Term
List 2 standard protocols used for simple email clients. |
|
Definition
|
|
Term
Email software component responsible for delivering messages from the client to the correct mailbox |
|
Definition
|
|
Term
Software component to assist the core post office in transferring messages between mailboxes. |
|
Definition
MTA (Message Transfer Agent) |
|
|
Term
What is the location where you will find the setup for the client for groupwise on the Groupwise CD? |
|
Definition
G:\EMail\Grpwise\Software\Client\Win32 folder |
|
|
Term
Which Netware 6 web services use apache web server? 5 of them.. |
|
Definition
• NetWare Web Manager • NetWare Web Search Server • NetWare WebAccess • iFolder • iManager |
|
|
Term
|
Definition
A set of hardware and software components that provide WWW and FTP information services to clients located on the Internet or company intranet |
|
|
Term
How do you block inheritance for a file system? |
|
Definition
You can change the rights to the subfolders restricting or not allowing access |
|
|
Term
Define Trusted, untrusted, and unknown networks |
|
Definition
Trusted Network a network with an IP address range that’s known to be safe or can be controlled and monitored by your organization.
Untrusted Network – an IP address range that might contain hackers or other malicious entities. Packets from networks listed as untrusted are inspected by the network firewall.
Unknown network - A network that is not specified as a trusted or untrusted network in a firewall. Firewalls treat unknown networks as untrusted networks. |
|
|
Term
The purpose of a firewall? What is it designed to do? |
|
Definition
Firewalls are used to protect your computer and data from the potential hazards of the Internet. Computer firewalls control access between the company’s private network and an untrusted external entity on the Internet. Firewalls consist of software that run on a server or specialized hardware, such as a network router. |
|
|
Term
What is the Purpose of the Rconsolej utility? |
|
Definition
A NetWare java-based remote console tool that enables an administrator to access a server’s console screen from ConsoleOne |
|
|
Term
What method is used to encrypt ifolder content? |
|
Definition
iFolder uses the Blowfish encryption scheme that Bruce Schneier created in 1993. It is a fast symmetric block cipher designed as an alternative to the Data Encryption Standard (DES). In encryption, fast is good. Blowfish can use keys from 32 bits to 448 bits to encrypt data. Novell uses 128—bit keys for iFolder encryption. |
|
|
Term
How much free space is required on the sys volume for ifolder? |
|
Definition
The iFolder server must have 10 MB of free space on the SYS volume |
|
|
Term
What is the purpose of the Remote Manager Utility? |
|
Definition
Remote Manager — A Novell OneNet utility that enables a network administrator to manage a NetWare server console from a Web browser. |
|
|
Term
What is the purpose of Novell NetStorage? |
|
Definition
Novell Net Storage — A NetWare service that gives users secure access to files on the NetWare server from any Internet location. |
|
|
Term
Briefly define each type of login script |
|
Definition
container login script — A login script stored in a container object and used by all users in the container unless the user is assigned a profile login script or has a user login script. default login script —The login script that’s used if no other login script exists for a user.
profile login script — A login script stored in a Profile object and used by all users assigned to that script.
user login script — A login script stored in a User Object; this script runs for only an single user. |
|
|
Term
What is the purpose of IMonitor? |
|
Definition
The iMonitor program provides monitoring and diagnostic capabilities for all servers in the eDirectory tree |
|
|
Term
What is Ifolder and its purpose? |
|
Definition
iFolder — A NetWare service that enables files to be kept on a local computer (or one that’s not attached to the network) and synchronized with the network. With ifolder , users can have automatic, secure, and transparent synchronization of files between their hard drives and the iFolder server. |
|
|
Term
Which statements are part of the client default login script? |
|
Definition
• MAP *1:SYS: (maps the first network drive to the SYS volume) • MAP INS S1:SYS:Public (maps the first search drive to the Public directory) |
|
|
Term
What is the sequence of login script processing? |
|
Definition
A good way to remember the sequence of login script processing is the acronym CPU, for container, profile, user login scripts. |
|
|
Term
Define public access printers |
|
Definition
Public access printers are available to anyone with a attachment to the network. |
|
|
Term
What is the purpose of a print queue? |
|
Definition
The print queue represents a holding area where print jobs are kept until the printer is available. In Netware, a print queue is a subdirectory of the Queues directory, located in the volume specified during print queue creation. |
|
|
Term
Define iprint and its purpose? |
|
Definition
Iprint is Novell’s implementation of the IPP protocol that makes it possible to access and manage NDPS printers through a Web Browser. |
|
|
Term
Define IPP and its purpose. |
|
Definition
IPP ( Internet Printing Protocol) is an Industry –standard protocol that enables printers to be installed, managed, and accessed from a Web browser. |
|
|
Term
What are controlled access printers? |
