Вы находитесь на странице: 1из 6

1

LAB 4
CONFIGURING AND
MANAGING THE DNS
SERVER ROLE
Question
1
What is the name of the computer from which you are
working?
w2k8xx
w2k8xx.lucernepublishing.com

Question
2
What is the name of the computer from which you are
working?
w2k8yy
w2k8yy.lucernepublishing.com

Question
3
What forward lookup zones are currently configured on the
W2K8xx computer?
There are no currently configured forward lookup zones

Question
4
What types of zones can you configure from this screen?
Primary, secondary, stub

Question
What is the default selection on the Zone File screen?
5 Primary Zone

Question
6
Why is the allow only secure dynamic updates option
greyed out?
Only available for AD integrated servers

Question
7
What records are configured for the contoso.com zone?
(same as parent folder) Start of authority
(same as parent folder) Name Server

Question
8
What is the default selection on the Zone File screen?
Primary Zone

Question
9
What forward lookup zones are currently configured on the
W2K8xx computer?
Contoso.com

Question
10
What forward lookup zones are currently configured on the
W2K8xx computer?
Adatum.com

Question
11
What reverse lookup zones are currently configured on the
W2K8xx computer?
There are none

Question
12
What reverse lookup zones are currently configured on the
W2K8yy computer?
There are none

Question
13
What happens to the green "Refresh" button in the DNS
MMC when you click "Transfer From Master?"
I was able to use the refresh in the drop menu to display the
zone transer information


LAB REVIEW QUESTIONS
Completion time 15 minutes
1. In your own words, describe what you learned by completing this lab.
In Lab 4, I learned how to install the DNS server role. In addion to learning how
to test DNS functionalitiy, I learned how to configure primary zones, secondary
zones, zone transfers, and reverse lookup zones. Seeing how zone transfers work
was really beneficial.
2. You are able to resolve the names of the W2K8xx, W2K8yy, and CORExx
computers. Are you able to ping these computers? Why or why not?
It is possible, but not a given. For example, if rules are established to block
TCP/IP traffic, the ping would be unsuccessful.
3. You want to have only secure dynamic updates for a DNS zone file. Which type
of zone file must you have?
In order to only have secure dynamic updates for a DNS zone file, the zone must
be enabled in AD.
4. When do you use forwarding with DNS? Give one example.
A typical example of using DNS forwarders is to forward Internet DNS queries from
your internal DNS server to those belonging to your Internet Service Provider.

5. What is the difference between forwarding and conditional forwarding?
Forwarding forwards queries on the basis of DNS server location, while
conditional forwarding forwards queries on the basis of domain name.
LAB 5
CONFIGURING
ROUTING AND
REMOTE ACCESS
(RRAS)
Question
1
What are the names of the network connections installed on
this computer?
External
Internal

Question
3
Do you receive a ping response? Why or why not?
Yes. It can ping itself.

Question
4
Do you receive a ping response? Why or why not?
Yes. The internal and external cards are on the same virtual
machine. Again, the machine can ping itself.

Question
5
Do you receive a ping response? Why or why not?
Yes. The two machines are connected.

Question
Do you receive a ping response? Why or why not?
6 No

Question
7
Do you receive a ping response? Why or why not?
Yes. The machine can ping itself.

Question
8
Do you receive a ping response? Why or why not?
Yes. The machine is again pinging itself. I think it is happy

Question
9
Do you receive a ping response? Why or why not?
Yes. Rules allow this with the open internal card.

Question
10
Do you receive a ping response? Why or why not?
No.

Question
11
Do you receive a ping response? Why or why not?
Yes. The ping response is being routed.

Question
12
Do you receive a ping response? Why or why not?
Yes. The ping response is being routed.

Question
13
What Network Policies are configured by default?
Connections to Microsoft RRAS
Connections to other access servers

Question
What Access type is configured for these policies?
14 Deny access (to both)

Question
15
Name three types of conditions that you can add to a Network
Policy
Group, HCAP, Day and Time

Question
16
What are the default authentication methods that are
selected?
MS-CHAP-v2
MS-CHAP

LAB REVIEW QUESTIONS
Completion time 15 minutes
1. In your own words, describe what you learned by completing this lab.
In lab 5, my favorite lab to date, I learned about the Windows routing table and
how to manage it. The configuration of static IP addresses and creating firewall
exceptions was straight forward. I also learned to how to install and configure
RRAR on the server. In addition, I learned to configure LAN routing and VPNs,
as well as how to configure them.
2. When creating a Network Policy, what are the built-in constraints that you can
define?
Authentication mehods, idle timeout, session timeout, called station ID, day and
time restrictions, NAS port type
3. If multiple network policies exist that match a particular users connection
attempt, which one will be applied?
The strictest policy will be applied .
4. What is the default mechanism for auditing remote access connections?
Windows firewall is the default mechanism for auditing remote access
connections

Вам также может понравиться