Retrieve the name resolution policy table rule

Assignment Help Computer Networking
Reference no: EM131250963

Project Instructions

A common task for system administrators is to configure critical services. This project requires that you work with a virtual installation of Windows Server (2008 or 2012) that will be promoted to a Domain Controller as well as an installation of Windows PowerShell to configure several aspects of DNS on that server. You will include a reflective paper of at least 2 pages in current APA format that details the installations, configurations, challenges, and solutions to complete the following systems administration project:

1) Install a virtual instance of Windows Server using VirtualBox ( Windows Server can be downloaded from DreamSpark ( A video showing how to install Windows Server 2012 within VirtualBox is available here:

2) Configure the Server as a Domain Controller. Steps for 2012 are here:

3) Install Windows PowerShell on the server (

4) Using PowerShell, add a Name Resolution Policy Table rule that configures the server at as a DNS server for the namespace

5) Using PowerShell, retrieve the Name Resolution Policy Table rule that is configured on the server.

The paper must utilize appendixes to reference screenshots along the way. Screenshots must identify a unique piece of information on the user's computer such as a picture and include the system date and time in each screen capture. At the minimum, screenshots must exist during the initial setup of Virtualbox, installation of the operating system, configuration of the user accounts, security updates, and firewall configuration of the new operating systems. Subsequent screenshots must exist that detail the other deliverables in each phase (e.g., such as DNS).

Reference no: EM131250963

Develop a network security policy for environment

Give consideration to each service, and recommend protection measures. Risk mitigation is of extreme importance. Confidentiality and integrity are important factors of network

Peak network utilization occurs causing the speak activity

You note that peak network utilization occurse at approximately noon, when most of your employees are on lunch break. What could be causing the speak activity?

How mail user agents and mail transfer agents work together

Describe how mail user agents and mail transfer agents work together to transfer mail messages.- What roles do SMTP, POP, and IMAP play in sending and receiving email on the I

Internal network address to incorporate variable length sub

Change the internal network address to incorporate variable length subnet mask (VLSM) with EIGRP routing protocol. Set up all of the accountants on a separate VLAN. Create a

Significant means for assessing health of existing network

Explain some of the most significant means for assessing health of existing network. Which do you believe is most significant, and explain why?

Determine maximum value in ring if there is unique initiator

Design an algorithm that, under the standard set of assumptions (bidirectional links, total reliability, connectivity), determines maximum value in the ring assuming that the

Compute actual maximum channel capacity

Given narrow (usable) audio bandwidth of telephone transmission facility, a nominal SNR of 56dB (400,000), and a distortion level of <0.2%. Determine actual maximum chann

Compute total end-to-end delay to send packet of length l

Assuming that switches user store-and-forward packet switching, what is the total end-to-end delay to send a packet of length L? (Ignore queuing, propagation delay, and pr


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd