What is piggybacking in computer security?
ACK for the last received packet need not be sent as a new packet, but gets a free ride on the next outgoing data frame(using ACK field in the frame header). The technique is temporarily delaying outgoing ACKs, so that they can be hooked on the next outgoing data frame is called piggybacking. Piggybacking is one of the feature of TCP
When do you get an IP address assigned?
When you connect to the network is normally the time that an Internet Protocol address is created or assigned to your computer
What does active directory require and which components must be installed?
An NTFS partition with enough free space (250MB minimum)
· An Administrator's username and password
· The correct operating system version
· A NIC
· Properly configured TCP/IP (IP address, subnet mask and - optional - default gateway)
· A network connection (to a hub or to another computer via a crossover cable)
· An operational DNS server (which can be installed on the DC itself)
· A Domain name that you want to use
· The Windows 2000 or Windows Server 2003 or Windows Server 2008 CD media
What is the difference between menu bar and title bar?
A toolbar normally has icons on it and is designed for using with the mouse. A menu will have text on it, sometimes showing the icons too, and can be activated with the mouse or the keyboard. Toolbars tend to group related options together, so you have specialised toolbars moreso than specialised menus.
What is a group domain or domain group?
Domain Group Policy is an infrastructure inside of the Microsoft Windows operating systems (Windows Server 2000, 2003, and 2008, along with Vista) that allows the administrator to implement specific configurations for both computers and users. This infrastructure is what provides the centralized management and configuration for an Active Directory environment. Group Policy provides directory-based desktop-configuration management. With Group Policy, you can specify policy settings for registry-based policies, security, software installations, scripts, folder redirection, Remote Installation Services (RIS), and Internet Explorer maintenance.
Admins use Group Policy to define specific configurations for groups of users and computers by creating Group Policy settings. These settings are specified by the Group Policy Object Editor tool and contained in a Group Policy object (GPO), which is in turn linked to Active Directory containers, such as sites, domains, or OUs. Domain Group Policy is the configuration of groups and users within a domain. In this way, Group Policy settings are applied to the users and computers in those Active Directory containers. Admins can configure the users
What valid transmission is recorded to later be used to fraudulently authenticate to a server?
Identify the form of attack where a valid transmission is recorded to later be used to fraudulently authenticate to a server.
What is difference between host and server?
The terms host and end system can be used interchangeably. Both refer to the systems that sit on the "edge" of the internet and run application programs
What command should you use to query a dns server?
nslookup command is used
C:\>nslookup ?
Usage:
nslookup [-opt ...] # interactive mode using default server
nslookup [-opt ...] - server # interactive mode using 'server'
nslookup [-opt ...] host # just look up 'host' using default server
nslookup [-opt ...] host server # just look up 'host' using 'server'
What are the differences between Windows Server 2003 and Windows Server 2008 R2?
1. windows 2008 support Power shell , windows 2k3 not support powershell
2.Win2k8 has inbuilt IPV6 , win2k3 not
3. IIS 7.0 for windows 2k8 , IIS 6.0 for win2k3
4. Virtualzation support for windows 2008
What happens when your school does not have a DNS server?
A school probably doesn't need its own DNS server unless it has internal servers or printers that the students, faculty, and staff would need to access by name.
DNS converts names into IP addresses (numbers). If you set up access by IP addresses only, you're fine.
You can just your OpenDNS, Google DNS, or your ISP DNS servers for resources (websites) outside of the school.
What is the security boundary within Active Directory?
the Domain is called as the security boundary with in the active directory.
A Windows domain is a logical group of computers running versions of the Microsoft Windows operating system that share a central directory database.
domain governs the way user access resources of the network
DNS runs over UDP because the UDP does not have any delay to establish the connection, which DNS will have finer application level control for faster connection speed in comparison to TCP protocol.
Security group filtering
What are the two types of groups that can be created in a Windows active directory domain?
There are two types of groups in Active Directory: distribution groups : You can use distribution groups to create e-mail distribution lists security groups. security groups to assign permissions to shared resources like printers ,scanners ,servers etc.
Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the sub net mask and default gateway.
For any further detail, so you can visit this website:http://www.iyogibusiness.com
Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. RFCs 2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF) standard based on Bootstrap Protocol (BOOTP), a protocol with which DHCP shares many implementation details. DHCP allows hosts to obtain necessary TCP/IP configuration information from a DHCP server.
If you want to more further detail so you can visit this website:http://www.iyogibusiness.com DHCP (Dynamic Host Configuration Protocol) is a network protocol that enables a server to automatically assign an IP address to a computer.
How do you close an open dialog box?
You can close a dialog box without making changes to it by clicking the Cancel button or by clicking the Close button.
(D.)
Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. RFCs 2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF) standard based on Bootstrap Protocol (BOOTP), a protocol with which DHCP shares many implementation details. DHCP allows hosts to obtain necessary TCP/IP configuration information from a DHCP server.
If you want to more further detail so you can visit this website:http://www.iyogibusiness.com
What are the differences between file server and client server architectures?
file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files. A file server allows users to share information over a network without having to physically transfer files by floppy diskette or some other external storage device. Any computer can be configured to be a host and act as a file server. In its simplest form, a file server may be an ordinary PC that handles requests for files and sends them over the network. In a more sophisticated network, a file server might be a dedicated network-attached storage (NAS) device that also serves as a remote hard disk drive for other computers, allowing anyone on the network to store files on it as if to their own hard drive.
