Question: 1 . Explain Active Directory ( Chapter 1 - 4 f ) . Active Directory ( AD ) is a proprietary directory service developed by

1. Explain Active Directory (Chapter 1-4f).
Active Directory (AD) is a proprietary directory service developed by Microsoft to manage the authentication and authorization of users and machines on a Windows domain network. Active Directory was first released in 2000 and runs on Windows Server.
2. Identify Active Directorys main purposes and features (Chapter 1-4f).
The main purpose of Active Directory is to enable administrators to manage permissions and control access to network resources. In Active Directory, data is stored as objects, which include users, groups, applications, and devices, and these objects are categorized according to their name and attributes.
3. What is the acronym, meaning short abbreviation, Microsoft Management Console referred to?(Chapter 1-4g).
The acronym that the Microsoft Management Console is referred to is MMC.
4. Explain the Microsoft Management Console (Chapter 1-4g).
A framework that provides administrators and users with an interface for management, administration and configuration of a system. It is a component of the Microsoft Windows 2000 OS and all its successors. It is also known as tools host. The MMC console can also be used for monitoring or configuring other computers on the local area network (LAN) to which the user has access.
5. Identify the Disk Management snap-in (Chapter 1-4g, Figure 1-10).
The Disk Management console, or snap-in, can be used to initialize and configure new disks; import previously configured disks; convert basic disks to dynamic disks; create, extend, and shrink disk volumes; format disk volumes; enable shadow copies; and many more disk-related tasks.
6. Identify the decisions to consider when naming a Windows 2012/R2 server (Chapter 2-1a).
Although the computer name can contain up to 63 characters, workstations and servers that are pre-Windows 2000 recognize only the first 15 characters.
It is widely considered a best practice to use only Internet standard characters in your computer name. This includes the letters AZ (uppercase and lowercase), the numbers 09, and the hyphen (-).
7. Discuss assigning an IP address to a Windows 2012/R2 server during installation, Static vs. Dynamic (Chapter 2-1a).
By default Dynamic IP is set for windows server 2012, for static IP assign one of the first or last addresses in the address range
8. Explain a clean installation (Chapter2-1b).
A clean install refers to the installation of a software package where the previous version is completely deleted. This means that all partition data will be lost, and all data must be backed up to an external device. The process is to then to do the install, reinstall all applications and copy back all data.
9. Identify the tasks you should perform immediately on the first server in a network (Chapter2-1d)
Rename the server
Join a domain
Enable Remote Desktop
Configure the servers IP settings
Configure Windows Update
Configure time zone settings
10. Explain how Windows Server 2012/R2 secures access to files using permissions (Chapter 5-2)
11. Explain the least privileges principle(Chapter 5-2)
An information security concept in which a user is given the minimum levels of access
12. Explain FAT volumes and permissions (Chapter 5-2)
13. Explain share permissions (Chapter 5-2b)
14. Identify share permissions (Chapter 5-2b)
15. Describe difference between Read, Change, Full Control share permissions (Chapter 5-2b)
16. Explain NTFS permissions (Chapter 5-2c)
17. Identify NTFS permissions (Chapter 5-2c)
18. Describe difference between NTFS permissions (Chapter 5-2c), Review Figure 5-2
19. Identify Windows Active Directory Service features (Chapter 6-1a)
20. Identify the four components of the Active Directorys Logical Structure (Chapter 6-1b)
21. Describe organizational units (Chapter 6-1b, Figure 6-1)
22. Describe Active Directory Leaf Objects (user accounts, groups, computer accounts)(Chapter 6-3d)
23. Explain considerations when creating and modifying Active Directory User Accounts (Chapter 7-2a)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!