Question

In: Computer Science

Try to make it as simple as you can. Please provide the answers with some examples...

Try to make it as simple as you can. Please provide the answers with some examples as fast as you can.

6-What are the potential disadvantages of using a dynamic and static IP Address?

7-Explain the functionality of a global catalog in the Windows networking.

8-Explain the following terms: TCP/IP protocol, and what are two command-line utilities that can be used to check TCP/IP configuration and IP connectivity, respectively?

9-Explain: Which Windows Server utility provides a common interface for tools and utilities and provides access to server roles, services, and monitoring and drive utilities? and which server utility provides information about PowerShell command history?

10- What are Active Directory sites?

Solutions

Expert Solution

6. Disadvantages of static IP Address

The Static IP address is assigned to a partilcular host for a particuar network session . So there needs to be a maintainence of Routing Table at the BOOTP server for every Host in the network.

Also if any of the host becomes inactive for long the Static address assigned to it cannot be reused.

Disadvantages of dynamic IP Address

The dynamic IP address requires more computational tasks because there is a certain lifetime of the IP address assigned to the host and the host has to again request to keep that IP address once the lifetime is over. Overhead for the DHCP server is low but more computing is required.

7.The Global catalog performs two main tasks

The first is providing data that permits network logon and secondly it makes the searching of objects easy without the use of domain name. It is maintained by AD DS replication system.

8.TCP/IP protocols are the network protocols that perform crucial tasks among connection establishement,data transfer,connection termination,packet transfer,error control,congestion control,retransmission in computer network.

The CommandLine Utility to check configuration of TCP/IP is ipconfig which displays information such as IPv4 address,IPv6 address ,the default gateway meaning router to which you are connected.

ping is the command line argument used to check self connectivity or connectivity to another host.If it shows a valid TTL(Time to live) value then it means the device NIC is working correctly and the network is established .

9. Windows Server utility that provides a common interface for tools and utilities and provides access to server roles, services, and monitoring and drive utilities is the Server Manager. It helps us to manage both local and remote server in the windows server utility.

The server utility to get the PowerShell command history is Get-History .One can also use up-down key to see previous commands.

10.The Active Directory Sites are formed by the group of different subnets within a network forming a LAN or connected through a bus.For example A company has two departments within itself and the network is divided into two subnets so the LAN that connects both subnets(i.e the company LAN) consists of computers from both subnets.Their set is called Active Directory Site.


Related Solutions

Try to make it as simple as you can. Please provide the answers with some examples...
Try to make it as simple as you can. Please provide the answers with some examples as fast as you can. 11-Which of the following do all domains in the same forest have in common? (Choose all that apply.) a) The same domain name    b) The same schema c) The same user accounts    d) The same global catalog   12-Which of the following is a valid reason for using multiple forests? a) Centralized management     b) Need for different schemas c) Easy...
Try to make it as simple as you can. Please provide the answers with some examples...
Try to make it as simple as you can. Please provide the answers with some examples as fast as you can. 11-Which of the following do all domains in the same forest have in common? (Choose all that apply.) a) The same domain name    b) The same schema c) The same user accounts    d) The same global catalog   12-Which of the following is a valid reason for using multiple forests? a) Centralized management     b) Need for different schemas c) Easy...
Try to make it as simple as you can. Please provide the answers with some examples...
Try to make it as simple as you can. Please provide the answers with some examples as fast as you can. 11-Which of the following do all domains in the same forest have in common? (Choose all that apply.) a) The same domain name    b) The same schema c) The same user accounts    d) The same global catalog   12-Which of the following is a valid reason for using multiple forests? a) Centralized management     b) Need for different schemas c) Easy...
Try to make it as simple as you can. Please provide the answers with some examples...
Try to make it as simple as you can. Please provide the answers with some examples as fast as you can. 1-The technology that make up the core functionality of Windows Server 2012 include Active Directory, the Microsoft Server Manager, DHCP and IIS. Explain, in your own words, the nature and function of these technologies. Answer: 2-Windows Server Core is a new installation option in Standard, Enterprise, and Datacenter editions. The traditional Windows GUI is not available in Server Core....
Try to make it as simple as you can. Please provide the answers with some examples...
Try to make it as simple as you can. Please provide the answers with some examples as fast as you can. 1-The technology that make up the core functionality of Windows Server 2012 include Active Directory, the Microsoft Server Manager, DHCP and IIS. Explain, in your own words, the nature and function of these technologies. Answer: 2-Windows Server Core is a new installation option in Standard, Enterprise, and Datacenter editions. The traditional Windows GUI is not available in Server Core....
Try to make it as simple as you can. Please provide the answers with some examples...
Try to make it as simple as you can. Please provide the answers with some examples as fast as you can. 6-What are the potential disadvantages of using a dynamic and static IP Address? 7-Explain the functionality of a global catalog in the Windows networking. 8-Explain the following terms: TCP/IP protocol, and what are two command-line utilities that can be used to check TCP/IP configuration and IP connectivity, respectively? 9-Explain: Which Windows Server utility provides a common interface for tools...
Try to make it as simple as you can. You need to do some research on...
Try to make it as simple as you can. You need to do some research on different types of cryptography libraries in Python. Find out how can we use cryptography libraries in Python. Write down the steps to install the cryptography library in Python. Write a small program to encrypt and decrypt a message using the Python library.
Try to make it as simple as you can and explain as much as it needed....
Try to make it as simple as you can and explain as much as it needed. What is Trusted Third Party (TTP)? What are the problems with TTP? (3 points) Ans: Using Caesar cipher algorithm and key value = 4, encrypt the plain text “Network Security”. Show your work.          (3 points) Ans: Let k be the encipherment key for a Caesar cipher. The decipherment key differs; it is 26 - k. One of the characteristics of a public key system...
Try to make it as simple as you can and explain as much as it needed....
Try to make it as simple as you can and explain as much as it needed. Define Integrity and Nonrepudiation? (2 points) Ans: What are the differences between Stream Cipher and Block Cipher? (2 points) Ans: What is Access Control and why is it important? (2 points) Ans: Message Authentication Code ensures authentication or integrity or both? Justify and explain your answer. (3 points) Ans: What are the weaknesses of DES? Why triple DES is better than Double DES? (3...
Try to make it as simple as you can and explain as much as it needed....
Try to make it as simple as you can and explain as much as it needed. Define Integrity and Nonrepudiation? (2 points) Ans: What are the differences between Stream Cipher and Block Cipher? (2 points) Ans: What is Access Control and why is it important? (2 points) Ans: Message Authentication Code ensures authentication or integrity or both? Justify and explain your answer. (3 points) Ans: What are the weaknesses of DES? Why triple DES is better than Double DES? (3...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT