ICTNWK539 Design and Implement an Integrated Server Solution

Assignment Help Computer Networking
Reference no: EM133079483

ICTNWK539 Design and Implement an Integrated Server Solution

Task 1 - Integrated Server Solution

Your document must include:
A. Introduction
a. Description of what you will do during this task (1 paragraph)
B. Management Report
a. Overview of the Operating Systems (which OS did you use, and give a description of each one)
b. Overview of network protocols (which network protocols are used in this task, and describe)
c. Overview of selected methods (which method did you use to share the folder, and describe)
C. Report
a. Screenshot of your configuration, crop your screenshot making sure all the relevant information is captured and make a small comment of what the screenshot is about.
b. Create 2 Virtual Machine in VMWare (1 Ubuntu and 1 Windows 7)
c. Put the 2 VM in the same network
d. Do a ping test between the 2 VM (disable the firewall if necessary)
e. Share a folder between the 2 VM
f. Test sharing a file between the 2 VM
D. Sign Off Form
E. Referencing
a. The Referencing style that we use is APA style.

Task 2 - Integrated Server Solution

Your document must include:
A. Introduction
a. Description of what you will do during this task (1 paragraph)
B. Management Report (1 page)
a. Overview of the Operating Systems (which OS did you use, and give a description of each one)
b. Overview of network protocols (which network protocols are used in this task, and describe)
c. Overview of selected methods (which method did you use to share the folder, and describe)
C. Report
a. Screenshot of your configuration, crop your screenshot making sure all the relevant information is captured and make a small comment of what the screenshot is about.
b. Create 2 Virtual Machine in VMWare (1 Debian and 1 Windows 7)
c. Put the 2 VM in the same network
d. Do a ping test between the 2 VM (disable the firewall if necessary)
e. Share a folder between the 2 VM
f. Test sharing a file between the 2 VM
D. Sign Off Form
E. Referencing
a. The Referencing style that we use is APA style.

Knowledge questions

Question 1. You need to change the Active Directory database used by single sign-on. When you click Manage settings for single sign-on in Central Administration, all options are dimmed. You need to make the configuration change. What should you do?

Question 2. Where can you access the IP Security Policies in Active Directory?

Question 3. What is the purpose of Kerberos in Windows 2003?

Question 4. How are security templates useful to an administrator?

Question 5. Which level of security does Kerberos offer?
Moderate
High
Optimal
Low

Question 6. Which of the following cannot use Kerberos?
Windows NT clients
Windows XP
Window 2000
Windows Server 2003

Question 7. All of the following are Kerberos policies except the __________ policy.
Maximum lifetime for service ticket
Maximum tolerance for computer clock synchronisation
Enforce user logon restrictions
Reset account lockout counter after

Question 8. You are the administrator of a small business Active Directory domain server. Your users complain that they are unable to add more than 1 GB to their "My Documents" folders on their computers.
What is the most likely cause of the issue?
Incorrect folder redirection configuration
Insufficient disk space on local machines
Incorrect configuration of disk management
Insufficient user credentials

Question 9. Your manager asks you to implement a solution that would allow for the creation of two separate logical groupings of networked computers, both of which fall under a single, general company tree. Which of the following will accomplish this goal?

Create two forests and one domain
Create two trees and one domain
Create three domains
Create one forest and two domains
Create one forest, two trees, and four domains

Question 10. Which of the following is not a potential advantage of an active directory domain?
Centralised user management
Single sign-in login
Enhanced security management
Ability to deploy software and settings on a large scale
Cross-platform compatibility

Question 11. All of the following are characteristics of the IPX/SPX suite except:
Compatible with Novell NetWare
Non-routable
Require a frame type
Routable

Question 12. You are the administrator of an active directory domain. A user complains to you that he is unable to change his password. No other users have this issue. What is the most likely cause of the problem?
Insufficient login credentials
He is a member of the Administrators group
He is not a member of the domain
The property "User cannot change password" has been enabled in Active Directory Users and Computers
The property "Password never expires" has been enabled in Active Directory Users and Computers

Question 13. Which of the following protocols is Active Directory based upon?
LDAP
L2TP
PPTP
PPP
IPSec

Question 14. You are the manager and administrator of a large network using both Windows Server 2003 and UNIX infrastructure. Which of the following allows for limited cross-platform compatibility between the company domain COMPANY and the Unix nodes?
GPEDIT
SAMBA
IPCHAINS
KEREBOS
BASH

Question 15. A user complains that after repeated attempts at logging onto his domain account, he continues to receive the message that the username and/or password are incorrect. You are positive that he is entering the correct credentials to login to the domain server. Which of the following is the most likely explanation for this issue?
His network connection is not working correctly
The domain server is not recognising his computer as a registered node
He is logging onto his computer and not the actual domain
The domain controller's login server is not working correctly
He has a faulty Windows installation

Question 16. What is PAM?

