1. How would you set up and start an unattended upgrade of Windows Server 2003 using a CD-ROM?
Use from windows xp source from support folder use setup mgr and make your unattended file and make your unattended txt file you can merge or inject it with your source in I386 folder or but it in disk and use it .
2. How can you determine who has been logging on to your servers and accessing resources?
You can know from event viewer who log and when he log and what resources open
3. How does a computer decide whether or not data should be sent to the computer’s default gateway? Answer by using an example.
I don't understand this question plz explan more …..
4. What is the difference between a certificate authority that you create and a commercial certificate authority like VeriSign?
The certificate authority is sure for more security and the different that your own certificate u desion u have to have a cer server install on it and it's have always open to user authentic from this server
But Verisign you buy your cer from this company and it's for public use this section have many and many details u have to read and if u need any more information just ask
5. What is the difference between a symmetric key and an asymmetric key?
there are sure both of encryption mothed but here is difrrent betwen them
1- the symmetric algorithms
this use a only one key for encryption that meen for the reciver and the sender they use the same key for encript and also decript or for for en- and decryption
Once somebody else gets to know the key, it is not safe any more
this mothed ues this encription DES, Triple-DES (3DES), IDEA, CAST5, BLOWFISH, TWOFISH
it's more secure than the first one it's use to key privte key and public key
One is used for encryption and the other one for decryption
The decryption key is typically kept secretly, therefore called ``private key'' or ``secret key'', while the encryption key is spread to all who might want to send encrypted messages, therefore called ``public key''. Everybody having the public key is able to send encrypted messages to the owner of the secret key. The secret key can't be reconstructed from the public key
so this one is very hard to compromise than the first one coz it's use to key .
i hope it's been helping you in ur question
I will go now and I inshallah I will answer all other question soon and where is reall mcse guy not a mcse dunmper