It Server

In: Computers and Technology

Submitted By butcher1428
Words 295
Pages 2
memorandum to: | James bond | from: | Donald hannahs | subject: | Network standards | date: | October 3, 2013 | cc: | joe blow | | |
Mr. Bond, Below you will find proposed device and usernames, as well as the IP addresses associated with each device. All user passwords will be set as Password1, and all users will be required to change their password at first login. All user email accounts will be defined as username@goldfinger.ecpi. Department: | Group: | EMP Name: | Username: | Hostname: | IP Address: | Customer Service | CUS | Frank Jones | fjones | Cus-dsktp-1 | 200.7.0.246 | Sales: | Sales | Bobby Boes | bboes | Sales-dsktp-1 | 200.7.0.245 | Sales: | Sales | Cole Williamson | cwilliamson | Sales-dsktp-2 | 200.7.0.244 | Sales: | Sales | Shawn Little | slittle | Sales-dsktp-3 | 200.7.0.243 | Sales: | Sales | Torey Dozier | tdozier | Sales-dsktp-4 | 200.7.0.242 | Sales: | Sales | Ian Fraiser | ifraiser | Sales-dsktp-5 | 200.7.0.241 | Sales: | Sales | Brad Pledger | bpledger | Sales-dsktp-6 | 200.7.0.240 | Sales: | Sales | Will Vernon | wvernon | Sales-dsktp-7 | 200.7.0.239 | Sales: | Sales | Lindsay Pope | lpope | Sales-dsktp-8 | 200.7.0.238 | Sales: | Sales | Brad Clark | bclark | Sales-dsktp-9 | 200.7.0.237 | Sales: | Sales | Rick Onorato | ronorato | Sales-dsktp-10 | 200.7.0.236 | Human Resources: | HR | Jon Manger | jmanger | HR-dsktp-1 | 200.7.0.247 | Management | MGMT | James Bond | jbond | MGMT-dsktp-1 | 200.7.0.248 | Network: | NTWRK | Server | dhannahs | Server-1 | 200.7.0.254 | Network: | NTWRK | Switch | | Switch-1 | 200.7.0.253 | Network: | NTWRK | Router | | Router-1 | 200.7.0.252 | Network: | NTWRK | WAP | | WAP-1 | 200.7.0.251 | Network: | NTWRK | B&W Printer | | Bwprinter-1 | 200.7.0.250 | Network: | NTWRK | Color Printer | | Colorprinter-1 | 200.7.0.249…...

Similar Documents

Server

...production of the infamous Microsoft software company? Windows Server 2008 is based off the Windows Vista codes which makes it more user-friendly and more universally known (Wikipedia.org/windowsserver2008). February 27, 2008 brought about a new meaning for many businesses both large and small. Feature Enterprise Datacenter Standard Web Itanium Web Agent Yes Yes Yes No No Sever Backup Yes Yes Yes Yes Yes Power Shell Yes Yes Yes Yes Yes Admin Pack Yes Yes Yes Yes No Tcp/Ip Servics Yes Yes Yes Yes Yes Windows Server 2008 comes in different versions for numerous reasons. Windows server 2008, also known as “Win2K8” or “W2K8”, has many versions to help fit the needs of the consumer/client that is using the system. They make different versions, which contain different features, to accommodate the usefulness to the different user. For example, a large business, with large profits, would be willing to pay more for a certain version, since the server would be able to accommodate thousands of users and certain supportive systems for numerous processors. (technet.com) The following are some new features and/or enhancements made to Windows Server 2008:  Domain Name System (DNS) enhancements o Background zone loading o IPv6 Support o Support for read-only domain controllers (RODCs) o Global single names  Quality of Service o New facilities to manage network traffic for both enterprises and home networks.  Server Message Block 2.0  Http.sys Enhancements The research......

