What namespace should shiv llc implement

Assignment Help Operating System
Reference no: EM13720207

You have been hired by Shiv LLC as an Information Technology consultant to develop a technology proposal. Shiv LLC manufactures and distributes solar panel for the consumer market. Your job is to submit a proposal that meets their criteria.

Current Implementation/Concerns:

The company will have 3 locations (Los Angeles, Dallas, and Houston) but are planning to grow rapidly due to high demand in solar panels. Main staff will be at Dallas and Houston offices.
Data security is priority since patent and trademarks are at stake.
Los Angeles sales personnel will need secure remote access to Houston office.
The WAN connectivity is in place and it is not an issue. There is ample bandwidth in place.
Feel free to make other assumptions but they need to be noted in the paper.

Describe the technical and business reasons for each choice, citing other resources as appropriate. The Windows Server 2012 operating system should be used for all aspects of the solution.

The topics include:

Active Directory:

What forest/domain model should Shiv LLC implement? What is the domain name?
Where should the domain controllers be place? Should RODC be part of the consideration?
FSMO Roles placement
Plan for AD backup and recovery

Group Policy:

Is Group Policy needed?
What settings might be considered via Group Policy?

DNS:

What namespace should Shiv LLC implement?
What types of zones needed?

File Services:

How will the shares be secured?
Will quotas be used? FSRM be configured?
Will DFS be implemented?

Remote Services:

What technology will be implemented to provide secure remote access for users?
Who should have remote access?

WSUS:

How will the servers and clients be updated?
How will new servers be deployed?

Verified Expert

Reference no: EM13720207

Questions Cloud

Emergency medical treatment and active labor act : How could a hospital avoid being covered by the Emergency Medical Treatment and Active Labor Act? Identify and describe the key elements of the plan.
What is the difference between credit or debit : What is the difference between credit or debit? What is the difference between credit or debit?
What is dollar profit : You purchase 22 call option contracts with a strike price of $120 and a premium of $3.70. Assume the stock price at expiration is $132.00. What is your dollar profit? What if the stock price is $117.95?
Suppose hillard manufacturing sold an issue of bonds : Suppose Hillard Manufacturing sold an issue of bonds with a 10-year maturity, a $1,000 par value, a 10% coupon rate, and semi annual interest payments. Two years after the bonds were issued, the going rate of interest on bonds such as these fell to 7..
What namespace should shiv llc implement : What namespace should Shiv LLC implement and what types of zones needed - What settings might be considered via Group Policy?
Tax shield to a firm that has a capital structure : What is the annual tax shield to a firm that has a capital structure consisting of $100 million of debt and $180 million of equity, if the average interest rate on debt is 9%, the return on equity is 13%, and the marginal tax rate is 40%?
Methods used to assess the behaviors organizational members : Describe methods used to assess the behaviors and attitudes of organizational members, and apply 1 model in an analysis of your organization.
Determine the minimum total annual inventory cost : The Western Jeans Company purchases denim from Cumberland Textile Mills. The Western Jeans Company uses 35,000 yards of denim per year to make jeans. The cost of ordering denim from the textile company is $500 per order. It costs Western $0.35 per ya..
Distinguish the deontological and utilitarian ethical : First, distinguish the deontological and utilitarian ethical points of view, describing how they are different from each other and explaining their key characteristics. Then analyze how these two ethical positions would consider the above scena..

Reviews

Write a Review

Operating System Questions & Answers

  What is file system reliability

What is file system reliability and explain the roles of error handling, back up, and file checker methods in supporting the file system reliability?

  Explain whether the erp software is mostly appropriate for

originally the sap erp software was developed for and implemented by mostly manufacturing companies in the beginning.

  Write a brief description about the system calls

Write a brief description about the system calls used in Unix/Linux. Add information such as parameters, resources used, expected results/return values, and possible error conditions.

  Compute the net expected value for the project

You are considering to make modifications to an existing application. Compute the net expected value for the project risks and opportunities

  Clock drift results in error

Think about a frame being sent using synchronous transmission. Suppose that samples are taken at the middle of the bit period and that the clocks are synchronized at the starting of each frame.

  Security monitoring activities in it

Discuss and explain the security monitoring activities that should be conducted in an company with both internal IT and e commerce applications.

  Explain type of damage the computer infections can do

Write one to two paragraphs on each topic below, and describe how it applies to the realm of data communication. Also discuss what type of damage these computer infections can do to data in a computer.

  Questiona furniture manufacturer produces two types of

questiona furniture manufacturer produces two types of desks standard and executive. these desks are then sold at rs

  Write down three parts of linux kernel version number

Write down the three parts of Linux kernel version number, and which is least probable to change? What are "BogoMIPS", and what is their significance?

  Ethics with computer hackers

White Hat Cracking engage security testing by arrangement. Grey Hat Cracking seeks to identify insecure systems and inform administrators or users of vulnerabilities.

  Discussion about wireless networking technologies

Your corporation has just occupied an old historic building in which fifteen workers will work. Due to historic building codes, the corporation is not permitted to run cables inside walls or ceilings.

  Difference between data and information

Describe the difference between data and information and provide an example of each. Also define an operating system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd