17
Configure an Active Directory Domain Controller
Course Name and Number:
IS3230
Configure an Active Directory
Domain Controller
LAB – ASSESSMENT WORKSHEET
Student Name:
Steve Guzman
Instructor Name:
Ms. Matykowski
Lab Due Date:
Overview
In this lab, you used the Microsoft® Assessment and Planning (MAP) Toolkit to conduct an inventory of a
Windows server and analyze the results in preparation for installing the R2 upgrade. You also configured a
Windows domain controller, which controls the Active Directory. These are both critical steps in enabling the centralized control of authentication and security policies on Windows systems and form the foundation for future labs.
Lab Assessment Questions & Answers
1. Why would an administrator want to use the Microsoft® Assessment and Planning Toolkit?
It will help a system administrator collect the necessary information of different situations of inventory scenarios. With this information, an administrator can determine which systems' information can be used to deploy a certain type of network.
2. From the results of your use of the MAP Toolkit, what operating system is running on the server
scanned?
Windows Server 2008 R2 Standard
38399_LMxx_Lab01.indd 17
9/10/12 1:06 PM
18
LAB | Configure an Active Directory Domain Controller
3. From the results of your use of the MAP Toolkit, what software is running on the server scanned?
Various Citrix and Microsoft .NET Framework applications.
4. Is the machine ready to run Windows Server 2008 R2? What steps might you need to take before fully
running the server?
Other than a couple of unknown drivers or lack thereof, the machine is fully capable of running the server. 5. What tasks other than the ones performed in this exercise may administrators use the MAP Toolkit to
perform?
It can also track Performance Data, run a Consolidation Wizard, run a Private Cloud Fast Track
Wizard, and create an Azure Application Model.
6. What utility is used to transform a standalone Windows Server 2008 R2 system into an Active Directory
Domain Controller? dcpromo 7. What considerations should you take into account when choosing a domain name?
Whether that domain name has been taken into use by another domain.
38399_LMxx_Lab01.indd 18
9/10/12 1:06 PM
You May Also Find These Documents Helpful
-
8) How many total IP hosts dod you find on the server farm VLAN using the Nessus Lab #4 server farm scan?…
- 486 Words
- 3 Pages
Satisfactory Essays -
3. Which application is used for Step #2 in the hacking process to perform a vulnerability assessment scan?…
- 385 Words
- 2 Pages
Satisfactory Essays -
In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user…
- 506 Words
- 3 Pages
Satisfactory Essays -
6. Can Zenmap GUI detect which operating systems are present on IP servers and workstations? What would…
- 402 Words
- 2 Pages
Satisfactory Essays -
It was no problem at all helping you setup the US office. I am sorry to hear that you are having these problems with your new computers. What I would recommend is setting up an Active Directory. Active Directory stores information about network components. It allows clients to find objects within its namespace. The term namespace (also known as console tree) refers to the area in which a network component can be located.…
- 196 Words
- 1 Page
Satisfactory Essays -
9) The output from the command listed lines 1 and 3 from the hosts file.…
- 548 Words
- 2 Pages
Satisfactory Essays -
The only server roles discussed in this lesson that are not included with the Windows Server 2008 product are _________ and _________.…
- 489 Words
- 2 Pages
Satisfactory Essays -
9. Based on your Nmap scan results and initial reconnaissance and probing, what next steps would you perform on…
- 299 Words
- 2 Pages
Satisfactory Essays -
2. Which application is used for Step 2 in the hacking process to perform a vulnerability assessment scan?…
- 464 Words
- 2 Pages
Good Essays -
1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify…
- 629 Words
- 3 Pages
Satisfactory Essays -
4. if you ping the “windowsTarget01” VM server and the UbuntuTarget01” VM, Which Server fields in the ICMP echo / Echo-replies vary?…
- 292 Words
- 2 Pages
Satisfactory Essays -
2. What should you do if the Where do you want to install Windows? page appears, but it does not list any drives or partitions?…
- 283 Words
- 2 Pages
Satisfactory Essays -
This unit helps learners to develop, implement, monitor and review operational plans for own area of responsibility.…
- 249 Words
- 1 Page
Satisfactory Essays -
--Integrated map analysis packages: know some of the names we mentioned as most used program sets…
- 768 Words
- 4 Pages
Satisfactory Essays -
This toolkit is an overview of the different aspects involved in planning for an organisation or project. It should enable the user to make a clear distinction between strategic planning and action planning, both of which are dealt with in detail in separate toolkits. It also provides some ideas about techniques to use in planning. It should provide a fairly inexperienced planning team in any organisation with a clear picture of what planning should involve, and of how planning links to monitoring and evaluation. A further toolkit deals with monitoring and evaluation in detail. The site map will guide you around this overview of planning.…
- 15261 Words
- 62 Pages
Satisfactory Essays