Advantages and disadvantages of implementing a dfs

Assignment Help Computer Engineering
Reference no: EM133242

Question

You have been hired out as a contractor to Dover Leasing Company. Dover Leasing is in a process of reviewing its current structure and practices. There have been instances of minor security breaches in which users were able to gain access to information they shouldn't be permitted to view. Management would like you to create some recommendations on how permissions can be changed on specific folders.

Task

1. Two network servers continue confidential information pertaining to financial data and employee data. Users access folders both locally and on network. Only members of Managers group, Human Resources group, and Accounts group should have access to these folders. Describe how permissions can be implemented, including a short description of how shared folder permissions and NTFS permissions work together.

2. Dover Leasing has in recent times hired a new server administrator. Set up a brief explanation for new administrator about how to configure NTFS permissions for the dissimilar groups on the network.

3. The new server administrator has heard about a Distributed File System, but does not know if it is suitable for Dover Leasing. Arrange a brief explanation for new administrator that discusses advantages and disadvantages of implementing a DFS for this size of business, along with a recommendation for or against, and give appropriate reasons.

Reference no: EM133242

Questions Cloud

Evaluate the amount of gross income : Evaluate the amount of gross income to be recognized from the installment sale in 2013, 2014, 2015, and 2016 using point of delivery revenue recognition.
Essential elements of a design pattern : configuration of an Iterator pattern, patterns could be used in a Library System, Singleton, Template, Decorator, Façade,What does Alexander means by the following declaration "But it is impossible to form anything which has the temperament of natu..
Discuss two major kinds of resources : Discuss two major kinds of resources Discuss four approaches to natural resources management Discuss two new tools for resource management
What is the memory operations dominate execution time : What is  the memory operations dominate execution time
Advantages and disadvantages of implementing a dfs : Advantages and disadvantages of implementing a DFS
Enterprise application that integrates the erp concept : Presentation Server, Application Server, Database Server, Software application Architecture, SAP approach to a traditional Information system, benefits and drawbacks of SAP, different SAP application modules, automation and process of enterprise appl..
Tcp connections experience data segment loss : TCP connections experience data segment loss
Private base class function declared public in derived class : Private base class function declared public in derived class
How to explain capacity of the queue : How to explain capacity of the queue

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain the reason for the project development

Two members of your project development team are differing about relative significance of training and documentation.

  Write a program on simple game

Write a program on simple game.

  Write a non-recursive version of the process fibonacci

Write a non-recursive version of the process Fibonacci

  Describes a function named insidecircle

Describes a function named insideCircle

  Write down specification for the adt as a java interface

Write down specification for the ADT as a java interface

  Write down an automated checkout program

Write down an automated checkout program

  Illustrate precedence graph

Illustrate precedence graph

  How to generate paper for pair of public or private rsa key

How to generate paper for a pair of public or private RSA keys? The high-class reporter for foreign affairs learned about asymmetric cryptography, and proposed to security team at the paper to generate for a pair of public or private RSA keys.

  Write pseudo code - program and draw flow chart

Write pseudo code, program and draw flow chart for programs

  What are the types of malicious attack

What are the types of malicious attack

  What are all of ip addresses

What are all of IP addresses

  Suggest all sources using APA style

Suggest all sources using APA style

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd