Premium Essay

Nt1330 Lab2

In: Computers and Technology

Submitted By blackout376
Words 782
Pages 4
Lab 2 worksheet
CONFIGURING DNS AND DHCP

THIS LAB CONTAINS THE FOLLOWING EXERCISES:

Exercise 2.1 Designing a DNS Namespace
Exercise 2.2 Creating a Zone
Exercise 2.3 Creating Domains
Exercise 2.4 Creating Resource Records
Exercise 2.5 Creating a Scope
Exercise 2.6 Confirming DHCP Server Functionality
Exercise 2.7 Configuring DHCP Reservations
Workstation Reset: Returning to Baseline

Estimated lab time: 100 minutes

|Exercise 2.1 |Designing a DNS Namespace |
|Overview |You have been tasked with creating a test DNS namespace structure for your organization. Your first |
| |task is to design that namespace by specifying appropriate domain and host names for the computers in|
| |the division. |
|Completion time |15 minutes |

2. In the diagram provided in Figure 2-1, write both the domain names and the fully qualified domain names that you have selected for the computers in the appropriate spaces.

Figure 2-1

|Exercise 2.2 |Creating a Zone |
|Overview |You will now configure the DNS Server Role you installed in lab 1.4 by creating zones. A zone is the |
| |administrative division that DNS servers use to administer domains. The first step in implementing |
| |the DNS namespace that you designed is to create a zone representing your root domain. |…...

Similar Documents

Free Essay

Lab2

...Targeted attacks did not start in 2010 and will not end there. in addition, while Hydraq was quickly forgotten and, in time, Stuxnet may be forgotten as well, their influence will be felt in malware attacks to come. Stuxnet and Hydraq teach future attackers that the easiest vulnerability to exploit is our trust of friends and colleagues. Stuxnet could not have breached its target without someone being given trusted access with a USB key. Meanwhile, Hydraq would not have been successful without convincing users that the links and attachments they received in an email were from a trusted source. Social networks. Whether the attacker is targeting a CEO or a member of the QA staff, the internet and social networks provide rich research for tailoring an attack. By sneaking in among our friends, hackers can learn our interests, gain our trust, and convincingly masquerade as friends. Long gone are the days of strange email addresses, bad grammar, and obviously malicious links. A well-executed social engineering attack has become almost impossible to spot. Zero-day vulnerabilities and rootkits. Once inside an organization, a targeted attack attempts to avoid detection until its objective is met. Exploiting zero-day vulnerabilities is one part of keeping an attack stealthy since these enable attackers to get malicious applications installed on a computer without the user’s knowledge. in 2010, 14 such vulnerabilities were discovered. Rootkits also play a......

Words: 548 - Pages: 3

Free Essay

Nt1330 Unit 2. Exercise 1. Dns Scenario

...Aaron Battaglia NT1330 UNIT 2. EXERCISE 1. DNS SCENARIO It is not required to put a DNS server in such a small location for only five users and snail like network connectivity doesn’t justify the amount of money it would cost to install a server(s) in that area. One exception would be if there is a great amount of file sharing, or other information that would need to be accessed daily by other spots on the network. This sometimes but rarely happens but we could have a situation where we put it in the in the server but we set it up as a secondary or Active Directory Integrated zone type. I recommend installing the servers in the location where you have 30 users and fast internet connection. You could do this also, try storing all the files from either location in the bigger office, and in the smaller location you could remote connect through Virtual Private Network. When we do this all the information from the smaller sight is stored off site. The sight with five users can be run with a cheap router and the server that has thirty users at the office will be set up as the primary zone; since this is utilizing the fast internet connection and has more users this is our MAIN BASE which you can call home. =) If you were to run Domain Name System on domain controllers there are Active Directory Integrated zones and Active Directory Integrated zones. In classical Domain Name Systems the zone data is stored in text files which sit on the Hard Drive; which of course is......

Words: 428 - Pages: 2

Premium Essay

Nt1330 Homework Week 1

...NT1330 Client-Server Networking II Name: Homework 1 Ch. 1 (70-642): Introduction to Networking Concepts Fill in the Blank: 1-10 The most widely used IP addressing scheme is IPv4. The most recent and largest address space IP addressing scheme is IPv6. To distribute IP addresses automatically, a network administrator would configure the DHCP service. The first attempt at breaking up IP address space used classful addressing to provide address ranges of differing sizes. Prior to the introduction of the Domain Name System, computers used HOST files to map human-readable named to IP addresses. A(n) Subnet Mask is used to separate the host address portion of an IP address from the network address. The subnet mask within the TCP/IP configuration is used to distinguish the network address from the host address. In dotted-decimal notation, each IPv4 address is broken up into four octets. Server computers and other systems that need to be accessed reliably by network clients should be configured with a(n) static IP address. The method of breaking up IP address space into address ranges of flexible size is called CIDR . Page Break Case Scenario Case Scenario 1-1: Designing Windows Server 2008 Network Services Lucerne Publishing is a publishing company based in New York City, New York, which produces science textbooks for colleges and medical schools. In recent months, Lucerne Publishing has been......

Words: 574 - Pages: 3

Premium Essay

Nt1330

...Unit 1 Assignment Windows 2008 Network Services DNS and DHCP are two important aspects in in any network setting. DNS convers URL’s to IP addresses so that we can just remember a URL instead of an entire IP address for whatever site that we want to access. DHCP is a network protocol that automatically assigns IP addresses to computers and other devices that are connected to any particular network. DHCP is useful no matter how large or small of a network you are on. The decision of whether or not you should configure DHCP for your home network would depend on how many devices are accessing your network and whether or not it is worth the time and effort. Personally if I only had my computer and phone as well as someone else’s devices accessing my network I would go through the trouble of configuring my DHCP, but if I were in a small business or large family with 15 or more nodes on my network I would then set up my DHCP. While setting up DHCP for your home network may not be one hundred percent necessary I believe that it is still a good idea so that you don’t have to preconfigure your IP addresses on your devices. As far as the larger application of a business I think that setting up your DHCP is crucial. Especially in a large business with users who are less knowledgeable as far as computers are designed. If you allowed these users to configure their own IP addresses the results could be disastrous and take a while to fix. Which is why setting up your DHCP is crucial. This......

Words: 292 - Pages: 2

Premium Essay

Lab2

...Lab 2 Part 1: 10 points Learning Objectives and Outcomes * Analyze a mixed-version Microsoft Windows environment and identify the issues described in Microsoft Security Advisories. Assignment Requirements You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network as determined by group memberships. The network consists of computers working on a variety of client platforms, such as Windows XP, Windows Vista, and Windows 7, and server products in a single environment. An example of the network divisions is as follows: * Windows laptops: Traveling salespeople, remote suppliers, branch offices * Windows desktops: Accounting group, developer group, customer service group * Windows servers: Administrative server, Microsoft SharePoint server, Server Message Block (SMB) server Microsoft Common Vulnerability and Exposures (CVEs) are addressed through security advisories with a corresponding advisory ID. Other CVE sources attach a CVE ID to advisories. Go through the archive of Microsoft Security Advisories at http://technet.microsoft.com/en-us/security/advisoryarchive Answer the following questions based on the advisories for the past 12 months: 1. What vulnerabilities exist for the workgroup LAN listed above based on the advisories? List five of them. Explain what could happen to the LAN for each. 1. Update for Vulnerabilities in Adobe Flash Player in Internet Explorer...

Words: 684 - Pages: 3

Premium Essay

Nt1330 Unit 2

...NT1330 Unit 2 Assignment. Due before class Week 3. A. Students will respond to the following technical support email from a junior IT admin with further questions and considerations.   Facilitation   Read the scenario below and respond in detail with clarifying questions, suggested approaches and/or possible solutions.   Dear IT Admin: I am working at a branch office and have been tasked with changing out the DHCP scope to match the overall corporate IP address scheme. The main office assigned me an IP address range of 192.168.0.200 through 192.168.0.225. I changed the scope on Friday afternoon and came in on Monday morning to discover that only some of the workstations had picked up new leases from the new DHCP scope. Any ideas as to what may be happening, what I might check or adjust? Thank you, Junior Admin B. Students will respond to the following technical support email from a junior IT admin with further questions and considerations. Facilitation Read the scenario below and respond in detail with clarifying questions, recommendations and/or considerations. Dear IT Admin: I am working at two branch offices and have been tasked with where to place Active-Directory Integrated DNS Servers and what type to use. One of the branch offices is very small (maybe 5 users) and has very slow network connectivity. Do I need a DNS Server and, if so, which type of zone should it host? The second branch office is much larger (about 30 users) and has......

Words: 276 - Pages: 2

Free Essay

Nt1330-Unit 2 Exercise 1

...NT1330-Unit 2 Exercise 1 DNS Scenario Dear junior IT, Thank you for contacting me regarding your questions, and trust that I will do my best to help you. From what I understand, you work at two branch offices, and have been given the responsibility of discovering where to place an Active-Directory Integrated DNS server. You also have some question of what type DNS server would best meet your company’s needs. First let’s begin with the smaller branch supporting perhaps five user/workstations, with an unusually slow network. The question with such a small branch isn’t really about what kind of DNS server you need, but do you need a DNS server at all. If there is a very high level of file/data sharing, then yes perhaps you could benefit from a server, but configured in a secondary zone, such as an ADI. However, if there is not enough file/data sharing to really warrant the presence of the server, an ADI server could potentially slow down an already sluggish system. Now let’s move on to the second, much larger branch supporting around thirty users. You stated that this branch has a much better network connectivity than its smaller counterpart. In this case, I would recommend a DNS server set up in the primary zone. The primary zone is the primary source of information within this zone. I would also further suggest moving your servers from the smaller branch to your larger branch. All files from the smaller branch could be accessed via a “VPN” remote link. This would......

Words: 287 - Pages: 2

Free Essay

Nt1330 Unit 4 Assignment 1

...NT1330 Unit 4 Assignment 1. AD Design Replication Scenario AD Design Replication Scenario To whom it may concern: I am the IT Administrator for the company and I have been asked to give my recommendations for the Active Directory Replication Design of the two new Branches. The first I can recommend for you is that all the information that is needed for each new site is correctly documented and added to the Root Active Directory through the Active Directory sites and services. This is done because the Root AD automatically builds the inter-site replication topology based on the information provided about the new site connections. Each new site’s AD will have one each domain controller that is known as the inter-site topology generator and they are assigned to build the topology at their sites. To add two new branch offices we will need to find a strategy to design a replication process. To implement this we will need to use inter-site replication. Inter-site replication is needed when adding domain controllers located in different sites. We will also need a site link (Site link is a logical, transitive connection between two sites that allows replication to occur) protocol of Remote Procedure Call (RPC) over Internet Protocol (IP) which is the preferred choice for the replication process. This allows you to communicate with network services on various computers and also keep data secure when being transmitted by using both encryption and......

Words: 580 - Pages: 3

Premium Essay

Unit 2 Assignment Nt1330

...NT1330 Client Server Networking II Mr. Pham Unit 2 Assignment 1 Dear Junior Admin, Regarding your task with changing out the DHCP You can start by checking the workstations and seeing if they have an static IP setup on the network adapter. There are 2 ways to check this. The first way is to click on the run command in the start menu and type cmd and hit enter. Next type in ipconfig /all, depending on how many Network Interface Card or NIC cards are installed (both logically and virtually.) you might get a long list . Look for your main NIC card that you are configuring. Once you find your NIC card that you are looking for, you should see a line that says DHCP Enabled. If there is no static IP address set up then it should say yes. The second way to check is to open the control panel. Find and open the Network and Sharing Center. On the right hand side you should see an option for change adapter settings. Select you main NIC card and right click and select properties. Select and double click on Internet Protocol Version 4 (IPv4). Once the window pops up, make sure that both the radio buttons for obtain IP Address automatically are selected. You should also check to see if each workstation has renewed its DHCP lease. To do this you can repeat the steps in the first way to change the DHCP setup. Once again you want to look for your main NIC card that you are configuring. Once you find your NIC card that you are configuring you should see 2 lines that say Lease......

