Term
| List 2 standard protocols used for simple email clients. |
|
Definition
|
|
Term
| Email software component responsible for delivering messages from the client to the correct mailbox |
|
Definition
|
|
Term
| Software component to assist the core post office in transferring messages between mailboxes. |
|
Definition
| MTA (Message Transfer Agent) |
|
|
Term
| What is the location where you will find the setup for the client for groupwise on the Groupwise CD? |
|
Definition
| G:\EMail\Grpwise\Software\Client\Win32 folder |
|
|
Term
| Which Netware 6 web services use apache web server? 5 of them.. |
|
Definition
• NetWare Web Manager • NetWare Web Search Server • NetWare WebAccess • iFolder • iManager |
|
|
Term
|
Definition
| A set of hardware and software components that provide WWW and FTP information services to clients located on the Internet or company intranet |
|
|
Term
| How do you block inheritance for a file system? |
|
Definition
| You can change the rights to the subfolders restricting or not allowing access |
|
|
Term
| Define Trusted, untrusted, and unknown networks |
|
Definition
Trusted Network a network with an IP address range that’s known to be safe or can be controlled and monitored by your organization.
Untrusted Network – an IP address range that might contain hackers or other malicious entities. Packets from networks listed as untrusted are inspected by the network firewall.
Unknown network - A network that is not specified as a trusted or untrusted network in a firewall. Firewalls treat unknown networks as untrusted networks. |
|
|
Term
| The purpose of a firewall? What is it designed to do? |
|
Definition
| Firewalls are used to protect your computer and data from the potential hazards of the Internet. Computer firewalls control access between the company’s private network and an untrusted external entity on the Internet. Firewalls consist of software that run on a server or specialized hardware, such as a network router. |
|
|
Term
| What is the Purpose of the Rconsolej utility? |
|
Definition
| A NetWare java-based remote console tool that enables an administrator to access a server’s console screen from ConsoleOne |
|
|
Term
| What method is used to encrypt ifolder content? |
|
Definition
| iFolder uses the Blowfish encryption scheme that Bruce Schneier created in 1993. It is a fast symmetric block cipher designed as an alternative to the Data Encryption Standard (DES). In encryption, fast is good. Blowfish can use keys from 32 bits to 448 bits to encrypt data. Novell uses 128—bit keys for iFolder encryption. |
|
|
Term
| How much free space is required on the sys volume for ifolder? |
|
Definition
| The iFolder server must have 10 MB of free space on the SYS volume |
|
|
Term
| What is the purpose of the Remote Manager Utility? |
|
Definition
| Remote Manager — A Novell OneNet utility that enables a network administrator to manage a NetWare server console from a Web browser. |
|
|
Term
| What is the purpose of Novell NetStorage? |
|
Definition
| Novell Net Storage — A NetWare service that gives users secure access to files on the NetWare server from any Internet location. |
|
|
Term
| Briefly define each type of login script |
|
Definition
container login script — A login script stored in a container object and used by all users in the container unless the user is assigned a profile login script or has a user login script. default login script —The login script that’s used if no other login script exists for a user.
profile login script — A login script stored in a Profile object and used by all users assigned to that script.
user login script — A login script stored in a User Object; this script runs for only an single user. |
|
|
Term
| What is the purpose of IMonitor? |
|
Definition
| The iMonitor program provides monitoring and diagnostic capabilities for all servers in the eDirectory tree |
|
|
Term
| What is Ifolder and its purpose? |
|
Definition
| iFolder — A NetWare service that enables files to be kept on a local computer (or one that’s not attached to the network) and synchronized with the network. With ifolder , users can have automatic, secure, and transparent synchronization of files between their hard drives and the iFolder server. |
|
|
Term
| Which statements are part of the client default login script? |
|
Definition
• MAP *1:SYS: (maps the first network drive to the SYS volume) • MAP INS S1:SYS:Public (maps the first search drive to the Public directory) |
|
|
Term
| What is the sequence of login script processing? |
|
Definition
| A good way to remember the sequence of login script processing is the acronym CPU, for container, profile, user login scripts. |
|
|
Term
| Define public access printers |
|
Definition
| Public access printers are available to anyone with a attachment to the network. |
|
|
Term
| What is the purpose of a print queue? |
|
Definition
| The print queue represents a holding area where print jobs are kept until the printer is available. In Netware, a print queue is a subdirectory of the Queues directory, located in the volume specified during print queue creation. |
|
|
Term
| Define iprint and its purpose? |
|
Definition
| Iprint is Novell’s implementation of the IPP protocol that makes it possible to access and manage NDPS printers through a Web Browser. |
|
|
Term
| Define IPP and its purpose. |
|
Definition
| IPP ( Internet Printing Protocol) is an Industry –standard protocol that enables printers to be installed, managed, and accessed from a Web browser. |
|
|
Term
| What are controlled access printers? |
