Page 1

CIS 332 Entire Course

For more course tutorials visit

www.tutorialrank.com Please Check the Details below of all included tutorials

CIS 332 Week 3 Assignment 1 Permissions Oversight and Overview (2 Papers) CIS 332 Week 3 Assignment 1: Permissions Oversight and Overview CIS 332 Week 4 Quiz 1 (2 Set) CIS 332 Week 6 Quiz 2 (3 Sets)

CIS 332 Week 7 Assignment 2 Virtualize? (2 Papers) CIS 332 Week 7 Assignment 2: Virtualize? CIS 332 Week 9 Quiz 3 (2 Set)

CIS 332 Lab 02 Worksheet


CIS 332 Lab 01 Worksheet CIS 332 Lab 03 Worksheet

CIS 332 Lab 4 Worksheet CIS 332 Lab 5 Worksheet CIS 332 Lab 6 Worksheet CIS 332 Lab 7 Worksheet CIS 332 Lab 8 Worksheet CIS 332 Lab 9 Worksheet CIS 332 Lab 10 Worksheet CIS 332 Lab 11 Worksheet CIS 332 Lab 12 Worksheet CIS 332 Lab 13 Worksheet CIS 332 Lab 14 Worksheet CIS 332 Lab 15 Worksheet CIS 332 Lab 16 Worksheet CIS 332 Lab 17 Worksheet CIS 332 Lab 18 Worksheet


CIS 332 Lab 19 Worksheet

CIS 332 Week 1 Discussion CIS 332 Week 2 Discussion CIS 332 Week 3 Discussion CIS 332 Week 4 Discussion CIS 332 Week 5 Discussion CIS 332 Week 6 Discussion CIS 332 Week 7 Discussion CIS 332 Week 8 Discussion

CIS 332 Week 9 Discussion CIS 332 Week 10 Discussion CIS 332 Week 11 Discussion CIS 332 Week 1 -11 Discussion

==============================================


CIS 332 Lab 01 Worksheet

For more course tutorials visit

www.tutorialrank.com Exercise 1.1 Performing a Clean Installation Exercise 1.2 Performing an Upgrade Installation Exercise 1.3 Installing Windows Server Migration Tools (WSMT) Lab Challenge Accessing a WSMT Distribution Point

==============================================

CIS 332 Lab 02 Worksheet

For more course tutorials visit

www.tutorialrank.com


Exercise 2.1 Completing Post-Installation Tasks Exercise 2.2 Adding Roles and Features Exercise 2.3 Converting the GUI Interface to Server Core Lab Challenge Using the Server Core Interface

==============================================

CIS 332 Lab 03 Worksheet

For more course tutorials visit

www.tutorialrank.com Exercise 3.1

Initializing Disks

Exercise 3.2

Creating Simple Volumes

Exercise 3.3

Creating a Storage Pool

Lab Challenge Removing Storage Components

==============================================


CIS 332 Lab 4 Worksheet

For more course tutorials visit

www.tutorialrank.com Exercise 4.1

Sharing a Folder

Exercise 4.2

Testing Share Access

Exercise 4.3

Working with NTFS Permissions

Exercise 4.4

Creating Shares with Server Manager

==============================================

CIS 332 Lab 5 Worksheet

For more course tutorials visit

www.tutorialrank.com


Exercise 5.1

Installing a Printer

Exercise 5.2

Deploying Printers Using Active Directory

Exercise 5.3

Scheduling Printer Access

Lab Challenge Creating a Printer Pool

==============================================

CIS 332 Lab 6 Worksheet

For more course tutorials visit

www.tutorialrank.com Exercise 6.1

Adding Servers to Server Manager

Exercise 6.2

Working with Remote Servers

Lab ChallengeConfiguring Windows Firewall Exercise 6.3

Using Remote Server Administration Tools


==============================================

CIS 332 Lab 7 Worksheet

For more course tutorials visit

www.tutorialrank.com Exercise 7.1

Installing the Hyper-V Role

Exercise 7.2

Creating a Virtual Machine

Lab Challenge Creating a Virtual Machine Using Windows PowerShell Exercise 7.3

Configuring Dynamic Memory

==============================================

CIS 332 Lab 8 Worksheet

For more course tutorials visit


www.tutorialrank.com Exercise 8.1

Creating a Virtual Hard Disk

Exercise 8.2

Editing a Virtual Hard Disk File

Exercise 8.3 Hard Disk

Creating a Virtual Machine with an Existing Virtual

Exercise 8.4

Creating a Pass-Through Disk

==============================================

CIS 332 Lab 9 Worksheet

For more course tutorials visit

www.tutorialrank.com Exercise 9.1

Creating a Virtual Switch

Exercise 9.2

Creating a Virtual Network

Lab Challenge Creating an Isolated Network


==============================================

CIS 332 Lab 10 Worksheet

For more course tutorials visit

www.tutorialrank.com Exercise 10.1 Calculating IP Addresses Exercise 10.2 Manually Configuring TCP/IP Lab Challenge Configuring TCP/IP Using Windows PowerShell Exercise 10.3 Testing Network Connections

==============================================

CIS 332 Lab 11 Worksheet

For more course tutorials visit


www.tutorialrank.com Exercise 11.1 Installing the DHCP Server Role Exercise 11.2 Creating a DHCPv4 Scope Exercise 11.3 Creating a DHCPv6 Scope Exercise 11.4 Activating DHCP Lab Challenge Confirming DHCP

==============================================

CIS 332 Lab 12 Worksheet

For more course tutorials visit

www.tutorialrank.com Exercise 12.1 Designing a DNS Namespace Lab Challenge Remote DNS Administration Exercise 12.2 Creating a DNS Zone


Exercise 12.3 Creating DNS Domains Exercise 12.4 Creating DNS Resource Records Lab Challenge Using Reverse Name Resolution

==============================================

CIS 332 Lab 13 Worksheet

For more course tutorials visit

www.tutorialrank.com Exercise 13.1 Installing Active Directory Domain Services Role Exercise 13.2 Creating a New Forest Exercise 13.3 Creating a Child Domain Lab Challenge Installing AD DS on Server Core

==============================================


CIS 332 Lab 14 Worksheet

For more course tutorials visit

www.tutorialrank.com Exercise 14.1 Creating Computer Objects Exercise 14.2 Creating a Single User Exercise 14.3 Using Active Directory Administrative Center Lab Challenge Creating Users with Windows PowerShell Lab Challenge Creating Multiple Users with LDIFDE

==============================================

CIS 332 Lab 15 Worksheet

For more course tutorials visit

www.tutorialrank.com


Exercise 15.1 Creating Organizational Units Exercise 15.2 Creating Domain Local Groups Exercise 15.3 Creating Global Groups Lab Challenge Nesting Groups Exercise 15.4 Delegating Administration

==============================================

CIS 332 Lab 16 Worksheet

For more course tutorials visit

www.tutorialrank.com Exercise 16.1 Installing Group Policy Management Exercise 16.2 Creating a Starter GPO


Exercise 16.3 Creating Group Policy Objects Exercise 16.4 Linking a Group Policy Object Lab Challenge Confirming GPO Application

==============================================

CIS 332 Lab 17 Worksheet

For more course tutorials visit

www.tutorialrank.com Exercise 17.1 Configuring Security Policies Lab Challenge Assigning User Rights Exercise 17.2 Configuring Audit Policies Lab Challenge Viewing Auditing Data


==============================================

CIS 332 Lab 18 Worksheet

For more course tutorials visit

www.tutorialrank.com Exercise 18.1 Configuring Software Restriction Policies Exercise 18.2 Using AppLocker Lab Challenge Creating Additional Rules

==============================================

CIS 332 Lab 19 Worksheet

For more course tutorials visit


www.tutorialrank.com Exercise 19.1 Installing Internet Information Services Exercise 19.2 Testing IIS Connectivity Exercise 19.3 Allowing Apps through the Windows Firewall Control Panel Exercise 19.4 Creating Windows Firewall Rules Lab Challenge Creating an FTP Server Rule

==============================================

CIS 332 Week 1 Discussion

For more course tutorials visit

www.tutorialrank.com 1. List and define any three (3) Windows Server 2012 features that you would install to help provide enhanced system security. Using the three (3) features you have chosen, formulate a real-world business networking scenario that demonstrates the degree to


which installing these features would increase system security and two (2) potential consequences if these features are not installed. Provide support for your rationale. Discussion Title: "Choosing the Appropriate Windows Server 2012 Edition and Windows Server 2012 Features to Install”

2. From the e-Activity, identify your chosen organization’s significant IT challenges, the Windows Server 2012 edition it chose to meet these challenges, and the most significant operational benefits it derived from this choice. Compare and contrast at least two (2) feature sets between the edition the organization chose and a different Windows Server 2012 Edition. Then determine at least two (2) advantages and two (2) disadvantages of choosing this alternate edition, given the organization’s IT needs based on its intended roles for the servers and the organization’s virtualization and licensing strategies. Justify your response.

