CHAPTER ANSWERS IMPLEMENTING, MANAGING, AND MAINTAINING A MICROSOFT WINDOWS SERVER 2003 NETWORK INFRASTRUCTURE

Size: px
Start display at page:

Download "CHAPTER ANSWERS IMPLEMENTING, MANAGING, AND MAINTAINING A MICROSOFT WINDOWS SERVER 2003 NETWORK INFRASTRUCTURE"

Transcription

1 CHAPTER S IMPLEMENTING, MANAGING, AND MAINTAINING A MICROSOFT WINDOWS SERVER 2003 NETWORK INFRASTRUCTURE

2 2 TEXTBOOK CHAPTER 1 S: IMPLEMENTING DHCP CHAPTER 1 IMPLEMENTING DHCP CHAPTER REVIEW QUESTIONS 1. Under what circumstances should network administrators use DHCP? Network administrators should use DHCP in situations in which manually configuring each host on a network becomes inefficient. As the number of hosts on a network grows, and as the number of configuration options for each host also grows, so does the need for and benefit of using DHCP. 2. Place the following DHCP message types in the order in which a successful initial IP address assignment procedure uses them. a. DHCPACK b. DHCPOFFER c. DHCPREQUEST d. DHCPDISCOVER d, b, c, a. The client broadcasts a DHCPDISCOVER message to find the DHCP server, the server responds with a DHCPOFFER message, the client accepts the offer with a DHCPREQUEST message, and the server confirms by sending a DHCPACK message. 3. How does a DHCP client respond when its attempt to renew its IP address lease fails and the lease expires? The IP address is released and the client begins the process of acquiring a new lease. 4. You have configured a scope with an address range of through However, your DNS server on the same subnet has already been assigned a static address of With the least administrative effort, how can you allow for compatibility between the DNS server s address and DHCP service on the subnet? By configuring an exclusion for the address , you can most easily allow for compatibility between the DNS server and the currently configured DHCP scope. 5. Within your only subnet, you want 10 specific DHCP clients (out of 150 total on the network) to use a test DNS server that is not assigned to any other computers through DHCP. How can you best achieve this objective? The best way to achieve this objective is to create a new user class, configure a 006 DNS Servers option for the class that specifies the IP address of the test DNS server, and then set the class of the 10 DHCP clients by running the Ipconfig /setclassid command.

3 TEXTBOOK CHAPTER 1 S: IMPLEMENTING DHCP 3 CHAPTER CASE SCENARIOS Case Scenario 1-1: Obtaining an IP Address Last month, a server was configured for DHCP and was functioning normally. Five days ago, a test server on the same network segment was promoted to be the first domain controller on the network. Today several users on the same subnet as the original DHCP server have complained that they are unable to obtain an IP address using DHCP. What is the most likely reason users are unable to obtain an IP address? a. The user s IP address leases have expired. b. A DHCP relay agent is missing or incorrectly configured. c. There are duplicate IP addresses on the network. d. The DHCP server must be authorized and is not. d. Because Active Directory was introduced onto the network, the DHCP servers must now be authorized. Expired IP address leases trigger the acquisition of a new address and do not, by themselves, prevent a computer from obtaining a new address. A missing DHCP relay agent would cause clients on remote subnets not to obtain new addresses; however, the clients that have complained about not receiving an address are not using a DHCP relay agent. Although a duplicate IP address would prevent network communication, it does not prevent a computer from obtaining a new IP address from the DHCP server. Case Scenario 1-2: Maximizing Lease Availability You are configuring DHCP scope options for Contoso, Ltd. The company has a limited number of IP addresses available for clients, and it wants to configure DHCP to maximize lease availability. Choose all of the following actions that will accomplish this objective: a. Set long lease durations for IP addresses. b. Set short lease durations for IP addresses. c. Configure a DHCP option to automatically release an IP address when the computer shuts down. d. Create DHCP reservations for all portable computers. b, c. A is incorrect because setting long lease durations means that clients that no longer need leases may still hold them. IP addresses not in use will not be reclaimed unless the computer is configured to release the IP address lease at shutdown, manually releases the lease, or the lease period expires. A long lease period will ultimately result in fewer available addresses. B is correct because setting short lease durations enables faster recovery of IP addresses and results in a greater number of available addresses. C is correct because configuring a client to release an address on shutdown results in more available IP addresses. D is incorrect because creating DHCP reservations does not increase the available addresses, but in fact will decrease them.

4 4 TEXTBOOK CHAPTER 2 S: MANAGING AND MONITORING DHCP CHAPTER 2 MANAGING AND MONITORING DHCP CHAPTER REVIEW QUESTIONS 1. You have a Windows NT 4 client for which you want to enable dynamic updates. You want the DHCP server to automatically update both the A record and PTR record. Which action will accomplish this? a. Take no action. Updating of the A record and PTR record happens automatically by default. b. In the DNS tab of the DHCP server properties dialog box, select Dynamically Update DNS A And PTR Records For DHCP Clients That Do Not Request Updates. c. In the DNS tab of the DHCP server properties dialog box, select Always Dynamically Update DNS A And PTR Records. d. Register the client as a dynamic host with the DHCP server. b. Because pre Windows 2000 clients can neither directly update their records nor request the DHCP server to update their records, you must select Update DNS A And PTR Records For DHCP Clients That Do Not Request Updates. 2. You have not modified the default settings for DNS on the DHCP client or server. Which of the following client record or records will the DHCP server update in DNS? (Assume the clients are running Windows XP.) a. The PTR resource record b. The A resource record c. Both the PTR and A resource records d. Neither the PTR nor the A resource record a. By default, the DHCP server updates only the PTR record for DHCP clients running Windows 2000 and later. You can configure the DHCP server to update Windows 2000 and later clients, as well as pre Windows 2000 DHCP clients.

5 TEXTBOOK CHAPTER 2 S: MANAGING AND MONITORING DHCP 5 3. For a zone in which only secure dynamic updates are allowed, you have configured your DHCP server to perform dynamic updates on behalf of Windows NT 4 clients. Other dynamic DNS settings on the DHCP server have the default settings. After you migrate the clients to Windows XP, you find that their A resource records are no longer being updated. What is the most likely explanation for this problem? The DHCP server is not a member of the DnsUpdateProxy security group. 4. True or False: If a DNS zone accepts only secure dynamic updates and the DHCP server is a member of the DnsUpdateProxy security group, the resource records created by the Netlogon service for the domain controller lack security? Explain your answer. True. Being a member of the DnsUpdateProxy security group enables servers to update records without taking ownership of records and without requiring credentials for update. Although this enables multiple entities to update the same record, it also poses a security risk. 5. Automatic and manual backups of the DHCP database are successfully performed. You want to restore the following: all of the scopes, reservations, leases, options, and security credentials. What should you do? a. Restore from the automatic backup. b. Restore from the manual backup. c. Restore from an offline backup. d. Restore from the automatic or manual backup, and reconfigure security credentials manually. d. Regardless of how you back up and restore a DHCP database, you must reconfigure security credentials manually.