Question 17. Which of the following is a typical concern involved in migrating from Windows 2000 Server to Windows Server 2003 with regard to Active Directory functionality?

Difficulty in migrating existing user accounts
Difficulty in migrating existing group policy
Reduced cross-platform compliance in Windows Server 2003
Compatibility of legacy applications on the new server
Compliance of Server 2003 with LDAP specifications

Question 18. What does Samba offer?

Question 19. You are the network administrator for a Windows-based network with 100 users. You wish to organize the users by the department in which they work - Accounting, Engineering, and so forth. You also wish to apply access controls to centrally located (server-side) resources based on those assigned groups. Without the installation of additional software, which of the following is not necessary to apply this access control scheme?

Active Directory
TCP/IP
Creation of non-default groups
Creation of group policy settings
Creation of access control list for server resources

Question 20. Several different system services should be configured on the Linux client to use Active Directory as a domain controller. What are they and how should they be configured?

Attachment:- Integrated Server Solution.rar

Reference no: EM133079483

Questions Cloud

What is the sales volume variance : The flexible budget sales revenue is $76600. If the actual sales price is $6 and the budgeted sales price is $6.50, what is the sales volume variance
Efficient pigouvian tax on sulfur producers : Suppose there are two industries in an economy: sulfur mining and perfume manufacturing. The demand for sulfur is characterized by the private marginal benefit
What is the projected cash balance at end of third quarter : Cash purchases for merchandise inventory are budgeted at $401000 for the quarter. What is the projected cash balance at the end of the third quarter
Managing teams : Research a team that you believe that has been particularly successful. How was the team successful? What are the characteristic of this model team?.
ICTNWK539 Design and Implement an Integrated Server Solution : ICTNWK539 Design and Implement an Integrated Server Solution - Assignment Help - implement a solution that would allow for the creation of two separate logical
What is a haircut on debt : What is a "haircut" on debt and why would lenders ever give borrowers a "haircut"?
Determine the market equilibrium point : At a unit price of KES 16,000, the demand of a product is 300 units and at a unit price of KES 48,000 the demand is 100 units. At a unit price of KES 30,000 the
Prepare the liabilities section of Kate Cakes Ltd : Accounting services provided, but not yet billed by Kate's Cakes accountant are estimated at $1,800. Prepare the liabilities section of Kate's Cakes Ltd
Timeline of matrix of the cooperative movement : Create a timeline of matrix of the cooperative movement, then based on what you created synthesize the history of cooperative and its economic impact to the com

Reviews

Write a Review

Computer Networking Questions & Answers

  Draw the decomposition trees for each flow grap

The following sets of edges form flow graphs on five nodes, labeled from 1 to 5. Draw the flowgraphs using the conventions of Figure.

  Advantages and disadvantages of network processors

What are the advantages and disadvantages of network processors, such as hubs, switches, routers, and gateways?

  Compare the bus topology and the star topology

Describe the five IP addressing classes. Provide an example for each of classes in binary and dotted-decimal representation. Show the conversion of each of the addresses. Describe the function of the subnet address for each of the classes and how ..

  Hybrid or pure public cloud environment

Why would an organization move into a private cloud model instead of either the hybrid or pure public cloud environment?

  What is the next data chunk to be sent

The value of inTransit is 200. If each data chunk contains 100 bytes of data, how many DATA chunks can be sent now? What is the next data chunk to be sent?

  Find a code for the source

Using base-3 logarithms, compute the entropy of this source. - Assuming that there are three characters 0,1,2 in the code alphabet, find a code for the source that has average length equal to its base-3 entropy.

  Current state of operating systems

You will consider the current state of operating systems and consider potential innovations to improve them - dawn of computers and the information age, there were no operating systems.

  What is the osi model and why is it important

What is the OSI model and why is it important in understanding networking?Under what conditions would you choose to subnet a network?

  Research on project management practice

MN601 - Network Project Management - Individual case study assignment -

  1 this question relates to section 2 genetic algorithma

1. this question relates to section 2 genetic algorithma heredna -gt channel assigned to a wireless linkindividual -gt

  Critically reflect on current project management ethics

MN601 - Network Project Management - Melbourne Institute of technology - Individual case study assignment HE BEST PROJECT MANAGERS ARE EMOTION-DRIVEN LEADERS

  Effective accountability in project management

Issues and conclusions regarding project planning, scheduling, and risk management from the construction case that also apply to information technology projects.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd