Chapter 8 Solutions Review Questions What step can you take when you install a DCHP server to ensure that IP addresses are only assigned by a DHCP server managed by a server administrator in your company? Answer: c. Authorize the server. What is DHCPv6? Answer: Dynamic Host Configuration Protocol for IPv6 (DHCPv6) is for networks that use IPv6. Your company has Microsoft Windows Server 2008 servers functioning as DCs. The IT department is debating whether to use Microsoft DNS or a free open source version of DNS that one of the system programmers likes. What are some reasons for using Microsoft DNS? (Choose all that apply.) Answer: c. Microsoft DNS is fully compatible with Active Directory. and d. Microsoft DNS can be …show more content…
Answer: An IPv4 host record is called a host address (A) resource record and an IPv6 host record is called an IPv6 host address (AAAA) resource record. You work for a university that has about 7,800 students, faculty, and staff. In an IT managers meeting discussing the implementation of new Windows Server 2008 servers, one of the managers questions if this number of computer users is beyond the maximum that a single Windows Server 2008 DHCP server can handle. What is your response? Answer: c. This is within the capacity of a single DHCP server. You have installed a DNS server and now you want to check log information to make sure it is running properly before you release the server into live production. What tool or tools can you use to access log entries? (Choose all that apply.) Answer: b. Server Manager and c. Event Viewer Users complain that when an error occurs on your Web site confusing messages are displayed. What IIS feature enables you to address this problem? Answer: Use IIS Manager to configure error pages to display more informative messages. Hands-On Projects Tips and Solutions for Chapter 8 Activity 8-1 In this activity, students install DNS. Note that if DNS was installed earlier, such as to install Active Directory in Chapter 4, instructions are provided in a note to remove DNS so that students can install it from scratch. Activity 8-2 This activity enables students to create a
True or False: A permanent magnet is a piece of material that has been magnetized and can hold its magnetic strength for a reasonable length of time. True.
Review Questions for Mid-Term 1) What constitutional clause allows laws enacted by the federal government to take priority over conflicting state laws?
The European conquest of America began as an offshoot of the quest for a sea route to India, China, and the islands of the East Indies, the source of the silk, tea, spices, porcelain, and other luxury goods on which international trade in the early modern era centered. Profit and piety-the desire to eliminate Islamic middlemen and win control of the lucrative trade for Christian Western Europe-combined to inspire the quest for a direct route to Asia. Long before Columbus sailed, Europeans had dreamed of a land of abundance, riches, and ease beyond the western horizon. They hoped America would bring them a
active listening is about giving your full attention and watching not just what is being said but how its being said. This can be observed by watching their body language, gestures and other signals.
2. Working according to the agreed ways means following the organisation’s policy and procedures in relation to pressure areas. It also means following the individual care plans and respecting the instructions in place. For example making sure a resident is turned every two hours, applying Cavilon cream on areas; fill in turning charts, prompt fluid intake. Under the duty of care a care assistant must always be aware of and raise concerns regarding possible pressure areas. Always record information in care plans accurately and in confidentiality.
1. In the paternalistic model of doctor-patient relationship, power resident exclusively with Doctors; in the engineering model, it resides entirely with Patients.
A hierarchical system of servers and services specifically designed to translate IP addresses into domain names (forward lookups) as well as the reverse (reverse lookups) is called:
D1 – Evaluate the impact of war, conflict and terrorism on one UK Public Service
1. You recently retired from government contracting work and established a consulting company (fully consistent with government ethics laws and rules, of course) with the primary focus of advising potential government contractors and subcontractors. Mr. Johnny Jones, of The Johnny Jones Flooring and Construction Company has approached you with a question. Jones and his company are potential subcontractors (they, obviously, specialize in flooring) on a federal construction contract worth a little over two million dollars ($ 2,000,000.00) recently awarded to the Jimmy Smith Construction Company (Jimmy Smith, the prime contractor). Neither Johnny nor his company have ever been part of a government contract
Which layer of the OSI reference model handles logical addressing (IP addresses) and routing traffic?
Data will be created and used from all work stations on the network. The data will be produced by software application in a windows 7 environment on all work station and windows server 2008 on the server. Office 2010 professional (word, excel, power point, access and outlook) will also be utilized. Other data sources to be supported will be windows 7 accessories. The network cannot be accessed from outside the facility.
| a) Crash cost of A = (600-300)/(5-3) = $150; Crash Cost of B = (450-250)/(3-2) = $200; Crash Cost of C = (500-400)/(6-4) = $50; Crash Cost of D = (400-150)/(5-3) = $125 b) As per the above schedule, the activities on the
STAGE 6: Center on universal ethical principles- the person who has reached this stage bases moral judgment in the higher law of truth, justice, and morality.
The company’s servers and most of their computers were purchased over a decade ago and are creating issues with the newer properties thin clients ability to communicate with the network. ULH’s servers are located within their headquarters in California and are still operating on Windows NT 3.51. The company wants to increase the manageability and performance of the network in addition to being able to infinitely upgrade the network as growth requires. Currently, ULH is in a position where their IT network is creating a bottle neck to their growth. The network was functioning sufficiently when they just had 2 properties all operating on the same outdated operating systems, however acquisition of newer properties has created many issues with network functionality.
2. With the possibility of three business computers in his home, and all of his business records possibly vulnerable, this would be a good time to advise Bill on how to set up a routine plan to protect and defend his new network. Provide a list of the five most important concerns for safety and security of the network and the computers in the network. For each concern, specify the action to be taken, and if applicable, what software you recommend be added to the system. Justify each of your recommendations.