6 6 TEXTBOOK CHAPTER 2 S: MANAGING AND MONITORING DHCP 6. You just completed a restoration of the DHCP database. You start the DHCP console to verify a successful restoration. You notice the scope and options are displayed, but active leases are not. What should you do to repopulate the active leases? a. The restoration failed. Perform the restoration again. b. The restoration failed because the backup was corrupt. Locate a valid backup and use it to restore the DHCP database. c. Using the DHCP console, perform reconciliation. d. Delete the Tmp.mdb file, and restart the DHCP service. c. Because the scope and options are displayed, it is unlikely that the restoration failed or that the backup was corrupt. Performing reconciliation will repopulate the active lease information from the registry into the DHCP database. Deleting the Tmp.mdb file has no effect on restoring the active leases. 7. You are monitoring a DHCP server and you want to save the audit log that was created last Tuesday. Today is Monday. What should you do? a. Do nothing; the DHCP server automatically saves the log after writing to it. b. Remove the log file from the directory. c. Change the location of the log files. d. On Wednesday, stop and start the DHCP Server service. b. To prevent the log file from being overwritten, remove it from the designated log file directory. Although it is true that the DHCP server saves the file after writing to it, if you do nothing, it will overwrite the file by default. Changing the location of the log files will prevent you from overwriting the file, but changing the location each time you want to prevent a file from being overwritten is not efficient. You can prevent overwriting of the file by starting and stopping the DHCP Server service. 8. You want to determine how many IP addresses are available for lease across all scopes. What tool should you use for this? a. System Event Log b. DHCP scope statistics c. DHCP server statistics d. DHCP audit log c. Only the DHCP server statistics window shows you the addresses available across different scopes.

7 TEXTBOOK CHAPTER 2 S: MANAGING AND MONITORING DHCP 7 CHAPTER CASE SCENARIOS Case Scenario 2-1: Monitoring DHCP Requests You have been monitoring DHCP server activity by using System Monitor. You have been viewing the Discovers/sec counter. You observe a sudden increase in the number of DHCP requests. Which of the following statements could explain the sudden increase? a. A large number of clients are initializing simultaneously and attempting to locate a DHCP server. b. A large number of clients are shutting down simultaneously and releasing their IP address leases. c. Scope leases are too short, forcing an increase in DHCPNACK messages. d. Two new DHCP servers have been initialized on the network and are querying the directory service for the enterprise root. a. Clients send these messages when they log on to the network and obtain a new address lease. When clients shut down, they do not send DHCPDISCOVER messages. If the scope lease is too short, leases expire quickly. In this scenario, clients send DHCPREQUEST messages, not DHCPNACK messages. When a DHCP server queries the directory service, it sends DHCPINFORM messages, not DHCPDISCOVER messages. Case Scenario 2-2: Monitoring DHCP Network Traffic Recently, users have complained that the network is slow at different periods throughout the week. You suspect heavy DHCP traffic is a contributing cause. When DHCP traffic is heavier than normal, you want notification of it. How can you accomplish this? To determine what is normal, you must first create a performance baseline for comparison to current conditions. After you have created a performance baseline, determine a threshold for notification (for example, a 50 percent to 100 percent increase in traffic), and then set an alert to notify you.

8 8 TEXTBOOK CHAPTER 3 S: IMPLEMENTING NAME RESOLUTION USING DNS CHAPTER 3 IMPLEMENTING NAME RESOLUTION USING DNS CHAPTER REVIEW QUESTIONS 1. Describe the process by which secondary servers determine whether a zone transfer should be initiated. The secondary server conducts an SOA query, in which the serial number value in the primary zone s SOA resource record is compared to the serial number value in the secondary server s own version of the zone database. If the secondary server determines that the master zone has a higher serial number, a transfer is initiated. 2. What is the difference between an IXFR query and an AXFR query? IXFR queries initiate an incremental zone transfer. In these transfers, only the updated information is transferred across the network. AXFR queries initiate an all-zone transfer. In these transfers, the complete zone database is transferred across the network. 3. You discover that an administrator has adjusted the default TTL value for your company s primary DNS zone to 5 minutes. Which of the following is the most likely effect of this change? a. Primary servers initiate a zone transfer every 5 minutes. b. DNS clients have to query the server more frequently to resolve names for which the server is authoritative. c. Secondary servers initiate a zone transfer every 5 minutes. d. DNS hosts reregister their records more frequently. d. Smaller TTL values help ensure that information about the domain is more consistent across the DNS databases, especially in environments in which the data changes frequently, but because records expire more quickly, clients must query the server more frequently. This also increases the load on the name servers that contain the name, and it also increases Internet traffic. Answer a is not correct because the TTL does not dictate the frequency of zone transfers. Answer b is not correct because the TTL does not dictate the frequency of zone transfers. Answer c is not correct because changing the TTL has no impact on how frequently DNS hosts register their records.

9 TEXTBOOK CHAPTER 3 S: IMPLEMENTING NAME RESOLUTION USING DNS 9 4. Relative to file-backed zones, storing DNS zones in Active Directory results in which of the following? a. Less frequent transfer of information b. Increased need for administration c. Less saturation of network bandwidth d. Ability to perform secure dynamic updates a. Using Active Directory integrated zones, or storing zones in Active Directory, means less administration and more efficient replication, which results in lower bandwidth utilization and access control to records resulting in secure dynamic updates. Answer b is not correct because storing zones in Active Directory requires less need for administration. Answer c is not correct because storing zones in Active Directory enables transfers to take advantage of the more efficient replication process provided by Active Directory. Answer d is not correct because Active Directory provides the capability for secure dynamic updates. 5. You want to consolidate DNS traffic between your network and the Internet. How could you use a forwarder to accomplish this? One possible answer is to configure the firewall used by your network to allow only one DNS server to communicate with the Internet. Configure the other DNS servers to forward queries they cannot resolve locally to the Internet-facing DNS server. The Internet-facing DNS server acts as a forwarder to the other servers. 6. What are some reasons a source server might respond with an AXFR to an IXFR request? The primary server for a zone is not required to perform an incremental zone transfer. It can choose to perform a full zone transfer if the primary DNS server does not support incremental zone transfers, if the primary DNS server does not have all the necessary data for performing an incremental zone transfer, or if an incremental zone transfer would consume more network bandwidth than a full zone transfer. 7. True or False: A primary server always initiates a zone transfer? False. A secondary server always initiates a zone transfer.

10 10 TEXTBOOK CHAPTER 3 S: IMPLEMENTING NAME RESOLUTION USING DNS CHAPTER CASE SCENARIOS Case Scenario 3-1: Minimizing DNS Traffic and Administration Contoso, Ltd., has a branch office connected to corporate headquarters with a slow WAN link. The company wants to minimize the amount of traffic generated by the local DNS server on this link and minimize DNS administration in the branch office. How would you configure the DNS server to meet these requirements? a. Disable round-robin and netmask ordering. b. Reduce the refresh interval in the SOA resource record for the primary zone. c. Do not configure any forward or reverse zones, but configure the server to use a forwarder. d. Configure the forward lookup zone with a WINS lookup record, and decrease the cache time-out value. c. This will make the server a caching-only server, which will eliminate zone transfer network traffic. Answer a is incorrect because disabling round-robin and netmask ordering changes how addresses are returned to clients, but does nothing to lower administration or use of bandwidth. Answer b is incorrect because reducing the refresh interval will likely consume more, not less, bandwidth. Answer d is incorrect because the DNS server will still create network traffic to use WINS records. Decreasing the cache time-out value increases the number of lookups and consequently the amount of network traffic.

11 TEXTBOOK CHAPTER 3 S: IMPLEMENTING NAME RESOLUTION USING DNS 11 Case Scenario 3-2: Troubleshooting Access to External Resources You are the network administrator for Contoso, Ltd. Users are complaining that they cannot access resources external to the local network. You eliminate connectivity issues to the DNS server and narrow the problem to name resolution. Using Ping.exe, you are able to successfully resolve local hosts but cannot resolve names external to the local network. Which of the following is the most likely cause of this issue? Choose the correct answer. a. The local DNS server is not authoritative for the Internet DNS domains. b. Iterative queries are disabled on the DNS servers. c. Recursive queries are disabled on the DNS servers. d. DNS root hints are missing or incorrectly configured. d. Root hints are DNS resource records stored on a DNS server that list the IP addresses for the DNS root servers on the Internet. If the DNS root hints are missing or incorrectly configured, the DNS server will not be able to forward requests for the queried Internet domain. Answer a is incorrect. The local DNS server is authoritative for only the organization s DNS domain. Internet DNS servers are authoritative for all first-level DNS domains. Answer b is incorrect because you cannot disable iterative queries on the DNS server. Answer c is incorrect. If recursive queries are disabled on the DNS server, the DNS server would send DNS referrals back to the client. The client would still be able to connect to Internet resources.

12 12 TEXTBOOK CHAPTER 4 S: MANAGING AND MONITORING DNS CHAPTER 4 MANAGING AND MONITORING DNS CHAPTER REVIEW QUESTIONS 1. What is the function of round robin in DNS? Round robin rotates the order of matching resource records in the response list returned to DNS clients. Each successive DNS client that queries for a multihomed name gets a different resource record at the top of the list. 2. Which feature takes priority round robin or netmask ordering? Round robin is secondary to subnet prioritization. When the Enable Netmask Ordering check box is also selected, round robin is used as a secondary means to order returned resource records for multihomed computers. 3. Which of the following are valid reasons to monitor the TTL settings on your DNS servers? Choose all that apply. a. Query traffic increases as DNS clients request information that has expired from their cache. b. DNS clients may be caching outdated records. c. DNS clients may not be able to resolve host names. d. Query traffic decreases as DNS clients request information that has expired from their cache. a and b. Answer c is incorrect because TTL has no effect on whether clients are able to resolve host names. Answer d is incorrect because traffic increases, not decreases. 4. What type of test query can be run from the Monitoring tab of the DNS server properties page? a. Recursive query b. Simple query c. Verbose query d. Interval query a and b.

13 TEXTBOOK CHAPTER 4 S: MANAGING AND MONITORING DNS Which of the following approaches provides the best early warning of a DNS service failure? a. Create an alert based on the standard performance counters, and set the threshold to notify you if the counters exceed 95 percent of the recommended threshold. b. Create an alert based on the counters that you decide are appropriate indicators of a failure, and set the threshold to notify you when it is 10 percent below the baseline. c. Create an alert based on the standard counters, and set the threshold to notify you if the counters exceed 75 percent of the recommended threshold. d. Create an alert based on the counters that you decide are appropriate indicators of a failure, and set the threshold to notify you when it is 10 percent above the baseline. d. Answers a and c are incorrect because standard counters should be customized for your organization s specific conditions. Answer b is incorrect because when the threshold is at or slightly below the baseline, conditions are normal, not problematic. 6. You are a systems administrator for Contoso, Ltd. Contoso is planning its DNS zones, and you have been asked to recommend the best way to configure the zones on the company s Microsoft Windows Server 2003 computers. You recommend using Active Directory integrated zones. Why do you recommend this configuration? Choose all answers that apply. a. DNS data is replicated with Active Directory. b. You can configure secure dynamic updates. c. The DNS load will be shared because the other domain controllers will become secondary DNS servers. d. You can configure a replication scope. a, b, and d. However, the additional DNS servers will not become secondary DNS servers but masters that can both read and write DNS data.

14 14 TEXTBOOK CHAPTER 4 S: MANAGING AND MONITORING DNS 7. You are the administrator for Contoso, Ltd., and have updated the IP address for a host by using the DNS console. Assuming it exists, which of the following types of resource records is associated with the host record and must also be updated? a. A resource record b. MX resource record c. NS resource record d. PTR resource record e. SOA resource record f. SRV resource record d. A PTR record is associated with an address (A) resource record. It maps an IP address to a host name. If the associated host name changes, so must the PTR record. Answer a is incorrect because it is the record being updated. Answer b is incorrect because a mail exchanger (MX) record specifies a mail server for the domain and it may not be required to change if an A resource record changes. Answer c is incorrect because an NS record specifies the server responsible for the zone. Answer e is incorrect because it specifies the start of authority and is not impacted by a change in a host record. Answer f is incorrect because an SRV record specifies a server providing a specific service and is not necessarily associated with a host record. 8. A client computer on the internal network of Contoso, Ltd., is unable to connect to a file server. You verify the file server is running and are able to connect to it using another client computer on the same subnet. You suspect the client computer that cannot connect has outdated information in its local cache. Which of the following actions would fix the issue? a. At the client computer, run the Ipconfig /flushdns command. b. At the file server, run the Ipconfig /flushdns command. c. At the file server, run Nslookup. d. At the file server, stop and start the DNS Client service. a. Running the Ipconfig /flushdns command clears the client cache. Answer b is incorrect because although running Ipconfig /flushdns clears the cache on the file server, it does not solve the problem on the client. Answer c is incorrect because running Nslookup on the server does not remove the outdated information on the client. Answer d is incorrect because stopping and starting the DNS Client service on the server does not remove outdated information on the client.

15 TEXTBOOK CHAPTER 4 S: MANAGING AND MONITORING DNS 15 CHAPTER CASE SCENARIOS Case Scenario 4-1: Enabling Network Users to Connect to Internet Host Names You are the network administrator for Contoso, Ltd. The Contoso network consists of a single domain, contoso.com, which is protected from the Internet by a firewall. The firewall runs on a computer named NS1 that is directly connected to the Internet. NS1 also runs the DNS Server service, and its firewall allows DNS traffic to pass between the Internet and the DNS Server service on NS1 but not between the Internet and the internal network. The DNS Server service on NS1 is configured to use round robin. Behind the firewall, two computers are running Windows Server 2003 NS2 and NS3, which host a primary and secondary DNS server, respectively, for the contoso.com zone. Users on the company network report that, although they use host names to connect to computers on the local private network, they cannot use host names to connect to Internet destinations, such as Which of the following actions requires the least amount of administrative effort to enable network users to connect to Internet host names? a. Disable recursion on NS2 and NS3. b. Enable netmask ordering on NS1. c. Configure NS2 and NS3 to use NS1 as a forwarder. d. Disable round robin on NS1. c. Disabling recursion will force NS2 and NS3 to use iterative queries, but will not enable them to resolve external names. Enabling netmask ordering will provide results in the most efficient order for clients, but does not enable internal clients to resolve external addresses. Configuring NS2 and NS3 to use NS1 as a forwarder will result in successful name resolution for internal clients. Disabling round robin will prevent any possible load balancing, but does not enable internal clients to resolve external host names.

16 16 TEXTBOOK CHAPTER 4 S: MANAGING AND MONITORING DNS Case Scenario 4-2: Implementing DNS Updates You are the system administrator for Contoso, Ltd. The company has grown rapidly over the past year, and currently Contoso is using only a single DNS zone. Recently, the Marketing department has made several requests for DNS changes that were delayed. Users would like the ability to make their own DNS updates. What should you do to try to address this problem? a. Create a secondary server in the Marketing department so that users can manage their own zone. b. Delegate the marketing domain to a DNS server in the Marketing department. c. Place a domain controller running DNS in the Marketing department so that people in the department can make changes. d. Upgrade the network infrastructure to improve network performance. b. The marketing domain would reside on a computer in the Marketing department where marketing personnel could administer the zone themselves and make changes as necessary.

