Microsoft server admin

Assignment Help Basic Computer Science
Reference no: EM13819733

Rough Country Miles of Alaska (RCM) is a teardrop snowshoe manufacturer (worn by lumberjacks) that has contacted you to install Windows Server 2012 R2 and Active Directory. It owns the RoughCountryMiles.com domain name. It has 300 users, equally dispersed in three locations: Anchorage, Juneau, and Fairbanks.

Anchorage is the headquarters, while the Fairbanks office handles the Northern Alaskan region, and the Juneau office is in charge of the

Southern Alaskan region. The security policies, such as password length and account lockout, are more laidback in Juneau than in Fairbanks. The company headquarters establishes financial goals and general operations policy, but it allows some regional operational autonomy.

Within corporate headquarters are the following business units:

Operations

Manufacturing

Executive

Logistics

Within the two regional offices are the following business units:

Sales

Purchasing

Management

Inventory

Finance

The chief information officer (CIO) would like to delegate the ability to manage users and groups to the business unit level, without delegating control over security policies.

Answer the following questions:

How would you design the logical structure of Active Directory for the Rough Country Miles of Alaska, and what domain naming structure would you suggest?

How many domain controllers, DNS servers, and global catalog servers would you suggest? Where would you place them? What is your reasoning?

For the benefit of the upper management who are nontechnical, please describe how forest functional levels, trees, domains, OUs, and sites function in Active Directory.

What edition of Windows 2012 R2 server would you use for your domain controller? If you needed a high-availability fault-tolerant clustering system for RCM's Web server, what edition of Windows Server 2012 R2 would you use?

You will be building these servers. How would you select your server components? What would you do if you added a backup peripheral device to your server and the mouse froze?

Reference no: EM13819733

Questions Cloud

Discuss risk methodologies used in capital budgeting : Was there further financial information that you required that was not provided to you? What financial figure do you believe was the determinant to your decision and why? How would you be able to apply this particular financial information to other s..
What cause people perceptions regarding literature to change : What causes people's perceptions regarding the value of literature to change? How has the importance of reading changed from earlier eras (pre-digital/audio/visual media) to our present day?
Underlying principles or ideas for theory : Summarize the underlying principles or ideas for theory/approach - Explain why this theory/approach is important to understand and how it will benefit your work with children.
What influence affect nature of demand for short-term versus : Explain the strategies businesses can use to finance their assets with short- term and long- term funds. What influences affect the nature of the demand for short- term versus long- term funds?
Microsoft server admin : MICROSOFT SERVER ADMIN
Explaining and discussing the roles company directors : Your assignment is to prepare a report to be submitted to the Chairman of the board explaining and discussing the roles, duties and responsibilities of the company's directors
Write a paper about transcendentalism : Write a paper about Transcendentalism. Analyze Thoreau's "Civil Disobedience" in light of a contemporary example or figure or incident in the tradition of American civil disobedience.
Standard deviation for ounces in the bottles : Calculate the mean, median, and standard deviation for ounces in the bottles - Construct a 95% Confidence Interval for the ounces in the bottles and strategy geared toward mitigating this issue in the future
Determine role of campaign process in maintaining two-party : Determine the role of the campaign process in maintaining the two-party system. Use examples to support your response.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  You task is to break the code and there is more than one

many people are interested in codes especially in our computer world. we can create a simple code by assigning digits

  Filling all the positions of his cabinet

How many ways are there of filling all the positions of his cabinet if we assume that each position be filled by a different person and do not take into account which position each been has been assigned?

  What are the advantages of that method and disadvantages

a company has two building that are 50 meters (roughly 50 yards) apart. Between the building is private land owned by the company. A large walk-through tunnel connects the two buildings.

  Program specifications for a simple business problem

Given a set of program specifications for a simple business problem requiring iteration, code and test a program that meets the specifications and employs best programming practices.

  Implement the stack and queue with a single class

Implement the stack and queue with a single class interfaces with a unique class that is derived from class LinkedDeque. i asked this question before. Please do not copy the answer. thanks

  Write a function that convert any angles outside of interval

Suppose that an array contains angles in degrees. Write a function that converts any angles outside of the interval [0,360] to an equivalent angle in that interval. For example, an angle of 380.5 degrees should be converted to 20.5 degrees.

  You may have observed such a situation before a highly

you may have observed such a situation before a highly publicized and outrageous crime has taken place and the suspect

  Describe two commercial technologies for use by small

Describe two commercial technologies for use by small or medium size businesses in effectively managing operations.

  Will action alter or destroy any historical and scientific

Will action alter or destroy any historical, scientific, or archaeological site? New engineering building project doesn't have any reported historical, scientific.

  Provide an explanation of hash tables

Provide an explanation of hash tables, including a description of a realistic scenario that could be solved with the application of a hash table.

  Technical architecture document

Quality assurance process and procedures to ensure the functionality and performance requirements are met Testing procedures to ensure the application is operational at all levels (program, network, systems, and interfaces) Implementation steps an..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd