s sales, the company has decided to migrate from a workgroup network to a centrally managed domain model using Microsoft Windows Server 2008 R2 Active Directory Domain Services. This IT change will allow Andrew to utilize several benefits of a domain, including organizing network objects, applying group policies to manage desktop computers, and managing security. Andrew has decided to have multiple domain controllers for redundancy, as well as to split operations roles. The new organization system will support future company growth. 1. What is a benefit of having a domain model network as opposed to a workgroup? a. there isn t any benefit it is cost-prohibitive. It is easier to manage user accounts on 20 different computers than a centrally managed option b. it allows for a centrally managed system where employees authenticate to the domain rather than to each individual workstation c. the only benefit is that it is easier to secure than a workgroup model 2. What should Andrew do to determine which domain controller maintains the operations role of RID master? a. contact the previous system administrator b. open Active Directory Users and Computers, right-click his domain, and select Operation Masters c. create a batch file that will query each domain controller to determine who is responsible for the RID master 3. What domain controller maintains all five operations roles by default? a. the first domain controller in the forest b. operations roles are automatically transferred to subsequent domain controllers as they are added to the forest c. the domain controller is selected by the administrator when the system is being promoted Migrating from a workgroup model to a domain model allows for ease of administration. It creates a centrally managed database that can be replicated across domain controllers which adds fault tolerance. Understand Active Directory infrastructure 27
39 Answers 1. The primary benefit of a domain model network is: b. having a centrally managed system where employees authenticate to the domain rather than to each individual workstation. This allows for better security policies and network management. 2. Andrew can determine which domain controller maintains the operations role of RID master if he b. opens Active Directory Users and Computers, right-clicks his domain, and selects Operation Masters 3. The domain controller that maintains all five operations roles by default is: a. the first domain controller in the forest. The operations roles have to be transferred manually when the additional domain controllers are promoted in the forest. NTDSUTIL is a command-line utility that can accomplish this task. Essential details A domain is a unit of replication. A domain controller is a server that is running a version of the Windows Server operating system and has Active Directory Domain Services installed. In a domain model, the user authenticates once to the domain, which maintains all information about other objects in the domain. Compare this to a workgroup model in which the administrator has to duplicate user accounts on any workstation that is sharing resources. This means that a single user would have to have a user account created for on each computer she accesses. FAST TRACK HELP /3 28 CHAPTER 3: Understanding Active Directory
40 OBJECTIVE UNDERSTANDING ACTIVE DIRECTORY 3.4 Understand group policy SCENARIO: Benjamin Harris works for Wingtip Toys as their desktop administrator. Ben s primary function is desktop management and support of the company s desktop environment. His main goal is to have a quiet day at his desk so he can research new ideas for Wingtip Toys. He has several tools at his disposal to accomplish this but his most important tool is his use of group policies on their domain. 1. Wingtip Toys only want password policies applied to their Testing Division. Ben wants to create a Group Policy Object for the Testing organizational unit that sets these password policies. Will this accomplish what Wingtip Toys wants? a. yes, the password policy set at the organizational unit level will only apply to the users and computers in that OU b. yes, the password policy will apply to the users in the Testing division no matter what computer they log onto c. no, password policies can only be applied at the domain level 2. Ben wants to see if the policies he set are in effect. He does not want to reboot or wait for the system to refresh automatically in 90 minutes. What command can he issue to force the application of group policies? a. gpupdate /NOW b. gpedit.msc /update c. gpupdate /force Some issues have arisen in various departments: Employees want to have customized desktops and features on their systems and still maintain consistency with Wingtip Toys Administrators at Wingtip Toys want some primary settings to remain consistent on all systems in the company but want to allow each department to have individual settings that will help them perform their jobs more efficiently 3. Ben has a policy that sets his homepage in Internet Explorer to open to The testing department has their homepage in IE set to open to wingtiptoys.com. What will the homepage display when Ben logs into a testing department workstation? a. Policy settings follow the user b. He is authenticating to a testing department station c. Internet Explorer default MSN homepage. He is not a Testing user and it s not his workstation Group Policy settings apply to users regardless of the workstation they authenticate to. Understand group policy 29
41 Answers 1. Wingtip Toys want password policies applied only to their Testing division: c. No, password policies can only be set and applied at the domain level. Password policies can only be set and applied at the domain level. The user has already authenticated by the time organizational unit policies are applied. 2. The command to force the application of group policies is: c. gpupdate /force 3. When Ben logs into a testing department workstation his homepage will display: a. User Policy settings follow the user Essential details A Group Policy is an infrastructure that enables administrators to implement specific configurations for users and computers. Winlogon is a component of the Windows operating system that provides interactive logon support. Winlogon is the service in which the Group Policy engine runs. Group Policy Preference enables administrators to manage drive mappings, registry settings, local users and groups, services, files, and folders. FAST TRACK HELP /3 30 CHAPTER 3: Understanding Active Directory
42 4 Understanding Storage IN THIS CHAPTER 4.1/4.2 Identify storage technologies; Understand RAID 4.3 Understand disk types
43 Understand Windows application deployment methods SCENARIO: Stepan spends much of his free time in the outdoors, camping, hiking, and canoeing. Whenever school is not is session, he tries to take at least one trip. He has developed two applications to help him enjoy his hobbies. The first application helps him log his activities, downloads data from his GPS unit, and automatically posts updates to his favorite social media websites. The second is a relatively simple application for planning trips; it helps him organize his maps, plan the supplies he ll need, and keep track of weather reports in the days before he leaves. Both programs are Windows Forms applications. He has always run the applications from his own computer, but now that his friends have seen how well they work, he would like to distribute copies for others to enjoy. 1. The planning application is newer and Stepan is still making frequent changes. Which deployment option checks for updates before installing the application? a. ClickOnce b. Windows Installer c. Both deployment options automatically check for updates. 2. The log application interfaces with a GPS and must install a device driver upon deployment. Which option is best suited for this application? a. ClickOnce b. Windows Installer c. Neither deployment option can install a device driver. 3. Which option will allow Stepan to distribute his applications via USB drives? a. ClickOnce b. Windows Installer c. Both deployment options can be distributed via USB drive. Answers 1. If Stepan wants the installer to check for updates, the deployment method he should use is: A. ClickOnce
44 OBJECTIVE UNDERSTANDING STORAGE 4.1/4.2 Identify storage technologies; Understand RAID SCENARIO: Howard Gonzalez is the systems administrator for Humongous Insurance. The company is responsible for protecting the property of hundreds of thousands of clients across 14 states. Because of the time-critical nature of the data stored by Humongous Insurance, Howard is researching his best alternative to ensure that the customer service representatives have access to their client s information whenever they need it. Server downtime is not an option for Humongous Insurance, where customer satisfaction is top priority. Howard is considering various form of Redundant Array of Independent Disks (RAID), possibly configured in a Network Attached Storage (NAS). 1. What is the minimum number of hard drives required if Howard wants to configure a RAID 5 solution? a. 5 b. 2 c What is a benefit of NAS over Storage Area Network (SAN)? a. There isn t any advantage; they are equal b. NAS provides file serving without the need for a server c. NAS benefits from being attached to a server on the network to provide file abstraction 3. Howard is configuring a server with RAID 5. He is using four 750-GB hard drives in his RAID array. How much available free space will Howard have after RAID is configured? a. 750 GB b. 2,250 GB c. 2,250 TB The amount of drive space used for redundancy is 1/n (total drive space) where n is the total number of drives in the array. Identify storage technologies; Understand RAID 33
45 Answers 1. The minimum number for hard drives required to configure a RAID 5 solution is: c A benefit of NAS over Storage Area Network (SAN) is that: b. NAS provides file serving without the need for a server 3. After RAID is configured Howard will have: b. 2,250 GB of free space (3000-¼(3000)=2,250) Essential details Network-attached storage (NAS) is file-level computer data storage connected to a computer network providing data access to heterogeneous clients. NAS does not require a server to provide services. SAN requires a server to provide file abstraction services. NAS reduces the number of servers on a network. A Redundant Array of Independent Disks (RAID) is a data storage method in which data is distributed across a group of computer disk drives that function as a single storage unit. Available free space after RAID 5 is configured =Total drive space-1/n (total drive space) 3000-¼(3000)=2,250 FAST TRACK HELP /3 34 CHAPTER 4: Understanding Storage
46 OBJECTIVE UNDERSTANDING STORAGE 4.3 Understand disk types SCENARIO: Luka Abrus works for City Power and Light as a systems administrator. Luka wants to increase the data availability for three servers without having to rebuild them from scratch and without incorporating a great deal of cost by purchasing array controllers. Luka also would like to be able to use data on one system and transport it to another system and have it appear as another hard drive. 1. What can Luka do to increase his server data availability without additional costs of an array controller or rebuilding each server? a. make sure the servers are always on b. add another physical drive to each server, convert the drives from basic disks to a dynamic disk, and establish a mirror (RAID 1) between the two drives c. make sure that his backups are running every night to ensure that he can restore data in the event of a failure 2. What can Luka do to be able to transport data from one system to another and have it appear as a separate drive? a. create a virtual hard disk (VHD) to store the data b. carry an external drive and attach it from one system to another c. compress the data and the data to himself 3. What advantages will Luka experience when using self-healing NTFS in Microsoft Windows Server 2008 R2? a. continuous data availability b. no concerns about physical drive failure c. no need to install antivirus software Self-healing NTFS does not protect against hardware malfunctions. Understand disk types 35
47 Answers 1. To increase his server data availability without additional costs of an array controller or rebuilding each server, Luka can: b. add another physical drive to each server, convert the drives from basic disks to a dynamic disk and establish a mirror(raid 1) between the two drives 2. To be able to transport data from one system to another and have it appear as a separate drive, Luka can: a. create a virtual hard disk (VHD) to store the data. The vhd can be stored to a network share and then be utilized from one system to another and mounted as a virtual drive. A VHD can be mounted to any Windows system and appear as a separate physical drive 3. When using self-healing NTFS in Microsoft Windows Server 2008 R2, Luka will experience the advantage of: a. continuous data availability. Self-healing NTFS attempts to correct corruptions of the file system without requiring the use of chkdsk.exe Essential details A dynamic disk is a physical disk that can use the master boot record (MBR) or GUID partition table (GPT) partitioning scheme and has the ability to create fault tolerant volumes (mirrored and RAID-5 volumes). A mount point is an association between a volume and a directory on another volume. Microsoft virtual hard disk (VHD) file format specifies a virtual machine hard disk that can reside on a native host file system encapsulated within a single file. FAST TRACK HELP What-are-basic-and-dynamic-disks /3 36 CHAPTER 4: Understanding Storage
48 5 Understanding Server Performance Management IN THIS CHAPTER 5.1 Identify major server hardware components 5.2 Understand performance monitoring 5.3 Understand logs and alerts
49 2. If he wants to install a device driver he should use: B. Windows Installer 3. Stepan s applications can be distributed via USB drives because: C. both deployment options can be distributed via USB drive. Essential details The.NET Framework provides two primary technologies for deploying applications: ClickOnce and Windows Installer. Both technologies: provide a user interface to guide users through the installation process. allow for the creation of Start Menu and desktop shortcuts. can be distributed by a website or by removable media. can register file types. The advantages and features of ClickOnce include: There is minimal user interaction during the installation process. The technology automatically checks for updates. Updates do not require complete reinstallation of application. Features of Windows Installer include the use of a wizard that assists the user with installation and the flexibility to handle a variety of installation situations. In general, ClickOnce is simpler and is ideal for applications that are updated frequently. Windows Installer provides more control over the installation process and is flexible enough to handle unusual or complicated setup requirements. FAST TRACK HELP
50 OBJECTIVE UNDERSTANDING SERVER PERFORMANCE MANAGEMENT 5.1 Identify major server hardware components SCENARIO: Proseware Inc. has recently purchased land to expand their business center. A great deal of thought and research must go into planning for the technology needs of a business the size of Proseware. Cari has been the server administrator at Proseware for several years and has a deep understanding of the technology needs related to the server components. Proseware has asked Cari to submit a plan for the redesigned datacenter that will ensure data redundancy and server availability. The overall business plan is dependent upon a dependable data system. 1. What technology can Cari implement that will allow for the replacement of server components while the servers are still running? a. the technology does not exist b. component live swappable c. hot swappable/pluggable 2. What can Cari implement that will protect the servers from a power outage and allow the systems to be shut down gracefully in the event of a power loss? a. uninterruptable power supply (UPS) b. a script that will shut down the server when the datacenter loses power c. several surge suppressors for the servers ASHRAE recommends a temperature range 3. Why is it important for Cari to have climate control within the datacenter? of 61 to 75 degrees a. to be comfortable when she is working in the datacenter Fahrenheit and a humidity b. to prevent servers from overheating range of 40 to 55 percent. c. it is irrelevant servers are configured with their own cooling systems Identify major server hardware components 39
51 Answers 1. To allow for the replacement of server components while the servers are still running, Cari can implement: c. hot swappable/pluggable. Various hot swappable components include hard disks and fans. 2. To protect the servers from a power outage and allow the systems to be shut down gracefully in the event of a power loss, Cari can implement: a. uninterruptable power supply (UPS). A UPS only protects against power outages and is used to gracefully shut the systems down in the event of an extended power loss 3. It is important for Cari to have climate control within the datacenter: b. to prevent servers from overheating Essential details Hot pluggable technology includes replacing system components without shutting down the system. Memory is a hardware device where information can be stored and retrieved. A Network Interface Card (NIC) is a hardware device that handles an interface to a computer network and allows a network-capable device to access that network. FAST TRACK HELP /3 40 CHAPTER 5: Understanding Server Performance Management
52 OBJECTIVE UNDERSTANDING SERVER PERFORMANCE MANAGEMENT 5.2 Understand performance monitoring SCENARIO: Cliff Majors works for Southridge Video as a systems administrator. Southridge Video began as a start-up business in southern Georgia just a few years ago and its popularity has skyrocketed; Southridge has a unique ability to anticipate customer needs and provide services before customers are even aware that they would find the services valuable. A while ago the company introduced a service for customers to rent videos over the internet and stream the movies to their computers or internet-capable devices. In spite of their best planning and anticipation of problems, calls have come in from the customers complaining that the quality of the video is poor or that the videos just aren t available. 1. Cliff attempted to close a program on one of the video servers; however the application did not respond. What application can he open to end that process? a. File Manager b. Task Manager c. Command Prompt 2. Cliff wants to compare the performance reports he created when he initially deployed the video servers. What application does he need to launch to create a comparison report? a. Network Monitor b. netstat c. Performance Monitor Continuous page fi le hits are a result of a system not having enough RAM. 3. Cliff is analyzing Performance Monitor and adds a counter that tracks page file/usage and hits. Cliff notices that the page file is being accessed continuously. What can Cliff do to solve this issue? a. add more RAM b. adjust the size of the page file c. move the page file to another physical drive on the system Understand performance monitoring 41
53 Answers 1. To end a process that cannot be closed in the usual manner, Cliff can open the: b. Task Manager 2. To create a comparison report, he must launch the: c. Performance Monitor. It is important to create a baseline performance report using Performance Monitor when deploying a system. This allows the administrator to have a report to compare against. The reports can be overlapped within Performance Monitor to have a visual comparison. 3. To solve the problem of continuous page file hits, Cliff should: a. add more RAM Essential details A page file is a hidden file on the hard disk that operating systems use to hold parts of programs and data files that do not fit in memory. A process is a program or part of a program. Performance is the measure of how quickly a computer completes application and system tasks. FAST TRACK HELP /3 42 CHAPTER 5: Understanding Server Performance Management
54 OBJECTIVE UNDERSTANDING SERVER PERFORMANCE MANAGEMENT 5.3 Understand logs and alerts SCENARIO: Walter Felhofer manages the network at Graphic Design Institute. He has been monitoring the network for several months to better understand the traffic variations. The network performance seems to vary greatly and Walter suspects a variety of causes ranging from the time-of-day use to events that coincide with special promotions and cyclical events. Walter keeps this historical data as it relates to the systems performance. He reviews this data on a regular basis as well as reviewing the data in comparison mode because he knows that it contains details that will be valuable for justifying future technology acquisitions and creating business plans. 1. What benefit can Walter gain by maintaining a historical record of the system s performance? a. use of the data to justify future upgrades as well as to identify performance trends throughout the year b. provide performance documentation if a supervisor asks for it c. there is no benefit to keeping a historical record of your systems performance because technology changes so frequently 2. Walter s job keeps him very busy. He is unable to watch performance logs and data all day long. What can Walter do so he can perform his other day-to-day tasks and not miss any major performance issues? a. hire an intern to watch performance monitor and page him whenever something goes wrong b. create a Performance Alert that will send a network message, write an event log, or run a program when certain criteria are met c. remote into the systems periodically to check performance logs, regardless of whether he is busy 3. What is the default location for system performance logs? a. %systemroot%\logs b. #system#\perflogs c. %systemdrive%\perflogs Performance monitoring is crucial for real-time system performance but is also important for scaling future systems and upgrades. Understand logs and alerts 43
55 Answers 1. By maintaining a historical record of the system s performance, Walter can: a. use the data to justify future upgrades as well as to identify trends throughout the year. 2. To ensure that he doesn t miss any major performance issues, Walter can: b. create a Performance Alert that will send a network message, write an event log, or run a program when certain criteria are met. 3. The default location for system performance logs is: c. %systemdrive%\perflogs Essential details Objects are specific resources in the Performance Monitor that can be measured. Performance counters are measurements of system state or activity. Use of the overlay mode is only available in the Performance Monitor when it is running in stand-alone mode with comparison enabled: Click Start->click in the Start Search box, type perfmon/sys/comp and press Enter. The Performance Monitor will open in stand-alone mode with comparison enabled. FAST TRACK HELP /3 44 CHAPTER 5: Understanding Server Performance Management
56 6 Understanding Server Maintenance IN THIS CHAPTER 6.1 Identify steps in the startup process 6.2 Understand business continuity 6.3 Understand updates 6.4 Understand troubleshooting methodology
57
58 OBJECTIVE UNDERSTANDING SERVER MAINTENANCE 6.1 Identify steps in the startup process SCENARIO: Fourth Coffee has expanded its business to 20 new stores in neighboring states. The expansion meant that the company had to expand its IT department and hire several new technicians. It is critical that all of the new hires have knowledge and skills in maintaining the company s technology infrastructure the success of the company depends upon effective technology at every level of the business. The CIO has asked the systems administrator, April Meyer, to provide training to her staff on Server 2008 R2. She wants everyone to have a fundamental understanding of the boot process as well as some troubleshooting techniques. 1. What command-line utility can April demonstrate to modify the boot configuration database? a. bcdedit.exe b. boot.ini c. ntloader.exe 2. What does the Power-On Self Test (POST) do? a. tests to see whether the power is on b. performs initial hardware checks, verifies devices, and retrieves system configurations from CMOS c. calls programs such as autoexec.bat, config.sys, and win.ini 3. April want to demonstrate starting a computer in safe mode. What are the steps to start a computer in safe mode? a. access the system BIOS and configure it to start in safe mode b. boot the installation media and select the safe mode option c. remove all media and then press and hold the F8 key before the Windows Logo appears Safe mode starts Windows with a limited set of fi les and drivers. Identify steps in the startup process 47
59 Answers 1. The utility that April can demonstrate to modify the boot configuration database is: a. bcdedit.exe 2. The Power-on Self Test (POST): b. performs initial hardware checks, verifies devices, and retrieves system configurations from CMOS 3. To start a computer in safe mode: c. remove all media and then press and hold the F8 key before the Windows Logo appears Essential details Power-On Self Test (POST) is a set of routines stored in a computer s read-only memory (ROM) that tests various system components such as RAM, the disk drives, and the keyboard to see whether they are properly connected and operating. The Master Boot Record (MBR) is the first sector of the first hard disk; it is a physically small but critical element in the startup process on an x86-based computer. To start a computer in safe mode remove all floppy disks, CDs, and DVDs from the computer and then restart the computer. If your computer has a single operating system installed, press and hold the F8 key as your computer restarts. FAST TRACK HELP Start-your-computer-in-safe-mode /3 48 CHAPTER 6: Understanding Server Maintenance
60 OBJECTIVE UNDERSTANDING SERVER MAINTENANCE 6.2 Understand business continuity SCENARIO: Rachel Valdes is developing a strategic information technology plan for her company, Northwinds Traders. The main focus of this plan is to maintain business continuity by ensuring that critical business functions will be available for customers and business partners. Her plan must ensure that the needs and important activities of Northwinds customers, suppliers, regulators, and employees can be met in event of an unforeseen technology problem or a natural or human-induced disaster. She needs to plan for data redundancy as well as disaster recovery. 1. Northwinds Traders core infrastructure runs on Microsoft Windows Server 2008 R2. What inherent application can they use to implement the data redundancy portion of their strategic plan? a. Windows Server Backup b. Active Directory Restore Mode c. NTBackup.exe 2. What benefit does folder redirection offer? a. allows administrators to direct folders to perform data backups and migrations b. allows users and administrators to redirect the path of a folder to a new location that can provide backup on a network share c. converts a folder from one file system to another 3. Part of Rachel s plan is to develop a disaster recovery plan. What is a disaster recovery plan? a. the process, policies, and procedures related to preparing for recovery or continuation of critical technology after a natural or human-induced disaster b. a plan that dictates how to recover data and financial loss after a theft c. a procedure meant solely for recovering lost data A disaster recovery plan is related to any technology infrastructure and should be updated on a regular basis. Understand business continuity 49
61 Answers 1. To implement the data redundancy portion of Northwinds strategic plan they can use: a. Windows Server Backup 2. The benefit offered by folder redirection is to: b. allow users and administrators to redirect the path of a folder to a new location that can provide backup on a network share. Folder redirection is a method that helps prevent users from keeping important information on their local hard drives by redirecting it to another location where it can be backed up for data redundancy. 3. A disaster recovery plan includes: a. the process, policies, and procedures related to preparing for recovery or continuation of critical technology after a natural or human-induced disaster Essential details Data redundancy is a property of some disk arrays that provides fault tolerance so that all or part of the data stored in the array can be recovered in the case of disk failure. Disaster recovery is the process, policies, and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. Business continuity is the activity performed by an organization to ensure that critical business functions will be available to customers, suppliers, regulators, and other entities that must have access to those functions. FAST TRACK HELP / CHAPTER 6: Understanding Server Maintenance
62 OBJECTIVE UNDERSTANDING SERVER MAINTENANCE 6.3 Understand updates SCENARIO: Mark Patten is a network engineer with Tailspin Toys. Tailspin Toys has asked Mark to find a way to ensure that all of the systems on their network are updated on a regular basis. They also want Mike to discuss updates with their software development team because developers sometimes run into issues with updates conflicting with their custom software while they are in development process. Tailspin Toys desktop systems range from Windows XP to Windows 7, both 32-bit and 64-bit. They also have a mix of server operating systems running Windows Server 2003 R2 through Windows Server 2008 R2. This variety of computers and systems within a single organization is not unusual, but requires strong network administration skill on Mark s part! 1. What can Mark do to streamline update management for Tailspin Toys? a. configure Windows Software Update Services (WSUS) to download and deploy updates based on his needs b. arrive early every Wednesday before Tailspin Toys opens and perform Windows Updates c. allow the users to run the updates whenever they see fit 2. What can Mark do to solve the issues he will run into with the software development team? a. disable updates for the software development team b. configure a separate WSUS group and put all of the software development computers and servers in that group c. isolate the software development team on a separate segment and allow them to manage their own updates 3. What tool can Mark use to determine the security state in accordance with Microsoft security recommendations? a. Qchain.exe b. Network Monitor c. Microsoft Baseline Security Analyzer (MBSA) Use MBSA to detect common security misconfi gurations and missing security updates on computer systems. Understand updates 51
63 Answers 1. To streamline update management for Tailspin Toys, Mark can: a. configure Windows Software Update Services (WSUS) to download and deploy updates based on his needs 2. To solve the issues with the software development team, Mark can: b. configure WSUS to have a separate group and put all of the software development computers and servers in that group. He can schedule updates to be selectively applied to their system. 3. To determine the security state in accordance with Microsoft security recommendations, Mark can use: c. Microsoft Baseline Security Analyzer (MBSA) Essential details A hotfix is a single package composed of one or more files used to address a problem in a product. Update management is the process of controlling the deployment and maintenance of interim software releases into production environments. Service packs are cumulative set of hotfixes, security updates, critical updates, and updates since the release of the product, including many resolved problems that have not been made available through any other software updates FAST TRACK HELP /3 52 CHAPTER 6: Understanding Server Maintenance
64 OBJECTIVE UNDERSTANDING SERVER MAINTENANCE 6.4 Understand troubleshooting methodology SCENARIO: Recent changes in the network configurations at Coho Winery have been successfully implemented. Andrew Ma, the systems administrator, is pleased with his ability to organize network objects, apply group policies to manage desktop computers, and manage security, but the changes have brought about the need to refresh the skills of the helpdesk team. Jeff Wang is responsible for updating the skills of the current team and training the new helpdesk hires at Coho Winery. The helpdesk team is in charge of troubleshooting various issues that come in on a day-to-day basis from the local winery and their remote winery locations located on both the east coast and the west coast. Troubleshooting methodology is imperative for the success of the helpdesk team. 1. What is an example of a systemic problem? a. a hard disk fails on a user s computer b. a worm propagates through the entire network c. a user s monitor will not turn on 2. What is the first tool in a Microsoft environment that should be used to determine the time and type of problem a particular system may be having? a. resource Monitor b. task Manager c. event Viewer 3. What application allows you to view all processes and either selectively end a single process or the entire process tree? a. resource Monitor b. task Manger c. msconfig.exe Windows Resource Monitor allows you to view a process wait chain and to end processes that are preventing a program from working properly. Understand troubleshooting methodology 53
