Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

inistalling and Configuring Windows Server 1. What upgrade options exist for moving from Server 2008 (R2) to Server 2012? What limitations or caveats should be considered when upgrading? Would you typically recommend a clean install or an in-place upgr

 

Inistalling and Configuring Windows Server

1. What upgrade options exist for moving from Server 2008 (R2) to Server 2012? What limitations or caveats should be considered when upgrading? Would you typically recommend a clean install or an in-place upgrade when attempting to move a service from Server 2008 to 2012, and why?

2. Describe a scenario in which you'd use Server Core, including a description of the services that you might install on the server, and the advantages and disadvantages of using Server Core.

3. Consider a data center heavily built on Hyper-V (or VMware) and the ability to clone virtual machines from template VMs or from other existing VMs. For a highly virtualized data center, how does this change the deployment options available from traditional data centers? Is there any benefit or need in using some of the traditional deployment options (e.g., disk imaging using software like Ghost, deploying operating systems using Windows Deployment Services and the Windows Automated Installation Kit or Microsoft Deployment Toolkit)?

4. Using tools mentioned in the chapter (or other tools), research one of these domains: microsoft.com, cnn.com, icann.org, wikipedia.org, google.com. Your goal is to find out publicly available information about each domain including domain registration information and DNS records. Provide the following for the domain chosen, providing details on how you found the information:
lDomain admin e-mail address
lDomain expiration date
lName servers for the domain
lAt least 2 A records in the domain
lAt least 1 MX record in the domain

5. What are some good practices when deploying directory services?

6. What factors might an organization consider when choosing to implement an AD-integrated DNS zone versus a traditional zone? Describe a scenario in which it would be preferable not to integrate a DNS zone into AD. Since the DNS zones can be hosted on specific AD domain controllers, what factor(s) might go into deciding which DCs will host DNS?

7. From what security risks does EFS offer protection, and from what risks does it not offer protection? In your own words, describe what a "FEK" is and how it's used? Feel free to research EFS .

8. NTFS "disk quotas" and FSRM quotas are implemented and function differently. In your own words, what are the differences between NTFS disk quotas and FSRM quotas? How do each actually determine usage? Why might an organization choose to use one over the other?

9. Discuss some of the benefits and disadvantages of using group policy in an organization.

10. Describe TCP and UDP, and how they differ. Why do both protocols exist?

11. In your own words, briefly describe each of the address types mentioned in LabSim, and provide a scenario when each is useful for an organization. In particular, differentiate link-local, unique local and global addresses.

12. LabSim describes the ISATAP, 6to4 and Teredo transition technologies for IPv6. In your own words, define one (in a way that differentiates it from the others). Then, do one of the following:
lDescribe a realistic scenario (with some details) for using the technology you chose
lLocate a case study or other online article (of that technology or IPv6 transition in general) and provide your thoughts on it
lIf your organization is undergoing (or underwent) an IPv6 transition, discuss some of the details


13. Consider the types of systems that benefit from DHCP reservations and/or from having manually-configured (static) IP addresses, including servers, networked printers, and other networked devices (e.g., network-connected HVAC controllers, IP camera systems). One option is to configure DHCP reservations and allow the devices to use DHCP to consistently get the same address; another option is to configure static addresses on the devices themselves and leave the addresses out of any DHCP scopes (or just to reserve them in DHCP). For the scenarios mentioned above (e.g., servers, networked printers, other similar networked devices), would you recommend static configuration on the devices or DHCP reservations? Why? Are some types of devices better suited to DHCP than others?

14. Provide a brief description for each DHCP message that would be exchanged, in order, if the DHCP server is in the middle of rebooting during an initial lease request but comes up seconds later. Answers might be slightly different depending on when you choose exactly for the DHCP server to come online. Feel free to use a diagram if you wish, and provide a rough description of timing of the messages and/or duration between them.

15. Consider a large network with many desktops, laptops, and networked printers. What are the advantages and disadvantages of short versus long lease times? Consider if the DHCP server is unavailable for a short time - what are the impacts if lease time is short, or if lease time is long? What do you expect is a typical lease time for most large organizations with desktops, servers, wireless devices, networked printers and other networked devices (e.g., network-connected HVAC controllers, IP camera systems)?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91348560
  • Price:- $60

Guranteed 36 Hours Delivery, In Price:- $60

Have any Question?


Related Questions in Computer Engineering

Discuss the importance functionality and role of a

Discuss the importance, functionality, and role of a GateKeeper or VoIP server in a VoIP -deployed network?

Systems and networksconsider communication between a sender

(Systems and Networks) Consider communication between a sender and receiver. Using a time-space diagram, illustrate reliable transmission of a message consisting of 5 segments using the selective-repeat protocol with N=3 ...

If we compare and contrast the four market structures it is

If we compare and contrast the four market structures, it is evident that one market structure is most practiced and evident in the United States. It is the one that promotes and strives on competition. It is the one tha ...

You get hired as a machine learning expert at moviescom

You get hired as a Machine learning expert at movies.com. Your task on day one is to improve the performance of a classifier. You divide the data into 2 parts training, and testing. You learn a model from the training da ...

In the on the spot system package pickup and deliv- ery are

In the On the Spot system, package pickup and deliv- ery are closely integrated with route schedules. How- ever, recall the RMO system, where there is a Sales subsystem, an Order fulfillment subsystem, a Cus- tomer accou ...

Question suppose alice bob and carol want to use secret key

Question : Suppose alice, bob and carol want to use secret key technology to authenticate each other. If they all use the same key, K, then bob would impersonate carol to alice. suppose instead that each had their own se ...

Question sally averages 5 strokes a hole when she plays

Question: Sally averages 5 strokes a hole when she plays golf. One day, she took 40 strokes to complete the first nine holes. Her partner conjectured that she would probably regress to the mean and take 50 strokes to com ...

What are information silos what are the problems caused by

What are information silos? What are the problems caused by information silos? How organizations can solve the problems caused by information silos?

Suppose the information content of a packet is the ascii

Suppose the information content of a packet is the ASCII (8-bit code) representation of "OK" and an even parity scheme is being used. What would the value of the field containing the parity bits be for the case of a two- ...

Search the web for two or more sites that discuss the

Search the web for two or more sites that discuss the ongoing responsibilities of security manager. What other components of security management, as outlined by this model, can be adapted for use in the security manageme ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As