Premium Essay

Lab 1 Server 2012

In:

Submitted By lilguy2146
Words 269
Pages 2
LAB 1 Questions
Exercise 1.1 1. Remove the File 2. Check to make sure that the drive is installed correctly in the PC and then if it still occurs you need to reformat the drive to work with the windows server.
Exercise 1.2
Roles on the Server Manager are File Services and Web Server (IIS) 3. The conditions that the upgrade option is not available during the windows server 2012 installation process is when it is a new hard drive with no previous version of windows. 4. An example of a compatibility note that will stop the upgrade process and force you to take action before restarting the installation would be when the previous version of windows installed is not able to be upgraded to windows server 2012.
Using server manager determine which roles are installed on the server and make a note of them in the space on your worksheet.
File and Storage Services and Web Server (IIS)

5. The proof that you would have that the procedure just completed has upgraded the operating system on the computer and not just performed a new, clean installation is to check to see if previous users are still available.
Exercise 1.3 6. You cannot install the Server Migration tools to the Server running Windows Server 2008 using the Add Roles and Features Wizard on your server because you must Register Windows Server Migration Tools on source computers that are running older releases of Windows Server than your destination server. That would be Windows Server 2012, Windows Server 2008 R2, Windows Server 2008, or Windows Server

Similar Documents

Premium Essay

Nt1230 Syllabus

...ITT Technical Institute NT1230 Client-Server Networking I Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course...

Words: 1834 - Pages: 8

Free Essay

It- Sql Server 2012

...Course 10774A: Querying Microsoft SQL Server 2012 Length: 5 Days Prerequisites: Before attending this course, students must have: Working knowledge of relational databases. Basic knowledge of the Microsoft Windows operating system and its core functionality. Before attending this course, students should have: Basic understanding of virtualization technology (Classroom labs utilize virtual machines) To help you prepare for this class, review the following resources: Book: T-SQL Fundamentals for Microsoft SQL Server 2012 and SQL Azure MCTS Self Paced Training Kit 70-461 About this Course This 5-day instructor led course provides students with the technical skills required to write basic Transact-SQL queries for Microsoft SQL Server 2012. This course is the foundation for all SQL Server-related disciplines; namely, Database Administration, Database Development and Business Intelligence. This course helps people prepare for exam 70-461. All the labs for this course can be performed using the provided virtual machines. However, if you have a Microsoft Windows Azure account and the classroom virtual machines connect to the internet you may be able to connect to your Windows Azure server and database from the classroom. Many of the labs in this course are enabled for you to perform the lab while connected to your own Windows Azure database in the cloud. Your instructor should be able to provide a current list of Windows Azure enabled labs. To acquire a trial Windows Azure account click...

Words: 1666 - Pages: 7

Premium Essay

Networking Server 2012

...LAB 1 INSTALLING SERVERS THIS LAB CONTAINS THE FOLLOWING EXERCISES AND ACTIVITIES: Exercise 1.1 Exercise 1.2 Lab Challenge Performing a Clean Installation Installing Windows Server Migration Tools (WSMT) Accessing a WSMT Distribution Point Exercise 1.1 Performing a Clean Installation Overview In this exercise, you install Windows Server 2012 R2 on a new computer with no previously installed operating system. Mindset In many cases, organizations purchase servers without operating systems installed—sometimes called bare metal servers—either because they have an existing license agreement or because they intend to purchase the OS through another channel. In these cases, you perform what is known as a clean operating system installation, which is a procedure that creates a new server with its default operating system settings. Completion time 10 minutes Question1 What should you do if the drive on which you want to install Windows Server 2012 R2 already has a partition on it containing an operating system and data you do not need? Format the drive and do a clean install Question 2 What should you do if the Where do you want to install Windows? page appears, but it does not list any drives or partitions? Install device drivers for the drives Exercise 1.2 Installing Windows Server Migration Tools Overview In this exercise, you install the Windows Server Migration Tools, which enable you to migrate roles from an existing server to a...

Words: 554 - Pages: 3

Premium Essay

Visual Studio

...Microsoft® Visual Studio® 2012 and MSDN® Licensing Published October 2012 © 2012 Microsoft Corporation. All rights reserved. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. © 2012 Microsoft Corporation. All rights reserved...

Words: 11728 - Pages: 47

Free Essay

Nos 230 Lab 8

...Lab 8 Creating and Configuring Virtual Machine Storage | | This lab contains the following exercises and activities: Exercise 8.1Exercise 8.2Exercise 8.3 Exercise 8.4Exercise 8.5Lab Challenge | Creating a Virtual Hard DiskEditing a Virtual Hard Disk FileCreating a Virtual Machine with an Existing Virtual Hard DiskConfiguring QOS on a Virtual Hard DiskCreating a Pass-Through DiskCreating a Checkpoint | BEFORE YOU BEGIN The lab environment consists of three servers connected to a local area network, one of which is configured to function as the domain controller for a domain called adatum.com. The computers required for this lab are listed in Table 8-1. Table 8-1 Computers Required for Lab 8 Computer | Operating System | Computer Name | Domain controller 1 | Windows Server 2012 R2 | SERVERA | Member server 2 | Windows Server 2012 R2 | SERVERB | Member server 3 | Windows Server 2012 R2 | SERVERC | In addition to the computers, you also require the software listed in Table 8-2 to complete Lab 8. Table 8-2 Software Required for Lab 8 Software | Location | Lab 8 student worksheet | Lab08_worksheet.docx (provided by instructor) | Working with Lab Worksheets Each lab in this manual requires that you answer questions, take screen shots, and perform other activities that you will document in a worksheet named for the lab, such as Lab08_worksheet.docx. It is recommended that you use a USB flash drive to store your worksheets, so you can submit them to...

Words: 1958 - Pages: 8

Premium Essay

Lab 6 Security

...Lab #6 - Assessment Worksheet Implementing a Business Continuity Plan Course Name and Number: NT2580 Student Name: Instructor Name: Lab Due Date: Overview In this lab, you implemented a portion of your organization’s BCP. Based on the BIA, the organization determined that the internal Active Directory database and the corporate Web site must be recoverable in the event of system failure or natural disaster. To accomplish this, you configured local backups of Active Directory on the existing virtual server using Windows Server Backup. You also configured the organization’s Web servers to host content from a single NFS share, and back up that NFS share daily using Windows. Lab Assessment Questions & Answers 1. What is the purpose of the business impact analysis (BIA)? The BIA perceives the organization from the impact that is going to occur for an organization in the critical business processes are interrupted or tampered with. 2. What is the difference between the disaster recovery plan (DRP) and a business continuity plan (BCP)? The DRP helps recover the infrastructure necessary for normal business operation whereas the BCP helps keep the critical business processes running should a disaster occur. 3. What are the commands used in Windows 2012 to mount the NFS share on the Linux server. mount -o mtype=hard 4. Is creating redundancy for systems such as Active Directory or Web servers a part of the DRP or the BCP? ...

Words: 304 - Pages: 2

Free Essay

It Management

...Overview This lab will give you with the opportunity to experience a number of different options for upgrading or migrating a private cloud from Windows Server 2012 to Windows Server 2012 R2. There are four major upgrade or migration options available, each with different properties, those options include: cross version live migration, export and import, copy cluster role wizard and in place upgrade. The ultimate goal of this lab is to take a Hyper-V cluster running with Windows Server 2012 and fully upgrade the cluster to Windows Server 2012 R2. The following document exists to facilitate upgrade in this lab environment. Hyper-V ClusterTwo Node Windows Server 2012 ClusterThree LUNs * Quorum LUN * Two CSV’sNetwork Teaming With Three NetworksManagementSubnet: 172.16.0.0/16IP: 172.16.<pod#>.<server#> i.e. 172.16.10.1DNS: 172.16.0.1; 172.16.0.2Vlan: default (untagged)Note cluster IP is .3ClusterSubnet: 192.168.1xx.0/24IP: 192.168.1<pod>.<server#> i.e. 192.168.110.1Vlan: 2922Live MigrationSubnet: 192.168.2xx.0/24IP: 192.168.2<pod>.<server#> i.e. 192.168.210.1Vlan: 2923Virtual MachinesFour virtual machines * Copy Cluster Role Wizard * Export and Import * Live Migration * In Place Upgrade | | User Names and Password Username: mvp.lab\mvp<pod#> Example mvp.lab\mvp10 Password: P@ssw0rd (zero for the ‘o’) Overview of Upgrade Options At the end of the document is the TechNet documentation that was published on TechNet...

Words: 1312 - Pages: 6

Premium Essay

Essay

...Lab #3 – Assessment Worksheet Enabling Windows Active Directory and User Access Controls Course Name and Number: NT2520 Introduction to Information Security_V2.0 Student Name: Rony Azanon Instructor Name: Brandon Solomon Lab Due Date: august 9, 2015 Overview In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user accounts and security groups, and applied the new user accounts to the security groups, just as you would in a real world domain. You created nested folders on the remote server and assigned unique file permissions using the new user accounts and security groups. You modified the Windows Group Policy enabling each new user account to use remote desktop services to remotely access the TargetWindows01 server. Finally, you tested the security layers you placed in the previous parts of the lab by using each new user account to access and modify the nested folders on the remote server. Lab Assessment Questions & Answers 1. What are the three fundamental elements of an effective security program for information systems? Identification, Authentication and Authorization 2. Of these three fundamental controls, which two are used by the Domain User Admin to create users and assign rights to resources? Security policy is set to read only 3. If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured...

Words: 482 - Pages: 2

Premium Essay

Network

...high quality to support current and future operational requirements. Due to the size of the building there would be limitations if using Cat 5 based Ethernet cables for example and so therefore there should be a requirement to utilize Cat 6 based Ethernet as this will support a maximum cable length in excess of 300 ft without there being any connectivity or performance issues (Mitchell, 2014). Each of the two floors will have a designated server room that is designed to provide a central point of connectivity for all locations on that floor, and each of the rooms on the first and second floor will require a certain number of data ports based on their expected utilization. This can then be used to determine the patching and switch requirements for each of the two floors respectively, including an appraisal of the peripheral items: oom | Staff Connections | Student Connections | Total Data Points | 1st Floor Location | Staff Connections | Student Connections | Total | Lecture Classroom 1 | 1 | | 1 | Lecture Classroom 2 | 1 | | 1 | Office 1 | 1 |...

Words: 1451 - Pages: 6

Free Essay

Securing Internet Client and Server Applications on Windows Systems

...Securing Internet Client and Server Applications on Windows Systems Assessment Worksheet Note: This tab is for reference only. Please see your instructor to determine the assessment they wish you to use. Overview Both IIS and Internet Explorer can be hardened to improve confidentiality, integrity, and availability (CIA). In this lab, you identified security hardening opportunities for the IIS application, then made those changes on a Windows Server 2012 machine. Next, you will identified and modified the Internet Options for the Internet Explorer browser. Finally, you documented the changes you made and provided an explanation for how each change helps achieve CIA. Lab Assessment Questions & Answers 1. What are the steps you took to harden IIS? Disabled services not used by functional roles and blocked ports that were not in use. These steps are necessary because servers proved one or more specific services on the network. 2. What are the steps you took to harden the Internet Explorer browser? Opened only minimum required ports at the firewall; use encrypted connections for all communications; disabled any unneeded server features on the Web server. These are important because they heighten security. 3. As a result of this lab, which changes will you implement on your own Internet browser? Why? Disable any features that are not being used. Also turn on pop-up blocker. 4. Why should you change the directory where the log is stored? You should change...

Words: 398 - Pages: 2

Free Essay

Storage Networking

...Description Lab 1 – Storage Networking This laboratory activity introduces key storage networking concepts. Using an open source SAN/NAS solution you will build a network storage server that provides both block and file level storage across the network. Using virtualization technologies multiple operating systems will be configured to use the network storage. We will use a rolling check-off approach in this laboratory. You may check off progress at any point of a phase’s duration. The final check-off date is the last day on which you may check off objectives for full credit. For Phases I and II partial credit will be available for up to one week after the final phase check off. Please be sure to review the notes section at the end of this document before beginning the lab. There is adequate time to complete these objectives if you plan and manage your people resources well. However, if you get behind it will quickly snowball. It is highly suggested that you have everything in Phase I other than VM installation completed by Martin Luther King Day. Objectives Phase I – Three weeks  Implement a NetGear GS108T gigabit switch for management and iSCSI traffic. A sample configuration is shown in figure 1. Port Tagged 802.1q VLAN 1 2 3 4 1 & 101 5 1 & 101 6 7 8 Untagged 802.1q VLAN 1 101 1 PVID (if required) 1 101 1 1 1 1 1 1 Attached Host 1 1 1 Uplink to NET SAN iSCSI Interface SAN Mgmt Interface ESXi 1 ESXi 2 Client 1 Client 2 Client 3 Figure 1 – VLAN Configuration ...

Words: 1568 - Pages: 7

Premium Essay

Network Administrator

...of material that were originally submitted during [1/6/2013 -2/12/2013] in [IT401-1301A] with [Kay N. Crook]." Re-use: "This task contains portions of material that were originally submitted during [8/19/2012 -9/26/2012] in [ENGL205-1203B-04] with [Carmen Kimble]." IT326-1401A-01: Network Infrastructure Administration D & S Residential Services Network Implementation Plan-2014 Titius Ivie February 3, 2014 Table of Contents Target Organization 5 Corporate Structure 5 Business Goal 5 Part 1: Proposed Network Solution 7 Network Configuration 7 Transmission Media 7 Targeted Users 8 Hardware and Software Requirements 8 Production Applications 10 External and Internal Costs 11 Personnel (External Costs) 11 Hardware and Software (Internal Costs) 12 Short Term and Long Term Benefits to the Organization 13 Part 2: Network Design 14 Physical Topology 14 Part 3: Installation and Configuration 15 Installation and Configuration Steps 15 Part 4: Maintenance and Troubleshooting 19 Maintaining servers on the network 19 Maintaining PCs on the network 19 Implementing security 20 Managing network connections 21 Unauthorized Usage 21 Proper Network Operating System 22 Training users 23 Conclusion 24 Part 5: Remote Access 26 Network Pro Prep Toolkit Screenshots 27 Screenshot of Completed Labs--Phase 1 27 Screenshot of Completed Labs--Phase 2 28 Screenshot of Completed Labs--Phase 3 32 References 35 Target Organization ...

Words: 4303 - Pages: 18

Premium Essay

Liao

...Volume 1 FACULTY OF INFORMATION TECHNOLOGY Computer Network Systems Department Computer Networks 1 Lab Manual V 2.0 P R E P A R E D D R . A S U B Y H I J J A W I M O H A M M A D 2 0 1 2 R E V I E W E D B Y D R . M O H A M M A D H I J J A W I Applied Science Private University – Jordan http://FIT.asu.edu.jo Table of Contents Lab 1: Network Components ....................................................................................... 7 Introduction ........................................................................................................ 7 Objectives: ........................................................................................................ 13 Lab Steps: ......................................................................................................... 13 Lab 2: Cable Construction ......................................................................................... 14 Introduction: ...................................................................................................... 14 Objectives: ........................................................................................................ 20 Lab Steps: ......................................................................................................... 21 Preparation ....................................................................................................... 21 Main Steps .................................................

Words: 20902 - Pages: 84

Premium Essay

Information Security

...JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES LABORATORY MANUAL TO ACCOMPANY Security Strategies in Windows Platforms and Applications 1E REVISED 38542_FMxx.indd i 9/5/12 10:48 AM World Headquarters Jones & Bartlett Learning 5 Wall Street Burlington, MA 01803 978-443-5000 info@jblearning.com www.jblearning.com Jones & Bartlett Learning books and products are available through most bookstores and online booksellers. To contact Jones & Bartlett Learning directly, call 800-832-0034, fax 978-443-8000, or visit our website, www.jblearning.com. Substantial discounts on bulk quantities of Jones & Bartlett Learning publications are available to corporations, professional associations, and other qualified organizations. For details and specific discount information, contact the special sales department at Jones & Bartlett Learning via the above contact information or send an email to specialsales@jblearning.com. Copyright © 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner. The Laboratory Manual to accompany Security Strategies in Windowa Platforms and Applications is an independent publication and has not been authorized, sponsored, or otherwise...

Words: 25969 - Pages: 104

Premium Essay

Common Lab Tasks

...Common Lab Tasks In each lab, you will follow a series of step-by-step instructions designed to help you explore the environment and gather the information you need to successfully complete the deliverables. In each lab, you will perform identical steps, such as opening the virtual lab, logging in to another server, taking screen captures, and transferring files to your local computer. To avoid repeating steps in the lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list...

Words: 2387 - Pages: 10