17 TEXTBOOK CHAPTER 5 S: NETWORK SECURITY 17 CHAPTER 5 NETWORK SECURITY CHAPTER EXERCISE Exercise 5-5: Using the Security Configuration And Analysis Snap-In Analyzing System Security 7. In the details pane, review the policies that were analyzed. They display the result of a comparison between actual settings and the database setting. QUESTION List some of the configuration settings that are the same in the database and on the computer. Any setting that is labeled with a green check mark is the same in the database as it is on the computer. QUESTION List some of the configuration settings that are different in the database than on the computer. Any setting that is labeled with a red X or exclamation point. Policies labeled with a red X do not match. Policies labeled with an exclamation point exist in the database, but not on the computer. CHAPTER REVIEW QUESTIONS 1. Which of the following are user rights? a. Allow log on locally b. Access a share with full control c. Open a database file d. Back up files and directories a and d. Answers b and c are incorrect because they are permissions.

18 18 TEXTBOOK CHAPTER 5 S: NETWORK SECURITY 2. An administrator temporarily grants a user rights to log on locally to a domain controller by applying a policy to the domain GPO. The administrator does not add the user to other groups. When the user attempts to log on, Windows Server 2003 displays the following error: User does not have the right to log on interactively. What is the most likely cause of the problem? The administrator applied the policy to the domain GPO. By default, the policy setting at the domain controller s OU does not allow users to log on locally to the domain controller, and it overrides the domain-level policy settings. 3. You are the system administrator responsible for creating, configuring, and managing GPOs for your organization. The systems engineers present you with a plan, and you must determine whether you can use a default template. Which of the following default Group Policy templates provides the highest default security for clients? a. Rootsec b. Hisecws c. Securews d. Compatws b. Hisecws is the template used for the highest level of security. 4. You are responsible for creating, configuring, and managing GPOs for your organization. You must determine which settings on the domain controller do not match the security policies that were applied using a specific template. Which of the following tools can you use to determine this? a. Domain Security Policy b. Security Configuration And Analysis snap-in c. Group Policy Management d. Active Directory Users And Computers b. The Security Configuration And Analysis snap-in can evaluate security policy against current settings on a computer. The other tools cannot evaluate security policy against settings; therefore, answers a, c, and d are incorrect.

19 TEXTBOOK CHAPTER 5 S: NETWORK SECURITY You are the system administrator responsible for creating, configuring, and managing GPOs for your organization. Before you can determine which Group Policy settings you should apply to each GPO, you must determine which types of Group Policy settings you can configure. Which of the following types of Group Policy settings can you configure in an Active Directory environment? Choose all that apply. a. Desktop settings b. Network connections c. Location of computers d. Inventory-installed software e. Who can log on to a computer and when a, b, and e. Answers c and d are incorrect because you cannot configure the location of computers and inventory-installed software with Group Policy. CHAPTER CASE SCENARIOS Case Scenario 5-1: Folder Redirection You are the system administrator for Contoso, Ltd., and you want to centrally store users data using folder redirection. Specifically, you want to configure folder redirection of the My Documents folder to each user s existing home directory. Users should have exclusive access to their My Documents data. How will you accomplish your objectives? Choose two answers. a. Configure a GPO to set the Folder Redirection policy to redirect to the user s home directory setting, and link it to the appropriate OU. b. Configure a GPO to set the Grant The User Exclusive Rights To My Documents setting to Disabled, and link it to the appropriate OU. c. Configure a GPO to set the Folder Redirection policy to redirect special OU units. d. Configure a GPO to set the Grant The User Exclusive Rights To My Documents setting to Enabled, and link it to the appropriate OU. c and d. Redirecting special folders to a specific path satisfies the requirements. You must enable the Grant Exclusive Right To My Documents setting to satisfy your requirements. Answer a is incorrect. Here, you redirect the My Documents folder, not the home directory. Answer b is incorrect. You want to provide not disable exclusive access to the My Documents folder.

20 20 TEXTBOOK CHAPTER 5 S: NETWORK SECURITY Case Scenario 5-2: Auditing Someone notifies you that users are having a difficult time accessing shared resources on two of the organization s file servers. You decide to review the audit logs for these servers to determine the cause of the issues. When you review the event logs, you discover that the log contains only data from the previous 12 hours. What might be responsible for the lack of data? Choose all that apply. a. The maximum size of the event log is too small. b. You audited too many events. c. The Overwrite Events Older Than [x] Days setting is set to 1 day. d. Another administrator manually cleared the event logs. e. The relevant events are logged to domain controllers, not member servers. a, c, and d. Answer a is correct because when the maximum size of the event log is too small, events that help you determine the problem can be overwritten.answer c is correct because it allows events to be overwritten every 24 hours, which might not allow enough log activity time. Answer d is correct because the events might have been cleared when another administrator tried to isolate a different issue. Answer b is incorrect because you cannot determine how much log activity the audit objects will produce. It is possible to audit many events that produce little log activity; or, conversely, you can audit only a few objects that produce extremely heavy log activity. Answer e is incorrect because events are logged locally to the servers that are performing the actions.

21 TEXTBOOK CHAPTER 6 S: SECURING NETWORK TRAFFIC WITH IPSEC 21 CHAPTER 6 SECURING NETWORK TRAFFIC WITH IPSEC CHAPTER REVIEW QUESTIONS 1. Which of the following most accurately describes the functionality of the Client (Respond Only) default policy rule? a. The client will respond only to requests secured by IPSec. b. The client will respond to unsecured requests, but will respond by using IPSec. c. The client will respond to unsecured requests with an unsecured response, but will respond to secure requests with a secure response. d. The client will respond to a server only if it can perform a reverse lookup on the IP address of the server. a. The client responds by using IPSec to secure the response if this is requested. Answers b and c are incorrect because the client will not respond to unsecured requests. Answer d is incorrect because the client does not distinguish between the types of computers making the request and because a reverse lookup is not required. 2. Fabrikam, Inc., recently joined two servers to its Active Directory domain. After joining the servers to the domain, the company no longer is able to communicate on the network. You suspect that applying the IPSec policies caused the problem. Which tool would you use to determine whether your suspicion is correct? a. Network Monitor b. The security log in Event Viewer c. Resultant Set of Policies (RSoP) d. IP Security Monitor c. RSoP allows you to examine the Group Policy settings that are applied to the computers. Because the computers have recently joined the domain, it is possible that new Group Policy settings apply to the computers. Answer a is incorrect. Although Network Monitor provides detailed information about network activity, you cannot use it to investigate the application of a Group Policy. Answer b is incorrect. Although the event log provides information about the application of policies, it is not an effective tool with which to determine the active policies for a particular computer. Answer d is incorrect. IP Security Monitor displays current IPSec activity and statistics, but it does not indicate which policies are applied to a particular computer.

22 22 TEXTBOOK CHAPTER 6 S: SECURING NETWORK TRAFFIC WITH IPSEC 3. You wish to determine whether a quick mode association is currently in place. Which of the following tools can you use to make that determination? a. RSoP b. Event Viewer c. Oakley log file d. IP Security Monitor d. Use the IP Security Monitor to determine which security associations (SAs) exist. Because IP Security Monitor provides real-time quick mode association statistics, you can determine whether the association has been made. Answer a is incorrect. RSoP enables you to verify policies in effect for a given user or computer, but it does not indicate whether a quick mode association is currently in place. Answer b is incorrect. Although IPSec events can be written to Event Viewer, you cannot determine whether an association is currently in place. Answer c is incorrect. Although the Oakley log file displays SA information, it does not display real-time information about the association. 4. IPSec can be used to secure communications between two computers. Which of the following would be good reasons to use IPSec? Choose all that apply. a. Examine Kerberos tickets b. Block transfer of specific protocol packets c. Allow transfer of packets with a destination TCP port of 23 from any computer to the host computer d. Permit one user to use Telnet to access the computer, while denying another user b and c. IPSec can be configured to block or accept specific protocol packets. Also, IPSec can be configured to block or accept packets based on criteria, such as TCP port number and IP address. Answer a is incorrect. Although IPSec uses Kerberos as one method of authentication, it is not a tool for examining Kerberos tickets. Answer d is incorrect. IPSec is designed for securing communication between computers; it is not used to authorize or deny user access to resources.

23 TEXTBOOK CHAPTER 6 S: SECURING NETWORK TRAFFIC WITH IPSEC What is a good reason for assigning an IPSec policy using Netsh instead of using Group Policy? a. Using Netsh is the only way to apply a policy that can be used to permit a user s computer to be used for a telnet session with another computer while blocking all other telnet communications. b. Using Netsh is more easily implemented than Group Policy when multiple machines must be configured. c. You can apply Netsh even if the computers are not joined in a domain, whereas Group Policy can work only in a domain. d. You can use Netsh to create a persistent policy if Group Policy cannot be used. d. You cannot use Group Policy to create a persistent IPSec policy. Answer a is incorrect. IPSec is not designed to authorize or deny user access to resources. Answer b is incorrect. Both Group Policy and Netsh can be used to restrict a computer s access to a particular protocol. Answer c is incorrect. Group policies can be applied regardless of whether the computer is joined to the domain. 6. Netsh is used to create and assign an IPSec policy for a stand-alone server running Microsoft Windows Server One of the commands used is executed from the Netsh IPSec static context. It follows: Add rule name="smtpblock" policy="smtp" filterlist="smtp computerlist" filteraction="negotiate smtp" description="this rule negotiates smtp" Why is the policy not working? a. The policy is set with the wrong IP addresses. b. Each policy specifies a different encryption algorithm. c. A stand-alone server does not have a Simple Mail Transfer Protocol (SMTP) service; therefore, the policy is unassigned. d. The policy uses Kerberos for authentication and the computer is not a member of a domain. d. By default, Kerberos authentication is used and, for the policy to authenticate using Kerberos, it must be a member of an Active Directory domain. Answer a is incorrect. An IP address was not used for the command. Answer b is incorrect. A difference in algorithms between policies does not prevent them from working. Answer c is incorrect. Stand-alone servers do have an SMTP service; however, the presence of the service has no impact on the policy assignment or effectiveness.

24 24 TEXTBOOK CHAPTER 6 S: SECURING NETWORK TRAFFIC WITH IPSEC 7. You wish to set up a tool for maintenance and monitoring of IP policies on remote hosts in your domain. You add the IP Security Monitor and IP Security Policy Management snap-ins to an MMC. However, when you try to add the host to the IP Security Monitor, you get the error message shown in Figure FT06xx10 Figure 6-10 IPSec console error message How can you manage and monitor IPSec on ? a. You cannot do so. The host is a legacy host that does not support IPSec. b. The host is not part of the domain. You must join the host to your domain if you want to use IP Security Monitor. c. Only IPSec policies that use your authentication can be managed and monitored using IP Security Monitor. You must assign such a policy to d. You should use legacy Ipsecmon. e. You cannot add a computer using its IP address. You must use the computer s DNS host name. d. This error occurs when you try to add a host running Windows 2000 to the IP Security Monitor. Legacy Ipsecmon is the appropriate tool to use for such hosts. Unfortunately, it is not possible to create a single-seat maintenance tool using this method if some of the client hosts run Microsoft Windows Answer a is incorrect. Figure 6-10 shows that the IP Security Policy Management snap-in has already been added to the MMC for Therefore, supports IPSec. Answer b is incorrect. Hosts can be managed and monitored using the IP Security Monitor snap-in whether or not they are joined to a domain. Answer c is incorrect. The authentication method has no bearing on whether IP Security Monitor can be used. Answer e is incorrect. You can add computers using an IP address or host name.

25 TEXTBOOK CHAPTER 6 S: SECURING NETWORK TRAFFIC WITH IPSEC During the testing of the IPSec policies, the workstation you use as a test computer works correctly and the traffic is encrypted; however, when you resume testing after making some changes on one of the servers, the workstation can no longer communicate with that server. The policy that you set on the server requires you to use Kerberos as the authenticating protocol. What is the most likely cause of the communication issue? a. Your workstation lost its connection to a domain controller. b. Your workstation lost its connection to the CA. c. The IPSec Policy Agent lost communication with the domain controller and must be restarted. d. You must reapply the server s IPSec policy. c. When you troubleshoot communication issues, first stop the IPSec Policy Agent and verify communication, and then restart the IPSec Policy Agent and use the IP Security Monitor to confirm that a security association is established between the computers. Answer a is incorrect. Once the initial connection is made, the IPSec service does not need to contact a domain controller. Answer b is incorrect. It is not likely that the workstation lost its connection to the CA because the connection uses Kerberos, which means a domain controller could authenticate a new session. In addition, the question implies that this is the same session. Answer d is incorrect. Policies are reapplied every time a new connection is made. Reapplying a policy would have no effect on this issue. CHAPTER CASE SCENARIOS Case Scenario 6-1: Securing Communications You administer a Windows Server 2003 Active Directory domain. All client PCs are in a top-level OU called Clients, and all server PCs (apart from domain controllers) are in a top-level OU called Servers. The domain controllers are in their default OU. The Secure Server (Require Security) default IPSec policy has been assigned to all servers, including domain controllers. The Client (Respond Only) default IPSec policy has been assigned to all clients. All client PCs are Windows 2000 Professional hosts. Management is concerned that the client computers in the Research department do not securely communicate with each other and with other clients. Only four such machines exist. On one of them, you create a custom policy that requires secure communications. You export it to a file and import it into the other three client machines in the Research department. You assign the policy on all four machines.

26 26 TEXTBOOK CHAPTER 6 S: SECURING NETWORK TRAFFIC WITH IPSEC Next, you use the IP Security Monitor console on one of the machines and find that no SAs are set up between the Research department hosts or between these machines and clients in other departments. You capture traffic using Network Monitor and discover that unencrypted traffic is passing between the Research clients. What is the first step you should take to solve the problem? a. Change the authentication method on the custom policy to use a preshared key. b. Change the encryption algorithm from Triple DES (3DES) to Data Encryption Standard (DES). c. Create an OU. d. Move the Research department computer accounts into the Servers OU. c. In this scenario, assigning an IPSec policy locally has no effect. This situation happens when the hosts are in a domain and a policy has been assigned through Group Policy. In this case, the Client (Respond Only) policy has been assigned to a GPO that is linked to the Clients OU. You must create an OU called Research, move the four client computer accounts into that OU, create a GPO linked to Research, and then assign the custom IPSec policy to that GPO. Answer a is incorrect. The policy was exported from one client and exported to the others, so the same authentication method is specified in the policy on all four machines. The authentication method is unlikely to be the problem. In addition, the preshared key authentication method is weak authentication and is not appropriate in this scenario. Answer b is incorrect. A system running Windows 2000 that does not have Service Pack 2 or later installed on it does not support 3DES. If 3DES is specified, the rule defaults to DES for communication with that computer. Therefore, the encryption algorithm is not a factor in this scenario. Answer d is incorrect. This approach would ensure that communication among the Research department s computers and between the Research department s computers and other hosts in the domain is encrypted. However, it is not the best solution. Servers are often put into one OU and clients are put into another OU for various reasons not merely to assign IPSec policy. As a result, the Research department clients would be configured with other settings that might be inappropriate (such as the Log On Locally rights). Case Scenario 6-2: Troubleshooting IPSec Your company does not use a domain structure; it uses workgroups. The Research workgroup has six clients running Windows XP Professional, four clients running Windows 2000 Professional, and two stand-alone servers running Windows Server Communication between hosts in this workgroup must be secure. A member of your support staff configures and assigns an IPSec security policy on all hosts in the Research workgroup. All hosts can ping each other by IP address, but the Research department staff cannot access files on the servers from their client PCs.

