Top-Rated Free Essay
Preview

Final Review Server Security NT2670

Powerful Essays
1432 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Final Review Server Security NT2670
Final review NT2670

Terminal Services Role enables users working at another computer on the company network or on the Internet to establish a connection to a server and open an application or desktop session there.

Server Core is a stripped down version of the Operating System, where there is no start menu, no Microsoft Management Console (MMC) console, and virtually no graphical applications.

When a client runs an application on a terminal server, which computer are the services utilizing?
The Terminal Server

A virtual server is a complete installation of an operating system (one or more) that runs in a software environment emulating a physical computer.

The Server Manager is an MMC (Microsoft Management Console) that provides a selection of the most commonly used tools

The Add Roles Wizard provides roles that fall into three basic categories:
Directory Services,Application Services,Infrastructure Services

Where is the root directory of the default Web site placed when IIS is installed?
C:\inetpub\wwwroot

Virtual Directories : Virtual Directories enable you to use a Web site to publish files located anywhere on the network.

Which of the following correctly identifies the HTTP binding options available

IP Address, Port Number, Host Header

FTP can use SSL to encrypt its authentication traffic before transmission :
Secure Socket Layer

The most secure of the traditional challenge/response authentication methods supported by IIS7 is Windows Authentication :Windows Authentication

Which Authentication protocol is integrated into an IIS7 installation by default? :Anonymous Authentication

The process of confirming a user's identity, usually by requiring the user to supply some sort of token, such as a password or a certificate, is called authentication : Authentication

To restrict Web site or FTP access to specific computers or companies, you can create a list of IP Addresses add Domain Names to which the server will grant or deny access : IP Addresses and Domain Names

If all of the authentication methods fail, as in an improperly configured site with no methods enabled, the client receives HTTP Error 401.2 : 401.2

Web servers use port number 80 by default and the default number for an SSL connection is 443:
80; 443

Digital certificates are issued by internal or external resources called a certification authority : A Certification Authority

Windows Server 2008 includes a feature that implements an SMTP Server, which you can configure to handle all of the outgoing email messages sent by the system's various roles and features : SMTP Server

The client must use the prefix https:// in its URL to connect to an IIS7 server using SSL : Https://

Windows Server 2008 includes a feature that implements an SMTP Server, which you can configure to handle all of the outgoing email messages sent by the system's various roles and features : SMTP Server

Two basic types of computers that can be on an enterprise network are Servers and Clients : Servers and Clients

E-mail is typically created and sent using an e-mail client program, such as Microsoft Outlook or Eudora, called a Mail User Agent (MUA) : MUA (Exchange Server 2007

Domain names that contain the name of the host computer are called Fully Qualified Domain Names:
Fully Qualified Domain Names (FQDN) (Exchange Server 2007

Extended Simple Mail Transfer (ESMTP) is an improved version of the standard e-mail protocol that provides greater support for embedded graphics and attachments in an e-mail :ESMTP (Exchange Server 2007

Which Exchange Server role allows users to access e-mail, voice mail, and fax messages from a MAPI client, OWA, smart phone, or telephone? : Unified Messaging (UM) (Exchange Server 2007

Web applications use a three-tiered architecture. First tier- The client browser application Second tier – Web Server, Third Tier – Database Server : Database Server

The two forest-wide FSMO roles that must be present on a single Domain Controller (DC) in the forest are the Domain Naming Master and the Schema Master : Schema Master (Exchange Server 2007

GPOs are applied to user and computer objects based on the link in the following order: Site>Domain>Parent Ous>Child Ous : Site (Exchange Server 2007

Unlike other Exchange servers within your Exchange Organization, servers, that host the Mailbox role cannot communicate directly with Active Directory : Mailbox

To relay e-mail within your organization and across the Internet, your Hub and Edge roles servers must have Connectors that specify how to send and receive e-mail:Connectors

Which user group represents users within an organization that have both a user account in Active Directory (AD) and a mailbox on an Exchange server? : Mailbox Users

Instead of using public folders, Outlook 2007 and Entourage 2008 MAPI clients use the Autodiscover and Availability services within Exchange 2007 to obtain offline address books, schedule calendar appointments, and obtain configuration information :Autodiscover and Availability services

Although mailbox users connect to a single public folder database be default, they will be able to see and access all of the public folders within the Exchange organization using public folder referrals :Public Folder Referrals

Although mailbox users connect to a single public folder database by default, they will be able to see and access all of the public folders within the Exchange organization using public folder referrals :
Public folder referrals

Network-based firewalls can restrict traffic based on source and destination IP address, network, and Media Access Control (MAC) address :Media Access Control

Which platform does Exchange Server 2007 require for a production environment? :x64

Edge role servers must use ADAM to periodically obtain AD and Exchange information using the EdgeSync protocol from a server that hosts the Hub role : EdgeSync

When assigning permissions, it is best to assign them to Groups rather than to individual users : Groups

What type of mailbox allows a user in one forest to access a mailbox in another forest across a trust relationship? : Linked Mailbox

How many hub role servers should you have? : One for each AD site

You can use the TELNET command to test connectivity to SMTP, POP3, and IMAP4 :TELNET

Outlook Anywhere uses the RPC over HTTP component to connect to your Exchange Servers from across the Internet : RPC over HTTP

Creation of C:\inetpub\wwwroot : The results of adding Web Server (IIS) Role

Index.html is the original default filename for the : Web

All applications that you add to the Default Web Site on the server use Default AppPool
Default AppPool

When IIS7 generates a 404 error, it sends a detailed error page, in response to local requests, and a custom error page for requests coming from other computers.
Detailed Error pages assist with debugging
Custom Error pages simply tell the outside requester, “There is a problem.” : Detailed; custom

Web Applications use a three-tiered architecture:Client Browser application,Web Server
Database Server : Database Server

All applications that you add to the Default Web Site on the server use the DefaultAppPool :DefaultAppPool

Windows Server 2008 includes a feature that implements an SMTP Server, which you can configure to handle all of the outgoing email messages sent by the system's various roles and features : SMTP Server

The Mail Exchanger (MX) DNS record is used to indicate the email server for a particular domain should be forwarded : Mail Exchanger (MX)

IMAP4
Allows you to leave a copy of your email on the serverIMAP4 uses TCP port 143 by default :IMAP4

POP3 is designed to download e-mail from an e-mail server to a client for viewing
POP3 uses TCP Port 110 : POP3

The Mail Exchanger DNS record is used to indicate the email server for a particular domain should be forwarded : Mail Exchanger (MX)

POP3 Downloads and erases the email for the email sever,IMAP4Allows you to leave a copy in the server : POP3 and IMAP4

A Smart Host is an email server that receives inbound email and simply forwards it to another email server within the organization : Smart Host

The GC is a database of all object names in the forest and aids in locating objects in the Active Directory (AD) : Global Catalog

Which of the following is not a server role available in Exchange Server 2007? :Anti-spam

Which log in the Windows Event Viewer contains Exchange-related errors and warnings? :Application

What type of mailbox allows a user in one forest to access a mailbox in another forest across a trust relationship?Linked Mailbox

IIS7, to protect its own server functions, as well as those of other Web sites and Windows Server 2008 itself, can isolate Web applications in separate address spaces called Application Pools :Application Pools

How many hub role servers should you have? : One for each AD site

You can use the TELNET command to test connectivity to SMTP, POP3, and IMAP4 : TELNET

Outlook Anywhere uses the RPC over HTTP component to connect to your Exchange servers from across the Internet : RPC over HTTP

When assigning permissions, it is best to assign them to Groups rather than individual users : Groups

You May Also Find These Documents Helpful

  • Satisfactory Essays

    lower your attack surface, Windows 2008 Server Core would be installed on a group of your servers.…

    • 235 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2460

    • 271 Words
    • 2 Pages

    Installs and removes roles, role services and features. Also displays the list of all roles, role services, and features available, and shows which are installed on this computer. For additional information about the roles, roles services, and features that you can specify using this tool, refer to the Help for Server Manager.…

    • 271 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It-260 Worksheet

    • 512 Words
    • 3 Pages

    Which of the previous tasks could be completed using Server Manager instead of other consoles?…

    • 512 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    After careful consideration it was decided by the IT corporate team that in order to increase security and lower your attack surface, Windows 2008 server core would be installed on a group of your servers. However, a few roles need to be installed on the server and your senior Administrator is not familiar with installing roles on a server core machine.…

