Inistalling and Configuring Windows Server
1. What upgrade options exist for moving from Server 2008 (R2) to Server 2012? What limitations or caveats should be considered when upgrading? Would you typically recommend a clean install or an in-place upgrade when attempting to move a service from Server 2008 to 2012, and why?
2. Describe a scenario in which you’d use Server Core, including a description of the services that you might install on the server, and the advantages and disadvantages of using Server Core.
3. Consider a data center heavily built on Hyper-V (or VMware) and the ability to clone virtual machines from template VMs or from other existing VMs. For a highly virtualized data center, how does this change the deployment options available from traditional data centers? Is there any benefit or need in using some of the traditional deployment options (e.g., disk imaging using software like Ghost, deploying operating systems using Windows Deployment Services and the Windows Automated Installation Kit or Microsoft Deployment Toolkit)?
4. Using tools mentioned in the chapter (or other tools), research one of these domains: microsoft.com, cnn.com, icann.org, wikipedia.org, google.com. Your goal is to find out publicly available information about each domain including domain registration information and DNS records. Provide the following for the domain chosen, providing details on how you found the information:
lDomain admin e-mail address
lDomain expiration date
lName servers for the domain
lAt least 2 A records in the domain
lAt least 1 MX record in the domain
5. What are some good practices when deploying directory services?
6. What factors might an organization consider when choosing to implement an AD-integrated DNS zone versus a traditional zone? Describe a scenario in which it would be preferable not to integrate a DNS zone into AD. Since the DNS zones can be hosted on specific AD domain controllers, what factor(s) might go into deciding which DCs will host DNS?
7. From what security risks does EFS offer protection, and from what risks does it not offer protection? In your own words, describe what a “FEK” is and how it’s used? Feel free to research EFS at http://technet.microsoft.com/en-us/library/cc962103.aspx. With some detail, how can multiple people be granted access to an EFS-encrypted file?
8. NTFS “disk quotas” and FSRM quotas are implemented and function differently. In your own words, what are the differences between NTFS disk quotas and FSRM quotas? How do each actually determine usage? Why might an organization choose to use one over the other?
9. Discuss some of the benefits and disadvantages of using group policy in an organization.
10. Describe TCP and UDP, and how they differ. Why do both protocols exist?
11. In your own words, briefly describe each of the address types mentioned in LabSim, and provide a scenario when each is useful for an organization. In particular, differentiate link-local, unique local and global addresses.
12. LabSim describes the ISATAP, 6to4 and Teredo transition technologies for IPv6. In your own words, define one (in a way that differentiates it from the others). Then, do one of the following:
lDescribe a realistic scenario (with some details) for using the technology you chose
lLocate a case study or other online article (of that technology or IPv6 transition in general) and provide your thoughts on it
lIf your organization is undergoing (or underwent) an IPv6 transition, discuss some of the details
13. Consider the types of systems that benefit from DHCP reservations and/or from having manually-configured (static) IP addresses, including servers, networked printers, and other networked devices (e.g., network-connected HVAC controllers, IP camera systems). One option is to configure DHCP reservations and allow the devices to use DHCP to consistently get the same address; another option is to configure static addresses on the devices themselves and leave the addresses out of any DHCP scopes (or just to reserve them in DHCP). For the scenarios mentioned above (e.g., servers, networked printers, other similar networked devices), would you recommend static configuration on the devices or DHCP reservations? Why? Are some types of devices better suited to DHCP than others?
14. Provide a brief description for each DHCP message that would be exchanged, in order, if the DHCP server is in the middle of rebooting during an initial lease request but comes up seconds later. Answers might be slightly different depending on when you choose exactly for the DHCP server to come online. Feel free to use a diagram if you wish, and provide a rough description of timing of the messages and/or duration between them.
15. Consider a large network with many desktops, laptops, and networked printers. What are the advantages and disadvantages of short versus long lease times? Consider if the DHCP server is unavailable for a short time – what are the impacts if lease time is short, or if lease time is long? What do you expect is a typical lease time for most large organizations with desktops, servers, wireless devices, networked printers and other networked devices (e.g., network-connected HVAC controllers, IP camera systems)?