Words: 357 - Pages: 2

Free Essay

Lab2

...Assessment Worksheet Obtaining Personally Identifiable Information through Internet Research Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored a variety of search engines and social networking Web sites that may contain personal information about you that, in the hands of an identity thief, could compromise and exploit your privacy. You documented the sites that displayed your personal information and suggested methods for controlling access to that information within the specific sites. You also explored the privacy policy of some of the more popular social networking sites. Lab Assessment Questions & Answers 1. Complete the following table to describe the results you discovered about your own personally identifiable information on the Internet. Search Engine Was personal information returned? (Yes or No) Dogpile.com Google.com InstantCheckmate.com AlltheInternet.com WhitePages.com Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Instructor Lab Manual ZabaSearch.com Your local government Web site Facebook LinkedIn Twitter 2. Was there enough personal information returned that......

Words: 435 - Pages: 2

Premium Essay

Lab2

...Laboratory 2 Switches, Lights, and Multiplexers Part I Objectives The purpose of this part is to connect the switches and lights by using FPGA chip with VHDL entity. These switches (SW17-0) represent the inputs of a circuit, and LEDR17-0(red lights) represents the outputs of a circuit. Switches are assigned to the LEDR which means each switch connects one light separately. So when one of the switches is on, the corresponding light will be light. Equipment DE2 package, Altera’s Quartus II Design and Test Procedure 1. Create a new project: to start click File > New Project Wizard > select the directory for storing this project and the same name of the project with directory > select Cyclone II and EP2C35F672C6 as the target chip; 2. Create a new VHDL entity: File > New > VHDL File; 3. Type the VHDL code in this file; 4. Start the calculation and it will be automatically saved; 5. When it is completed, the next step which is the most important thing is importing assignment: Assignments > Import Assignments > select the file (DE2 pin assignments.csv); 6. Save the project and click the compilation; 7. Download the compiled circuit: Tools > Programmer > Hardware Setup > select USB-Blaster > make sure the Program Configure box is checked > Start; 8. Test: for every switches, the red LED lights will turn on when the switch is on Results It is successful when our group does it in the first time. For every......

Words: 2728 - Pages: 11

Premium Essay

Nt1330

...Unit 2 Explore and discuss Assignments EXT2 was the default file system for Linux until EXT3 came along. EXT2 still is a favored file system for Flash and USB drives due the lack of journaling. Journaling requires more writes to the storage unit and can be slow on these external devices. The Flash and USB drives have a limited number of write cycles. The File system Hierarchy Standard (FHS) is a reference describing the conventions used for the layout of a UNIX system. It has been made popular by its use in Linux distributions, but it is used by other UNIX variants as well. The Linux Standard Base (LSB) refers to it as a standard. In the FHS all files and directories appear under the root directory "/", even if they are stored on different physical or virtual devices. Note however that some of these directories may or may not be present on a UNIX system depending on whether certain subsystems, such as the X Window System, are installed. The Linux Standard Base (LSB) is a joint project by several Linux distributions under the organizational structure of the Linux Foundation to standardize the software system structure, including the file system hierarchy used in the GNU/Linux operating system. When targeting Linux as a platform, application developers want to have some assurance that the code they write on one Linux distribution will run on other Linux distributions without having to go through extra effort. This matches their experiences on other popular platforms, such...

Words: 333 - Pages: 2

Premium Essay

Nt1330 Unit 1 Assignment 1

...NT1330 Mr. Ajero Assignment 1 September 14, 2015 DNS – Domain Name System DNS is a hierarchical representation of all the IT devices and their sub-domains in a (company) network. So, in case you see an address like mail.subdomain.company.com, you can easily recognize the name of the system (mail), name of the sub-domain (sub-domain), name of the company (company) and the name of the primary domain (.com). DHCP – Dynamic Host Control Protocol A DHCP server automatically assigns the IP addresses for a device. Any device, before communicating with any other device in the network needs an IP address. These IP addresses are given to the network devices dynamically by a DHCP server (IP addresses ought to be within a certain range and the range is already specified). The IP addresses assigned this way are not permanent – they are actually leased for a certain amount of time to the devices (till they log-out of the network, for example). I believe that two hosts should be sufficient. Using a DHCP Relay Agent would greatly reduce the time necessary for me to set up the name allocation and resolution. If I were to do this manually on a static IP Address, I would have to put a stop to it at 25 machines as it would waste valuable time with trying to get to the other pieces of equipment my client owns. Regardless of if I was getting paid by the hour, I would need extra time for future maintenance and upgrades References DNS and DCHP......

Words: 276 - Pages: 2

Free Essay

Nt1330 Week 2 Assignment

...ITT Technical Institute 3825 West Cheyenne Avenue, Suite 600 North Las Vegas, Nevada 89032 NT1330 Client-Server Networking II Name: ____________________________________________________ Date: _______________________ NT1330 Week 2, Assignment 2 Instructions: 1. Complete this assignment and submit it prior to the beginning of the next class meeting. 2. Completely fill in the bubble for the correct answer(s), any other mark such as an X or just a line through it will be marked as incorrect. 1. DHCP frees system administrators from manually configuring each host on the network. A True B False 2. The smaller the network, the greater the benefit of using a dynamic address assignment. A True B False 3. DHCP provides three key benefits to those managing and maintaining a TCP/IP network. A True B False 4. The key aspect of the DHCP process is that it is dynamic. A True B False 5. Once a DHCP scope is defined and exclusion ranges are applied, the remaining addresses form what is called an available address pool within the scope. A B True False 6. To conserve disk space, DNS servers store only the most recent updates. A True B False 7. The primary DNS server for a zone is not required to perform an incremental zone transfer. A True B False Steve Todd Page 1 of 8 8. For replication of Active Directory–integrated zones, DNS notification is needed. A True B False 9. Scavenging is enabled by default. A True B False 10. As long as the TTL for a cached resource record does not expire...

Words: 1735 - Pages: 7

Premium Essay

Nt1330 Assignment 1

... NT1330 Assignment 1: Introduction to Windows 2008 Network Services 1.) The Domain Name System consists of a hierarchical set of DNS servers. Each domain or subdomain has one or more authoritative DNS servers that publish information about that domain and the nameservers of any domains "beneath" it. The hierarchy of authoritative DNS servers matches the hierarchy of domains. At the top of the hierarchy stand the root nameservers: the servers to query when looking up (resolving) a top-level domain name (TLD) Features • Scalability—Because DNS is capable of distributing workload across several databases or computers, it can scale to handle any level of name resolution required. • Constancy—Host names remain constant even when associated IP addresses change, which makes locating network resources much easier. • Ease of Use—Users access computers using easy-to-remember names such as www. microsoft.com rather than a numerical IP address, such as 192.168.1.100. • Simplicity—Users need to learn only one naming convention to find resources on either the Internet or an intranet. 2.) DHCP stands for Dynamic Host Configuration Protocol. As the name suggests, DHCP is used to control the network configuration of a host through a remote server. DHCP functionality comes installed as a default feature in most of the contemporary operating systems. DHCP is an excellent alternative to the time-consuming manual configuration of network settings on a host or a network device. Features · DHCP......

Words: 1542 - Pages: 7