Preview

It 260 Final Exam Review

Satisfactory Essays
Open Document
Open Document
300 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It 260 Final Exam Review
1. Know the acronym associated with an email client program/ 2. Know wha a fully Qualified domain name entails 3. Know the diff versions of email protocols 4. Know diff Exchange server roles and what it allows you to access -=n B 5. Know the fsmo roles and which ones must be present together 6. Know the order in which GPO’s are applied 7. Know whether or not it is a good idea to install the Exchange role on multifunction servers 8. Know the amount of ram required on an exchange server based on server roles 9. For installation of Exchange, know then diff between unattended and graphical mode 10. Know what the diff exchange administrative roles are and that you can do under
B
11. Which exchange server role does not allow you to communicate directly with AD 12. Know that connectors are used for in exchange server. 13. Which user group is represented in both AD and exchange mailbox 14. Know the purpose of a mail enabled group 15. Know what auto discover and availability services are used for 16. Know why you would use public folder referrals 17. Know the diff protocols for email and what they are used for. 18. Know the TCp ports associates with pop3 and imap 19. Know the diff viruses that are spread via email and how they work, 20. Know the diff ways network based firewall can restrict traffic. 21. Know what the vss is used for. 22. Know the diff groups and what they can be used for regarding mailbox operations 23. Know the logs associated with the hub role servers and what information is stored 24. Know the parameters associated with eseutil.exe and what they are used for. 25. Know the file extension associated with mailbox

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    MNP231

    • 1327 Words
    • 4 Pages

    1. In Exercise 3, which of the New Zone Wizard pages would not appear if you opted to store your zones in Active Directory?…

    • 1327 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    However, a few roles need to be installed on the server, and your Senior Administrator is not familiar with…

    • 235 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The email server will serve as a storage facility for emails, a database of user email accounts, and will transfer messages from other mail servers and email clients. This functionality will be very important for communication between management and employees. The third server will provide storage management and allows users to share data from a single location and allow all users to print to a centralized network printer.…

    • 247 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    FP/120 Final Exam Paper

    • 430 Words
    • 2 Pages

    Question: From the following, which is a factor to consider when you are buying a car?…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2). On October 2, 2011, Starbucks Corporation reported, on its Form 10-K, the following (in…

    • 7004 Words
    • 61 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 9 Assignment 1

    • 113 Words
    • 1 Page

    Baldeo Persaud NT 1330 Unit 9 Assignment 1 During the design phase: Define the scope of application of Group Policy. Determine the policy settings that are applicable to all corporate users. Classify users and computers based on their roles and locations. Plan desktop configurations based on the user and computer requirements.…

    • 113 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IT302 assignment 5

    • 356 Words
    • 2 Pages

    d. If you want vsftpd to run in standalone mode, what do you need to set in vsftpd.conf?…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    The TJX was still using the old wired equivalent Privacy (WEP) encryption system, which is relatively easy for hackers to crack. An auditor also later found the company had neglected to install firewalls and data encryption, on many of the computers using the wireless network,…

    • 667 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This exam will be a combination of multiple choice & matching questions and a few short essay responses. For best results in preparing for the upcoming exam, focus your studies on the following historical items, events and individuals. Your textbook may help with some of the things listed, but this exam is more so drawn from class lectures and power point presentations.…

    • 510 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    1)Data protection: Ensure all information is stored in a secure place and no information is given out if unsure.…

    • 1527 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    301 Scenario 1

    • 291 Words
    • 2 Pages

    Consider the following questions for each example. Your response needs to demonstrate your knowledge and understanding of the policies and procedures in your setting.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    lemme

    • 3472 Words
    • 14 Pages

    Electronic mail (e-mail) is one of the most popular network services nowadays. Most e-mail systems that send mail over the Internet use simple mail transfer protocol (SMTP) to send messages from one server to another. The messages can then be retrieved with an e-mail client using either post office protocol (POP) or Internet message access protocol (IMAP). SMTP is also generally used to send messages from a mail client to a mail server in “hostbased” (or Unix-based) mail systems, where a simple mbox utility might be on the same system [or via Network File System (NFS) provided by Novell] for access without POP or IMAP. This chapter describes the fundamentals of SMTP, elements of its client–server architecture (user agent, mail transfer agent, ports), request–response mechanism, commands,mail transfer phases, SMTP messages, multipurpose internet mail extensions (MIME) for non-ASCII (American Standard Code for Information Interchange) data, e-mail delivery cases, mail access protocols (POP3 and IMAP4), SMTP software, vulnerability and security issues, standards, associations, and organizations.…

    • 3472 Words
    • 14 Pages
    Powerful Essays