Client/server it is the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request. Although the client/server idea can be used by programs within a single computer, it is a more important idea in a network. In a network, the client/server model provides a convenient way to interconnect programs that are distributed efficiently across different locations. Computer transactions using the client/server model are very common. For example, to check your bank account from your computer, a client program in your computer forwards your request to a server program at the bank. That program may in turn forward the request to its own client program that sends a request to a database server at another bank computer to retrieve your account balance. The balance is returned back to the bank data client, which in turn serves it back to the client in your personal computer, which displays the information for you. Fore More information with help website :http://www.iyogibusiness.com
What are the two most popular authentication protocols?
one way authentication and mutual authentication
The Software Development Lifecycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
How many DNS root server in the world?
there are many hundreds of root DNS servers around the world . And there are 13 organisation responsible for the management of these servers . In India , there are three root servers located in Mumbai , Delhi and Chennai .
References : -
http://www.iana.org/domains/root/servers
http://www.apnic.net/community/support/root-servers
http://blog.icann.org/2007/11/there-are-not-13-root-servers/
What are the features of Windows Server 2012?
Windows 2000 had new and updated features when it was released. Features of Windows 2000 include administrative tools, accessing Internet, USB support, plug and play, multi-processing, and backup options.
Server Manager
What are the differences between Windows XP and Windows Vista and Windows Server?
Windows Vista Service Pack is being released to manufacturing on Monday 4 Feb and will start being available to customers in March, starting with Microsoft Volume Licensing customers.
Windows Server 2008 is also being released to manufacturing on the same date and will be available to new customers on March 1. Microsoft Volume Licensing customers with active Microsoft Software Assurance coverage or an Enterprise Agreement will be able to download the new Server software toward the end of February as part of the joint Microsoft SQL Server 2008 and Visual Studio 2008 Heroes Happen Here launch event
Group Policy gives you administrative control over users and computers in your network. By using Group Policy, you can define the state of a user's work environment once, and then rely on Windows Server 2003 to continually force the Group Policy settings that you apply across an entire organization or to specific groups of users and computers.
Group Policy Advantages
You can assign group policy in domains, sites and organizational units.
All users and computers get reflected by group policy settings in domain, site and organizational unit.
No one in network has rights to change the settings of Group policy; by default only administrator has full privilege to change, so it is very secure.
Policy settings can be removed and can further rewrite the changes.
Where GPO's store Group Policy Information
Group Policy objects store their Group Policy information in two locations:
Group Policy Container: The GPC is an Active Directory object that contains GPO status, version information, WMI filter information, and a list of components that have settings in the GPO. Computers can access the GPC to locate Group Policy templates, and domain controller does not have the most recent version of the GPO, replication occurs to obtain the latest version of the GPO.
Group Policy Template: The GPT is a folder hierarchy in the shared SYSVOL folder on a domain controller. When you create GPO, Windows Server 2003 creates the corresponding GPT which contains all Group Policy settings and information, including administrative templates, security, software installation, scripts, and folder redirection settings. Computers connect to the SYSVOL folder to obtain the settings.
The name of the GPT folder is the Globally Unique Identifier (GUID) of the GPO that you created. It is identical to the GUID that Active Directory uses to identify the GPO in the GPC. The path to the GPT on a domain controller is systemroot\SYSVOL\sysvol.
Managing GPOs
To avoid conflicts in replication, consider the selection of domain controller, especially because the GPO data resides in SYSVOL folder and the Active Directory. Active Directory uses two independent replication techniques to replicate GPO data among all domain controllers in the domain. If two administrator's changes can overwrite those made by other administrator, depends on the replication latency. By default the Group Policy Management console uses the PDC Emulator so that all administrators can work on the same domain controller.
WMI Filter
WMI filters is use to get the current scope of GPOs based on attributes of the user or computer. In this way, you can increase the GPOs filtering capabilities beyond the security group filtering mechanisms that were previously available.
Linking can be done with WMI filter to a GPO. When you apply a GPO to the destination computer, Active Directory evaluates the filter on the destination computer. A WMI filter has few queries that active Directory evaluates in place of WMI repository of the destination computer. If the set of queries is false, Active Directory does not apply the GPO. If set of queries are true, Active Directory applies the GPO. You write the query by using the WMI Query Language (WQL); this language is similar to querying SQL for WMI repository.
Planning a Group Policy Strategy for the Enterprise
When you plan an Active Directory structure, create a plan for GPO inheritance, administration, and deployment that provides the most efficient Group Policy management for your organization.
Also consider how you will implement Group Policy for the organization. Be sure to consider the delegation of authority, separation of administrative duties, central versus decentralized administration, and design flexibility so that your plan will provide for ease of use as well as administration.
Planning GPOs
Create GPOs in way that provides for the simplest and most manageable design -- one in which you can use inheritance and multiple links.
Guidelines for Planning GPOs
Apply GPO settings at the highest level: This way, you take advantage of Group Policy inheritance. Determine what common GPO settings for the largest container are starting with the domain and then link the GPO to this container.
Reduce the number of GPOs: You reduce the number by using multiple links instead of creating multiple identical GPOs. Try to link a GPO to the broadest container possible level to avoid creating multiple links of the same GPO at a deeper level.
Create specialized GPOs: Use these GPOs to apply unique settings when necessary. GPOs at a higher level will not apply the settings in these specialized GPOs.
Disable computer or use configuration settings: When you create a GPO to contain settings for only one of the two levels-user and computer-disable the logon and prevents accidental GPO settings from being applied to the other area.