Question

In: Computer Science

Try to make it as simple as you can. Please provide the answers with some examples...

Try to make it as simple as you can. Please provide the answers with some examples as fast as you can.

6-What are the potential disadvantages of using a dynamic and static IP Address?

7-Explain the functionality of a global catalog in the Windows networking.

8-Explain the following terms: TCP/IP protocol, and what are two command-line utilities that can be used to check TCP/IP configuration and IP connectivity, respectively?

9-Explain: Which Windows Server utility provides a common interface for tools and utilities and provides access to server roles, services, and monitoring and drive utilities? and which server utility provides information about PowerShell command history?

10- What are Active Directory sites?

Solutions

Expert Solution

Disadvantages of Static IP Address:-

  • Security– Static IP Address could be a security risk as the IP address is constant. There is a greater chance of hacking the website. Also you cannot easily change the Static IP once it has been hacked. This makes your system very susceptible to continuous attack. It is imperative to put preventive measures in place before obtaining a static IP such as Internet security suites and router firewalls.
  • Uptime– static IPs are preferred for hosting servers and file transfer protocol sites. So the servers have to be on all the time to host these functions. The cost of constantly running a server is exorbitant.
  • Configuration– The process to set a static IP is manual and relatively complex. Occasionally, external software is required for this purpose. Also several consumer level ISPs lack support for static IPs.
  • Keeping pace with technology– The field of computers is rapidly changing. It is possible that a static IP computer running a server becomes obsolete in the near future. It is relatively complex to transfer the server settings from a static IP computer to a new computer. It is wise to invest in an easily upgradable computer to run a static IP server.
  • Disadvantages of Dynamic IP Address
  • Security issues – DHCP automation can be significant security threat in case of a rogue DHCP server. This server is not in the control of the network personnel. If any user connects to it, information over that connection can be intercepted and looked at. Thus network security and user privacy is violated.
  • Network Failure –If only a single DHCP server is in place, it’s failure causes a system wide issue. In case of server failure, any connected computers that don’t already have an IP address will try and fail to obtain one. Computers which already have an IP address before the server’s failure will try to renew it, which will cause the computer losing its IP address.
  • Less Reliable – Note that Dynamic IP addressing should not be used for VOIP, VPN, playing online games as Dynamic IP addressing is less reliable then Static IP addressing and could cause the service to disconnect while you are on a VOIP, VPN or gaming.

7-  

A global catalog is a distributed data storage that is stored in domain controllers (also known as global catalog servers) and is used for faster searching. It provides a searchable catalog of all objects in every domain in a multi-domain Active Directory Domain Services (AD DS). A global catalog provides a partial representation of the objects and is distributed using multi-master replication.

A global catalog is a multi-domain catalog that allows for faster searching of objects without the need for a domain name. It helps in locating an object from any domain by using its partial, read-only replica stored in a domain controller. As it uses only partial information and a set of attributes that are most commonly used for searching, the objects from all domains, even in a large forest, can be represented by a single database of a global catalog server.

A global catalog is created and maintained by the AD DS replication system. The predefined attributes that are copied into a global catalog are known as the Partial Attribute Set (PAS). Users are allowed to add or delete the attributes stored in a global catalog and thus change the database schema.

Some of the common global catalog usage scenarios are as follows:

  • Forest-wide searches
  • User logon
  • Universal group membership caching
  • Exchange address book lookups

8:-TCP/IP (Transmission Control Protocol/Internet Protocol)

TCP/IP, in full Transmission Control Protocol/Internet Protocol, standard Internet communications protocols that allow digital computers to communicate over long distances. The Internet is a packet-switched network, in which information is broken down into small packets, sent individually over many different routes at the same time, and then reassembled at the receiving end. TCP is the component that collects and reassembles the packets of data, while IP is responsible for making sure the packets are sent to the right destination. TCP/IP was developed in the 1970s and adopted as the protocol standard for ARPANET (the predecessor to the Internet) in 1983.

TCP/IP model is a concise version of the OSI model. It contains four layers, unlike seven layers in the OSI model. The layers are:

  1. Process/Application Layer
  2. Host-to-Host/Transport Layer
  3. Internet Layer
  4. Network Access/Link Layer

10:- Active Directory sites

What makes Active Directory (AD) a very powerful tool is the combination of two distinctly different structures it possesses: a logical structure and a physical structure. The logical structure consists of forests, domains, etc.. On the other hand, the physical structure is represented by the Domain Controllers (DCs), servers, physical subnets, etc. A Site is a logical means to represent the physical aspects of AD.


Related Solutions

Try to make it as simple as you can. Please provide the answers with some examples...
Try to make it as simple as you can. Please provide the answers with some examples as fast as you can. 11-Which of the following do all domains in the same forest have in common? (Choose all that apply.) a) The same domain name    b) The same schema c) The same user accounts    d) The same global catalog   12-Which of the following is a valid reason for using multiple forests? a) Centralized management     b) Need for different schemas c) Easy...
Try to make it as simple as you can. Please provide the answers with some examples...
Try to make it as simple as you can. Please provide the answers with some examples as fast as you can. 6-What are the potential disadvantages of using a dynamic and static IP Address? 7-Explain the functionality of a global catalog in the Windows networking. 8-Explain the following terms: TCP/IP protocol, and what are two command-line utilities that can be used to check TCP/IP configuration and IP connectivity, respectively? 9-Explain: Which Windows Server utility provides a common interface for tools...
Try to make it as simple as you can. Please provide the answers with some examples...
Try to make it as simple as you can. Please provide the answers with some examples as fast as you can. 11-Which of the following do all domains in the same forest have in common? (Choose all that apply.) a) The same domain name    b) The same schema c) The same user accounts    d) The same global catalog   12-Which of the following is a valid reason for using multiple forests? a) Centralized management     b) Need for different schemas c) Easy...
Try to make it as simple as you can. Please provide the answers with some examples...
Try to make it as simple as you can. Please provide the answers with some examples as fast as you can. 11-Which of the following do all domains in the same forest have in common? (Choose all that apply.) a) The same domain name    b) The same schema c) The same user accounts    d) The same global catalog   12-Which of the following is a valid reason for using multiple forests? a) Centralized management     b) Need for different schemas c) Easy...
Try to make it as simple as you can. Please provide the answers with some examples...
Try to make it as simple as you can. Please provide the answers with some examples as fast as you can. 1-The technology that make up the core functionality of Windows Server 2012 include Active Directory, the Microsoft Server Manager, DHCP and IIS. Explain, in your own words, the nature and function of these technologies. Answer: 2-Windows Server Core is a new installation option in Standard, Enterprise, and Datacenter editions. The traditional Windows GUI is not available in Server Core....
Try to make it as simple as you can. Please provide the answers with some examples...
Try to make it as simple as you can. Please provide the answers with some examples as fast as you can. 1-The technology that make up the core functionality of Windows Server 2012 include Active Directory, the Microsoft Server Manager, DHCP and IIS. Explain, in your own words, the nature and function of these technologies. Answer: 2-Windows Server Core is a new installation option in Standard, Enterprise, and Datacenter editions. The traditional Windows GUI is not available in Server Core....
Try to make it as simple as you can. You need to do some research on...
Try to make it as simple as you can. You need to do some research on different types of cryptography libraries in Python. Find out how can we use cryptography libraries in Python. Write down the steps to install the cryptography library in Python. Write a small program to encrypt and decrypt a message using the Python library.
Try to make it as simple as you can and explain as much as it needed....
Try to make it as simple as you can and explain as much as it needed. What is Trusted Third Party (TTP)? What are the problems with TTP? (3 points) Ans: Using Caesar cipher algorithm and key value = 4, encrypt the plain text “Network Security”. Show your work.          (3 points) Ans: Let k be the encipherment key for a Caesar cipher. The decipherment key differs; it is 26 - k. One of the characteristics of a public key system...
Try to make it as simple as you can and explain as much as it needed....
Try to make it as simple as you can and explain as much as it needed. Define Integrity and Nonrepudiation? (2 points) Ans: What are the differences between Stream Cipher and Block Cipher? (2 points) Ans: What is Access Control and why is it important? (2 points) Ans: Message Authentication Code ensures authentication or integrity or both? Justify and explain your answer. (3 points) Ans: What are the weaknesses of DES? Why triple DES is better than Double DES? (3...
Try to make it as simple as you can and explain as much as it needed....
Try to make it as simple as you can and explain as much as it needed. Define Integrity and Nonrepudiation? (2 points) Ans: What are the differences between Stream Cipher and Block Cipher? (2 points) Ans: What is Access Control and why is it important? (2 points) Ans: Message Authentication Code ensures authentication or integrity or both? Justify and explain your answer. (3 points) Ans: What are the weaknesses of DES? Why triple DES is better than Double DES? (3...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT