What are the shared permissions?
ANSWER
In a network made up of an
Administrator and users (clients), the share folder permission allows the
granting of privileges/access to a folder/file by the network Administrator. In
this case, any user to which permission is not given will be denied access to
the folder. The following are different permissions given to a client:
o
FULL CONTROL:
Allows are user to fully control a folder and even change permissions for other
users. That is, full ownership of the folder is given to the client.
o
READ: Allows a user to only read the files, view the
folders, sub-folders and permissions, but cannot edit or change the content of
the folder.
o
WRITE: Allows the user to read attributes and even create
sub-folders and files.
o
READ AND EXECUTE: Allows a user to read and run
applications.
o
MODIFY: Users with this permission cannot read, modify or
create new files and folders but can see the folders. List content applies to
folders ONLY.
The share folder permissions no
doubt makes the network authentic.
What are the features of server?
ANSWER
They are:
o
NETWORK VIRTUALIZATION: Helps to “isolate network traffic”
on a shared infrastructure. While preserving virtual network assignments, users
can move their virtual machines.
o
LIVE MIGRATION: This feature allow users to move a running
virtual machine from one physical machine to another.
o
POWERSHELL: This allows
a command line based configuration of windows server 2008. Itis quicker than
GUI- based configuration and so is preferable.
o
WINDOWS RECOVERY ENVIRONMENT: This is a startup repair feature of windows
server which diagnose and fixes and fixes blue screen.
o
IP ADDRESS MANAGEMENT: This is a combination of DNS and
DHCP. It monitors network auditing and static & dynamic IP address
allocation for easier management of IP addresses.
o
FRICTION FREE DEPLOYMENT: This combines the installation
of roles and features in a scenario based deployment and allows the movement
between a full server and server core in windows 2008.
o
NETWORK ACCESS PROTECTION (NAP): Ensures security as it
works with DHCP to locate and isolate hosts that are virus infected.
What are DHCP roles
Dynamic
Host Configuration Protocol (DHCP) is a protocol used to dynamically/automatically
assignIP addresses to hosts on a network. It makes the work easier and simpler
as stress and the amount of time used in manually assigning IP addresses to
hosts lessens. DHCP not only assign IP addresses but also sends automatic
TCP/IP configurations settings to DHCP enabled clients on the network.
When
a client starts up TCP/IP operations, it requires for address information. DHCP
server receives the request and replies by assigning IP address for a lease
period and also sends required configurations (TCP/IP). Then the client
acknowledges it. The address assigned to the client will not be reallocated
during the lease period. Anytime the client require for address, the same
address assigned to it will be returned. Before the lease expires, the client
must request for a change of address from the DHCP sever. Before a server could
distribute IP addresses, it must be configured as DHCP.
DHCP roles are as follows:
o
OPTION CLASS: This is a way by which option types provided
to the clients is managed. It allows a specific option type to be provided to
clients for configuration.
o
OPTION TYPES: These are client configuration parameters
that a DHCP give to clients. It is configured for each scope.
o
LEASE: This is the length of time during which a client can
use IP address assigned to it by DHCP. The length of time is specified by the
DHCP.
o
SCOPE: It is the range of IP address for a network. E.g.
10.0.0.1- 10.0.0.20
o
RESERVATION: Here the DHCP creates a permanent address
reserved for special purposes. When a network Administrator configures a DHCP
server, the server stores information in a database which includes:
a)
Reserved IP address for consistent assignment of
IP addresses to clients.
b)
Valid TCP/IP configurations parameters for all
clients in a network.
c)
Valid IP addresses maintained in a pool to be
assigned to clients.
The large network support,
centralized network client configuration, IP address management, network
booting etc., beautifies DHCP.
Domain Controller and RODC.
ANSWER
a)
DOMAIN CONTROLLER (DC): Thisis a server that manages
access to a set of network resources such as printers and applications for a
group of users. It is responsible for responding to the user’s security
requests, checking permissions, verifying permissions and logging in a user
before he/she could have access to the resources. So, a user can have access to
the resources only with the use of his/ her password and username
authenticated.
Domain Controller(DC) is divided
into two different types (as roles):
o
PRIMARY DOMAIN CONTROLLER(PDC):It manages the “master user
database” for the domain.
o
BACKUP DOMAIN CONTROLLER (BDC): This stores/saves copies
of database that are periodically sent to it by the Primary Domain Controller
as a backup. It also helps in Load Balancing (LB), balancing workload if the
network is too busy. If Primary Domain Controller (PDC) fails, Backup Domain
Controller replaces it and manages master user database for domain.
The concept of domain not only
allows users have access to resources on different servers, but also allows two
or more domain to have access to each other. In this arrangement, if user logs
in to the first domain, access to resources on the other domains to which the
first domain is connected is automatically made.
b)
READ ONLY DOMAIN CONTROLLER (RODC):
This is a newly added feature of windows 2008 active directory domain services.
It is a Read Only copy of Domain Controller and also a domain controller in itself
which is placed at branch locations. RODC maintains a copy of all objects in a
particular domain and all attributes except password.
When RODC is installed at branch
locations, it acts as a forwarder of authentication requests and sometimes
authenticates the user directly if configured to do so. For RODC to
authenticate the user directly, a “Password Replication Policy” will be
configured to cache specific users that logs on to it. If a group of user is
specified in Password Replication Policy, RODC caches the user’s login and
password so that authentication will not be done by Domain Controller (DC) but
by RODC. These cannot be possible if RODC is not manually configured.
ConversionConversion EmoticonEmoticon