You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation?
Blog
Which networking model is based on peer-to-peer networking?
Which networking model is based on peer-to-peer networking?
Which of the following is susceptible to social engineering…
Which of the following is susceptible to social engineering exploits?
Which of the following actions should you take to reduce the…
Which of the following actions should you take to reduce the attack surface of a server?
You are working in Hyper-V Manager on a system that hosts se…
You are working in Hyper-V Manager on a system that hosts several Windows Server 2008 R2 virtual machines. You create snapshots of these virtual machines nightly as part of your disaster recovery plan. Users are complaining that they can no longer access the virtual servers. In Hyper-V Manager, they are identified as being in a Paused-Critical state. What should you do? (Select two. Each answer is a part of the overall solution.)
You have connected a print device to Srv4 and created a prin…
You have connected a print device to Srv4 and created a printer for it. You have shared the printer as Printer1 and published it to Active Directory. You assign the allow print permission for the printer to the Help Desk Technicians domain local group. However, you discover that users who are not members of the Help Desk technicians group can print to the printer. You want only members of the Help Desk Technicians group to print to Printer1. What should you do?
Sally, a member of the sales department, is borrowing a lapt…
Sally, a member of the sales department, is borrowing a laptop computer from her supervisor to do some work from home in the evenings. Sally contacts you and indicates that she cannot access the C:\Reports folder on the laptop. This folder contains documents that she needs to edit. You log on to the laptop as a domain administrator to check the folder’s access control list. You are denied access to view the permissions. You contact Sally’s supervisor to verify that Sally should receive access to the folder. Sally’s supervisor indicates that Sally should be able to read, change, and delete documents in the folder, but that only the supervisor should be able to configure permissions. You need to grant Sally appropriate permissions to the C:\Reports folder. What should you do? (Choose two. Each correct choice is part of the solution.)
You manage a company network with a single Active Directory…
You manage a company network with a single Active Directory domain running on two domain controllers. The two domain controllers are also DNS servers and hold an Active Directory-integrated copy of the zone used on the private network. The network has five subnets with DHCP servers delivering IP address and other configuration to host computers. All host computers run Windows 10. You want to ensure that all client computers use the DNS server for DNS host name resolution. Hosts should not be able to automatically discover DNS host names, even for computers on their own subnet. What should you do?
You are installing DHCP in four subnets. Three of the subnet…
You are installing DHCP in four subnets. Three of the subnets have Windows desktop computers, and the fourth subnet has only Windows laptop computers. On the subnet with the laptops, you want any computer that has not logged on in two days to release its IP address. On the desktop subnets, you want computers that have not logged on in 30 days to release their IP addresses. How should you configure the DHCP scopes?
You are the administrator of what will become a large Window…
You are the administrator of what will become a large Windows Server network using the TCP/IP protocol. Currently, the network consists of three Windows servers and 50 Windows workstations all on the same subnet. During the last meeting you had with the CIO, it was determined that company growth would mean adding workstations and printers to the existing network for a total of 235 devices. No one segment is to have more than 85 hosts. The existing hardware will be used on the network as the new devices are added. How should you assign IP addresses to the workstations on the network to minimize administration?