CCNA Security Chapter 2 Exam v2

An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.) Enable inbound vty SSH sessions. Generate two-way pre-shared keys. Configure DNS on the router. Configure the IP domain name on […]
Continue reading…

 

IPv4 Addresses and Subnet Masks

The Format of an IPv4 Address An IPv4 address can be written in two ways: dotted decimal notation – 192.168.1.1 32-bit binary notation – 11000000.10101000.00000001.00000001 The address has 4 octets separated by periods and counted from let to right. There are three types of IPv4 addresses: a network address, a host address, and a broadcast […]
Continue reading…

 

CCNA Routing and Switching

The CCNA R&S certification validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks. CCNA certified professionals have the knowledge and skills to make connections to remote sites via a WAN, and mitigate basic security threats. CCNA R&S training covers (but is not limited to) the use of these  topics: IOS, […]
Continue reading…

 

Domain Functional Levels

Domain Functional Levels Active Directory has functional levels at the domain and forest levels which determine which Active Directory features are available. The higher the functional level the more features available. This video looks at which domain functional levels are available and how to raise the domain functional level to get access to these features. […]
Continue reading…

 

External time source

External time source In any environment you need to ensure that the time and date on your computers is set correctly. If the time drifts too far from the correct time, this can cause problems logging in to the network and cause time sensitive authentication systems to fail. This video looks at keeping computers in […]
Continue reading…

 

Seizing Operation Master Roles

Seizing Operation Master Roles Active Directory has five operational master roles that can be transferred from domain controller to domain controller as required. In some cases the role may not be able to be transferred; for example, if the hardware on the domain controller was to fail, a transfer cannot be made. When this occurs, […]
Continue reading…

 

Operators Master Role Placement Global Catalog

Operators Master Role Placement Global Catalog In Active Directory there are five operations master roles known as FSMO roles. This video looks at which Domain Controllers you should put these roles on and also which Domain Controllers you should make into Global Catalog Servers. There are five operations master roles. The Schema and Domain Naming […]
Continue reading…

 

Moving operation roles

Moving operation roles Active Directory has 5 operations master roles. These roles can be moved from Domain Controller to Domain Controller. Two are at the forest level and three are at the domain level. This video looks at how to move these operations roles from one Domain Controller to another. How To Points The 3 […]
Continue reading…

 

Operation Master Role

Operation Master Role Active Directory has five operations master roles otherwise known as FSMO roles. These roles are assigned to one Domain Controller to ensure changes happen in only one location at a time. This ensures that the Active Directory database is kept consistent. This video goes through the five operations master roles. At the […]
Continue reading…