65 Answers 1. An example of a systemic problem is when: b. a worm propagates through the entire network. Answers A and C are specific to a single system s problems, not systemic. 2. The first tool in a Microsoft environment that should be used to determine the time and type of problem is: c. Event Viewer 3. To view all processes an either selectively end a single process or the entire process tree, use the a. Resource Monitor Essential details Event Viewer maintains logs about program, security, and system events on your computer. Resource Monitor is a system tool that allows you to view information about the use of hardware (CPU, memory, disk, and network) and software (file handles and modules) resources in real time. Event viewer can be accessed through Start->Programs->Administrative Tools->Server manager-> Diagnostics->Event Viewer. Default location for event logs: %systemroot%\system32\config FAST TRACK HELP proddocs/en-us/snap_event_viewer.mspx?mfr=true /3 54 CHAPTER 6: Understanding Server Maintenance
Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015
Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this
Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
MCTS Guide to Microsoft Windows 7. Chapter 13 Enterprise Computing
MCTS Guide to Microsoft Windows 7 Chapter 13 Enterprise Computing Objectives Understand Active Directory Use Group Policy to control Windows 7 Control device installation with Group Policy settings Plan
Advanced Diploma In Hardware, Networking & Server Configuration
Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Implementing and Supporting Microsoft Windows XP Professional
Implementing and Supporting Microsoft Windows XP Professional Key Data Course #: 2272C Number of Days: 5 Format: Instructor-led The purpose of this course is to address the implementation and desktop support
BackupAssist v6 quickstart guide
Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...
Small Business Server Part 2
Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP [email protected] Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS
BackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
Backup and Recovery FAQs
May 2013 Page 1 This document answers frequently asked questions regarding the Emerson system Backup and Recovery application. www.deltav.com May 2013 Page 2 Table of Contents Introduction... 6 General
Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
70-682. Microsoft. Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician. http://www.pass4sureofficial.com. www.dumpspdf.
70-682 Microsoft Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician http://www.pass4sureofficial.com Dumpspdf.com is a reputable IT certification examination guide, study guides and
Managing and Maintaining a Windows Server 2003 Network Environment
Managing and maintaining a Windows Server 2003 Network Environment. AIM This course provides students with knowledge and skills needed to Manage and Maintain a Windows Server 2003 Network Environment.
VERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
SharePoint Server for Business Intelligence
SharePoint Server for Business Intelligence SharePoint Business Intelligence Content Team Summary: Step-by-step, learn how to install and configure SharePoint Server 2010 and SQL Server 2008 to create
System Protection for Hyper-V Whitepaper
Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Definitions... 3 Considerations... 3 2. About the BackupAssist Hyper-V solution... 4 Advantages... 4
MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008
MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials
Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led
Microsoft Dynamics GP Release
Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.
Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1
EaseUS Todo Backup Reliable Backup & Recovery Solution EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 Part 1 Overview EaseUS Todo Backup Solution Guide. All Rights Reserved Page 2 Introduction
Interworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
(Exam 70-680): Configuring
Microsoft MCTS Self-Paced Training Kit (Exam 70-680): Configuring Windows? Ian McLean Orin Thomas Contents Introduction Lab Setup Instructions Hardware Requirements Using the DVD xxv How to Install the
Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution
Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution Intronis Cloud Backup and Recovery is a file based backup application that allows users to back up their critical data to the
Sage Timberline Enterprise Installation and Maintenance Guide
Sage Timberline Enterprise Installation and Maintenance Guide NOTICE This document and the Sage Timberline Enterprise software may be used only in accordance with the accompanying Sage Timberline Enterprise
FileMaker Server 13. Getting Started Guide
FileMaker Server 13 Getting Started Guide 2007 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08
Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL Installation and System Administrator's Guide 4MASIN450-08 2011 Sage Software, Inc. All rights reserved. Sage, the Sage logos and the Sage product
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
Group Policy for Beginners
Group Policy for Beginners Microsoft Corporation Published: April 2011 Abstract Group Policy is the essential way that most organizations enforce settings on their computers. This white paper introduces
Moving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
Open Source and License Source Information
BlackArmor NAS 220 BlackArmor NAS 220 User Guide 2010 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks of Seagate
Course 20533: Implementing Microsoft Azure Infrastructure Solutions
Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
Microsoft Dynamics GP. Workflow Installation Guide Release 10.0
Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Microsoft MTA Qualifications. CompTIA Qualifications. Course Title: SUPPORT SPECIALIST (ITSS) Includes Work Experience of 16 weeks with IT company
Course Title: IT SUPPORT SPECIALIST (ITSS) Program Type: Course Code: Award Type: Traineeship AT00005 Industry Professional Certification CompTIA and Microsoft Awards Objective Areas: Microsoft MTA; Server;
Microsoft Windows Storage Server 2003 R2
Microsoft Windows Storage Server 2003 R2 Getting Started Guide Abstract This guide documents the various features available in Microsoft Windows Storage Server 2003 R2. Rev 1. 2005 Microsoft Corporation.