    • 394 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2670 Week2 Research 3

    • 752 Words
    • 3 Pages

    The common gateway interface (CGI) is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user. It is part of the Web's Hypertext Transfer Protocol (HTTP). A disadvantage of a CGI application (or "executable file," as it is sometimes called) is that each time it is run, it runs as a separate process with its own address space, resulting in extra instructions that have to be performed, especially if many instances of it are running on behalf of users The improper use of CGI scripts affords users a number of vulnerabilities in system security. Failure to validate user input, poorly…

    • 752 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    NT2670 Midtern Questions

    • 842 Words
    • 3 Pages

    An MMC console that provides a selection of the most commonly used windows Server 2008 management tools.…

    • 842 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    nt1330 unit 7 assinment1

    • 350 Words
    • 2 Pages

    I can understand how you concerned with your company’s security after all information on competitors can be invaluable or very harmful to a company and this is why it must be protected from prying eyes. This does not have to mean that you have to lose production over trying to secure your networks information. An easy measure like user names and passwords can be used to protect less sensitive information but how strong you make those usernames and passwords can have a significant effect on how well your information is protected. I will give you some tips on how to better secure your network with the tools that you already have at hand, keep in mind that you can also buy better security items to better protect you network things like; smart card, finger print scanners, retinal scanners, etc. but I only recommend these for really sensitive information and only for certain users in your company. On the server that is the DC log in to the administrator account and in the Active Directory Users and Computers in the Domain icon in the left pane click on the users icon, you’ll be able to see all of the users in that domain. From here you can click on any user and make changes as necessary, for user names I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “CCbattle1234@Domain*%#.Local” if someone hack the account and all that they knew the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. As for passwords I recommend that they be alpha numeric and what this means is that they should be at least eight characters long, be composed of upper and lower case letters, should contain at least one number and one special character.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Powerful Essays

    The authentication process is a necessity for safeguarding systems against various forms of security threats, such as password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and last but not least reply attacks just to name a few. In addition, it is imperative that authentication policies are interchangeable with the organizations in which information is being exchanged if resources are being shared between alternative organizations.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    School

    • 629 Words
    • 3 Pages

    1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify…

    • 629 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Absolute Links

    • 264 Words
    • 2 Pages

    Consider the following folder structure: A project folder has the following path: http://www.mywebsite.com/IT237MyProject. The IT237ZMyProject folder contains a page called index.html and a folder called Images. A picture named imgLake.jpg is saved in the Images folder.…

    • 264 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Internet Information Services enables you to configure websites to use specific port numbers. This makes it possible to test the functionality of Windows Firewall.…

    • 970 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Windows Installation

    • 930 Words
    • 4 Pages

    Some advantages of a Windows Server 2008 Server Core installation is, greater stability, with less resources taken up versus a full server installation you have more resources for your server to manage only things you need it to manage. Simplified management, compared to a full server installation you have much less installed on your server. This makes it much easier to manage and configure. Reduction in maintenance, this means fewer hot fixes for roles/services you aren’t using so this means theirs much less to maintain. The reduction in the amount of memory and hard disk requirements, install what you need and leave out what you don’t need. You don’t want anything to take up your precious resources that you’re not even using in your server. Finally reduced attack surface, with less installed on your server there are less services to be targeted to an attack. Now for the disadvantaged are the lack of a GUI, so if an administrator is not familiar with the command environment it will make it that much harder to maintain. I see a lot of griping about it not supporting .Net Frameworks and there’s also no support for the managed code. There also seems to be limited amount of roles and features in a server core installation.…

    • 930 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    CompTIA A+ chapter 11

    • 723 Words
    • 3 Pages

    11. What is the file extension of a console that is managed by the Microsoft Management Console?…

    • 723 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    14 SITE MAPPING: MORE ABOUT THE ‘SITE’ OPERATOR ...................................................................................... 15 FINDING DIRECTORY LISTINGS ........................................................................................................................ 16 VERSIONING: OBTAINING THE WEB SERVER SOFTWARE / VERSION ............................................................. 17 via directory listings…

    • 9461 Words
    • 38 Pages
    Powerful Essays