Reference no: EM131269987
Activity 1:
Research the required commands to configure Windows Server 2012 R2 using Powershell.
Deploy and configure a domain controller and a server in that domain using only the Server Core mode of Server 2012 R2 using your researched commands.
Write a brief report based on the above task. Use the following headings.
- Objective
- Method
- Observations
- Discussion
When writing observations, include a comparison to the graphical user interface (GUI) mode of performing the same tasks, as well as any difficulties you had.
Under the discussion heading, pick two topics from the previous semester and research the process of configuring them using Server Core and powershell.
Compare the powershell process to using the Graphical User Interface to perform the same configurations.
2 Pages maximum for whole report.
Activity 2
Discussion Questions:
1. Research two different certificate authorities and compare the certificates and services they provide.
2. Explain the different methods of certificate enrollment, with an example of where you might use each.
Activity 3
AD CS Lab Report with the following headings.
Refer to Orin Thomas, Chapter 4 for lab steps.
Headings:
- Objective
- Method
- Observations
Activity 4
Discussion Questions:
1. Your IT firm wants to implement an NFS system for their UNIX and Linux clients to access shared files on the predominantly windows network.
Research and explain how you would do this.
2. The firm is having issues with employees in a branch office having delays in accessing their shared files due to high network load.
What windows feature could help alleviate this network load? How would you configure this feature both in an office with a primary server and without one?
Activity 5
Complete practice exercises 1-12 in chapter 9 of the Orin Thomas reading (page 649).
Write a lab report based on the lab.
Activity 6
1. Briefly describe each type of trust and an give example of a situation where it would be appropriate to use. (Transitive, Forest, External, Realm, Shortcut)
2. Explain the difference between selective authentication, domain-wide authentication and forest-wide authentication.
3. Give an example of a situation where SID filtering might need to be disabled.
Activity 7
Multi-Domain Forests Lab Report
Refer to Orin Thomas Chapter 1, Exercises 1-13 for Lab steps.
Prepare a lab report
Headings:
- Objective
- Method
- Observations
Activity 8
Complete practice exercises 8-11 in chapter 6 of the Orin Thomas reading (page 448).
Write a lab report based on the lab. Prepare a lab report
Headings:
- Objective
- Method
- Observations
Activity 9
Discussion Questions:
1. Research and discuss three major differences between Failover Cluster and Network Load Balancing.
2. What are Failover Cluster and Network Load Balancing best used for? Research and explain for each technology.
3. Research and describe two methods of ensuring that any sort of storage attached to a Failover Cluster or an NLB system remains highly available.
need a summary of the work (No Lab work) for less than 2 pages.
Investment banker arrested or indicted
: In a sample of 50 investment banking firms, the agency found that 18 of the firms sampled had at least one investment banker arrested or indicted during the past year. Does this study support the claim? Use alpha = .025. Find an appropriate p-valu..
|
Describe social influences that may lead to individuals
: Analyze if biological or environmental factors drive criminal behavior. Consider research on twins. Describe social influences that may lead to individuals who engage in criminal behaviors. Evaluate the ethical responsibilities of intervening to dete..
|
Find an appropriate p-value
: In a sample of 50 investment banking firms, the agency found that 18 of the firms sampled had at least one investment banker arrested or indicted during the past year. Does this study support the claim? Use alpha = .025. Find an appropriate p-valu..
|
What are the problems with horizontal and vertical solutions
: What expectation should there be for a database management system with regard to handling data control issues such as data security, backup and recovery, and concurrency control? Why?
|
Explain the different methods of certificate enrollment
: Deploy and configure a domain controller and a server in that domain using only the Server Core mode of Server 2012 R2 using your researched commands - Compare the powershell process to using the Graphical User Interface to perform the same configu..
|
Investigate a career in investment banking
: Use the Internet to investigate a career in investment banking. [Hint: Good starting places are websites such as The Princeton Review Career Profile,
|
Prepare a project proposal for anc and maternity tracker
: Prepare a Project Proposal for ANC and Maternity tracker. Here, details such as mode of delivery, Apgar score, weight of the baby, conditions of both mother and child at discharge will all be captured.
|
Define at least two different cultures must be investigated
: Use the University Library or other resources to locate three articles relating to culture and marriage/intimacy/family/parenting, in other words social behavior. Write one abstract for each article - If you are unsure of what an Abstract is do lo..
|
Find the gini index of income concentration for lorenz curve
: Interpret the results of Problem with both a graph and a description of the graph.- Find the Gini index of income concentration for the Lorenz curve with equation.
|