Words: 743 - Pages: 3

Intro to Server

...METHOD 6. If a system will be a DHCP server which add should you set?: STATIC IP 7. ;rlcess of obtaining an IP address for a comp name is : Name resolution 8. What is made up of free space from multiple Physical disk: SPANNED VOLUME 9. _____ groups are non security related distribution of info: DISTRIBUTION 10. Which partition 2TB Disks/NTFS (No fucking clue what this said :D) 11. Boot enabled tcp/ip WS retrieves settings needed to run excluding WORKSTATION SETTINGS 12. Which of the following is not key benefit provided by DHCP for management tcp/ip decentralized admin 13. Sent by clients via broad to locate DHCP RFC2131 which msg may include option DHOPDISCOVER 14. What type of zone might DNS Server host? PRIMARY 15. Which of the following is NOT a FWD or PVSZONE INTEGRATED 16. WS2008 ds role is reffed to as a DOMAIN CONTROLLER 17. Process or KP E DC in synch w changes network called REPLICATION 18. AD create REPLICATION TOPOLOGY w the idea or write doman communicate AD 19. A DISTINGUISHED NAME references objects in AD directory by using hierarchical path 20. What command can be used to run AD Directory wizard DCPROMO 21. What is minimum amount of storage for AD 200MB 22. The READ ONLY DC contains copy of NTDS.dit file cannot be modified 23. APPLICATION DIRECTORY partitions are used to separate forests wide DNS info 24. How often intersite replication 15 MINUTES 25. When rep in for between sites designated a bridged server 26. What port is used by......

Words: 767 - Pages: 4

Dhcp Server

...DHCP
Server
(on
Debian
Squeeze)
 
 1. Pastikan
Login
sebagai
Root
 
 idris@debian:~$
su
 Password:

 root@debian:~#
whoami
 root
 root@debian:~#

 
 2. Persiapan
Repository
 Pastikan
Repositorynya
 
 root@debian:~#
cat
/etc/apt/sources.list
 deb
ftp://kebo.eepis­its.edu/debian
squeeze
contrib
main
non­free
 deb­src
ftp://kebo.eepis­its.edu/debian
squeeze
contrib
main
non­free
 root@debian:~#
 
 Jika
belum
edit
menggunakan
editor
seperti:
vim,
nano,
pico,
atau
lainnya.
 
 3. Update
repository
 
 root@debian:~#
apt­get
update
 Get:1
ftp://kebo.eepis­its.edu
squeeze
Release.gpg
[1672B]
 Get:2
ftp://kebo.eepis­its.edu
squeeze/contrib
Translation­en_US
 Get:3
ftp://kebo.eepis­its.edu
squeeze/main
Translation­en_US
 Get:4
ftp://kebo.eepis­its.edu
squeeze/non­free
Translation­en_US
 Hit
ftp://kebo.eepis­its.edu
squeeze
Release
 
 Get:5
ftp://kebo.eepis­its.edu
squeeze
Release
[104kB]
 Get:6
ftp://kebo.eepis­its.edu
squeeze/contrib
Packages/DiffIndex
 Hit
ftp://kebo.eepis­its.edu
squeeze/contrib
Packages
 Fetched
105kB
in
13s
(7586B/s)











































































 Reading
package
lists...
Done
 
 4. Pastikan
paket
DHCP‐nya
 
 root@debian:~#
apt­cache
search
isc­dhcp­server
 isc­dhcp­server
­
ISC
DHCP
server
for
automatic
IP
address
assignment
 isc­dhcp­server­dbg
­
ISC
DHCP
server
for
automatic
IP
address
assignment
(debug)
 isc­dhcp­server­ldap
­
DHCP
server
able
to
use
LDAP
as
backend
 
 
 
 5. Installasi
paket
DHCP
 
......

Words: 484 - Pages: 2

Windows Server

...Multimedia Lab 1.2: Determine Windows Server 2008 Networking Capabilities for Deployment Planning 1. IPv4 & IPv6 2. C) Multicast 3. A) Dial-up Remote Access, B) Routed Remote Access, D) Virtual Private Networks 4. B) 802.1X 5. IP (Internet Protocol) Lab 1.3: Access Administrative Tools 1. A) Component Services, B) Event Viewer, C) Reliability and Performance Monitor, D) Services 2. B) Click Start and click Administrative Tools, D) Click Start, point to All Programs, and click Administrative Tools 3. A) The Computer Management window opens 4. False 5. False Lab 1.4: Turn on Network Discovery 1. D) Network Discovery is turned off. 2. Printer Sharing 3. Public Folder Sharing Lab 1.5: Obtain a MAC Address 1. Physical 2. C) An IPv4 Address 3. Ipconfig 4. B) ARP(Address Resolution Protocol) Lab 2.1: Determine Windows Server 2008 Features that can be installed 1. C) Initial Configuration Tasks tool 2. A) UNIX-Based 3. Encrypting 4. C) SMTP Server 5. Failover Clustering Lab 2.2: Configure Windows Server 2008 Ease of Access Options 1. Click Start, click Control Panel, click Classic View, and double-click Ease of Access Center 2. Start Magnifier 3. On-Screen Keyboard 4. A) Adjust settings for reading and typing, C) Set up alternative key positions on the keyboard, D) Optimize for blindness 5. True Lab 2.3: Activate a Server and Install......

Words: 341 - Pages: 2

Servers

...own companies. Online banking make life simpler. You can check your account balance, deposit checks, pay bills, and make transfers. In order to make web applications more secure and less vulnerable, there are three top areas of risk to a company that wants to expand their systems web servers, databases server, and file servers. The web servers are applications that make information available on the internet. Web servers protect client information, client logins and passwords, and other client information that is not meant to be viewed by the public. Securing the database servers will keep persons or employees from accessing account holder contact information or changing account balances. Database servers are used by most companies. An unsecured database can have excessive and unused privileges. Keeping a database server secured will increase customer satisfaction and peace of mind. File servers are designed to keep out online threats from your Microsoft Windows documents safe and secure. Securing the file server would deny employees access from changing or viewing loan applications and other personal data to inflict damage. In closing, the web servers, database servers, and file servers are all designed to make customers feel at ease about online banking. They were built to keep hackers or identify thieves outside or inside a company from accessing information that is private. References www.imperva.com/docs/wp_TopTen_Database_Threats.pdf Unit 1 Discussion 1:......

Words: 262 - Pages: 2

Server Questions

... Server question Ques 1 :-Which of the following is not a benefit of DHCP? 1.       centralized administration of IP configuration 2.       dynamic host configuration 3.       seamless IP host configuration 4.       portability of workstations ques 2:- Which of the following is not a component of DNS? 1.       DNS namespace 2.       DNS zones 3.       DNS resource records 4.       DNS relay agent Ques 3:- A starting address of 192.0.0.0 and an ending address of 223.255.255.255 is a member of which network class? 1.       Class a 2.       Class b 3.       Class c 4.       Class d Ques 4:- Which of the following is not a function of DHCP? 1.       transmitting data from one network to another 2.       bootstrapping diskless workstations 3.       automating the assigning, tracking, and reassigning of IP addresses 4.       dynamically allocating an IP address from a pool of addresses ques 5:-  If a system will be a DHCP server, what type of address should you set? 1.       automatic private IP address 2.       fixed IP address 3.       static IP address 4.       none of the above ques 6:- What is the minimum number of physical computers required to allow you to use a KMS key? 1.       20 Vista and ten Windows Server 2008 computers 2.       20 Vista and five Windows Server 2008 computers 3.       15 Vista and ten Windows Server 2008 computers 4.       25 Vista and five Windows Server 2008 computers Ques 7:- A striped volume uses which type of striping to interleave data......

Words: 4583 - Pages: 19

Windows Servers

...Topics |Securing Windows 7 |Installing Windows Server 2008 | |Password and Account Lockout Policies |What Defines a Server | |Windows Firewall Configuration |Server Hardware | |Encrypting File System (EFS) |Windows Server 2008 Editions | |Remote Access Technologies |Server Roles in Windows Server 2008 | |Backup and Restore |Method of Installing Windows Server 2008 | |System Restore Points |Server Configuration | | |IP Address Settings | | |Management of Devices and Device Drivers | | |Microsoft Management Console (MMC) ...

Words: 2079 - Pages: 9

Server Analytics

...uncovering the total IT environment, including the logical relationships between physical, virtual and cloud elements, has never been more important—or more complex. IBM’s analytics for logical dependency mapping, ALDM, reengineers the IT discovery process to provide a more complete and accurate view of the IT infrastructure. It is designed to facilitate data center migration planning but also provide insights for companies looking to optimize or improve the resiliency of their IT environment. Developed by IBM Research, ALDM uses analytics and advanced mathematical modeling to simplify IT inventories and dependency mapping, while extending data collection capabilities to deliver new insights about the infrastructure. ALDM reads server configuration files to reveal dependencies that would otherwise go undetected. It fills information gaps and exposes platform anomalies that cannot be seen with many other discovery tools. But ALDM also delivers actionable insights with greater speed and rich visualization. It accelerates discovery by as much as 30 to 40 percent using automation and the scalable processing power of the cloud. And it replaces obscure, one-dimensional dependency maps with interactive infographics that enable companies to dynamically navigate complex IT environments and gain deeper insights into the configuration and operation of the infrastructure. Data Center Services ALDM also replaces much of the labor-intensive manual analysis......

Words: 5168 - Pages: 21

Server 1

...the United States, and it has just added a location in Canada that will need to become part of your Active Directory network. Your network designer has provided you with the following configuration information regarding the new location servers and the connections that have been procured. Three new servers will be installed in the Canada facility with the following specifications: •Server 1: 2.4-GHz processor with 2 GB RAM will be installed as a domain controller. •Server 2: 2.0-GHz processor with 1 GB RAM will be installed as a domain controller. •Server 3: 2.0-GHz processor with 2 GB RAM will be installed as an application server. Two links between the United States and Canada facilities will be available. They are as follows: •A T-1 link for the primary connection •A 256-Kbps link for a backup connection Bandwidth should be used during the day mainly for file transfers and email. Any network maintenance that requires bandwidth should be done only between 11:00 pm and 4:00 am on weekdays. Weekends are available anytime for maintenance procedures. Sketch a design that will meet the previous requirements and consider the following questions: 1.Should you configure a bridgehead server at the Canada facility? If so, which server would you recommend? 2.What will you configure the costs for on each link? 3.What should the replication schedule and interval be set for?...

Words: 255 - Pages: 2

Server

...Research Assignment 1 1. The two current versions that are released for Windows Server 2008 are Service pack 2 and R2. The difference between the two versions is that Windows R2 includes enhancements and new functionality for Active Directory, new Virtualization and Management features that the original version does not have. 2. The difference between Windows Server 2003 and 2008 is that the 2008 version has a third party updated device driver and it consumes less power and it has additional feature such as virtualization. Also, 2003 is made to control WinXP networks and 2003 is made to control Vista networks. 3. Having the 64-bit architecture doubles the amount of data a CPU can process per cycle. 4. Server Core is a minimal server installation option for computers running on the Windows Server 2008 operating system or later. Server Core provides a low-maintenance server environment with limited functionality. Windows Server virtualization provides the service that you can use to create and manage virtual machines and their resources. Powershell is an installable feature of Windows Server 2008. You have access to an amazing command line scripting language. Unlike other scripting languages in Windows, Powershell is designed just for us system administrators. Powershell uses .NET and utilizes “cmdlets” (or “command-lets”) to do its job. 5. An RODC makes it possible for organizations to easily deploy a domain controller in scenarios where physical......

Words: 269 - Pages: 2

Web Server

...A web server is a crucial element in most company’s infrastructure. Every corporate company has to have a web presence. Some companies use it for marketing, some use it for sales, and some use it just to share information. It doesn’t matter why they use it, because they need it either way. Most customers want to check out products online before they decide what they want. Computers provide an easy and flexible way to research for the best products that are available for the customer. Depending on what you are going to use your web server for, you have to select an appropriate solution for yourself that will satisfy your needs. There is no “clear cut” way to create and configure a web server. If you are looking for the answer: “Ok! This is the best web server!” You are out of luck. I wish there was an easy way to figure this stuff out, but there are many questions to answer and needs to satisfy before you can declare that you have a great web server. There is a lot of information out there that will “help” you chose a solution for your company or organization. Unfortunately, I think in this case there is a little too much information available and it could be overwhelming. There is a lot of biased information available on the net. Some people say Apache is better than IIS, but it really depends on what your needs are. If you have your own company, you have to sit down with your IT staff and marketing staff and preferably every member of your company to come up with a......

