Windows Server 2008 for Dummies
1. Permissions: the access privileges granted to a user account.
2. Auditing: Windows Server 2008 can track access and usage by domain user accounts if
that level of audit
Make up assignment
1. UDDI- implements universal description discovery, and Integration, which enables the
organization to publish information about its web services for use by intranet, extranet,
and/or internet clie
1. Active Directory: a Windows directory service that stores and retrieves information
about users and network resources.
2. Domain Controller: Client computer then forwards your user logon information to
1. Server: a system that responds to request for resources originating from the same clients
on the same network
2. Client-run Application: application that run wholly on client computer such as office
1. Emails, notes, file attachments, task, calendars, journals, forms, and contacts with other
2. Outlook, Entourage, or the Public Folder Management Console within the exchange
2. Yes this way the traffic runs smoothly through the data flow that will be coming in and
4. RAID 1
1. Exchange Organization Administrator
1. Exchange Recipient Administrator
2. Exchange Public Folder
1. Brute Force Attack-intruder attempts to gain access to a server by guessing a user
password (usually the root administrator) through the SSH server, Mail server, or other service
running on your system
1. Open Relay- A
1. Do Not Use Authentication
a. HTTP-BASIC Authentication And Membership Service Account
b. HTTP-BASIC Authentication And NTLM Account Database
1. TCP on port 80, 554, and 1755
a. UDP on port 1755 and 5005
1. Microsoft exchange server is a messaging software product that is used in many
3. MUA: Mail User Agent
1. Microsoft Outlook
2. Windows mail
3. Apple mail
4. Microsoft Exchange
1. Are the clients IP address and domain name allowed access to the site?
1. Who is the client sending the request?
2. Does the client have the permissions needed to access the resources?
3. Does the client have
1. To listen for incoming request from clients of various types and then respond some action
or supplying of information.
2. IP addressing, and Domain name restrictions, Anonymous and basic authentication, and