Nexio Connectus with Nexio G-Scribe
Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Implementing Microsoft Azure Infrastructure Solutions
Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently
Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008
Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:
Using Rsync for NAS-to-NAS Backups
READYNAS INSTANT STORAGE Using Rsync for NAS-to-NAS Backups Infrant Technologies 3065 Skyway Court, Fremont CA 94539 www.infrant.com Using Rsync For NAS-To-NAS Backups You ve heard it before, but it s
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
Introduction to Windows Server 2003
CHAPTER Introduction to Windows Server 2003 After reading this chapter and completing the exercises, you will be able to: Differentiate between the different editions of Windows Server 2003 Explain Windows
Microsoft Training and Certification Guide. Current as of December 31, 2013
Microsoft Training and Certification Guide Current as of December 31, 2013 Welcome to the Microsoft Training and Certification Guide. This device is intended to provide a quick, comprehensive view of our
Selecting the Right NAS File Server
Selecting the Right NAS File Server As the network administrator for a workgroup LAN, consider this scenario: once again, one of your network file servers is running out of storage space. You send out
HOUR 3. Installing Windows Server 2003
HOUR 3 Installing Windows Server 2003 In this hour, we discuss the different types of Windows Server 2003 installations, such as upgrading an existing server or making a clean install on a server that
AV-006: Installing, Administering and Configuring Windows Server 2012
AV-006: Installing, Administering and Configuring Windows Server 2012 Career Details Duration 105 hours Prerequisites This course requires that student meet the following prerequisites, including that
User Guide - Exchange Public Folder idataagent
Page 1 of 191 User Guide - Exchange Public Folder idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE PUBLIC FOLDER IDATAAGENT DEPLOYMENT
Attix5 Pro Storage Platform
Attix5 Pro Storage Platform V6.0 User Manual Cover for Microsoft Windows Your guide to configuring the Attix5 Pro Storage Platform. SERVER EDITION V6.0 for MICROSOFT WINDOWS Copyright Notice and Proprietary
Introducing ZENworks 11 SP4. Experience Added Value and Improved Capabilities. Article. Article Reprint. www.novell.com. Endpoint Management
Introducing ZENworks 11 SP4 Experience Added Value and Improved Capabilities Article Article Reprint Endpoint Management Endpoint Management Article Introducing ZENworks 11 SP4 Addressing Key Usability
How to Prepare for the Upgrade to Microsoft Dynamics CRM 2013 (On-premises)
How to Prepare for the Upgrade to Microsoft Dynamics CRM 2013 (On-premises) COMPANY: Microsoft Corporation RELEASED: September 2013 VERSION: 1.0 Copyright This document is provided "as-is". Information
How To Use Windows Small Business Server 2011 Essentials
Everything Your Business Needs in a Server, Nothing it doesn t. Ideal as a first server for small businesses with up to 25 users, Windows Small Business Server 2011 Essentials provides a cost-effective
6445A - Implementing and Administering Small Business Server 2008
6445A - Implementing and Administering Small Business Server 2008 Table of Contents Introduction Audience At Clinic Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course
1. Installation Overview
Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender
Hosting Users Guide 2011
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
DriveLock Quick Start Guide
Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Vendor: Microsoft Exam Code: 70-417 Exam Name: Microsoft Upgrading Your Skills to MCSA Windows Server 2012 Exam Version: Demo Question:
Seagate Business Storage 1-Bay, 2-Bay, and 4-Bay NAS User Guide
Seagate Business Storage 1-Bay, 2-Bay, and 4-Bay NAS User Guide Seagate Business Storage NAS User Guide 2013 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and
How To Install The Exchange Idataagent On A Windows 7.5.1 (Windows 7) (Windows 8) (Powerpoint) (For Windows 7) And Windows 7 (Windows) (Netware) (Operations) (X
Page 1 of 208 User Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS
Configuring Windows Server 2008 Active Directory
Configuring Windows Server 2008 Active Directory Course Number: 70-640 Certification Exam This course is preparation for the Microsoft Technical Specialist (TS) exam, Exam 70-640: TS: Windows Server 2008
FileMaker Server 15. Getting Started Guide
FileMaker Server 15 Getting Started Guide 2007 2016 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
Installing Windows XP Professional
CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows
safend a w a v e s y s t e m s c o m p a n y
safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses
Using Microsoft Active Directory (AD) with HA3969U in Windows Server
Using Microsoft Active Directory (AD) with HA3969U in Windows Server Application Note Abstract This application note describes how to use Microsoft Active Directory (AD) service with HA3969U systems in
Fixed Destinations. BackupAssist Quick-Start Guide for. BackupAssist installation, configuration and setup. www.backupassist.com.