Words: 1165 - Pages: 5

Server 2008

...ITN 200 Week 6 Labs Activity 8-5: Checking the DNS Server and Client Services We begin with Services from the Configuration option here and it shows a list of Services I switch to the Standard tab from the Extended tab and I locate the DNS Client and Server, with its Startup type set to Automatic, as shown below After viewing the DNS Client properties I click on the stop button to stop and restart the service with the status showing stopped Here, I click Start and double-click the DNS Server Next, I click stop to stop the service I select the Server Manager, to return to the default display Activity 8-9: Configuring DHCP Scopes I open DHCP server I select IPv4 here I begin to create a New Scope New Scope Wizard starts After entering the IP address the subnet mask automatically filled out and adjusting the length also changes the subnet mask Next I entered and added the IP address below in the Start IP space and I didn’t need to enter one for the End IP address Next screen shows the default screen time for the Lease Duration which is 8 days, 0 hours and Minutes I change the default time to 5 days Here I choose the default gateway for router Next I add the domain and DNS server. To enter more than one server I click Add I activate the scope now here I successfully complete the Scope Wizard I now see my newly created scope on the right pane of the DHCP window an Active status Activity 9-3: Configuring a Web Site I...

Words: 413 - Pages: 2

Windows Server

...Windows Server 2008 comes in different versions due to the simple fact that people and businesses have different wants and needs. A local small business doesn’t have the same needs as a global enterprise or a college campus. The different Windows Server 2008 options allow the consumer to choose your best option for their situation. Windows Server 2008 Standard offers the user most basic features of the server software including IIS 7.5, Hyper-V, Remote Desktop Services, and improves on existing management tools from older versions of server. Windows Server 2008 Enterprise builds on the standard edition by giving you increased scalability, cost-effective virtualization, failover clustering and Server Core. Windows Server 2008 Datacenter incorporates all the features of the enterprise edition and puts them on a larger scale with high availability, increased scalability, enhanced power management and dynamic hard partitioning. Windows Web Server 2008 allows the customer to easily develop and support intra and internet networks including features like IIS 7.0, low setup fee, Microsoft ASP .NET, and Microsoft .NET Framework. Windows Sever 2008 has many new features that were not included in the Windows Server 2003 software. Server Core has been added to the new server operating system which allows an administrator to install the minimal installation of Windows Server 2008 and helps with reliability, more secure server and requires less patching and servicing. Another new......

Words: 487 - Pages: 2

Server Side

...July 14 2010.) Part 2 1. Identify and describe a client/server protocol used in everyday life. A client/server protocol used in every day life is Hypertext Transfer Protocol (HTTP), which can be described as a set of rules that governs the transfer of content such as pictures, documents, videos and so on, over the Internet. It operates by having a server out on the net hosting the content and listening for requests on the usual standard port 80, I say standard because it can be changed. The client (a web browser) makes a request for a particular document (web page) and in collaboration with other protocols and services like DNS and TCP/IP, the information is returned to the browser and displayed. 2. Identify two ways of classifying computer networks. Two ways of classifying networks are by scale and by design. Brookshear’s example of the two consisted of the former being classed by distance, Local Area Network, Metro Area Network and Wide Area Network being in this class. He went on to show that design meant whether or not the network was open to the public like in hot-spots or privately closed and controlled. I would like to introduce a third concept which links classification to the connection media. Here we can show the thought of wired versus wireless and even explore the types under such. 3. Give two examples of client-side activities on the Web. Give two examples of server-side activities on the Web. Two client side web activities are......

Words: 1067 - Pages: 5

Dns Server

...“Birch” DNS Server The Mail server will be using fedora as the OS. First step will be to install fedora on the server. After successful install there are 3 packages that need to be installed. The first package will be the bind package. Next will be the bind-utils and bind-chroot packages. After successful install of all packages we will start with adding files to the chroot directory that will be implemented for security. We will do this in anticipation if anyone hacks into the server they will be confined to that directory. To do this a copy of the named.config, named.rfc1912.zones, and the named.root.hints files will made in the /var/named/chroot/etc directory.Also copy the default zone files from/user/share/doc/bind/sample/var/named into var/named/chroot/var/named directory. In the /etc/named.config file we need to add the DNS server Birch.company.com with the ip address 206.207.208.12, mail server Cedar.company.com 206.207.208.11, and web server Aspen.company.com 206.207.208.10 to the list of servers to be added to the DMZ zone.. In the /etc/resolve.config file we need to point the DNS server to quiry the ISP DNS 82.83.84.85 for unknown names or domains. This setup will allow clients on the Corp. side to query the DMZ DNS which will in turn query the ISP DNS for any name resolution and protect the internal network from being compromised. In addition to the using chroot we will also implement SELinux as addition security. To ensure DNS will run automatically at system......

Words: 295 - Pages: 2

Fairly Legal (16) | Ending Soon | Pajama Friends