|
Definition
| controlled access printer -— An NDPS printer that exists as an object in the eDirectory tree. By default, only users in the same container as the controlled access printer can send output to it. |
|
|
Term
| Which utilities are used in Netware 6 to create and manage objects |
|
Definition
| In NetWare 6, you can use ConsoleOne, NetWare Administrator, or the new iManager Internet utility to create and manage User and Group objects |
|
|
Term
| What is the purpose of intruder detection and where is it set? |
|
Definition
| Intruder detection works at the container level by setting a limit on the number of incorrect login attempts that can be made 0n a user account in that container during a specified time period. To work with Intruder Detection, right—click on the container in ConsoleOne, select Properties, click the down arrow on the General tab, and then click the Intruder Detection option to open the Intruder Detection dialog box |
|
|
Term
| The max # of characters for a username? |
|
Definition
| Usernames can be up to 64 characters. |
|
|
Term
| Option used to force users to periodically change passwords |
|
Definition
| is called “Force Periodic Password Change” . The default is set to 40 days. |
|
|
Term
| Standardized client – server protocol used for sending/receiving email between email client and email server. |
|
Definition
|
|
Term
| What is the purpose of the NDPS Manager |
|
Definition
| NDPS Manager consists of software and an eDirectory object used to create, manage, and run printer agents for printers without embedded printer agents. |
|
|
Term
| Define Public Key Cryptography |
|
Definition
| public key cryptography —An Internet security system that uses public and private keys to encrypt and decrypt data and create digital signatures for authenticating users. |
|
|
Term
| How must a login script variable be formatted (typed) in order for it to be executed properly? |
|
Definition
| with a % followed by the variable in caps |
|
|
Term
| Why was queue based printing designed? What version of Novell was it implemented? |
|
Definition
| Available since Netware 3, queue-based printing was designed to support simple printers and DOS—based applications |
|
|
Term
| List a utility in Netware 6 used for remote management |
|
Definition
| Remote Manager enables a network administrator to manage a NetWare server from a Web Browser. |
|
|
Term
| What is the purpose of checking off “run scripts” on the Novell Client login screen? |
|
Definition
| You use the Run scripts checkbox to control whether the user’s workstation processes login script commands |
|
|
Term
| What is Novell Portal Services? Describe? |
|
Definition
| Novell Portal Services (NPS) —A Net Services component running on a NetWare server that provides customized pages or portals for users based on users’ rights and personal style specifications. |
|
|
Term
| Standardized protocol used to access and store messages from a post office server |
|
Definition
|
|
Term
| An ifolder component which allows for administrative tasks |
|
Definition
| Server Management Console – The iFolder component that enables network administrators to perform administrative tasks, such as managing iFolder user accounts. |
|
|
Term
| When testing login scripts you should?? |
|
Definition
| When testing login scripts you should consider using MAP DISPLAY ON and MAP ERRORS ON |
|
|
Term
| Define the implementations of Novell’s printer gateways |
|
Definition
| When you create a printer agent, in addition to selecting the NDPS Manager to host the agent, you need to identify the gateway and the physical printer’s make, model, and connection information (port and address). To send output from the printer agent to the correct printer, you configure a gateway with the connection information that identifies the correct physical printer. |
|
|
Term
| Define Trustee , rights , acl . |
|
Definition
Trustee – A user given access to eDirectory objects or network file system directories and files. Access is given when rights are assigned or granted to the user or another eDirectory object the user is associated with.
Rights – When referring to eDirectory or the network file system, the type of access that has been granted or assigned to a user, who is called a trustee. In eDirectory, there are entry rights and attribute rights; the network file system has directory rights and file rights.
ACL (Access Control List) – A property of an eDirectory object that’ stores the trustee list for that object. |
|
|
Term
| Define how inherited rights and irf function |
|
Definition
Inherited rights -Rights that flow down into a container object, directory, or file from a higher level.
Inherited Rights Filter (IRF) — Each container object, directory, and file contains an IRF that controls what access rights can flow down to the container object, directory. or file from a higher level. |
|
|
Term
| What is the purpose of a user template? |
|
Definition
| A user Template defines certain standard settings you want to establish for each user created with that template. |
|
|
Term
| This is used to prohibit users from logging in from different workstations |
|
Definition
| Address Restrictions are used to limit a user to logging in from only certain workstation addresses. |
|
|
Term
| What is the default grace login for Novell? |
|
Definition
| The default grace period prevents users from being accidently locked out from the network after their passwords expire, and it also keeps users from using an expired password indefinitely.. the default is 6 |
|
|