27 TEXTBOOK CHAPTER 6 S: SECURING NETWORK TRAFFIC WITH IPSEC 27 You log on to one of the servers using the local administrator account, you access the Security Settings node within Local Computer Policy, and you enable success and failure auditing for logon events. You open Event Viewer and locate a failure audit event 547 in the security log. The failure reason given is, Failed to obtain Kerberos server credentials for the ISAKMP/ERROR_IPSEC_IKE service. What is the most likely cause of the problem? a. The default response rule is not activated. b. Kerberos has been specified as the initial authentication method. c. The 3DES encryption algorithm has been specified, and it cannot be used on the clients running Windows d. The incorrect policy has been assigned. d. The error detected occurs when Kerberos is specified as the authentication protocol in an environment that cannot support it (such as a workgroup). It is not possible to create a new policy in this environment, which means that one or more of the default policies must have been assigned. The most common mistake in this situation is to assign Secure Server (Require Security) on the servers. Answer a is incorrect. This rule specifies that to communicate securely, the computer must respond to requests for secure communication. Clearing the check box that specifies this rule would make communication less secure, but would not prevent it altogether. Answer b is incorrect. Kerberos cannot be used for authentication in this scenario because the hosts are not in an Active Directory domain. The IP Security Policy wizard would not create a policy if Kerberos were specified. Answer c is incorrect. A system running Windows 2000 that does not have Service Pack 2 or later installed does not support 3DES. If 3DES is specified, however, the rule defaults to DES for communication with that computer.

28 28 TEXTBOOK CHAPTER 7 S: IMPLEMENTING AND MANAGING SOFTWARE UPDATE SERVICES CHAPTER 7 IMPLEMENTING AND MANAGING SOFTWARE UPDATE SERVICES CHAPTER REVIEW QUESTIONS 1. You are the system administrator for Contoso, Ltd., and you have been given the responsibility of managing security patches and other updates to operating systems that already have a SUS-compatible version of Automatic Updates installed. Although you want the ability to approve updates, you do not want to store them all locally. How can you accomplish this? Use the SUS Administration Web page to configure the server to use a Windows Update Web server instead of storing them locally. To configure this, load the SUS Administration Web page, click Set Options, and in the Select Where You Want To Store Updates section of the details pane, click Maintain The Updates On A Microsoft Windows Update Server, and then click Apply. 2. You want to obtain critical updates and security fixes for your PC that runs Windows XP Professional. You access the Windows Update site. However, you cannot find the Windows Update Catalog under See Also in the left pane. What is the problem? a. You have not installed and configured SUS. b. You have not installed and configured Automatic Updates. c. Transmission Control Protocol (TCP) port 80 is blocked for incoming traffic on the firewall at your Internet service provider (ISP). d. You must configure the Windows Update site. d. You should select Personalize Windows Update and select the Display The Link To The Windows Update Catalog Under See Also check box. Answer a is incorrect because SUS is a server application and is not necessary in this situation. Answer b is incorrect because Automatic Updates is installed by default on computers running Windows XP Professional. Answer c is incorrect because you could not have accessed the Microsoft Windows Update site if port 80 were blocked.

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses

More information

Lesson Plans Managing a Windows 2003 Network Infrastructure

Lesson Plans Managing a Windows 2003 Network Infrastructure Lesson Plans Managing a Windows 2003 Network Infrastructure (Exam 70-291) Table of Contents Course Overview... 2 Section 0.1: Introduction... 3 Section 1.1: Client Configuration... 4 Section 1.2: IP Addressing...

More information

5 Configuring a DNS Infrastructure

5 Configuring a DNS Infrastructure 5 Configuring a DNS Infrastructure Exam Objectives in this Chapter: Configure a DNS server. Configure DNS zone options. Configure DNS forwarding. Manage DNS zone settings. Manage DNS server options. Why

More information

Managing Name Resolution

Managing Name Resolution 3 CHAPTER THREE Managing Name Resolution Terms you ll need to understand: Windows Internet Naming Service (WINS) WINS Proxy Agent LMHOSTS Tombstoning Persistent Connections Push/pull partner Hostnames

More information

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required) MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking

More information

DNS: How it works. DNS: How it works (more or less ) DNS: How it Works. Technical Seminars Spring 2010 1. Paul Semple psemple@rm.

DNS: How it works. DNS: How it works (more or less ) DNS: How it Works. Technical Seminars Spring 2010 1. Paul Semple psemple@rm. DNS: How it works Paul Semple psemple@rm.com DNS: How it works (more or less ) Paul Semple psemple@rm.com 1 Objectives What DNS is and why we need it DNS on Windows Server networks / Community Connect

More information

MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring

MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange

More information

Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network

Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network Introduction p. xix Assessment Test p. xxxviii Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network Components

More information

Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure

Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure iseries DNS iseries DNS Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule

More information

Module 6: Managing and Monitoring Domain Name System

Module 6: Managing and Monitoring Domain Name System Module 6: Managing and Monitoring Domain Name System Contents Overview 1 Lesson: Managing DNS Records 2 Lesson: Testing the DNS Server Configuration 11 Lesson: Monitoring DNS Server Performance 24 Lab:

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot

More information

Windows 2008 Server. Domain Name System Administración SSII

Windows 2008 Server. Domain Name System Administración SSII Windows 2008 Server Domain Name System Administración SSII Contenidos Introducción Configuración DNS Transferencia de zona Herramientas DNS Introducción Domain Name System is a hierarchical distributed

More information

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב עש ספיר מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.

