You have been hired as the system administrator for msp llc

Assignment Help Computer Network Security
Reference no: EM13467840

Desktop Migration Proposal:

You have been hired as system administrator for MSP, LLC. Your first task involves in upgrading from Windows 7 to Windows 8. Currently, the MSP, LLC has around 500 desktops/laptops that run Windows XP and Windows 7. Your manager has also been getting many requests for tablet computers as well.

Current Desktop/Laptop Configuration for Windows 7:

Processor: Intel Core i3 Second Generation
Memory: 4GB RAM
Hard Drive: 350GB
Network Card: 10/100/1000 Mbps
USB Ports: 4 USB 2.0
Monitor: 20inch LCD

Current Desktop/Laptop Configuration for Windows XP:

Processor: Intel Core 2
Memory: 2GB RAM
Hard Drive: 80GB
Network Card: 10/100 Mbps
USB Ports: 4 USB 2.0
Monitor: 15inch LCD

Your boss wants to come up with a 5 to 7 page proposal that meets the following requirements:

· Research and justify new hardware for Windows 8.

· Plan for migration from XP and Windows 7 to Windows 8. Minimize the downtime for end users.

· Research and recommend efficient method for migration to Windows 8.

· Research and recommend appropriate tablet that end-users can use.

Reference no: EM13467840

Questions Cloud

Explain how are the companies in this business protecting : only need around 125 words for each question. online classified web pages that are accessible to others online have a
Where are the worlds major population clusters what areas : where are the worlds major population clusters? what areas have sparse populations? please answer this question in a
Write an illustration of a nested if structure and build it : write a 200- to 300-word short-answer response to the followinga create an example of a nested if structure and build
Write a 8-12 page essay on russia all including folk and : write a 8-12 page essay on russia. all including folk and popular culture language ethnicity religion their
You have been hired as the system administrator for msp llc : desktop migration proposalyou have been hired as system administrator for msp llc. your first task involves in
How would you effectively present issue of potentially : an upcoming meeting with your new companys chief executive officer ceo and other executives is a great opportunity for
What other ways can you track and measure the performance : what other ways can you track amp measure performance of a project other than earned value measurement evm? are some
How are humans and culture related to environment in this : consider the way in which dr. lindholdts book brings political or environmental issues to light. choose one of the
Search the internet for one instance of a security breach : search the internet for one instance of a security breach that occurred for each of the four best practices of access

Reviews

Write a Review

Computer Network Security Questions & Answers

  Rsa public key cryptography standards

Choose one of the standards that you have interest and describe what it does, if possible have some discussion on it. You may usehttp://www.sis.uncc.edu/~yonwang/papers/pkcs.pdf as a reference.

  A virus is a program that attaches itself to other programs

A virus is a program that attaches itself to other programs. An infected user must take some sort of action to spread a virus to others. A worm functions as an independent program

  Research on workplace privacy laws

Determine how much time, if any, these two employees are spending surfing the Web. Is it wrong to access these records? Do some research on workplace privacy laws to justify your answer.

  Write down a 1000- to 1500-word paper explaining the

write a 1000- to 1500-word paper describing the importance of policies and standards for maintaining information

  Discussion on training

This issue of training is specific to each company, so there is no one size fits all plan. I do believe in training staff just before a new system is deployed,

  Demonstrate that hash value collides with original value

Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

  Organization-severely lacks in appreciating need security

Organization that severely lacks in appreciating the need for security or a company that depends on equipment that is outdated and services from contractors that are low quality? Why?

  A determine the elements of the risk management framework b

to foster and develop national preparedness and encourage the exploration of risk related interdependencies across the

  Coaxial cable as a transmission medium

The earliest LANs used coaxial cable as a transmission medium. Over time, unshielded twisted pair wiring emerged as a better and faster medium.

  Describe the secure communication scenarios

Both IPsec and SSL provide encrypted network communication, but at different layers in the Internet protocol stack, and for different purposes. Compare and contrast these two protocols, and describe the secure communication scenarios they are best..

  Subnet masking and designing small networks

Users on wireless or the open nodes adjacent to the concierges desk should not be able to access the hotels corporate networks and corporate network should only be able to talk to the machine room using protocols DNS, DHCP, HTTP, HTTPS and SSH.

  How many bits is the encrypted message

How many bits is the encrypted message - find the corresponding code for the first letter of your first name, add 1 to the left position of the most significant bit

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd