Windows server 2008
Chapter 1 key terms
Automatic Private IP Addressing a service in windows XP, windows server 2003, windows vista, and
windows server 2008 that can automatically configure client IP address in the absence of a DH
Windows 2008 server
Lesson 2 key terms
Basic disks- disks that use partition tables that are recognized by older operating system such as MS-DOS
and Windows 95/98
Boot volume- the volume containing the operating system files
Windows Server 2008
Lesson 3 key terms
Address resolution Protocol (ARP) Used to map a known IP address to an unknown MAC address
Application layer- The top-most layer of the OSI model, where DHCP and other networks applications
Linux Chapter 4
1. It does not differentiate between an unacceptable login name and an
unacceptable password to discourage unauthorized people from guessing names
and passwords to gain access to the system.
2. admin, me123 and
Windows server fundamentals
Step one I opened my oracle virtual box and I created a new machine. I choose windows server 2008. Set
the hard drive size to 50.00GB, disable the floppy drive and pressed OK. Once
Linux Final Project
A. Wine is the most popular and powerful open source app for Linux. Its
used to run Windows based applications, games on Linux platforms
without any issues.
B. Wine is used to run Windows based applications
Chapter 6 Linux
1. a. milk_co simple filename
b. correspond/business/milk_co relative pathname
c. /home/max absolute pathname
d. /home/max/literature/promo absolute pathname
e. simple filename
2. a. Cd
3. a= mkdir /home/
Linux Chapter 3
1. A Linux session that runs on a computer without installing Linux. The computer will be
unaffected or changed by the live session.
2. You would use the verify and boot line.
3. Anaconda installer identifies ha
Chapter 17 exercises
1. Switches have increased available network bandwidth. There is reduced
workload on individual computers. Increased network performance.
2. NIS can provide a uniform login, regardless of which system you lo
Chapter 5 linux
1. Displays list of users who are logged in.
2. Command n to keep users from writing on your terminal. To keep from overwriting over
something that your viewing.
3. The file to_do is copied in the file, renames
Linux Chapter 2
1. Installing Fedora/RHEL is the process of copying operating system files from a CD, DVD, or USB
flash drive to hard disk(s) on a system and setting up configuration files so Linux runs properly on
Chapter 1 exercises
1. Free software is code that is available for free to everyone free in the sense that it can be used freely
to the user's desires. It is free to be studied, redistributed, and modified.
2 Free, Open Source.
Chapter 23 exercises
1. SMBD and NMBD. The smbd program provides Sambas file and printer services, using one TCP/IP
stream and one daemon per client. It is controlled from the default configuration file, and can be
Lesson 4 Key terms
Authoritative- a DNS server that host a primary or secondary zone for a particular DNS domain
Authoritative answer a response from a DNS server that host a primary or secondary zone for the DNS
Define Key terms
Malware- Software designed to infiltrate a computer system and possibly damage it without the users
knowledge or consent.
Virus- code that runs on a computer without the users knowledge; it infect
Chapter 4 key terms
Cookies text files placed on the client computer that store information about it, which could include
your computers browsing habits and credentials.
Locally shared object (LSO)- also known as flash
Define Key terms
Information Security- sometimes shortened to InfoSec, is the practice of defending information from
unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction
Chapter 12 security key terms
signature-based monitoring-Frames and packets of network traffic are analyzed for
predetermined attack patterns. These attack patterns are known as signatures.
anomaly-based monitoring- Also
Chapter 7 key terms
network perimeter-The border of a computer network, commonly secured by devices such as
firewalls and NIDS/NIPS solutions.
access control list-A list of permissions attached to an object. ACLs specif
Security Chapter 8 key terms
default account-An account installed by default on a device or within an operating system with a
default set of user credentials that are usually insecure.
privilege escalation-The act of ex
Chapter 5 key terms
MAC flooding- an attack that sends numerous packets to a switch, each of which has a different source
MAC address, in an attempt to use up the memory on the switch. If this is successful, the switch wil
Chapter 3 Key terms
Hardening- hardening of the operating system is the act of configuring an OS securely, updating it,
creating rules and policies to help govern the system in a secure manner, and removing unnecessary