Managing access to an active directory environment located

Assignment Help Computer Networking
Reference no: EM13754192

Read the Managing Access to an Active Directory Environment located on the student website and select one option to complete the assignment.

Option 1: Managing Access to an Active Directory Environment

Assume for this assignment that Kudler Fine Foods is running Windows Server® 2008 R2. The company has three locations, each overseen by a store manager. Each store manager has access to a desktop, a laptop, and a printer/scanner/fax machine. This equipment is authorized for use according to the following rules:

· The desktop and laptop are authorized for use by the store manager, President Kathy Kudler ,and the president's administrative assistant.

· The printer/scanner/fax machine is authorized for use by the store employees where it is located, as well as President Kathy Kudler and the president's administrative assistant.

· The director of store operations can use any equipment in any location.

Design group objects to implement group policies to manage access to these resources. Document the group design using the following table:

Name

Membership

Type

Scope

Permissions

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

During your work on the network operating system, you become concerned about threats such as disk failures, administrative errors, natural disasters, and the impact of unauthorized changes to data.

· How do you plan to recover from these types of loss of current AD DS and other critical information?

· What utilities might you investigate to help accomplish your plan?

Option 2: Managing Access to an Active Directory Environment (Graphical)

Assume for this assignment that Huffman Trucking is running Windows Server® 2008 R2. The organization has four locations that will be visited by an internal auditor next month. A review of previous audit reports shows that the internal auditor does not have access to examine all the files and use all the computing devices at each location.

Produce a group object and group policies table to show how you will grant the required access to the auditor. Document the group design using the following table:

Name

Membership

Type

Scope

Permissions

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

While designing the access, you get multiple reports of slow response times on the network. You suspect that one or more domain controllers (DCs) do not have the required hardware resources to operate properly. It is possible that the hardware running a DC has been replaced with an older server that may have been purchased to run Windows Server® 2003. What tool will you use to test your suspicion?

Option 3: Managing Access to an Active Directory Environment (Advanced)

Assume for this assignment that Riordan Manufacturing is running Windows Server® 2008 R2. Riordan Manufacturing has four locations. Recent visits by members of the executive team to these locations have generated a new set of access requirements. These are the rules you have been provided:

· President and CEO Dr. Michael Riordan is the only person authorized to have full access to all files and equipment at all locations.

· Senior Vice President Kenneth Collins and Chief Operating Officer Hugh McCauley are to have access to one PC and one printer/scanner/fax located in the management office of each location.

· Executive Assistant Jane McCall is to have access to the printer/scanner/fax machine located in the management offices of each location.

· The managers of each location are to have access to Executive Assistant Jane McCall's executive office printer/scanner/fax machine.

Design group objects to implement group policies to manage access to these resources. Use either a table as in Option 1 or graphical representation as in Option 2.

Working with the Hangzhou, China network, you notice that the single domain has recently been organized using four subnets.

Write a 1-page report that answers the following questions:

· What problems related to replication might this situation cause?

· What is your recommended solution?

Reference no: EM13754192

Questions Cloud

Types of executive compensation arrangements : Ajax Corporation is a young high-growth company engaged in the manufacture and distribution of automotive parts. Its common stock has doubled in value since the company was listed on the NASDAQ exchange about two years ago. Ajax currently has a high ..
Ending finished goods inventory is budgeted : Jasmine Company produces hand tools. Budgeted sales for March are 10,000 units. Beginning finished goods inventory in March is budgeted to be 1,400 units, and ending finished goods inventory is budgeted to be 1,300 units. How many units will be produ..
Which enlightened monarch was the most enlightened : provided links to primary sources that you will examine to help you answer the focus question: Which enlightened monarch was the most enlightened?
What amount of these investigation costs can angel deduct : While she was a college student, angel lived by a bookstore located near campus. she thinks a bookstore located on the other side of campus would be successful. she incurs expenses of 42,800 (legal fees, accounting fees, marketing survey, etc.) in ex..
Managing access to an active directory environment located : How do you plan to recover from these types of loss of current AD DS and other critical information. What utilities might you investigate to help accomplish your plan
Markup percentage using a total-cost approach : Morales Corporation produces microwave units. The following per unit cost information is available: direct materials $36; direct labor $24; variable manufacturing overhead $18; fixed manufacturing overhead $40; variable selling and administrative exp..
Describe the accomplishments of copernicus and vesalius : Describe the accomplishments of Copernicus and Vesalius. Why were they considered founders of the Scientific Revolution?
Compute the target selling price : Mussatto Corporation produces snowboards. The following per unit cost information is available: direct materials $12; direct labor $8; variable manufacturing overhead $6; fixed manufacturing overhead $14;
What is the true horizontal length of a recorded distance ab : A 100-ft steel tape of cross-sectional area of 0.0020 in2, weight 2.4 lb, and standardized at 68Fo is 100.008 ft between end marks when supported throughout under a 15-lb pull. What is the true horizontal length of a recorded distance AB for the cond..

Reviews

Write a Review

Computer Networking Questions & Answers

  Clusters can be implemented by leveraging most of the

clusters can be implemented by leveraging many operating systems and applications. in a report of 1-2 pages complete

  Explain the basic components and media of network systems

Explain the basic components and media of network systems and summarize current networking standards and how standards bodies and the standardization process impact networking technology.

  Determine different subnets exist in ip network-subnet mask

Write all IP addresses on same subnet as this one. Determine maximum number of hosts in this subnet? How many different subnets exist in IP network by using this subnet mask.

  What are advantages and disadvantages of networked computers

What are some advantages and disadvantages of networked computers? Explain some similar characterisitcs between a network and the internet.

  Identifying potential malicious attacks threats and

identifying potential malicious attacks threats and vulnerabilitiesyou have just been hired as an information security

  Examine the throughput of a tcp connection

Compare the Weighted Fair Queuing, Priority Queuing, and FIFO schemes in terms of drop rate, delay, and delay variation. What are the advantages and disadvantages of each - examine the throughput of a TCP connection as the flow control window size..

  Difference between wats and leased lines

Discuss the differences between Wide Area Telecommunications Service and leased lines?

  How can p2p file-sharing networks make money

What social issues are raised by P2P file-sharing protocols and programs such as BitTorrent? Is the record industry justified in attempting to shut them down? Why or why not?

  Identify different subnets according to network requirements

Identify the different subnets according to network requirements - Configure the other PCs and configure the necessary static routes (such as IP route 0.0.0.0 0.0.0.0 exit interface) on three routers to make a successful connection between routers.

  Detail study on social media

The length of your report should reflect the complexity of the topic and the thoroughness of the research. The report should be self-contained (explain any terminology particular to the topic the first time you use it), consistent, and to the poin..

  Consider a tcp connection between host a and host b

Consider a TCP connection between Host A and Host B. Suppose that the TCP segments traveling from Host A to Host B have source port number x and the destination port number y. What are the source and destination numbers for the segments traveling ..

  Protocol used to update the massive routing tables

What is the name of the protocol used to update the massive routing tables maintained on routers within the internet?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd