Terminal Services Role enables users working at another computer on the company network or on the Internet to establish a connection to a server and open an application or desktop session there.
Server Core is a stripped down version of the Operating System, where there is no start menu, no Microsoft Management Console (MMC) console, and virtually no graphical applications.
When a client runs an application on a terminal server, which computer are the services utilizing?
The Terminal Server
A virtual server is a complete installation of an operating system (one or more) that runs in a software environment emulating a physical computer.
The Server Manager is an MMC (Microsoft Management Console) that provides a selection of the most commonly used tools
The Add Roles Wizard provides roles that fall into three basic categories:
Directory Services,Application Services,Infrastructure Services
Where is the root directory of the default Web site placed when IIS is installed?
C:\inetpub\wwwroot
Virtual Directories : Virtual Directories enable you to use a Web site to publish files located anywhere on the network.
Which of the following correctly identifies the HTTP binding options available
IP Address, Port Number, Host Header
FTP can use SSL to encrypt its authentication traffic before transmission :
Secure Socket Layer
The most secure of the traditional challenge/response authentication methods supported by IIS7 is Windows Authentication :Windows Authentication
Which Authentication protocol is integrated into an IIS7 installation by default? :Anonymous Authentication
The process of confirming a user's identity, usually by requiring the user to supply some sort of token, such as a password or a certificate, is called authentication : Authentication
To restrict Web site or FTP access to specific computers or companies, you can create a list of IP Addresses add Domain Names to which the server will grant or deny access : IP Addresses and Domain Names
If all of the authentication methods fail, as in an improperly configured site with no methods enabled, the client receives HTTP Error 401.2 : 401.2
Web servers use port number 80 by default and the default number for an SSL connection is 443:
80; 443
Digital certificates are issued by internal or external resources called a certification authority : A Certification Authority
Windows Server 2008 includes a feature that implements an SMTP Server, which you can configure to handle all of the outgoing email messages sent by the system's various roles and features : SMTP Server
The client must use the prefix https:// in its URL to connect to an IIS7 server using SSL : Https://
Windows Server 2008 includes a feature that implements an SMTP Server, which you can configure to handle all of the outgoing email messages sent by the system's various roles and features : SMTP Server
Two basic types of computers that can be on an enterprise network are Servers and Clients : Servers and Clients
E-mail is typically created and sent using an e-mail client program, such as Microsoft Outlook or Eudora, called a Mail User Agent (MUA) : MUA (Exchange Server 2007
Domain names that contain the name of the host computer are called Fully Qualified Domain Names:
Fully Qualified Domain Names (FQDN) (Exchange Server 2007
Extended Simple Mail Transfer (ESMTP) is an improved version of the standard e-mail protocol that provides greater support for embedded graphics and attachments in an e-mail :ESMTP (Exchange Server 2007
Which Exchange Server role allows users to access e-mail, voice mail, and fax messages from a MAPI client, OWA, smart phone, or telephone? : Unified Messaging (UM) (Exchange Server 2007
Web applications use a three-tiered architecture. First tier- The client browser application Second tier – Web Server, Third Tier – Database Server : Database Server
The two forest-wide FSMO roles that must be present on a single Domain Controller (DC) in the forest are the Domain Naming Master and the Schema Master : Schema Master (Exchange Server 2007
GPOs are applied to user and computer objects based on the link in the following order: Site>Domain>Parent Ous>Child Ous : Site (Exchange Server 2007
Unlike other Exchange servers within your Exchange Organization, servers, that host the Mailbox role cannot communicate directly with Active Directory : Mailbox
To relay e-mail within your organization and across the Internet, your Hub and Edge roles servers must have Connectors that specify how to send and receive e-mail:Connectors
Which user group represents users within an organization that have both a user account in Active Directory (AD) and a mailbox on an Exchange server? : Mailbox Users
Instead of using public folders, Outlook 2007 and Entourage 2008 MAPI clients use the Autodiscover and Availability services within Exchange 2007 to obtain offline address books, schedule calendar appointments, and obtain configuration information :Autodiscover and Availability services
Although mailbox users connect to a single public folder database be default, they will be able to see and access all of the public folders within the Exchange organization using public folder referrals :Public Folder Referrals
Although mailbox users connect to a single public folder database by default, they will be able to see and access all of the public folders within the Exchange organization using public folder referrals :
Public folder referrals
Network-based firewalls can restrict traffic based on source and destination IP address, network, and Media Access Control (MAC) address :Media Access Control
Which platform does Exchange Server 2007 require for a production environment? :x64
Edge role servers must use ADAM to periodically obtain AD and Exchange information using the EdgeSync protocol from a server that hosts the Hub role : EdgeSync
When assigning permissions, it is best to assign them to Groups rather than to individual users : Groups
What type of mailbox allows a user in one forest to access a mailbox in another forest across a trust relationship? : Linked Mailbox
How many hub role servers should you have? : One for each AD site
You can use the TELNET command to test connectivity to SMTP, POP3, and IMAP4 :TELNET
Outlook Anywhere uses the RPC over HTTP component to connect to your Exchange Servers from across the Internet : RPC over HTTP
Creation of C:\inetpub\wwwroot : The results of adding Web Server (IIS) Role
Index.html is the original default filename for the : Web
All applications that you add to the Default Web Site on the server use Default AppPool
Default AppPool
When IIS7 generates a 404 error, it sends a detailed error page, in response to local requests, and a custom error page for requests coming from other computers.
Detailed Error pages assist with debugging
Custom Error pages simply tell the outside requester, “There is a problem.” : Detailed; custom
Web Applications use a three-tiered architecture:Client Browser application,Web Server
Database Server : Database Server
All applications that you add to the Default Web Site on the server use the DefaultAppPool :DefaultAppPool
Windows Server 2008 includes a feature that implements an SMTP Server, which you can configure to handle all of the outgoing email messages sent by the system's various roles and features : SMTP Server
The Mail Exchanger (MX) DNS record is used to indicate the email server for a particular domain should be forwarded : Mail Exchanger (MX)
IMAP4
Allows you to leave a copy of your email on the serverIMAP4 uses TCP port 143 by default :IMAP4
POP3 is designed to download e-mail from an e-mail server to a client for viewing
POP3 uses TCP Port 110 : POP3
The Mail Exchanger DNS record is used to indicate the email server for a particular domain should be forwarded : Mail Exchanger (MX)
POP3 Downloads and erases the email for the email sever,IMAP4Allows you to leave a copy in the server : POP3 and IMAP4
A Smart Host is an email server that receives inbound email and simply forwards it to another email server within the organization : Smart Host
The GC is a database of all object names in the forest and aids in locating objects in the Active Directory (AD) : Global Catalog
Which of the following is not a server role available in Exchange Server 2007? :Anti-spam
Which log in the Windows Event Viewer contains Exchange-related errors and warnings? :Application
What type of mailbox allows a user in one forest to access a mailbox in another forest across a trust relationship?Linked Mailbox
IIS7, to protect its own server functions, as well as those of other Web sites and Windows Server 2008 itself, can isolate Web applications in separate address spaces called Application Pools :Application Pools
How many hub role servers should you have? : One for each AD site
You can use the TELNET command to test connectivity to SMTP, POP3, and IMAP4 : TELNET
Outlook Anywhere uses the RPC over HTTP component to connect to your Exchange servers from across the Internet : RPC over HTTP
When assigning permissions, it is best to assign them to Groups rather than individual users : Groups
You May Also Find These Documents Helpful
-
lower your attack surface, Windows 2008 Server Core would be installed on a group of your servers.…
- 235 Words
- 2 Pages
Satisfactory Essays -
Installs and removes roles, role services and features. Also displays the list of all roles, role services, and features available, and shows which are installed on this computer. For additional information about the roles, roles services, and features that you can specify using this tool, refer to the Help for Server Manager.…
- 271 Words
- 2 Pages
Satisfactory Essays -
Which of the previous tasks could be completed using Server Manager instead of other consoles?…
- 512 Words
- 3 Pages
Good Essays -
After careful consideration it was decided by the IT corporate team that in order to increase security and lower your attack surface, Windows 2008 server core would be installed on a group of your servers. However, a few roles need to be installed on the server and your senior Administrator is not familiar with installing roles on a server core machine.…
- 394 Words
- 2 Pages
Powerful Essays -
The common gateway interface (CGI) is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user. It is part of the Web's Hypertext Transfer Protocol (HTTP). A disadvantage of a CGI application (or "executable file," as it is sometimes called) is that each time it is run, it runs as a separate process with its own address space, resulting in extra instructions that have to be performed, especially if many instances of it are running on behalf of users The improper use of CGI scripts affords users a number of vulnerabilities in system security. Failure to validate user input, poorly…
- 752 Words
- 3 Pages
Satisfactory Essays -
An MMC console that provides a selection of the most commonly used windows Server 2008 management tools.…
- 842 Words
- 3 Pages
Powerful Essays -
I can understand how you concerned with your company’s security after all information on competitors can be invaluable or very harmful to a company and this is why it must be protected from prying eyes. This does not have to mean that you have to lose production over trying to secure your networks information. An easy measure like user names and passwords can be used to protect less sensitive information but how strong you make those usernames and passwords can have a significant effect on how well your information is protected. I will give you some tips on how to better secure your network with the tools that you already have at hand, keep in mind that you can also buy better security items to better protect you network things like; smart card, finger print scanners, retinal scanners, etc. but I only recommend these for really sensitive information and only for certain users in your company. On the server that is the DC log in to the administrator account and in the Active Directory Users and Computers in the Domain icon in the left pane click on the users icon, you’ll be able to see all of the users in that domain. From here you can click on any user and make changes as necessary, for user names I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “CCbattle1234@Domain*%#.Local” if someone hack the account and all that they knew the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. As for passwords I recommend that they be alpha numeric and what this means is that they should be at least eight characters long, be composed of upper and lower case letters, should contain at least one number and one special character.…
- 350 Words
- 2 Pages
Satisfactory Essays -
Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.…
- 4381 Words
- 33 Pages
Satisfactory Essays -
The authentication process is a necessity for safeguarding systems against various forms of security threats, such as password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and last but not least reply attacks just to name a few. In addition, it is imperative that authentication policies are interchangeable with the organizations in which information is being exchanged if resources are being shared between alternative organizations.…
- 1478 Words
- 5 Pages
Powerful Essays -
1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify…
- 629 Words
- 3 Pages
Satisfactory Essays -
Consider the following folder structure: A project folder has the following path: http://www.mywebsite.com/IT237MyProject. The IT237ZMyProject folder contains a page called index.html and a folder called Images. A picture named imgLake.jpg is saved in the Images folder.…
- 264 Words
- 2 Pages
Good Essays -
Internet Information Services enables you to configure websites to use specific port numbers. This makes it possible to test the functionality of Windows Firewall.…
- 970 Words
- 6 Pages
Good Essays -
Some advantages of a Windows Server 2008 Server Core installation is, greater stability, with less resources taken up versus a full server installation you have more resources for your server to manage only things you need it to manage. Simplified management, compared to a full server installation you have much less installed on your server. This makes it much easier to manage and configure. Reduction in maintenance, this means fewer hot fixes for roles/services you aren’t using so this means theirs much less to maintain. The reduction in the amount of memory and hard disk requirements, install what you need and leave out what you don’t need. You don’t want anything to take up your precious resources that you’re not even using in your server. Finally reduced attack surface, with less installed on your server there are less services to be targeted to an attack. Now for the disadvantaged are the lack of a GUI, so if an administrator is not familiar with the command environment it will make it that much harder to maintain. I see a lot of griping about it not supporting .Net Frameworks and there’s also no support for the managed code. There also seems to be limited amount of roles and features in a server core installation.…
- 930 Words
- 4 Pages
Good Essays -
11. What is the file extension of a console that is managed by the Microsoft Management Console?…
- 723 Words
- 3 Pages
Satisfactory Essays -
14 SITE MAPPING: MORE ABOUT THE ‘SITE’ OPERATOR ...................................................................................... 15 FINDING DIRECTORY LISTINGS ........................................................................................................................ 16 VERSIONING: OBTAINING THE WEB SERVER SOFTWARE / VERSION ............................................................. 17 via directory listings…
- 9461 Words
- 38 Pages
Powerful Essays