In the following table, identify the type of authentication for the given authentication methods.
(Knowledge, Ownership, or Characteristic)
Unit 10 Assignment 1 Ad Disaster Recovery Planning Scenario
The backup of all of the DCs in the company should always be done after hours, this way you
dont use up all of the bandwidth during work hours. Using RAID 1 will benefit because you can
Unit 9 Assignment 1 GPO Planning Scenario
1. How many employees are working on the projects?
2. What permissions does each application need?
3. What permissions does each employee need?
4. How will we organize the employees in the OUs?
5. Will you need a
You are a networking intern at Richman Investments. You recently developed a design for a remote
access control policy that indicated access controls for systems, applications, and data access.
To obtain a baseline you will need to define a basic configuration for every workstation
and device on the network. By doing this you will ensure that all of the workstations and devices
will have the same exact baseline for security. So the baseline will
High Profile Malware Incidents
The CIH virus was created by a student in Tatung University in Taiwan. He has claimed he and
another student from Tamkang University named Weng Shi-hao. This virus splits it-self into small
slivers inserting it into the inte
Match common encryption algorithms and methods with the scenarios representing real-world business
applications and requirements.
Common encryption algorithms and methods:
Data Encryption Sta
Workstation Malware Policy
No user will download files from torrents, or public places.
All usb ports are disable (mouse and keyboard will still work)
Antivirus must scan entire network every 2 weeks for viruses, Trojans, and malware
Users must backup eve
Based on the following information, assess where and when cryptography is needed within a typical IT
infrastructure to be in compliance with policies and laws.
Data and information ar
Three factors that could affect splicing is a bad quality fiber cleaver, fiber isnt cleaned,
fiber doesnt match. These factors play a big part in fusion splicing, and if these factors arent
done properly it can devastate the fiber-optic line. If the fiber
An issue that I have had on the campus of ITT-Technical Institute is the slackness of group
members for assignments or projects. For example I am currently in a project for my capstone
class in Networking System Administration, and my group consists of 4
Our company is going to be a technological company with Network System Administrators,
Electrical Engineers, and Project managers. The Network System Administrators will be in
charge of setting up the network diagrams and
Maintaining your communication with your friends and family, and by doing so you can build a
strong relationship with them. Having strong communication skills can land you the next job
position you want or to even get the girl you want either way communic
I have a friend who plays certain games for example he plays football games, as I do not but I
will sit down and play a few matches with him. My kind of game is basketball but most people I
know are more into football than into basketball. I conformed to
Unit 5 Assignment 1
How many sites are there?
Are there any plans for subdomain connectivity?
How many domains will there be?
What will the connectivity be like for the server domains?
How often will the replication process happen?
The very first Server i
The fairness of culture is important to everyone and too many people. In this day and age
many people have different beliefs and believe certain things about culture and fairness. For
example a person from Iraq may be flying on a plane to Oregon from St.
Unit 4 Assignment 1
First I would have made sure both new Branches are added to the forest of the main office, and
set the replication to after hours every Friday for Branch 1 and every other day for Branch 2.By
having each branch replicating after hours
Unit 3 Exercise 1 Company Merger Scenario
What kind of server does the merger company have?
How many sites are their?
Are their plans for subdomains connectivity?
Does the merger company need or have subnets?
Is there a DNS server?
Are there any off site
Unit 2 Problem Set 1 Unit 2 Problems
1. By default, Win 7 standard users are permitted to install Plug and Play devices only if their drivers are
2. The debilitating condition in which files are stored as clusters scattered all over a di
Unit1 Problem Set 1 Unit 1 Problems
1. The general public in the United States will be able to purchase all of the Windows 7 editions in retail
stores except Windows 7 Starter, Windows 7 Home Basic, Windows 7 Ente
Unit 2 Assignment 1 DHCP Troubleshooting
TO: Junior Admin
FROM: IT Admin
Hey reading what you have sent to me seems that the leases for each workstation may
have not expired yet, so to accomplish a fix would to either disable the nic and enable the nic
Unit 10 Exercise 1 AD Troubleshooting Scenario: Troubleshooting Tools
You should be paying attention to the traffic, and what time the bandwidth is low. The resource
monitor is a great tool to use to check everything going on with the server. I would chec
Unit 9 Exercise 1 Research Software Deployment Options
Yes we can meet every requirement you need to have done. The computers that do not have
windows XP, will be in an OU. Then we can break down each requirement from there, set the
application where ther
Unit 8 Exercise 1 Administrator Control Versus Trust: Research/Scenario
How you should go about this situation you have is to, find out what permissions each
department needs. So for example: HR doesnt need full control over their computer just simple
Unit 7 Exercise 1 AD OU Planning Scenario
1. How many OUs will you need?
2. What kind of rules and or filters will you need?
3. How many sites are their total in the company?
4. How many times will the company need to replicate its data?
5. What kind of i
Unit 7 Assignment 1 AD Password Policy Planning
Hey Business Manager, you have the IT admin set it on the server for every person in the
company should have at least 8 character length passwords, he can also set the how many
lockouts each user can have be
Unit 6 Exercise 1 AD User and Group Account Creation
1. You can Google VB scripts that will create all of the accounts for you, so you dont have
to create them by hand, doing this task this particular way is fast and easy and doesnt
require much work.
Unit 6 Assignment 1 AD User/Group Design Scenario
1. You can put each printer in the subnet and have it set in the IP subnet settings, this way
by doing this its easier to manage and you wont get confused where each printer is
2. You can do this
Access Control Models
Scenario 1: (DAC) Discretionary Access Control. A small business is not in need of higher
security measures, its easier just to maintain and monitor for a small business.
Scenario 2: (MAC) Mandatory Access Control. Employees primaril