Computer Networking
Question 1
Part I
a.Read the following four statements regarding dedicated servers on a network, then correct any of the statements which are untrue.
i.Wide Area Networks (WANs) do not require routers to access them as they only cover a particular and possibly restricted geographical area.
ii.In a client-server network a server uses a network operating system for managing the whole network.
iii.A mesh topology is the most common topology used for Local Area Networks (LANs) as it uses the fewest connections.
iv.A host can really be any type of networking device.
b.At which layers of the OSI model do applications, the transmission control protocol (TCP) and switches primarily operate?
c.What is the “dotted-decimal” IPv4 representation of the binary address 11000000101010001100100011111110?
d.Which of the following is the valid MAC address? Where would you find a MAC address?
i.00101000.01000101.01011001.00000110
ii.40:69::ae
iii.40:69:89:06:1f:ae
iv.40.69.89.6
e.Which of the following are private IPv4 addresses which cannot be used on the internet?
i.10.10.32.0
ii.129.0.0.1
iii.172.16.31.254
iv.191.168.32.0
f.Which, if any, of the following statements are true regarding the network address and subnet mask 192.168.100.85/26?
i.There are 64 useable hosts in this subnet.
ii.The network address for this subnet is 192.168.100.48.
iii.The subnet mask may be represented by 255.255.255.128.
iv.The broadcast address of the previous subnet, assuming it had the same subnet mask, is 192.168.100.63.
g.What are the suggested minimum and maximum lengths for passwords?
h.Name the two basic firewall methods described in this module.
i.In a sentence, what is the ping of death?
j.Which is the best test utility command to run from a PC connected to a network to test whether your recently installed DNS server has been correctly configured?
Part II
Part of an organisation’s computer network shown in Figure 1 (attached). It comprises four servers: 2 DCHP Servers, a DNS server and a web server. Two PCs are also shown and are running Windows 7. The supplied network address was 192.168.2.0/24 which has been subnetted as shown.
a.
How many subnetworks are shown in Figure 1?
b.
How many additional hosts (as defined in the Network+ book) can be supported by LAN 3 given the number of hosts already fitted as shown in Figure 1?
c.
How many more separate LANs supporting the same total number of hosts as the existing LANs could be installed using the network address 192.168.2.0/24? Show your working.
d.
Describe briefly in a sentence the function of each of the Servers shown in Figure 1?
Question Two
Part I
a.In a sentence, describe a Server Core installation.
b.Which tool would you use to distribute and manage software updates for resolving security vulnerabilities on a Server 2008 network? Provide both the initials and the full name.
c.Give two examples of DHCP-enabled hosts on a network that should use DHCP reservations.
d.Describe what each component (separated by full-stops) of the fully qualified domain name (FQDN) server1.open.ac.uk means.
e.What is a Host (A) record?
f.Which of the following translates internal, private IP addresses to external, public addresses?
i.NAT
ii.NAP
iii.NPS
iv.VPN
g.Which role service is required to be able to configure disk quotas?
h.What two Network Sharing and Discovery settings need to be turned on to share a printer on a Server 2008 computer?
i.In a network with a single network attached print device, give three advantages of having a single, shared print server over multiple print servers.
j.What server role should a Windows Server 2008 be running in order to act as a software-based router?
Part II
a.
In your own words, explain the differences between a standard primary zone and a standard secondary zone in Windows Server 2008.
You should aim to write about 100 words for this question.
b.Imagine you are a network administrator for an organisation that has a DNS server that hosts the primary zone for the companyone.com domain. Your organisation has recently merged with another one with its own DNS server hosting the primary zone for companytwo.com. You have been asked to configure each server to host a secondary zone for the other domain and allow zone transfers between them. Describe, in your own words, the main steps you would take to achieve this.
You should aim to write about 300 words for this question.
a.When installing the Files Services Role in Windows Server 2008, which role services would you install to prepare the server to host DFS and enable advanced file server functionality?
b.Imagine you are a network administrator for a company and you have been asked to configure a Windows Server 2008 computer (W2K801) to act as a File Server. Assuming the File Services Role and necessary role services have been installed, describe how you would configure multiple shared folders (file shares) to test access levels on the computer. Assume you have access to a second Windows Server 2008 computer and there are already two local user accounts – User01 and User02 – and these belong to the groups Group01 and Group02 respectively. You should test access for both users and both groups.
You should aim to write about 300 words for this question.
Question Three
Part I
a.Name the two kinds of Domain Controllers. Which kind of Domain Controller contains a copy of the ntds.dit file that cannot be modified and does not replicate its changes to other domain controllers within Active Directory?
b.When a child domain is created, what type of trust in relation to its parent domain does it automatically receive?
c.In a sentence, what is Partial attribute set (PAS)?
d.Which FSMO role has the authority to manage the creation and deletion of domains, domain trees, and application data partitions in the forest?
e.What console must be used to move the Domain Naming Master FSMO role?
f.What policies are designed to identify software and control its execution?
g.What types of certificates are generated by the enterprise CA and used to generate a smart card logon certificate for users in an organization?
h.When implementing multiple Software Restriction Policy rules, which rule is always applied last?
i.In a sentence, what is the purpose of the dcdiag command?
j.What identifies certificates that have been revoked or terminated?
Part II (15 marks)
a.Briefly explain, in your own words, your understanding of Active Directory Sites and inter-site replication.
You should aim to write about 50 words for this question.
b.In your own words, describe the steps you would take to create and configure the following two new sites such that replication between the two sites can take place. The first site should be called London and is to be associated with subnet 192.168.10.0/24. The second site should be called New York and is to be associated with subnet 192.168.20.0/24. Assume there are three existing Domain controllers, namely DC1, DC2 and DC3 in the existing HQ site. You would move DC2 to the London site and DC3 to the New York site and create a Site Link Object to enable replication. Include in your description creating, configuring and linking these two sites.
You should aim to write about 400 words for this question.
Part III
a.Briefly explain, in your own words, what are Active Directory Rights Management Services.
You should aim to write about 50 words for this question.
b.In your own words, briefly describe the main steps you would take to install and configure Active Directory Rights Management Services. Include in your answer the steps required to configure IIS and SQL servers including a brief description of what these are and what their roles are.
You should aim to write about 400 words for this question.

+1 862 207 3288 