Discussion

Part 4
Last week, a disk containing CSM Tech Publishing’s current project manuscripts crashed. Fortunately, there was a backup, but all files that had been added or changed that day were lost. A new disk had to be purchased for overnight delivery, and the data had to be restored. Several days of work time were lost. The owner of CSM Tech wants to know what can be done to prevent the loss of data and time if a disk crashes in the future. The server currently has two disks installed: one for the Windows boot and system volumes and one for manuscript files. The disk used for manuscript files is about one-third full. There’s enough money in the budget to purchase up to two new drives if needed. What solution do you recommend, and why?

Part 5
Let’s take a break from  CSM Tech Publishing and talk about your experience with virtualization. Unit 5 is Implementing Virtualization with Hyper-V: Part 1. In this class, we will be learning how to use Hyper-V, which is the virtualization platform that is included in Windows. Have you used Hyper-V or any other virtualization platform before? If so, tell us about it. If not, how do you think you could use it in the future?

Part 6
You recently became the server administrator for a company. As soon as you walked in the door, users were telling you the network is running slowly quite often, but they couldn’t tell you when it happened or how much it slowed down. What tests and measurements could you use to try to determine what’s going on?

Part 10
When CSM Tech Publishing started its Windows network almost a year ago, the network was small enough that you simply used the default Users and Computers containers for the user account and computer account objects that you created. However, now that the company has grown to more than 50 users and computers, you decide that some structure is needed. You talk to the owner to understand how the business is organized and learn that there are four main departments: Executive, Marketing, Engineering, and Operations. How would you structure Active Directory based on this information? What types of objects would you include in each container? Would you move any objects and where would you move them to?

Part 11
CSM Tech Publishing has added a branch office with about 50 users. The HR Department has given you a spreadsheet with the employee information that includes the employee name, office location, department, title, and so forth. Describe at least two different methods you can use to add these user accounts to Active Directory that don’t involve manual creation of each account from scratch.

Part 12
You’ve been called in to solve a problem for CSM Tech Publishing, which is running Windows Server 2016 servers in a domain environment. Strict account policies that require password changes every 20 days, a password history of 24, complex passwords, and an account lockout threshold of 2 are in place because five high-level managers have access to information about future projects that must be kept secret. The problem is that the support team is constantly fielding calls to unlock accounts and reset passwords because users forget them. Worse, many users have taken to writing their passwords on notes stuck to their desks or monitors. What can you suggest to maintain a strict password policy for the five managers but loosen requirements for the remaining staff? What steps would you take?

Part 13
You have been told that all users in the Marketing Department must have a computer working environment that meets certain criteria. Marketing Department users don’t always sign in to the same computer every day, so these requirements should apply wherever they sign in. You have a Windows Server 2016 domain, and all computers are domain members. All Marketing Department user and computer accounts are in the Marketing OU. All desktops run Windows 10. The criteria follow:
Marketing users must be able to access documents they save in the Documents folder in their profiles from any computer they sign in to.
A company marketing application must be installed automatically when users sign in if it’s not already installed.
The marketing application they run leaves behind temporary files named mktapp.tmpX in the C:MktApp folder (with the X representing a number). These files contain sensitive information and must be deleted when the user signs out.
How can you make sure all these criteria are met? What should you configure to meet each criterion? Be specific about any options that should be enabled or disabled and how the configuration should be applied.

Part 14
You have several users who have local administrative access to their computers. Some of these users are changing certain policies that shouldn’t be changed for security reasons. You don’t want to take away their local administrative access, but you want to be sure that these important policies are reapplied to computers if a user changes them. What can you do?

Order Now

Top