==============================================

CIS 332 Week 1 to 11 Discussion

For more course tutorials visit


www.tutorialrank.com CIS 332 Week 1 Discussion CIS 332 Week 2 Discussion CIS 332 Week 3 Discussion CIS 332 Week 4 Discussion CIS 332 Week 5 Discussion CIS 332 Week 6 Discussion CIS 332 Week 7 Discussion CIS 332 Week 8 Discussion CIS 332 Week 9 Discussion CIS 332 Week 10 Discussion CIS 332 Week 11 Discussion ==============================================

CIS 332 Week 2 Discussion

For more course tutorials visit


www.tutorialrank.com Realizing the Benefits of Using Windows Server 2012 Disk Storage Technologies and Avoiding Resource Sharing Issues When Permissions Overlap " Please respond to the following: 

Give examples of at least two (2) limitations of using standard workstation hard disks in a server environment. Examine at least two (2) specific Windows Server 2012 disk storage technologies for their capability to overcome these deficits. Provide support for your response.



From the e-Activity, compose an alternate share permission scenario similar to the one in the article by using an example where NTFS and share permissions overlap causing sharing issues. Provide an example of a strategy that helps solve the sharing issues outlined in your scenario.

==============================================

CIS 332 Week 3 Assignment 1 Permissions Oversight and Overview (2 Papers)

For more course tutorials visit


www.tutorialrank.com This Tutorial contains 2 Papers

Assignment 1: Permissions Oversight and Overview Due Week 3 and worth 150 points Suppose you were contracted by a local medium-sized business to speak with its business unit leaders about the importance of resource permissions in organizations. In your first moments on the job, you learn from a senior-level employee that the company just experienced a data theft incident at the hands of an employee, primarily due to the lack of permissions and resource segregation in the company. You later learn that there are multiple file servers on the network on which full control permissions are applied for the domain “Everyone� group. Write a two to three (2-3) page paper in which you: 1. Explain the basic need for and concepts of file / folder permissions and business unit resource segregation in organizations so the company leaders will understand the importance of each. 2. Specify the strategy you would utilize for leveraging the business unit leaders to gain the necessary buy-in to implement your plan for resource and data segregation in the company.


3. Justify the use of NTFS permissions for the folders / files on the network and explain the top two to three (2-3) reasons this is the most reliable option at the business unit leaders’ disposal. 4. Prepare a plan for utilizing Active Directory and Group Policy Objects to achieve the goals of setting secure permissions on business unit resources. 5. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements: 

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are: 

Explain the various types of servers and services required within organizations.

Describe the need for and benefits of hardware and software integration in a server environment.


Demonstrate the ability to prepare, install, configure, maintain, and update a computer system for use as a server.

Demonstrate the ability to configure networking, file, remote management, and print services.

Describe the major functional challenges and configuration solutions associated with data storage.

Describe and configure secure systems, networks, and computing applications.

Analyze the creation, configuration, and maintenance of virtual servers, storage, and networks.

Use technology and information resources to research issues in server environments.

Write clearly and concisely about server administration topics using proper writing mechanics and technical style conventions.

==============================================

CIS 332 Week 3 Discussion

For more course tutorials visit

www.tutorialrank.com


"Solving Windows Server 2012 Printing Problems and Understanding Windows Server 2012 Network Security Implications" Please respond to the following: From the e-Activity, devise a scenario where a user in a business environment is unable to print a document to a printer connected to a Windows Server 2012 print server. Determine at least two (2) troubleshooting steps an IT support technician should follow to find a solution to a general network printing issue. Support your response with the main reasons each step would or would not be responsible for directly correcting the issue.

Examine at least two (2) Windows Server 2012 remote management tools by relating them to at least one (1) specific network security issue. Specify at least two (2) advantages and two (2) disadvantages of using each to minimize the security issue(s). Provide support for your rationale. ==============================================

CIS 332 Week 4 Discussion

For more course tutorials visit

www.tutorialrank.com


"Type I and Type II Virtualization Choices and Differentiating Between Virtual Disk Formats and Applicable Environments" Please respond to the following: Compare and contrast at least two (2) similarities and two (2) differences between Type I and Type II virtualizations. Using your comparison, choose either a Type I or Type II virtualization and determine a specific networking scenario in which your virtualization choice would be more viable than using the other. Provide an explanation to support your rationale. From the e-Activity and the textbook, give an example of a business scenario for which a dynamic disk image Type would be most appropriate. Determine one (1) advantage and one (1) disadvantage of using a dynamic image Type and one (1) advantage and one (1) disadvantage to using a fixed hard disk image Type. Then, give an example of a business networking scenario for which a differencing hard disk image Type would be best. Provide justifications to support your rationale. Dynamic Disk Scenario. ==============================================

CIS 332 Week 4 Quiz 1 (2 Set)

For more course tutorials visit

www.tutorialrank.com


CIS 332 Week 4 Quiz 1 (2 Set)

• Question 1 The Windows Server 2012 edition available through the Microsoft volume-licensing program and from original equipment manufacturers (OEMs), but not retail is _________:

• Question 2 What factor is not important for choosing the best Windows Server 2012 edition for your environment?

• Question 3 should ______ .

Before you perform any upgrade procedure, you

• Question 4 The Windows Server 2012 edition which is designed for servers with up to 64 processors is _____:

Question 5

What are the Windows Server Migration Tools?

• Question 6 You need to add a role to a VM in an offline state. How do you proceed?


• Question 7 You want to add a role to several Windows Server 2012 systems on the network. Which of the following is correct?

• Question 8 Services?

What was the former name of Remote Desktop

• Question 9 What is the command-line tool for renaming a computer and what is the command? Choose the proper syntax.

• Question 10 To extend or shrink a volume, of which built-in groups must you be a member?

• Question 11 After you create a new VHD, it appears as a _________ in the Disk Management snap-in and in Server Manager.

• Question 12 What is the preferred graphical tool in Windows Server 2012 with which you can manage storage pools and create virtual disks?

• Question 13 Windows Server 2012 includes a new disk virtualization technology called ______, which enables a server to concatenate storage space from individual physical disks.


• Question 14 Users generally do not understand the concept of network drive sharing. They only know they can store their files "on my F: drive" and are unaware that someone else's F: drive might point to a different folder. What do we call this concept of having a drive letter associated to a user's network folder?

• Question 15 Knowing how permissions can be cumulative or override each other is an important factor in understanding what?

• Question 16 What is the Windows Server 2012 feature that enables you to maintain previous versions of files on a server, so that if users accidentally delete or overwrite a file, they can access a copy?

• Question 17 The company's Board of Directors would like you to create private folders, which users should not know exist. While you are creating the new network share for their folders, which New Share option should you choose to prevent users from seeing the folders?

• Question 18 When managing printers, what is a method of giving certain users in your organization priority access to a print device? How to assure their print jobs are handled above others?


• Question 19 You have an executive who needs her print jobs handled above those of others. How would you accomplish this advanced printing configuration?

• Question 20 Your environment includes many users who print documents often. A single print device isn't sufficient. You need a "printer pool" to accommodate all the concurrent print jobs. How would you accomplish this advanced printing configuration?

• Question 21 The hardware that actually produces your hardcopy documents is called a _______.

• Question 22 Your company environment is very large, including several Windows Firewalls. How can you remotely configure the firewall on several servers at once?

• Question 23 Considering PowerShell Web Access Gateway is on the network perimeter, administrators should ensure ______.

• Question 24 For enterprise networks administrators, it might be necessary to add several servers to Server Manager. To avoid


working with a long scrolling list of servers, you can create ________, based on an organizational paradigm.

• Question 25 Rather than using a Windows Server 2012 server, how does Microsoft recommend you remotely manage Windows servers?

Set 2

• Question 1 should ______ .

Before you perform any upgrade procedure, you

• Question 2 What factor is not important for choosing the best Windows Server 2012 edition for your environment?


• Question 3 The Windows Server 2012 edition which is designed for servers with up to 64 processors is _____:

• Question 4 The Server Core installation option in Windows Server 2012 effectively removes _______:

• Question 5 Tools?

What are the Windows Server Migration

• Question 6 You need to add a role to a VM in an offline state. How do you proceed?

• Question 7 At the end of installing a role using Server Manager, you can export the configuration settings to a script file. Then, using PowerShell, you use the script to install roles and features on another Windows Server 2012. What is the PowerShell cmdlet for executing this script?


• Question 8 What is the command-line tool for renaming a computer and what is the command? Choose the proper syntax.

• Question 9 After initially configuring a new server, you can fully manage it without needing to be present at its console. What tool allows this?

• Question 10 What was the partition style(s) prior Windows Server 2008 and Windows Vista?

• Question 11 To extend or shrink a volume, of which built-in groups must you be a member?

• Question 12 Server 2012?

What is the new file system available in Windows

• Question 13 Windows Server 2012 includes a new disk virtualization technology called ______, which enables a server to


concatenate storage space from individual physical disks.

• Question 14 What is the primary tool in Windows Server 2012 to take control of the shares on all your disks on all your servers and exercise granular control over their properties?

• Question 15 Knowing how permissions can be cumulative or override each other is an important factor in understanding what?

• Question 16 What is the Windows Server 2012 feature that enables you to maintain previous versions of files on a server, so that if users accidentally delete or overwrite a file, they can access a copy?

• Question 17 Users generally do not understand the concept of network drive sharing. They only know they can store their files "on my F: drive" and are unaware that someone else's F: drive might point to a different folder. What do we call this concept of having a drive letter associated to a user's network folder?


• Question 18 The hardware that actually produces your hardcopy documents is called a _______.

• Question 19 You have an executive who needs her print jobs handled above those of others. How would you accomplish this advanced printing configuration?

• Question 20 In Windows, a ______ is the software interface through which a computer communicates with a print device.

• Question 21 What basic printer permission do you grant a user to be able to pause, resume, restart and cancel their own print jobs, as well as the print jobs of others?


• Question 22 Your company environment is very large, including several Windows Firewalls. How can you remotely configure the firewall on several servers at once?

• Question 23 Considering PowerShell Web Access Gateway is on the network perimeter, administrators should ensure ______.

• Question 24 _______.

PowerShell Web Access Gateway allows

• Question 25 Rather than using a Windows Server 2012 server, how does Microsoft recommend you remotely manage Windows servers?

==============================================

CIS 332 Week 5 Discussion


For more course tutorials visit

www.tutorialrank.com "Benefits of Hyper-V" Please respond to the following: Imagine you are a network administrator and you are proposing the implementation of Windows Server 2012 with Hyper-V to replace the existing VMware vSphere infrastructure utilized by the organization. Examine at least two (2) characteristics of Hyper-V that you would consider highlighting in order to convince the business decision makers and entice them to approve the proposed change. Specify the key reasons why you believe these characteristics are important in making your case to achieve the approval needed.

Explain what you believe are the top three (3) improvements and / or enhancements to Hyper-V in Windows Server 2012 from its Server 2008 predecessor and indicate the key reasons why you feel these improvements and / or enhancements can benefit organizations by realizing the full potential of Hyper-V. ==============================================

CIS 332 Week 6 Discussion


For more course tutorials visit

www.tutorialrank.com "Ensuring Consistent Availability of DHCP and Internal Domain Creation Best Practices" Please respond to the following: Provide one (1) example of a business networking scenario that would demand consistent availability of the DHCP service. From the textbook, choose at least two (2) of the overall objectives Microsoft used when designing DHCP and demonstrate the extent to which each contributes to the need for consistent DHCP availability in your scenario. Next, provide one (1) example of a business networking scenario where DHCP availability would not be as critical by contrasting it to one (1) of the objectives Microsoft used when designing DHCP. Examine at least two (2) best practices you should follow when creating internal domains. Provide one (1) example for each to demonstrate the degree to which each practice can help increase network efficiency and help cut costs for an organization.

==============================================

CIS 332 Week 6 Quiz 2 (3 Sets)

For more course tutorials visit


www.tutorialrank.com CIS 332 Week 6 Quiz 2 (3 Sets)

Question 1 Using Resource Metering, you are documenting the network traffic and memory usage of all virtual machines on a physical server. What is Resource Metering's statistics associated with?

Question 2 In Windows Server 2012, the hypervisor ________ the host operating system.

Question 3 Using the Standard edition of Windows Server 2012, I need to create 5 virtual machines. On how many can I install Windows Server 2012?

Question 4

What is Resource Metering?

Question 5 Server virtualization in Windows Server 2012 is based on a module called the _________.


Question 6 In some cases, certain Hyper-V guest operating system features do not function properly using the OS’s own device drivers. What Hyper-V software package can help remedy compatibility issues?

Question 7 Heartbeat, time synchronization, and data exchange between parent and child partitions are all examples of functions provided by ________

Question 8 When creating a new virtual hard disk, what feature does Windows PowerShell offer that the graphical interface does not?

Question 9 As of Windows Server 2012, what virtual image file provides for the largest size?

Question 10 Virtual SANs allow you to _______.


Question 11 Regarding the benefits of a SAN, what happens during a serverless backup?

Question 12 When creating a snapshot file using Hyper-V Manager, what is the file format and where is it stored?

Question 13 When choosing between disk types in the New Virtual Hard Disk Wizard, what type permits an image size up to 2 TB?

Question 14 How many MAC addresses are available for virtual network adapters, created by Hyper-V?

Question 15 Creating a new virtual switch automatically connects the host operating system with the child partition VMs by default. What setting can be changed during virtual switch creation to disconnect the host OS?


Question 16 What is the difference between an external virtual switch and an internal virtual switch?

Question 17 A _______, like its physical counterpart, is a device that functions at layer 2 of the Open Systems Interconnect (OSI) reference model.

Question 18 How many virtual network adapters can be created on a Hyper-V server?

Question 19 How does an administrator set up a new virtual network adapter to communicate on a network VLAN?

Question 20 Given the IPv6 address: 21cd:001b:0000:0000/8, what does the "/8" at the end signify?

Question 21 What is the technology intended to help transition IPv4 networks to IPv6, by expressing IPv4 addresses in IPv6 format?


Question 22 What is a Network-layer routing technology that enables a group of workstations to share a single registered address?

Question 23 What is the primary benefit of the IPv6 address space over the IPv4 address space?

Question 24 Rather than manually assign IPv6 addresses to computers, how can administrators ensure each Windows computer receives a linklocal unicast address upon starting?

Question 25 As defined by the original Internet Protocol standard, what are the three classes of IP addresses used for networks, and what differentiates them?

• Question 1 Using Resource Metering, you are documenting the network traffic and memory usage of all virtual machines on a physical server. What is Resource Metering's statistics associated with?

•

Question 2

What is Resource Metering?


• Question 3 What roles does Microsoft recommend can share the same server as the Hyper-V role?

• Question 4 When the Hyper-V role is added to a Windows Server 2012 server, the hypervisor creates the individual environments, each of which has its own operating system installed and accesses the computer’s hardware via the hypervisor. What are those individual environments called?

• Question 5 What is the primary graphical tool for creating and managing virtual machines?

• Question 6 In Windows Server 2012, the hypervisor ________ the host operating system.

• Question 7 Heartbeat, time synchronization, and data exchange between parent and child partitions are all examples of functions provided by ________

• Question 8 When creating a snapshot file using Hyper-V Manager, what is the file format and where is it stored?

• Question 9 What Server Manager tool allows you to create a new virtual hard disk?


Question 10

Do VMs ever directly access a physical hard disk?

• Question 11 As of Windows Server 2012, what virtual image file provides for the largest size?

• Question 12 disk?

What tool can you use to modify a virtual hard

• Question 13 When choosing between disk types in the New Virtual Hard Disk Wizard, what type permits an image size up to 2 TB?

• Question 14 How many MAC addresses are available for virtual network adapters, created by Hyper-V?

• Question 15 How does an administrator set up a new virtual network adapter to communicate on a network VLAN?

• Question 16 What is the difference between an external virtual switch and an internal virtual switch?


• Question 17 A _______, like its physical counterpart, is a device that functions at layer 2 of the Open Systems Interconnect (OSI) reference model.

• Question 18 How many virtual network adapters can be created on a Hyper-V server?

• Question 19 What is the difference between a private virtual switch and an internal virtual switch?

• Question 20 Given the IPv6 address: 21cd:001b:0000:0000/8, what does the "/8" at the end signify?

• Question 21 What is a tunneling protocol that emulates an IPv6 link using an IPv4 network, primarily for Windows workstation operating systems?

• Question 22 As defined by the original Internet Protocol standard, what are the three classes of IP addresses used for networks, and what differentiates them?

• Question 23 Rather than manually assign IPv6 addresses to computers, how can administrators ensure each Windows computer receives a link-local unicast address upon starting?


• Question 24 What is the technology intended to help transition IPv4 networks to IPv6, by expressing IPv4 addresses in IPv6 format?

Week 6 Quiz 2

• Question 1 What roles does Microsoft recommend can share the same server as the Hyper-V role?

• Question 2 In some cases, certain Hyper-V guest operating system features do not function properly using the OS’s own device drivers. What Hyper-V software package can help remedy compatibility issues?

• Question 3 Using Resource Metering, you are documenting the network traffic and memory usage of all virtual machines on a physical server. What is Resource Metering's statistics associated with?


• Question 4 In Windows Server 2012, the hypervisor ________ the host operating system.

• Question 5 What is the least expensive way an administrator can experiment with Hyper-V and virtualization?

• Question 6 When the Hyper-V role is added to a Windows Server 2012 server, the hypervisor creates the individual environments, each of which has its own operating system installed and accesses the computer’s hardware via the hypervisor. What are those individual environments called?

• Question 7 Server virtualization in Windows Server 2012 is based on a module called the _________.

• Question 8 What Server Manager tool allows you to create a new virtual hard disk?

• Question 9 disk?

What tool can you use to modify a virtual hard

• Question 10 When creating a snapshot file using Hyper-V Manager, what is the file format and where is it stored?


• Question 11 administrators?

What does a differencing disk offer

• Question 12 As of Windows Server 2012, what virtual image file provides for the largest size?

Question 13

Do VMs ever directly access a physical hard disk?

• Question 14 How does an administrator set up a new virtual network adapter to communicate on a network VLAN?

• Question 15 How many virtual network adapters can be created on a Hyper-V server?

• Question 16 Creating a new virtual switch automatically connects the host operating system with the child partition VMs by default. What setting can be changed during virtual switch creation to disconnect the host OS?

• Question 17 How many MAC addresses are available for virtual network adapters, created by Hyper-V?


• Question 18 Every network adapter has a hardware address. What is the common name for it and how long is it?

• Question 19 What is the difference between a private virtual switch and an internal virtual switch?

• Question 20 What is a Network-layer routing technology that enables a group of workstations to share a single registered address?

• Question 21 What is the technology intended to help transition IPv4 networks to IPv6, by expressing IPv4 addresses in IPv6 format?

• Question 22 In general terms, there are three ways a computer receives an IPv4 or IPv6 address. Which of the following is NOT one of them?

Question 23

What is an example of a valid IPv4 address?

• Question 24 Given the IPv6 address: 21cd:001b:0000:0000/8, what does the "/8" at the end signify?


• Question 25 Rather than manually assign IPv6 addresses to computers, how can administrators ensure each Windows computer receives a link-local unicast address upon starting?

==============================================

CIS 332 Week 7 Assignment 2 Virtualize (2 Papers)

For more course tutorials visit

www.tutorialrank.com This Tutorial contains 2 Papers

Assignment 2: Virtualize? Due Week 7 and worth 150 points

Imagine you are a senior systems administrator who has been tasked with considering whether or not to implement server virtualization into


your organization’s computing operations of multiple sites with a server count of more than 400.

Write a two to three (2-3) page paper in which you: 1. Specify the most significant advantages and disadvantages that could be realized by the organization in adopting a server virtualization infrastructure. 2. Prepare a plan for implementing Hyper-V (or an alternate solution, such as VMware) as a solution for your organization. Provide a rationale for the plan decisions. 3. Determine the strategy you would use to explain the concepts of server virtualization to senior management so that they understand the concepts and can form an opinion on the solution. Provide a rationale for using your chosen strategy. 4. Based on your plan for implementation and the specifics of the organization of which you are aware, determine whether or not you should move forward with the implementation of a virtual infrastructure. Justify your response. 5. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements: 

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must


follow APA or school-specific format. Check with your professor for any additional instructions. 

Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are: 

Demonstrate the ability to prepare, install, configure, maintain, and update a computer system for use as a server.

Describe and configure secure systems, networks, and computing applications.

Analyze the creation, configuration, and maintenance of virtual servers, storage, and networks.

Develop a server migration plan to address and solve a proposed business problem.

Demonstrate the ability to configure and deploy Active Directory, DNS, and DHCP services.

Use technology and information resources to research issues in server environments.

Write clearly and concisely about server administration topics using proper writing mechanics and technical style conventions.


==============================================

CIS 332 Week 7 Discussion

For more course tutorials visit

www.tutorialrank.com From the e-Activity, recommend two (2) new features of Windows Server 2012 Active Directory that you believe to be most beneficial to users from a network security standpoint. Provide one (1) example for each feature that demonstrates a security problem that could occur if a user does not implement that feature.

From the e-Activity, compare and contrast two (2) improved features of Windows Server 2012 Active Directory to the previous version of each feature. Examine your chosen features with a focus on the ability of each improved version to increase network efficiency and / or cost effectiveness compared to their previous versions. Provide support for your response.

==============================================


CIS 332 Week 8 Discussion

For more course tutorials visit

www.tutorialrank.com "Choosing the Best Active Directory User Creation Tool and Organizational Unit Design Best Practices" Please respond to the following: 

Determine at least two (2) Windows Server 2012 Active Directory user creation scenarios and specify one (1) Active Directory user object creation tool that you believe is the most efficient for each scenario. Include the main reasons why you believe each tool is the most efficient one to use for your specified scenarios based on the time it takes to create users and the complexity of using the tool.



From the e-Activity, choose the two (2) best practices you consider to be the most important when designing Organizational Units (OUs). Provide one (1) specific network configuration example for each best practice that demonstrates the application of the best practice. Provide justification as to why each best practice should be followed.

==============================================


CIS 332 Week 9 Discussion

For more course tutorials visit

www.tutorialrank.com Bolstering Network Security by Using Group Policy and Configuring GPO Security Settings” Please respond to the following: 

Determine one (1) situation that can cause a breach of network security. Provide two (2) examples to demonstrate the manner in which GPOs can be used to bolster network security to prevent the situation from occurring.

Choose at least two (2) Computer Configuration node security settings and, for each, specify a scenario whereby configuring the setting would provide security benefits. In each of your scenario descriptions, compare a pre-security configuration scenario with a post-security configuration scenario to demonstrate the potential security improvements.

==============================================

CIS 332 Week 9 Quiz 3 (2 Set)


For more course tutorials visit

www.tutorialrank.com CIS 332 Week 9 Quiz 3 (2 Set)

• Question 1 How far into the lease period does a DHCP client begin requesting renewal of the IP address?

• Question 2 During DHCP lease negotiation, what happens if the client requests an IP address from the server but the server has already assigned the offered IP address?

• Question 3 How do DHCP servers respond to a DHCPDISCOVER message?

• Question 4 What service does Dynamic Host Configuration Protocol (DHCP) provide?


• Question 5 How are DHCP settings labeled in a Windows computer's network interface?

• Question 6 What do you call the source responsible for maintaining a domain’s resource records?

• Question 7 You registered the domain name contoso.com. The FQDNs seattle.contoso.com and halifax.contoso.com are examples of different _____.

• Question 8 top-level domains?

Who is responsible for the ratification of new

• Question 9 What is the character limit on individual domain names, and the limit on the Fully Qualified Domain Names (FQDNs)?

• Question 10 The domain name part of a DNS name is _______ and consists of two or more words, separated by ______.

• Question 11 What defines what objects exist as well as what attributes are associated with any object in the Active Directory?


Question 12

What is the global catalog?

• Question 13 What is the process of granting the user access only to the resources he or she is permitted to use?

• Question 14 Active Directory keeps a naming convention for the domain that mirrors ______.

• Question 15 What is the next level of Active Directory container object within a domain?

• Question 16 Can a domain user, who does not possess explicit object creation permissions, create computer objects?

• Question 17 What are the two built-in user accounts are created on a computer running Windows Server 2012?

Question 18

How does CSVDE.exe differ from LDIFDE.exe?


• Question 19 What user creation tool was redesigned in Windows Server 2012 to incorporate new features such as the Active Directory Recycle Bin and fine-grained password policies?

• Question 20 Template?

When would administrators choose to use a User

• Question 21 Of the default groups created when Active Directory is installed, what are the types of those groups?

Question 22

Which of the following is NOT a group scope?

• Question 23 In Windows Server 2012, after a user logs on to Active Directory, a(an) ________ is created that identifies the user and all the user's group memberships.

• Question 24 special identity?

Which of the following is NOT an example of a


• Question 25 The Delegation of Control Wizard is capable of ________ permissions.

Set 2

• Question 1 How far into the lease period does a DHCP client begin requesting renewal of the IP address?

• Question 2 DHCP standards define multiple methods to allocate IP addresses. What are they?

• Question 3 How are DHCP settings labeled in a Windows computer's network interface?


• Question 4 During DHCP lease negotiation, what happens if the client requests an IP address from the server but the server has already assigned the offered IP address?

• Question 5 What service does Dynamic Host Configuration Protocol (DHCP) provide?

• Question 6 The domain name part of a DNS name is _______ and consists of two or more words, separated by ______.

• Question 7 You registered the domain name contoso.com. The FQDNs seattle.contoso.com and halifax.contoso.com are examples of different _____.

• Question 8 hierarchy called?

What are the servers at the top of the DNS

• Question 9 What is the character limit on individual domain names, and the limit on the Fully Qualified Domain Names (FQDNs)?

• Question 10 What do you call the source responsible for maintaining a domain’s resource records?


Question 11

• Question 12 Directory objects?

What is the global catalog?

What are the two basic classes of Active

• Question 13 What allows administrators to grant users in one domain access to resources of another domain within the same domain tree?

• Question 14 What is the process of granting the user access only to the resources he or she is permitted to use?

• Question 15 Active Directory keeps a naming convention for the domain that mirrors ______.

• Question 16 What are the two types of user accounts in Windows Server 2012?

Question 17

How does CSVDE.exe differ from LDIFDE.exe?


• Question 18 What user creation tool was redesigned in Windows Server 2012 to incorporate new features such as the Active Directory Recycle Bin and fine-grained password policies?

• Question 19 user objects?

What is the PowerShell cmdlet used to create

• Question 20 What are the two built-in user accounts are created on a computer running Windows Server 2012?

• Question 21 universal group?

Which of the following default groups is a

• Question 22 Within a domain, the primary hierarchical building block is the _________.

• Question 23 What is the only OU created by default after installing Active Directory?

• Question 24 Of the default groups created when Active Directory is installed, what are the types of those groups?


• Question 25 special identity?

Which of the following is NOT an example of a

==============================================

CIS 332 Week 10 Discussion

For more course tutorials visit

www.tutorialrank.com "Windows Firewall" Please respond to the following: From the e-Activity, take a position that the benefits of using the built-in Windows Firewall are or are not superior to those offered by third-party software products that boast similar features and integration with the Windows Server 2012 operating system. Provide justification for your response. Describe, in your own words, the two (2) features of the Windows Firewall in Windows Server 2012 that you believe are most useful to users. Provide one (1) specific example for each feature to demonstrate the manner in which each can work towards the goal of greater security on the server, the network, and in the organization as a whole.


==============================================

CIS 332 Week 11 Discussion

For more course tutorials visit

www.tutorialrank.com "Transfer It" Please respond to the following: Discuss two (2) ways you plan to apply what you learned in this course in your current or future position.

Describe the most important piece of knowledge that you gained during this course.

==============================================

Profile for b.r.o.a.dhurstcartwright348987

CIS 332 Enhance teaching - tutorialrank.com  

For more course tutorials visit www.tutorialrank.com Please Check the Details below of all included tutorials CIS 332 Week 3 Assignment 1...

CIS 332 Enhance teaching - tutorialrank.com  

For more course tutorials visit www.tutorialrank.com Please Check the Details below of all included tutorials CIS 332 Week 3 Assignment 1...

Advertisement