|
Definition
controlled access printer -— An NDPS printer that exists as an object in the eDirectory tree. By default, only users in the same container as the controlled access printer can send output to it. |
|
|
Term
Which utilities are used in Netware 6 to create and manage objects |
|
Definition
In NetWare 6, you can use ConsoleOne, NetWare Administrator, or the new iManager Internet utility to create and manage User and Group objects |
|
|
Term
What is the purpose of intruder detection and where is it set? |
|
Definition
Intruder detection works at the container level by setting a limit on the number of incorrect login attempts that can be made 0n a user account in that container during a specified time period. To work with Intruder Detection, right—click on the container in ConsoleOne, select Properties, click the down arrow on the General tab, and then click the Intruder Detection option to open the Intruder Detection dialog box |
|
|
Term
The max # of characters for a username? |
|
Definition
Usernames can be up to 64 characters. |
|
|
Term
Option used to force users to periodically change passwords |
|
Definition
is called “Force Periodic Password Change” . The default is set to 40 days. |
|
|
Term
Standardized client – server protocol used for sending/receiving email between email client and email server. |
|
Definition
|
|
Term
What is the purpose of the NDPS Manager |
|
Definition
NDPS Manager consists of software and an eDirectory object used to create, manage, and run printer agents for printers without embedded printer agents. |
|
|
Term
Define Public Key Cryptography |
|
Definition
public key cryptography —An Internet security system that uses public and private keys to encrypt and decrypt data and create digital signatures for authenticating users. |
|
|
Term
How must a login script variable be formatted (typed) in order for it to be executed properly? |
|
Definition
with a % followed by the variable in caps |
|
|
Term
Why was queue based printing designed? What version of Novell was it implemented? |
|
Definition
Available since Netware 3, queue-based printing was designed to support simple printers and DOS—based applications |
|
|
Term
List a utility in Netware 6 used for remote management |
|
Definition
Remote Manager enables a network administrator to manage a NetWare server from a Web Browser. |
|
|
Term
What is the purpose of checking off “run scripts” on the Novell Client login screen? |
|
Definition
You use the Run scripts checkbox to control whether the user’s workstation processes login script commands |
|
|
Term
What is Novell Portal Services? Describe? |
|
Definition
Novell Portal Services (NPS) —A Net Services component running on a NetWare server that provides customized pages or portals for users based on users’ rights and personal style specifications. |
|
|
Term
Standardized protocol used to access and store messages from a post office server |
|
Definition
|
|
Term
An ifolder component which allows for administrative tasks |
|
Definition
Server Management Console – The iFolder component that enables network administrators to perform administrative tasks, such as managing iFolder user accounts. |
|
|
Term
When testing login scripts you should?? |
|
Definition
When testing login scripts you should consider using MAP DISPLAY ON and MAP ERRORS ON |
|
|
Term
Define the implementations of Novell’s printer gateways |
|
Definition
When you create a printer agent, in addition to selecting the NDPS Manager to host the agent, you need to identify the gateway and the physical printer’s make, model, and connection information (port and address). To send output from the printer agent to the correct printer, you configure a gateway with the connection information that identifies the correct physical printer. |
|
|
Term
Define Trustee , rights , acl . |
|
Definition
Trustee – A user given access to eDirectory objects or network file system directories and files. Access is given when rights are assigned or granted to the user or another eDirectory object the user is associated with.
Rights – When referring to eDirectory or the network file system, the type of access that has been granted or assigned to a user, who is called a trustee. In eDirectory, there are entry rights and attribute rights; the network file system has directory rights and file rights.
ACL (Access Control List) – A property of an eDirectory object that’ stores the trustee list for that object. |
|
|
Term
Define how inherited rights and irf function |
|
Definition
Inherited rights -Rights that flow down into a container object, directory, or file from a higher level.
Inherited Rights Filter (IRF) — Each container object, directory, and file contains an IRF that controls what access rights can flow down to the container object, directory. or file from a higher level. |
|
|
Term
What is the purpose of a user template? |
|
Definition
A user Template defines certain standard settings you want to establish for each user created with that template. |
|
|
Term
This is used to prohibit users from logging in from different workstations |
|
Definition
Address Restrictions are used to limit a user to logging in from only certain workstation addresses. |
|
|
Term
What is the default grace login for Novell? |
|
Definition
The default grace period prevents users from being accidently locked out from the network after their passwords expire, and it also keeps users from using an expired password indefinitely.. the default is 6 |
|
|