Establishing trust relationships between the two

Assignment Help Computer Network Security
Reference no: EM13927378

Imagine you work for Quality Corporation (Quality.ad) who has just recently bought Crescent Inc. (Crescent.ad) in a recent merger. Quality and Crescent have separate offices in St. Louis (Quality HQ), Little Rock, and Austin (Crescent HQ). Crescent also has offices in Oklahoma City, Tulsa, and Santa Fe. The desire is to establish trusts between the two (2) AD forests and consolidate core services (DNS, DHCP, etc.) as soon as possible. Both companies are running Server 2012 as Domain Controllers. Their primary DNS, DHCP, and Domain Controller servers are in the two (2) corporate headquarters with secondary servers located in the other cities to reduce latency.

For the Quality.ad domain, the Flexible Single Master Operation (FMSO) roles are located on Server01, which is located at the Quality HQ. For the Crescent.ad domain, the FSMO roles are located on RWDC01, which is located at the Crescent HQ. In addition, the Quality.ad domain has several servers configured as a Certificate Authority, and the Crescent.ad domain has a single Certificate Authority.

During this acquisition, you will need to consider the following:

  • The Crescent Inc. has developed several enhancements for the widgets that your company produces. The engineering documents are installed on the ServerDocs located at the Austin office. You will need to configure the necessary systems so that the engineers from Quality Corporation can access these documents. Since these documents are considered proprietary and highly confidential, you must ensure that no other users except the two (2) engineering teams can access these documents and that the documents stay within the company.
  • For both organizations, all user IDs and digital certificates from the other organization must be recognized.

Write a six to eight (6-8) page paper in which you:

  • Explain the key considerations behind establishing trust relationships between the two (2) domains.
  • Suggest a method for consolidating Core Network services.
  • Provide a plan for integrating both AD forests eliminating duplication of service wherever possible.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe, manage, and install Active Directory replication, federation services, and certificate services.
  • Demonstrate the ability to plan an advanced AD, DHCP, and DNS solution.
  • Describe and plan for configuring a domain and forest as well as configuring trusts.
  • Use technology and information resources to research issues in advanced network infrastructure environments.
  • Write clearly and concisely about advanced network infrastructure topics using proper writing mechanics and technical style conventions

Reference no: EM13927378

Questions Cloud

What is cash insolvency analysis : What is cash insolvency analysis, and how can it help in the establishment of an optimal capital structure? What are the major limitations of EBIT-EPS analysis as a technique to determine the optimal capital structure?
Linear relationship by using correlation : Determine the strength of the linear relationship between temperature and ice cream consumption by using correlation.
Define null hypothesis and alternative hypothesis : Determine the test statistic. Show all work; writing the correct test statistic, without supporting work, will receive no credit
Determining the improvement of operations : What kind of an impact will FOSS have on the enterprise? Will it lead to an improvement of operations, help make better decisions, provide a competitive advantage for strategic use of IT?
Establishing trust relationships between the two : Explain the key considerations behind establishing trust relationships between the two (2) domains. Suggest a method for consolidating Core Network services. Provide a plan for integrating both AD forests eliminating duplication of service wherever p..
Compute pinchess dol dfl and dcl : Pinches Salt Company has the following income statement for 2010: Compute Pinches's DOL, DFL, and DCL. If sales increase to $5,500,000, what is your forecast of EPS?
What functions of the company to outsource : In doing a SWOT analysis of a company, a self-confident management is usually strength. However, an arrogant management team is usually a weakness. Yet you may view my self-confidence as arrogance. How can you tell the difference?
Determine the annual break-even volume : Determine the annual break-even volume for the Retread Tire Company operation.
Determine the best investment : Determine the best investment, using the following decision criteria. a. Maximax b. Maximin c. Minimax regret

Reviews

Write a Review

Computer Network Security Questions & Answers

  Include strategies for developing secure software

You want to convince your software development manager that the team needs to include strategies for developing secure software. Your first step is to help your manager understand the common sources of risks in software. 1. Write a ½ to 1 page memo t..

  Explain how would you apply operation security opsec

network security-operation security in a corporation - word count 200how would you apply operation security opsec

  Define security technique that aims to expose flaws

Fuzzing" is a security technique that aims to expose flaws in error handling by providing invalid, random, or unexpected data as inputs to computer systems. Here "system" is used generically, and should be read as "function call, program, or shell..

  Difference between errors or faults and failures

Explain the difference between errors, faults and failures

  What security vulnerabilities and threats can you see

What security vulnerabilities and threats can you see? What measures would you put in place to remove or minimize the vulnerabilities - Choose all the necessary and suitable MAC address, IP address for interfaces and port addresses implied by the a..

  Write a short report documenting the installation

Write a short report documenting the installation even if you don't get the application running

  Ientify another application other than course management

security change management and architectural adaptationthe online course management system from previous assignments is

  Improving the security of the current network

The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.

  Various methods of implementing rsa

Technical Guidelines: Study various methods of implementing RSA, a public-key cryptographic algorithm. Write time functions to help you conduct timing measurements for RSA.

  Write a program in to find the largest value of k

Write a program in to find the largest value of k such that there exists a k-core in a given undirected graph G = (V, E). Also print out the nodes in the largest k-core.

  Which of the cia goals did tjx fail to achieve in attack

Research the TJX data breach case on the web and answer the following questions.

  Explain how files on the network may be accessed by lsdg

Explain how files on the network may be accessed by LSDG

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd