Premium Essay

Lab 1 Server 2012

In: Computers and Technology

Submitted By lilguy2146
Words 269
Pages 2
LAB 1 Questions
Exercise 1.1 1. Remove the File 2. Check to make sure that the drive is installed correctly in the PC and then if it still occurs you need to reformat the drive to work with the windows server.
Exercise 1.2
Roles on the Server Manager are File Services and Web Server (IIS) 3. The conditions that the upgrade option is not available during the windows server 2012 installation process is when it is a new hard drive with no previous version of windows. 4. An example of a compatibility note that will stop the upgrade process and force you to take action before restarting the installation would be when the previous version of windows installed is not able to be upgraded to windows server 2012.
Using server manager determine which roles are installed on the server and make a note of them in the space on your worksheet.
File and Storage Services and Web Server (IIS)

5. The proof that you would have that the procedure just completed has upgraded the operating system on the computer and not just performed a new, clean installation is to check to see if previous users are still available.
Exercise 1.3 6. You cannot install the Server Migration tools to the Server running Windows Server 2008 using the Add Roles and Features Wizard on your server because you must Register Windows Server Migration Tools on source computers that are running older releases of Windows Server than your destination server. That would be Windows Server 2012, Windows Server 2008 R2, Windows Server 2008, or Windows Server…...

Similar Documents

Free Essay

Lab 1

...NT1430 Linux Administration LAB 4 vi -- again On your linux server enter the following in the command line: root@servername: cd /opt root@servername: ls -la 1) Write what files exist in your directory. root@servername: touch sysinfo root@servername: ls -la 2) Write what files exist in your directory. 3) What are the permissions on the file you have just created? root@servername: chmod 755 sysinfo root@servername: ls -la 4) What are the permissions on the file you have just created? 5) What have you just done? Practical Mysystem root@servername: vi mysystem Now to enter into insert mode (edit mode) hit [i] to exit back into command mode hit [Esc] Now while you are in INSERT MODE type the following, be careful of all characters and typos. #!/bin/bash clear printf "This is information provided by mysystem.sh. Program starts now.\n" printf "Hello, $USER.\n\n" printf "Today's date is `date`, this is week `date +"%V"`.\n\n" printf "These users are currently connected:\n" w | cut -d " " -f 1 - | grep -v USER | sort -u printf "\n" printf "This is `uname -s` running on a `uname -m` processor.\n\n" printf "This is the uptime information:\n" uptime printf "\n" printf "That's all folks!\n" To end and save the file enter the following: [Esc] [:] You will exit Insert Mode and enter into Command Mode then save and exit vi: wq [Enter] Now run the script. root@servername: chmod 755 mysystem root@servername: ./mysystem Print a screen shot of the......

Words: 1450 - Pages: 6

Premium Essay

Lab 1

...Assessment Worksheet 111 LAB #7 – ASSESSMENT WORKSHEET Relate Windows Encryption and Hashing to Confidentiality and Integrity Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only. Lab Assessment Questions & Answers 1. If you and another person want to encrypt messages, should you provide that person with your public 7 Relate Windows Encryption and Hashing to Confidentiality and Integrity key, private key, or both? You should both provide each other with your public keys. 2. What does GPG allow you to do once it is installed? GPG allows you to encrypt and decrypt data and generate public and private keys. 3. Name two different types of encryption supported by GPG for your key. GPG supports symmetric ciphers DES and Blowfish as well as asymmetric ciphers ELGamal and RSA. 112 LAB #7 | Relate Windows Encryption and Hashing to Confidentiality and Integrity 4. What happens when you sign and trust a new key to your keychain? A new private and public key is created with a fingerprint for non repudiation. 5. If a user sends you his/her public key, will he/she be able to decrypt your......

Words: 472 - Pages: 2

Free Essay

Lab 1 Security and Fundamentals Lab

...Lab 1 assessment worksheet 1. Name at least five applications and tools pre-loaded on the windows 2003 server target vm Windows applications loaded start as services y/n Filezilla y Wireshark n Nessus server n Nessus client n N map zen map n Mozilla fire fox n 2. What was the dhcp allocated source ip host address for the student vm, dhcpp server and ip default gateway router? 172.30.0.10 172.30.0.11 172.30.0.1 3. did the targeted ip host respond to the icmp echo-request with an icmp echo-reply packet when you iniated the ping command at your dos prompt? If yes how many icmp echo-request packets were sent back to the ip source? Yes 12 3 host 4.If you ping the windows target 01 vm server and the Ubuntu target 01 vm server which fields in the icmp echo-request/ echo-replies vary? Ttl is 128.64 5. what is the command line syntax for running an intense scan with zen map on a target subnet of 172.30.0.0/24 N map t4 a v pe ps22,25,80 - pa21,23,80,3389, 172.30.0.0/24 6. name at least 5 different scans that may be performed from the zenmap gui and document under what circumstances you......

Words: 369 - Pages: 2

Free Essay

Lab 6 Securing a Server

...|ITCS202 Week 6 Lab Worksheet | Student Name: John Smith General Instructions: This worksheet will assist you in completing your Labs for this week and is the MS Word document referred to in the lab instructions. After you complete this worksheet, please save it as lastname_lab6.doc and submit. You are required to complete all sections indicated by red brackets. You will replace the red brackets and text with the indicated material. For example, for the “Student Name” section above, a completed response would look like this: Student Name: John Smith When responding with text, please leave the text red so that your instructor will be able to find your responses easily. When pasting an image, please replace the red text with the image. Guidelines for the Week 6 Lab Securing a Server and Securing Infrastructure Services Total Points: 35 • Students will be using a login to the Microsoft virtual labs. Assignments (Using Labs 8 and 9 of the Microsoft virtual labs): 1. Perform Lab 8 Exercise 1 (3 points). [pic] [pic] 2. Perform Lab 8 Exercise 2 (3 points). >[pic] [pic] 3. Perform Lab 8 Exercise 3 (3 points). [pic] [pic] 4. Perform Lab 8 Exercise 4 (3 points). [pic] [pic] 5. Perform Lab 9 Exercise 1 (3 point). [pic] [pic] 6. Perform Lab 9 Exercise 2 (4 point). [pic] [pic] 7. ......

Words: 343 - Pages: 2

Free Essay

It- Sql Server 2012

...Course 10774A: Querying Microsoft SQL Server 2012 Length: 5 Days Prerequisites: Before attending this course, students must have: Working knowledge of relational databases. Basic knowledge of the Microsoft Windows operating system and its core functionality. Before attending this course, students should have: Basic understanding of virtualization technology (Classroom labs utilize virtual machines) To help you prepare for this class, review the following resources: Book: T-SQL Fundamentals for Microsoft SQL Server 2012 and SQL Azure MCTS Self Paced Training Kit 70-461 About this Course This 5-day instructor led course provides students with the technical skills required to write basic Transact-SQL queries for Microsoft SQL Server 2012. This course is the foundation for all SQL Server-related disciplines; namely, Database Administration, Database Development and Business Intelligence. This course helps people prepare for exam 70-461. All the labs for this course can be performed using the provided virtual machines. However, if you have a Microsoft Windows Azure account and the classroom virtual machines connect to the internet you may be able to connect to your Windows Azure server and database from the classroom. Many of the labs in this course are enabled for you to perform the lab while connected to your own Windows Azure database in the cloud. Your instructor should be able to provide a current list of Windows Azure enabled labs. To acquire a trial Windows Azure account......

Words: 1666 - Pages: 7

Premium Essay

Database Unit 1 Lab 1

...Lab 1 1. A collection of information accessible from a computer or server 2. DBMS is a Database Management System that organizes information internally. 3. Dbms stores information, spreadsheet runs formulas 4. Product | Use | Where it was used | Cost | DB2 | Open database environment | A small single-user application to a large multi-user system. | $598 + $99 additional user | Microsoft Access | Relational databases that have tables of data. | Software developers and data architects | $199 (Amazon) | Microsoft SQL Server | primary function is to store and retrieve data as requested by other software applications | workloads ranging from small single-machine applications to large Internet-facing applications with many concurrent users | Vary (Different Prices for different purposes) | Filemaker Pro | database engine with a GUI-based interface | ??? | $329.00 | Oracle | transfer any customer info from one location to any other in the world | larger organizations and small chain stores | ??? (Couldn’t find anything) | Mysql | database for use in web applications | Personal and commercial use | $2k-$10k/year | 5. “DBMS stands for database management system whereas RDBMS stands for relational database management system; these softwares are created to maintain and utilize large scale collection of data in an efficient manner.” http://www.differencebetween.info/difference-between-dbms-and-rdbms 6. 290 7. Peng J Wu 8. Footlocker:......

Words: 447 - Pages: 2

Premium Essay

Windows Server 2012 Hyper V 3.0

...Feature Comparison Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V Contents Introduction ............................................................................... 4 More Secure Multitenancy ..................................................... 5 Flexible Infrastructure .............................................................. 9 Scale, Performance, and Density ....................................... 13 High Availability ..................................................................... 18 Processor and Memory Support ....................................... 24 Network ................................................................................... 24 Storage ..................................................................................... 25 Manageability ......................................................................... 25 Feature Comparison: Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V 2 Copyright information © 2012 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. You may modify this document for your internal, reference......

Words: 4029 - Pages: 17

Free Essay

Lab 1

...Lab 1 HIPPA IT Asset Description | Seven Domains of typical IT | Privacy Data Impact | Assessment | Critical- Major-Minor | | ASA_5505 | LAN-WAN | Authentication | Major | ASA_Instructor | LAN-WAN | Authentication | Major | ASA_Student | LAN-WAN | Authentication | Major | Cisco_2811 | WAN | Packets | Major | Workstations | Workstations | Identification | Minor | LAN Switch 1 | LAN | FTP | Minor | LAN Switch 2 | LAN | FTP | Minor | Norfolk | WAN | Packets | Critical | Tampa | WAN | Packets | Critical | Indy | WAN | Packets | Critical | Seattle | WAN | Packets | Critical | West Covina | WAN | Packets | Critical | User | User | Email | Minor | Remote Access | Remote Access | P to P Information | Major | Questions : 1. It helps identify areas of potential risks. 2. The purpose of an asset classification is to evaluate the health of the company by examining how well each of the company's type of assets is performing 3. HIPPA – identify health care patient files, protect health information for not to be expose to others without concern of the patient and the fallow the ePHI law`s 4. HIPPA website is a minor but it do not make it major because it can`t be hacked or harm, also a e-commerce we have to be very careful what we promote or what we put on place. 5. Because is private HIPPA secure the information for not to be expose 6. Updates,Firewalls make sure data is in place 7. Data strategies differ greatly from one......

Words: 369 - Pages: 2

Premium Essay

Lab 1 & Assessment Questions

...IT255 Lab 1 & Assessment Questions Starting Nmap 5.21 ( http://nmap.org ) at 2012-03-28 19:38 Eastern Standard Time Nmap scan report for 172.30.0.10 Host is up (0.0054s latency). Not shown: 92 closed ports PORT STATE SERVICE 53/tcp open domain 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 445/tcp open microsoft-ds 1025/tcp open NFS-or-IIS 1027/tcp open IIS MAC Address: 00:0C:29:99:40:7B (VMware) Skipping SYN Stealth Scan against 172.30.0.75 because Windows does not support scanning your own machine (localhost) this way. Nmap scan report for 172.30.0.75 Host is up. PORT STATE SERVICE 7/tcp unknown echo 9/tcp unknown discard 13/tcp unknown daytime 21/tcp unknown ftp 22/tcp unknown ssh 23/tcp unknown telnet 25/tcp unknown smtp 26/tcp unknown rsftp 37/tcp unknown time 53/tcp unknown domain 79/tcp unknown finger 80/tcp unknown http 81/tcp unknown hosts2-ns 88/tcp unknown kerberos-sec 106/tcp unknown pop3pw 110/tcp unknown pop3 111/tcp unknown rpcbind 113/tcp unknown auth 119/tcp unknown nntp 135/tcp unknown msrpc 139/tcp unknown netbios-ssn 143/tcp unknown imap 144/tcp unknown news 179/tcp unknown bgp 199/tcp unknown smux 389/tcp unknown ldap 427/tcp unknown svrloc 443/tcp unknown......

Words: 1062 - Pages: 5

Free Essay

Lab#1

...IS 3220July 7, 2014 Lab #1 Analyze Essential TCP/IP Networking Protocols 1. What is the purpose of the address resolution protocol (ARP)? ARP is used to mediate between Ethernet (and other broadcast link-level protocols) and the network layer, or IP protocols. Put more simply, ARP converts IP addresses to Ethernet addresses. 2. What is the purpose of the dynamic host control protocol (DHCP)? DHCP (Dynamic Host Configuration Protocol) is a communications protocol that lets network administrators centrally manage and automate the assignment of Internet Protocol (IP) addresses in an organization's network. http://searchunifiedcommunications.techtarget.com/definition/DHCP/ARP. Lab #2 Network Documentation 1. When you TELNET to LAN Switch 1 and LAN Switch 2, why is it a good idea to first PING an IP interface or port’s IP address? The ping verifies connectivity by sending ICMP echo packets to a host and listening for an echo reply. This will detect if there are any name resolution issues. 2. Why is using Telnet a security risk for an IP network infrastructure? Telnet sessions are in clear text and programs such as packet sniff can capture passwords and then use them to log into those sessions. 3. How can you mitigate the security risk caused by Telnet? Intrusion detection is a packet inspection tool that monitors, intercepts and responds to abuse in real time. ICMP inspection permits responses to ICMP packets like ping and traceroute that come......

Words: 427 - Pages: 2

Premium Essay

Microsoft Server 1 Lab 6.1

...1-23-2012 Microsoft Server 1 6.1 Lab 1.What headings are available in the right-handed pane?montor tools,data collector ,and reports 2.What is monitored by% idle time? 3.What instances are available in the instances osf slected object section? 4.What is the average value of% idle time of the w2k839 computer?95.418 5.What is the average value of processor queue length on the W2kzzcomputer? 0.700 6.What subheading are available in the system stability report selection? Software unitalls, application failure, hardware failure, windows and miscellaneous 7.Waht logs are available by default? Application,security,setup,system and forward event 8.What is most recent Event id logged to the Application log? Application,security,setup,system,forward events 9.What is the most recent Event ID logged to security log? 4634 10.What is most recent event id logged to setup log? 1610 11. What is most recent event id logged to system log? 7036 12.How many events are displayed in this custom view? 52 13.What is the keyboard shortcut to begin a network capture? F5 14.What appears in the Capture Filter pane? 15.Does anything appear in the Network Conversations pane? no 16.Does anything appear in the Network Conversations pane? All traffic,my traffic, 17.Where will WSUS downloads be stored by default? (c:/wsus) 18.What database does WSUS use by Default? MSDE 19.What types of updates does WSUS......

Words: 260 - Pages: 2

Premium Essay

Lab 1

...Laboratory #1 Lab #1: Evaluate Business World Transformation – Impact of the Internet and WWW Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify the security challenges on the web as they relate to various business models and the impact that is made in e-Commerce and Internet-based deployments * Extract various businesses’ personal identifiable information (PII) that is collected and stored from Internet users by a business in a web application * Distinguish among the different reasons for the attacks on web sites and determine exactly what the attackers are after when they target your WWW presence * Evaluate the current state of security on a LAMP server using Telnet, Skipfish and TCPdump to identify whether the proper tools are installed for a security evaluation of the server * Install and use Firefox Web Browser with the Live HTTP Headers plug-in Lab #1 – Compromised Business Application Impact Analysis Course Name & Number: ______________________________________________________________ Student Name: _______________________________________________________________________ Instructor Name: _____________________________________________________________________ Lab Due Date: _______________________________________________________________________ Overview The threats of the Internet go way beyond an attacker defacing your website. An attack can include......

Words: 849 - Pages: 4

Free Essay

Win Server 2012

...Visio VIS4 Assignment......

Words: 721 - Pages: 3

Premium Essay

Server 1

...Case Scenarios Scenario 3-1: Adding a New Site to a Network Your company is located in the United States, and it has just added a location in Canada that will need to become part of your Active Directory network. Your network designer has provided you with the following configuration information regarding the new location servers and the connections that have been procured. Three new servers will be installed in the Canada facility with the following specifications: •Server 1: 2.4-GHz processor with 2 GB RAM will be installed as a domain controller. •Server 2: 2.0-GHz processor with 1 GB RAM will be installed as a domain controller. •Server 3: 2.0-GHz processor with 2 GB RAM will be installed as an application server. Two links between the United States and Canada facilities will be available. They are as follows: •A T-1 link for the primary connection •A 256-Kbps link for a backup connection Bandwidth should be used during the day mainly for file transfers and email. Any network maintenance that requires bandwidth should be done only between 11:00 pm and 4:00 am on weekdays. Weekends are available anytime for maintenance procedures. Sketch a design that will meet the previous requirements and consider the following questions: 1.Should you configure a bridgehead server at the Canada facility? If so, which server would you recommend? 2.What will you configure the costs for on each link? 3.What should the replication schedule and interval be set for?...

Words: 255 - Pages: 2

Premium Essay

Networking Server 2012

...LAB 1 INSTALLING SERVERS THIS LAB CONTAINS THE FOLLOWING EXERCISES AND ACTIVITIES: Exercise 1.1 Exercise 1.2 Lab Challenge Performing a Clean Installation Installing Windows Server Migration Tools (WSMT) Accessing a WSMT Distribution Point Exercise 1.1 Performing a Clean Installation Overview In this exercise, you install Windows Server 2012 R2 on a new computer with no previously installed operating system. Mindset In many cases, organizations purchase servers without operating systems installed—sometimes called bare metal servers—either because they have an existing license agreement or because they intend to purchase the OS through another channel. In these cases, you perform what is known as a clean operating system installation, which is a procedure that creates a new server with its default operating system settings. Completion time 10 minutes Question1 What should you do if the drive on which you want to install Windows Server 2012 R2 already has a partition on it containing an operating system and data you do not need? Format the drive and do a clean install Question 2 What should you do if the Where do you want to install Windows? page appears, but it does not list any drives or partitions? Install device drivers for the drives Exercise 1.2 Installing Windows Server Migration Tools Overview In this exercise, you install the Windows Server Migration Tools, which enable you to migrate roles from an existing server to......

Words: 554 - Pages: 3