Microsoft windows server 2003 managing 70 290


















I will talk about what we can do with the security dialog box, Server Then we will talk about installing and configuring administrative tools. These are the tools that allow us to manage the systems. They can be installed on any Server box. They can actually be installed on other servers as well. I will talk about how to install these tools and how to use these tools to configure servers. Also talk about creating user accounts, computer accounts and organizational units.

We will also talk about managing user and computer accounts after we created them. So we discuss modifying user properties, modifying computer properties, enabling unlocking accounts, user account templates, creating and save queries, resetting user and computer accounts, and even moving domain objects. In addition we will discuss groups. We will talk about managing groups including the different types of groups that we can manage, strategies for using groups how to create groups, modify groups and then some best practices that will serve you well both real life as well as the test.

Then we will turn our attention to permissions. We will talk about managing permissions, the importance of permissions, share permissions versus NTFS permissions a new tools with Windows Server called effective permissions and then some best practices with managing permissions. Also talk about managing printers including installing printers, printer permissions, printer drivers, printer locations, the print spooler, printer priorities and printer pools which are actually opposites of each other and then printer scheduling.

But we were just getting started in our next section we will finish up the overview. That is next. Virtual Training Company. Sign Up Login. Pricing Start. Microsoft Windows Server Course. Just click on the movie link to play a lesson. Lifetime online access to this course. Download for offline access. Course outline. Introduction And Overview. Introduction Hide these tips. Lesson Notes Subscribed users can add notes to any lesson for future reference.

Managing Overview The Windows Server Family Logging On and the Security Dialog Box Installing and Configuring Admin Tools Creating User Accounts Creating Computer Accounts Creating an Organizational Unit Hierarchy Managing Users And Computers. Modifying User Properties Modifying Computer Properties Enabling and Unlocking Accounts User Account Templates Finding Users in Active Directory Resetting User and Computer Accounts Moving Domain Objects Managing Groups. Group Types and Scopes Strategies for Using Groups Creating Groups Modifying Groups Best Practices for Groups Managing Permissions.

Overview and Importance Share Permissions Best Practices and Combining Permissions Effective Permissions Tool Managing Printing. Printers Overview Installing Printers Printer Permissions The devices can be disabled or enabled from their Properties dialog boxes. You need to ensure that in case of server failure, a server is returned to the original state as soon as possible. In order to bring the server back to its original state, you will have to create an Automated System Recovery Disk.

You installed a hotfix and a new driver for the network adapter on a member server successfully. When you restart the server and log on to the member server locally, you find that the server is unable to communicate to the computers in the network. The most likely cause of the issue is that the new network adaptor driver is malfunctioning.

The yellow question mark beside a device in Device Manager indicates that the device is installed, but the operating system is unable to find and install the driver for it.

RAID-0 , also known as stripe set, stores data in stripes on two or more physical disks. Stripe set uses a minimum of two and a maximum of thirty-two hard disk drives. The minimum number of hard disk drives required for implementing RAID-5 is three. Raid-1 refers to mirroring. In order to deny disk space to users who exceed their limit, right-click the volume for which you want to deny disk space, then click Properties, go to the Quota tab page, select the Enable quota management check box, select the Deny disk space to users exceeding quota limit check box, and then click the OK button.

In order to completely defragment the disk, you will have to remove the page file from the disk. The page file cannot be moved during defragmentation. The SystemProcessor Queue Length should not be more than one. The value more than one indicates that the processor is unable to handle queries and needs to be upgraded or an extra processor to be placed.

For configuring six hard disks into a fault tolerant volume that should have the maximum space for storing data, you will have to use RAID5 volume. RAID5 provides data redundancy at a cost of only one additional disk for the volume, while a mirrored volume uses another disk of the same disk size as that of the original data.

A RAID-5 volume has a better read performance as compared to a mirrored volume. A drive in the RAID-5 volume fails. In order to restore the RAID-5 volume, you will have to replace the failed drive with a new one, use Disk Management, select a new area of free space, and then regenerate the volume.

The performance of one of the member servers has deteriorated due to a large number of unused files and folders on the hard disk of the server. The RAID-5 volume has failed. You shut down the server and replace the failed disk with a new disk and restart the server. You now want to bring it back to its previous state. In order to bring the RAID-5 volume back to its previous state, you will have to perform the following steps: Open Command Prompt and type diskpart.

At the Diskpart prompt, type list disk and make note of the disk to be replaced. In order to check the hard disk performance on which the files are being saved, you will have to choose the LogicalDisk performance object and monitor the Average Disk Queue Length counter. A disks of the RAID-5 array has failed. You replace the failed disk with a new one. You restart the server, and run the Disk Management utility. The array also lists a missing offline dynamic disk.

In order to restore the fault tolerant RAID-5 array volume, you will have to take the following steps in the given order: Initialize Disk3 and convert it as a dynamic disk. A computer has three hard disks working as basic disks. One hard disk is used for the operating system and the other two are used for storing the printing data. Users complain that the speed of printing is slow. In order to get the fastest speed of printing, you will have to convert the two hard disks used for printing data to dynamic disks and create a striped volume.

In order to create a mirrored volume on a server, you will have to take the following steps: In the Administrative tools, double-click to open Computer Management local on the server. Click Storage and then click Disk Management. Right-click the unallocated space on the dynamic disk on which the mirrored volume is to be created, and then click New Volume. Performance alert detects when a predefined counter value rises above or falls below the configured threshold and notifies a user by means of the Messenger service.

Striped volumes are dynamic volumes that contain disk space from two to thirty-two hard disks. Data that is written to a striped volume is divided by the operating system into chunks of 64KB. The operating system stores each chunk on a separate disk.

Since, in a striped volume, a large amount of data is divided into identical portions, it is faster to read or write the data from a striped volume than from a spanned volume.

Striped volumes are not fault tolerant. RAID-0 volumes are also referred to as striped volumes. A minimum of three disks are required for RAID5 array. RAID 0 creates a stripe set but does not provide data redundancy. When a member of a mirrored volume or a RAID5 volume fails, it becomes an orphan. Data for the orphaned member can be regenerated from the remaining members. A new area of free space, which is of the same size or larger than the other members of RAID5 volume should be selected in Disk Management and then data should be regenerated.

Although striping with parity allows for fault-tolerance and excellent speed, using a combination of RAID-5 for your data and mirroring for the log will give you more fault tolerance. The RJ connector is used by an analog modem to connect to a phone line. Use the Device Manager utility to disable a device on a computer.

After installation of a driver for an ISA sound card on a Windows server, you restart the server. The newly installed driver fails and now the server is unable to start. In order to make the server working again, you will have to reboot the server in safe mode and disable the malfunctioning driver. It can provide information about the computer type, memory, video, network, OS version, mouse type, other adapters being used, disk drives being used, number of LPT ports being used, number of COM ports being used, IRQ status, TSR programs, and the device drivers The server is unable to boot due to the malfunctioning device driver.

In order to resolve the issue, you will have to start the server in Safe Mode, remove the driver by using Device Manager, and again restart the server. The speed of a database servers is slow. In order to improve the performance of the database server, you will have to install an extra processor. This service performs administrative services for disk management requests and configures hard disk drives and volumes.

The Logical Disk Manager Administrative Service is started only when a drive or partition is configured or a new drive is detected. This service does not start by default.

In order to update the device driver of the network interface card on a computer, you will have to Open Device Manager on the computer and expand the Network adapters. You should then right-click the network adapter, and after that, click Update Driver to run the Hardware Update Wizard.

In the Update Wizard, you should specify the path to the location where you have downloaded the updated driver. Managing Users, Computers, and Groups. Pass exam in the first attempt. Full featured Tests. PING is used to verify the existence of a host in a network. Event Viewer is used to locate the source of problems by monitoring system logs, security logs, and application logs.

Account logon events are generated when a domain user account is authenticated on a domain controller. The Security log contains events related to logon events by users. It also logs events such as opening, creating or deleting of files, folders, and other resources. A dependency service failure message in Windows Server comes under the system log in the Event Viewer utility. In order to track access to account management events on the domain controllers, view the security log in the Event Viewer utility.

You receive an error message from one of the member servers during the boot process that a dependency service has failed to start. In order to obtain more information about the error, you will have to run the Event Viewer utility and check the System log. In order to identify the person who has deleted a user account, you will have to use the Event Viewer tool and filter the security event log for the Account Management events on the domain controller.

Click the Automatic Updates tab and select the check box. When the Software Update Services is used to deploy security updates, the security updates must be approved before the client computers download and install them. In order to ensure that the downloading and synchronization of the software updates take a minimum amount of time, you will have to select only the languages that are required.

This will avoid downloading the same software updates in different languages, which are not required. Linking the GPO at the Sales OU will deploy the application on all the client computers with a minimum of administrative effort. The synchronization log of SUS stores information about the synchronization of contents.

In the System Properties dialog box, you will then have to click the Automatic Updates tab and select the Keep my computer up to date check box. Software Update Services SUS is a tool used to acquire and distribute critical Windows patches to computers running Windows operating systems. Per Device or Per User licensing mode is a new licensing mode in Windows It enables all network devices or users to access all the servers on a network. In this mode, the number of simultaneous connections to any server is unlimited.

Per Device or Per User is the normal licensing mode for a server product that is installed on multiple servers in a network.

It is the best option if clients frequently use multiple servers on the network. This licensing mode requires one Client Access License for each device. EXE is a command-line tool that is used to manage Active Directory. Telnet uses port 23 by default. Telnet enables you to access a UNIX server, using a text-based connection. Configure Your Server Wizard guides users in installing and configuring server roles.

This utility is used to perform the following tasks: Performing database maintenance of Active Directory.

Managing and controlling operations master roles. Removing metadata left behind by domain controllers. Internet Authentication Service IAS performs centralized connection authentication, authorization, and accounting for dial-up and virtual private network VPN , remote access, and router-to-router connections. Internet connection sharing ICS provides the ability to connect a home network or a private network to the Internet.

The use of smart cards for user authentication is a strong form of authentication. It includes a new set of imaging tools for rapidly deploying Windows Server and Windows Server remotely.

ADS offers improved communication security and a reliable script execution framework. It uses the image-based deployment method. In order to enable a server to offer remote assistance, you will have to perform the following actions: Log on as administrator on the server. Run gpedit. Click Remote Assistance. We promise that you can pass your exam more easily and quickly with our latest braindumps, even it is your first try.

In Testpassport, you can find valuable exams. Please notice our site, just because we will update the products regularly. Just like the latest By the way, the testpassport. If you can not find you exam, you can contact with us at both the two sites. We will do our best to support the best service for all of you! Testpassport Practice Exams for Microsoft are written to the highest standards of technical accuracy, using only certified subject matter experts and published authors for development.



0コメント

  • 1000 / 1000