More information

ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION

ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE COURSE: Windows 2003 Server COURSE NO: CSI 265 CREDIT HOURS: 3 hours of lecture weekly DEPARTMENT: CATALOG DESCRIPTION CSI 265 Windows 2003

More information

Outpost Network Security

Outpost Network Security Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It

More information

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Number: 6425C Course Length: 5 Days Course Overview This five-day course provides in-depth training on implementing,

More information

Module 2. Configuring and Troubleshooting DNS. Contents:

Module 2. Configuring and Troubleshooting DNS. Contents: Configuring and Troubleshooting DNS 2-1 Module 2 Configuring and Troubleshooting DNS Contents: Lesson 1: Installing the DNS Server Role 2-3 Lesson 2: Configuring the DNS Server Role 2-9 Lesson 3: Configuring

More information

ITCertMaster. http://www.itcertmaster.com. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

ITCertMaster. http://www.itcertmaster.com. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way! ITCertMaster Safe, simple and fast. 100% Pass guarantee! http://www.itcertmaster.com IT Certification Guaranteed, The Easy Way! Exam : 070-640 Title : Windows Server 2008 Active Directory. Configuring

More information

KB259302 - Windows 2000 DNS Event Messages 1 Through 1614

KB259302 - Windows 2000 DNS Event Messages 1 Through 1614 Page 1 of 6 Knowledge Base Windows 2000 DNS Event Messages 1 Through 1614 PSS ID Number: 259302 Article Last Modified on 10/29/2003 The information in this article applies to: Microsoft Windows 2000 Server

More information

Agency Pre Migration Tasks

Agency Pre Migration Tasks Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required

More information

Exam : 070-642 Title : TS: Windows Server 2008 Network Infrastructure, Configuring Ver : 08-13-2008

Exam : 070-642 Title : TS: Windows Server 2008 Network Infrastructure, Configuring Ver : 08-13-2008 Exam : 070-642 Title : TS: Windows Server 2008 Network Infrastructure, Configuring Ver : 08-13-2008 QUESTION 1: Certkiller.com has an IPv6 network which has 25 segments. As an administrator, you deploy

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip WINXP VPN to ZyWALL Tunneling 1. Setup WINXP VPN 2. Setup ZyWALL VPN This page guides us to setup a VPN connection between the WINXP VPN software and ZyWALL router. There will be several devices we need

More information

6425C - Windows Server 2008 R2 Active Directory Domain Services

6425C - Windows Server 2008 R2 Active Directory Domain Services Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Introduction This five-day instructor-led course provides in-depth training on configuring Active Directory Domain Services

More information

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Length: 5 Days Published: June 02, 2011 Language(s): English Audience(s): IT Professionals Level: 200

More information

MCSA Security + Certification Program

MCSA Security + Certification Program MCSA Security + Certification Program 12 credit hours 270 hours to complete certifications Tuition: $4500 Information technology positions are high-demand occupations that support virtually all industries.

More information

Using WhatsUp IP Address Manager 1.0

Using WhatsUp IP Address Manager 1.0 Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address

More information

PASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者

PASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者 PASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者 http://www.pass4test.jp 1 年 で 無 料 進 級 することに 提 供 する Exam : 70-640 Title : Windows Server 2008 Active Directory. Configuring Vendors : Microsoft Version : DEMO NO.1 An

More information

DC Agent Troubleshooting

DC Agent Troubleshooting DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Active Directory Group Policy. Administrator Reference

Active Directory Group Policy. Administrator Reference Active Directory Group Policy Administrator Reference Group Policy Administrator Reference for Templates All policies are listed alphabetically by: policy node, policy path, and policy name. For policy

More information

NETASQ SSO Agent Installation and deployment

NETASQ SSO Agent Installation and deployment NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user

More information

Planning and Maintaining a Microsoft Windows Server Network Infrastructure

Planning and Maintaining a Microsoft Windows Server Network Infrastructure Unit 27: Planning and Maintaining a Microsoft Windows Server Network Infrastructure Learning outcomes A candidate following a programme of learning leading to this unit will be able to: Configure security

More information

Module 11. Configuring Domain Name System. Contents: Lesson 1: Install and Configure DNS in an AD DS Domain 11-3. Lab A: Install the DNS Service 11-11

Module 11. Configuring Domain Name System. Contents: Lesson 1: Install and Configure DNS in an AD DS Domain 11-3. Lab A: Install the DNS Service 11-11 Configuring Domain Name System 11-1 Module 11 Configuring Domain Name System Contents: Lesson 1: Install and Configure DNS in an AD DS Domain 11-3 Lab A: Install the DNS Service 11-11 Lesson 2: Integration

More information

Installing and Setting up Microsoft DNS Server

Installing and Setting up Microsoft DNS Server Training Installing and Setting up Microsoft DNS Server Introduction Versions Used Windows Server 2003 Setup Used i. Server Name = martini ii. Credentials: User = Administrator, Password = password iii.

More information

Introduction. Assessment Test

Introduction. Assessment Test 61699ftoc.fm Page ix Friday, May 9, 2008 11:26 AM Introduction Assessment Test xvii xxviii Chapter 1 Understanding Windows Server 2008 Networking 1 Understanding the OSI Model 2 Protocol Stacks 4 Communication

More information

Exam: 070-215 QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4

Exam: 070-215 QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4 Exam: 070-215 QUESTION 1 You want to provide complete redundancy for all data stored on your hardware RAID-5 disk array. You install a second hardware RAID-5 disk array. You want to create a mirror of

More information

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Details Course Outline Module 1: Introducing Active Directory Domain Services This module provides

More information

INUVIKA OVD VIRTUAL DESKTOP ENTERPRISE

INUVIKA OVD VIRTUAL DESKTOP ENTERPRISE INUVIKA OVD VIRTUAL DESKTOP ENTERPRISE MICROSOFT ACTIVE DIRECTORY INTEGRATION Agostinho Tavares Version 1.0 Published 06/05/2015 This document describes how Inuvika OVD 1.0 can be integrated with Microsoft

More information

Implementing Domain Name Service (DNS)

Implementing Domain Name Service (DNS) Implementing Domain Name Service (DNS) H C A 1 P T E R ITINERARY Objective 1.01 Objective 1.02 Objective 1.03 Install and Configure DNS for Active Directory Integrate Active Directory DNS Zones with Existing

More information

How to Add Domains and DNS Records

How to Add Domains and DNS Records How to Add Domains and DNS Records Configure the Barracuda NextGen X-Series Firewall to be the authoritative DNS server for your domains or subdomains to take advantage of Split DNS or dead link detection.

More information

MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing Resources

MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing Resources MCSE TestPrep: Windows NT Server 4, Second Edition - CH 3 - Managing Resources Page 1 of 36 [Figures are not included in this sample chapter] MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing

More information

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Number: 6425B Course Length: 5 Days Course Overview This five-day course provides to teach Active Directory Technology

More information

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services www.etidaho.com (208) 327-0768 Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services 5 Days About this Course This five-day instructor-led course provides in-depth

More information

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Code: M6425 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Overview This five-day instructor-led course

More information

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol... Page 1 of 16 Security How to Configure Windows Firewall in a Small Business Environment using Group Policy Introduction This document explains how to configure the features of Windows Firewall on computers

More information

Configuring and Troubleshooting Windows 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows 2008 Active Directory Domain Services About this Course Configuring and Troubleshooting Windows This five-day instructor-led course provides in-depth training on implementing, configuring, managing and troubleshooting Active Directory Domain

More information

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 200 Technology: Windows Server

More information

6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Details Course Code: Duration: Notes: 6425C 5 days This course syllabus should be used to determine whether

More information

Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services About this Course This five-day instructor-led course provides to teach Active Directory Technology Specialists

More information

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Active Directory About this Course This five-day instructor-led course provides in-depth training on implementing, configuring, managing and troubleshooting (AD DS) in and R2 environments. It covers core

More information

NE-6425C Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

NE-6425C Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services NE-6425C Configuring and Troubleshooting Windows Server 2008 Active Domain Services Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 02 June 2011 200 Windows

More information

Actualtests.com - The Power of Knowing

Actualtests.com - The Power of Knowing Explanation: We should use Global Security groups. QUESTION 87 You are the network administrator for Certkiller.com. Your network consists of a single Active Directory domain named Certkiller.com. All

More information

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. What should you do?

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. What should you do? QUESTION 1 Your network contains the following: 20 Hyper-V hosts 100 virtual machines 2,000 client computers You need to recommend an update infrastructure design to meet the following requirements: Deploy

More information

ExecuTrain Course Outline Configuring & Troubleshooting Windows Server 2008 Active Directory Domain Services MOC 6425C 5 Days

ExecuTrain Course Outline Configuring & Troubleshooting Windows Server 2008 Active Directory Domain Services MOC 6425C 5 Days ExecuTrain Course Outline Configuring & Troubleshooting Windows Server 2008 Active Directory Domain Services MOC 6425C 5 Days Introduction This five-day instructor-led course provides in-depth training

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

MCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring

MCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring MCSA Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange

More information

MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services

MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services Table of Contents Introduction Audience At Clinic Completion Prerequisites Microsoft Certified Professional Exams Student Materials

More information

Using DC Agent for Transparent User Identification

Using DC Agent for Transparent User Identification Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify

More information

Networking Domain Name System

Networking Domain Name System System i Networking Domain Name System Version 5 Release 4 System i Networking Domain Name System Version 5 Release 4 Note Before using this information and the product it supports, read the information

More information

Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0

Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Microsoft Corporation Published: September 2009 Abstract This step-by-step guide describes a sample scenario for installing Microsoft

More information

nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc.

nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc. nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances The information contained in this document represents the current view of Microsoft Corporation on the issues discussed

More information

Understanding DNS (the Domain Name System)

Understanding DNS (the Domain Name System) Understanding DNS (the Domain Name System) A white paper by Incognito Software January, 2007 2007 Incognito Software Inc. All rights reserved. Understanding DNS (the Domain Name System) Introduction...2

More information

Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab

Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab Página 1 de 54 Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab This guide provides detailed information about how you can use five computers to create a test lab with which to configure

More information

MCSE 70-293 PLANNING AND MAINTAINING A MICROSOFT WINDOWS 2003 NETWORK INFRASTRUCTURE BY THIQUOCTE

MCSE 70-293 PLANNING AND MAINTAINING A MICROSOFT WINDOWS 2003 NETWORK INFRASTRUCTURE BY THIQUOCTE MCSE 70-293 PLANNING AND MAINTAINING A MICROSOFT WINDOWS 2003 NETWORK INFRASTRUCTURE BY THIQUOCTE Number: 70-293 Passing Score: 700 Time Limit: 120 min File Version: 2010-11-11 MCSE 70-293 PLANNING AND

More information

Configuring Windows Server 2008 Network Infrastructure

Configuring Windows Server 2008 Network Infrastructure Configuring Windows Server 2008 Network Infrastructure Course Number: 70-642 Certification Exam This course is preparation for the Microsoft Technical Specialist (TS) exam, Exam 70-642: TS: Windows Server

More information

Group Policy for Beginners

Group Policy for Beginners Group Policy for Beginners Microsoft Corporation Published: April 2011 Abstract Group Policy is the essential way that most organizations enforce settings on their computers. This white paper introduces

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

70-682. Microsoft. Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician. http://www.pass4sureofficial.com. www.dumpspdf.

70-682. Microsoft. Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician. http://www.pass4sureofficial.com. www.dumpspdf. 70-682 Microsoft Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician http://www.pass4sureofficial.com Dumpspdf.com is a reputable IT certification examination guide, study guides and

More information

How To Install And Configure Windows Server 2003 On A Student Computer

How To Install And Configure Windows Server 2003 On A Student Computer Course: WIN310 Student Lab Setup Guide Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 STUDENT COMPUTER SETUP Hardware Requirements All hardware must be on the Microsoft

More information

EXAM - 70-642. TS: Windows Server 2008 Network Infrastructure, Configuring. Buy Full Product. http://www.examskey.com/70-642.html

EXAM - 70-642. TS: Windows Server 2008 Network Infrastructure, Configuring. Buy Full Product. http://www.examskey.com/70-642.html Microsoft EXAM - 70-642 TS: Windows Server 2008 Network Infrastructure, Configuring Buy Full Product http://www.examskey.com/70-642.html Examskey Microsoft 70-642 exam demo product is here for you to test

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

DriveLock Quick Start Guide

DriveLock Quick Start Guide Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Computer Networks CCNA Module 1

Computer Networks CCNA Module 1 Chapter 1: Quiz 1 Q1: Which statement describes a network that supports QoS? The fewest possible devices are affected by a failure. The network should be able to expand to keep up with user demand. The

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503

More information

WatchGuard Mobile User VPN Guide

WatchGuard Mobile User VPN Guide WatchGuard Mobile User VPN Guide Mobile User VPN establishes a secure connection between an unsecured remote host and a protected network over an unsecured network using Internet Protocol Security (IPSec).

More information

MS 70-411 Exam Objectives Administering Windows Server 2012 R2

MS 70-411 Exam Objectives Administering Windows Server 2012 R2 MS 70-411 Exam Objectives Administering Windows Server 2012 R2 Below are the exam objectives for Administering Windows Server 2012 R2 Exam 70-411 Tasks measured as per latest update implemented in January

More information

How To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication

How To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide describes how to create

More information

Cloud Services for Backup Exec. Planning and Deployment Guide

Cloud Services for Backup Exec. Planning and Deployment Guide Cloud Services for Backup Exec Planning and Deployment Guide Chapter 1 Introducing Cloud Services for Backup Exec This chapter includes the following topics: About Cloud Services for Backup Exec Security

More information

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection

More information

NETWRIX ACCOUNT LOCKOUT EXAMINER

NETWRIX ACCOUNT LOCKOUT EXAMINER NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4

More information

This chapter describes how to set up and manage VPN service in Mac OS X Server.

This chapter describes how to set up and manage VPN service in Mac OS X Server. 6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure

More information

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

Networking Domain Name System

Networking Domain Name System System i Networking Domain Name System Version 6 Release 1 System i Networking Domain Name System Version 6 Release 1 Note Before using this information and the product it supports, read the information

More information

Implementing and Managing Security for Network Communications

Implementing and Managing Security for Network Communications 3 Implementing and Managing Security for Network Communications............................................... Terms you ll need to understand: Internet Protocol Security (IPSec) Authentication Authentication

More information

Customer Tips. Basic E-mail Configuration and Troubleshooting. for the user. Overview. Basic Configuration. Xerox Multifunction Devices.

Customer Tips. Basic E-mail Configuration and Troubleshooting. for the user. Overview. Basic Configuration. Xerox Multifunction Devices. Xerox Multifunction Devices Customer Tips November 24, 2003 This document applies to these Xerox products: x WC Pro 32/40 Color x WC Pro 65/75/90 x WC Pro 35/45/55 WC M35/M45/M55 x DC 555/545/535 x DC

More information

Get Success in Passing Your Certification Exam at first attempt!

Get Success in Passing Your Certification Exam at first attempt! Get Success in Passing Your Certification Exam at first attempt! Vendor: Microsoft Exam Code: 70-417 Exam Name: Microsoft Upgrading Your Skills to MCSA Windows Server 2012 Exam Version: Demo Question:

More information

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425 Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425 Course Outline Module 1: Introducing Active Directory Domain Services This module provides an overview of Active Directory

More information

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Five Days, Instructor-Led About this course This five-day instructor-led course provides in-depth training

More information

Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies

Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies Microsoft Corporation Published: October 2007 Author: Dave Bishop Editor: Scott Somohano Technical Reviewers: Sarah

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course OutlineModule 1: Introducing Active Directory Domain Services This module provides an overview

More information