BackupAssist Quick-Start Guide for Fixed Destinations BackupAssist installation, configuration and setup Contents 1.1 Introduction... 2 2.1 Before you begin... 2 Applies to Local directory 3.1 Installation...
Getting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
Overview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Agency Pre Migration Tasks
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
Exam: 070-215 QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4
Exam: 070-215 QUESTION 1 You want to provide complete redundancy for all data stored on your hardware RAID-5 disk array. You install a second hardware RAID-5 disk array. You want to create a mirror of
Spector 360 Deployment Guide. Version 7.3 January 3, 2012
Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server
How To Manage Your Email On A Microsoft Powerbook 2.5 (For Microsoft) On A Macbook 2 (For A Mac) On An Iphone Or Ipad (For An Ipad) On Your Pc Or Macbook
Page 1 of 285 User Guide - Exchange Mailbox idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE MAILBOX IDATAAGENT DEPLOYMENT -
Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its
DISASTER RECOVERY STRATEGIES: BUSINESS CONTINUITY THROUGH REMOTE BACKUP REPLICATION Every organization has critical data that it can t live without. When a disaster strikes, how long can your business
Deploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions
Paul McFedries. Home Server 2011 LEASHE. Third Edition. 800 East 96th Street, Indianapolis, Indiana 46240 USA
Paul McFedries Microsoft Windows9 Home Server 2011 LEASHE Third Edition 800 East 96th Street, Indianapolis, Indiana 46240 USA Table of Contents Introduction 1 Part I Unleashing Windows Home Server Configuration
The Windows Server 2003 Environment. Introduction. Computer Roles. Introduction to Administering Accounts and Resources. Lab 2
Islamic University of Gaza College of Engineering Computer Department Computer Networks Lab Introduction to Administering Accounts and Resources Prepared By: Eng.Ola M. Abd El-Latif Mar. /2010 0 :D Objectives
Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201
Administration GUIDE SharePoint Server idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Getting Started - SharePoint Server idataagent Overview Deployment Configuration Decision Table
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
Microsoft Training and Certification Guide. Current as of March 16, 2015
Microsoft Training and Certification Guide Current as of March 16, 2015 Welcome to the Microsoft Training and Certification Guide. This guide is intended to provide a quick, comprehensive view of our training
VIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE
VIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE Solution Overview Thank you for choosing the ViperVault cloud replication, backup and disaster recovery service. Using this service you can replicate your
Online Backup Plus Frequently Asked Questions
Online Backup Plus Frequently Asked Questions 1 INSTALLATION 1.1 Who installs the Redstor Online Backup Plus service? 1.2 How does the installed client connect to Redstor s Cloud Platform? 1.3 On which
Symantec Backup Exec System Recovery
Symantec Backup Exec System Recovery The Gold Standard in Complete Windows System Recovery Overview 7.0 is a complete, disk-based system recovery solution for Microsoft Windows based servers, desktops,
Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15
Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required
Installing and Upgrading to Windows 7
Installing and Upgrading to Windows 7 Before you can install Windows 7 or upgrade to it, you first need to decide which version of 7 you will use. Then, you should check the computer s hardware to make
Minimize the impact of downtime and disruption. Replace time-consuming manual processes with fast, automated recovery.
Protect Against Business Downtime and Disaster with Rapid, Reliable Backup and Recovery Overview Symantec Backup Exec System Recovery 2010 is a simple, cost-effective backup and recovery solution for small
Technical Brief for Windows Home Server Remote Access
Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality
How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
Deploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643)
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643) Chapter Four Windows Server 2008 Remote Desktop Services, Part 1 Objectives Describe the Remote Desktop
Mediasite EX server deployment guide
Mediasite EX server deployment guide 2008 Sonic Foundry, Inc. All rights reserved. No part of this document may be copied and/or redistributed without the consent of Sonic Foundry, Inc. Additional copies
Metalogix Replicator. Quick Start Guide. Publication Date: May 14, 2015
Metalogix Replicator Quick Start Guide Publication Date: May 14, 2015 Copyright Metalogix International GmbH, 2002-2015. All Rights Reserved. This software is protected by copyright law and international
Retail Deployment Guide. Microsoft Dynamics AX 2012 Feature Pack
Retail Deployment Guide Microsoft Dynamics AX 2012 Feature Pack Microsoft Corporation February 2012 Microsoft Dynamics is a line of integrated, adaptable business management solutions that enables you
StorageCraft Technology Corporation Leading the Way to Safer Computing 2009 StorageCraft Technology Corporation. All Rights Reserved.
PRODUCT WHITEPAPER This brochure is for informational purposes only. STORAGECRAFT MAKES NO WARRANTIES, EXPRESSED OR IMPLIED, IN THIS SUMMARY. StorageCraft, ShadowProtect and ExactState and the StorageCraft
Deploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions
