6-What are the potential disadvantages of using a dynamic and static 1P Address?
ID: 3823704 • Letter: 6
Question
6-What are the potential disadvantages of using a dynamic and static 1P Address?
7-Explain the functionality of a global catalog in the Windows networking.
8-What is the primaty difference between permissions and rights in networking?
9-There are three group scopes in Active Directory: domain local, global, and universal. Describe, in your own words, the
recommended use of groups and their corresponding memberships.
10-Explain the following terms, and provide examp: command-line tools for managing active directory multiple user's creation and
TCP/IP protocol.
Explanation / Answer
Disadvantages of dynamic IP address
-Using dynamic IP address means our Internet provider will constantly change our IP address usually every hour which results in a gap in the user's connection. Our machine sometimes can also have trouble connecting to Intternet again as soon as our IP is changed
-Dynamic IP address needs an extra effort from administrators to setup since there requires a seperate program to constantly change the IP's.
Disadvantages of Static IP
The major disadvantage of static IP is security,since our machine is running on a constant IP it becomes vulnerable to hacking because hackers need not concentrate on chnaging Ip's they just have to hack 1 IP.
Static IP's are mainly used by servers which is connected by a lot of computers .To maintain the connection with all computers in network a server has to be up all the time which is quite costly.
ans7)functionality of a global catalog in the Windows networking
A global catalog searches for the objects in all domains regardless of where data is stored.
A global catalog server resolves a user principal name when the authenticating domain controller has no idea of the user account
It Supplies universal group membership information in a multi domain setup.
8)difference between permissions and rights in networking
1.Permissions are given to OBJECTS like to folder, files, printers,shares, drives registry entries
2. Permissions are handled by Access Control Lists
RIGHTS are given to Security Principles and they are system related not object related for example rights are applied to change settings of system, any screen
2. Rights are handled by Security Policies.
10) TCP/IP model is a collection of rules to setup a network. it is a four layer architecture.TCP/IP tells how the data should be converted to bits and bits should be packaged into packects then sent over the wire to its destination and at last received.
The four layers are
Application layer
Transport layer
Internet layer
Network Interface layer.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.