Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Assignment -1

Answer all the questions below. Keep your answers short and to the point. Type (do not handwrite) your answers. You need to get at least 10 of the questions correct to be judged competent in the task

1. Give two examples of technologies that implement biometric authentication

2. What is the name of the network service that provides authentication, authorisation and accounting services, and is commonly used to authenticate remote users connecting via a VPN?

3. List two protocols that can be used to implement a site-to-site VPN.

4. List two protocols that can be used to implement a remote access VPN.

5. What are the two main function of the Key Distribution Center (KDC) within the Kerberos protocol?

6. What are the two types of tickets issued to a Kerberos client once the client has been authenticated?

7. What is the main advantage of the CHAP (Challenge Handshake Authentication Protocol) over PAP (Password Authentication Protocol)?

8. When I install Microsoft Active Directory Certificate Services (AD CS), what are the two types of Certificate Authority (CA) that are supported (hint: one requires Active Directory to be installed, whereas the other does not) ?

9. What is the name of the list maintained by AD CS which has details of revoked certificates, and what information is stored in that list?

10. List three types of Windows logs that you can see in Windows 2012

11. What is the minimum amount of RAM you need on a server to install Windows 2012 Server R2?

12. List two advantages of using the Server Core installation option (as opposed to the GUI option) in Windows 2012 Server

13. What is the option in the sconfig utility in Windows 2012 that I would use to restore the GUI to a Windows 2012 Server that was running a Server Core installation?

14. What is the name of the disk virtualization technology in Windows 2012 Server that allows you to combine storage from multiple physical drives into a pool of storage?

15. What are three pieces of information I might want to document about an installed server?

16. I want to set up a Windows 2012 Server as a domain controller. What type of IP address do I need to allocate to the server so it can function as a domain controller?

17. What is the PowerShell command I use to install the Active Directory Domain Services role on a Windows 212 Server running Server Core?

18. On a Windows 2012 Server, where are the local user accounts stored?

Part -2:

Assignment

Answer all the questions below. Keep your answers short and to the point. Type (do not handwrite) your answers. You need to get at least 10 of the questions correct to be judged competent in the task

1. What is the main role of DNS (Domain Name System) in a network?

2. List the FTP commands that I would use to (i) list files available in an FTP directory and (ii) copy a file from an FTP server to my computer running the FTP client.

3. What is the main purpose of the Network Time Protocol (NTP) in a network?

4. List two file systems that can be used by the Windows 2012 operating system

5. What is the command I would enter from the Windows command line to (i) start the Windows service called "Workstation" ; (ii) stop the Windows service called "Workstation"

6. Give one advantage of journaling in file systems.

7. Briefly explain how Task Scheduler be used to help administer server backups.

8. Give two examples of counters that can be used on Performance Monitor to monitor disk performance on a server.

9. What do the PowerShell commaciil. s Get-Process and Stop-Process do? How can they assist in troubleshooting server problems?

10. List three types of Windows logs that you can see in Windows 2012

11. What is the minimum amount of RAM you need on a server to install Windows 2012 Server R2?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92041037
  • Price:- $70

Guranteed 36 Hours Delivery, In Price:- $70

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Two countries australia and france have their interest

Two Countries Australia and France have their interest rates to be 8% and 2 %, respectively. If their currencies trade according to 2 Australian $s buy one euro in the spot market, what will their future spot rate be in ...

Objectivesthis assessment item relates to the unit learning

Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptors. This checks your understanding about configuring and troubleshooting medium-size networks. PART-1 IP Addressing: 1. Subn ...

Suppose that third national bank has reserves of 20000 and

Suppose that Third National Bank has reserves of $20,000 and check able deposits of $200,000. The reserve ratio is 10 percent. The bank sells $20,000 in securities to the Federal Reserve Bank in its district, receiving a ...

Question in regards to encryption does the public key and

Question : In regards to encryption, does the public key and private key come from the sender or does the receiver already have the private and is given the public key by the sender? The response must be typed, single sp ...

Prof gs farmer friend claims that aliens made crop circles

Prof G's farmer friend claims that aliens made crop circles in his farm. Using economic theory, prove his farmer friend wrong.

Assignment1 consider a tcp connection between host a and

Assignment 1, Consider a TCP connection between Host A and Host B. Suppose that the TCP segments traveling from Host A to Host B have source port number 10526 and destination port number 80. What are the source and desti ...

Lab activity investigate system backup and restore

Lab Activity: Investigate System Backup and Restore Tools Purpose: Assess and Document Tools to Backup and Restore the System Hard Drive for a Windows 8.1 Workstation. - Assess and document the use of a system backup too ...

About rsa please answer the following questionsa suppose

About RSA, please answer the following questions. (a) Suppose p=11 and q=7. What is ? (n), where n=p?q? (b) If the public key e is 11, find the private key d. (c) If the ciphertext is 4, what is the plaintext? (d) For en ...

You need to prepare packet tracer fileattached pdf contains

You need to prepare packet tracer file attached pdf contains topology and required configurations and assigned ip address. In packet tacer file you need to include banner, router and switches. 1. VLSM Design a) As first ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As