Preview

It 206 Midterm

Powerful Essays
Open Document
Open Document
980 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It 206 Midterm
* Know the basic types of computers that can be on an enterprise network
Clients and Servers * Know the role requirement trust relationships allowing users from network access to resources on other networks Active Directory Federation Services (ADFS) * Know how to create and enforce storage quotas, generate reports, and specify allowable file types File Server Resource Manager (FSRM) * Know the difference between windows server standard and windows server core Windows Server Core * Know the image files required to perform remote client installations Boot Image * Know how IIS can forward requests for a specific URL to another URL HTTP Redirection * What does IIS7 use to manage the request pipeline, application pools and worker process Windows Process Activation Service (WPAS) * What feature of IIS7 enables you to publish content found on different drives or computers without copying or moving the content Virtual Directory * What does IIS7 use to associate incoming requests with a particular website helping the protocol listener to identify each site request Site Bindings * What needs to be running in order to install FTP7 Web Server (ISS) Role * What kind of records are required for a DNS server to perform reverse name resolutions Pointer (PTR)
Know the authentication method that is integrated in IIS7Within IIS7 Windows Authentications module know the two authentication protocols supported Know what ACLs and ACEs are
Know where the web Server’s public and private keys are used
Know the three tiers of web applications
Know what CGI is used for
Know what the XML based directory service that enables businesses to publish listings about their activities and services they offer is
Know what the standard email protocols are and where they are used
Know why ASP.NET is used for web servers
Know the difference between downloading and streaming multimedia content
When media streaming, there is a tradeoff between what two

You May Also Find These Documents Helpful

  • Better Essays

    Tulloch, M. (2004, June 15). Best Practices for Assigning FSMO Roles. Retrieved from Windows Devcenter: http://www.windowsdevcenter.com/pub/a/windows/2004/06/15/fsmo.html…

    • 1426 Words
    • 4 Pages
    Better Essays
  • Good Essays

    This is used by Microsoft to seamlessly create a client/server model in Windows NT, with very little effort.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT2670 Week2 Research 3

    • 752 Words
    • 3 Pages

    The common gateway interface (CGI) is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user. It is part of the Web's Hypertext Transfer Protocol (HTTP). A disadvantage of a CGI application (or "executable file," as it is sometimes called) is that each time it is run, it runs as a separate process with its own address space, resulting in extra instructions that have to be performed, especially if many instances of it are running on behalf of users The improper use of CGI scripts affords users a number of vulnerabilities in system security. Failure to validate user input, poorly…

    • 752 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Orange Creek, Inc., a Fortune 500 company, has moved into Lexington and is requesting bids for…

    • 2372 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    1) Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data.…

    • 518 Words
    • 2 Pages
    Good Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    Of these three fundamental controls, which two are used by the Domain User Admin to create users and assign rights to resources?…

    • 503 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The authentication process is a necessity for safeguarding systems against various forms of security threats, such as password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and last but not least reply attacks just to name a few. In addition, it is imperative that authentication policies are interchangeable with the organizations in which information is being exchanged if resources are being shared between alternative organizations.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Chapter 3 Flashcards

    • 519 Words
    • 3 Pages

    Which of the following is NOT an objective when performing a large-scale Windows 7 deployment?…

    • 519 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    6. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs departmental folders, and data.…

    • 368 Words
    • 2 Pages
    Good Essays
  • Good Essays

    To perform a Windows 7 deployment using ZTI, you must have a SQL Server on your network. F…

    • 526 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    BLE 215 Midterm

    • 2051 Words
    • 5 Pages

    The difference between shareholder and stakeholder is that shareholders are individuals who own stock in a company in hopes of making a profit. On the other hand, stakeholders are individuals who have an interest in a company, or any organization and are affected by what happens within the institution based on rules. In this article, Joseph Johnston argues, “Stakeholder theory sounds good in social theory but will not work in practice.” In other words, the theory is saying that the “shareholder” is more crucial and important than the “stakeholder”, and I agree with the theory that Joseph Johnston has said. Shareholder in other words means the CEO of the company, and stakeholder are the one whoever is involved with the company. However, the shareholder doesn’t have to be participating inside of the company, it can be people from different industry or corporations. In the nowadays society, the shareholder plays a more important role than the stakeholder. They have to get along with the society, and what I mean by that is they have to have contact with financing, operations, government, control aspects, and consideration. This is what it has to include in order taking the company to success. Therefore, the main point that Joseph Johnston is trying to say is in the realities nowadays, you can’t just focus on one people anymore, you have to play as a team, you have to notice the society.…

    • 2051 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data.…

    • 263 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    It 218 Week 4 Checkpoint

    • 290 Words
    • 2 Pages

    A one dimensional array is a variable that holds more than one index value such as car [ 13 ]. A Two dimensional array will hold two different index values such as…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the Microsoft SQL Server, authentication process occures when someone wanted to make a connection to Microsoft SQL Server. User and password is required for some one to be able to access resources of the Microsoft SQL Server. Once the authentication process finishes, Microsoft SQL Server takes control of authorizing user’s can access to object ( Database, table, trigger and function ) and data in the system…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT 236

    • 2926 Words
    • 12 Pages

    The Final Project is a Web Site analysis. You will select an e-business or e-commerce Web site to respond to the Capstone Discussion Question, The Final Project consists of your recommendations on how to improve the site.…

    • 2926 Words
    • 12 Pages
    Satisfactory Essays