Saturday, July 20, 2013

CIS 409 Assignment 2 Transnational Railways Paper and Presentation

CIS 409 Assignment 2 Transnational Railways
Paper and Presentation
Follow the link (blue) to purchase A Grade Solution



We have all Assignments, Labs, Discussion Questions, Quizzes and Exams for CIS 409. We can also help with other Strayer classes. Email support@hwmojo.com if you need help. Or vist our website www.hwmojo.com


Instant Download

Strayer CIS 409 Assignment 2: Transnational Railways
Due Week 7 and worth 100 points
This assignment contains two (2) deliverables including a three (3) slide PowerPoint presentation, (3a), and a written paper. You must submit both deliverables for the completion of this assignment.
Transnational Railways (TR) is a transportation company that operates a railroad system across the United States and Canada. Imagine you are one of several network administrators assigned to manage TR‟s network. TR‟s network is composed of a multi-domain forest. The root is named transnatrail.com with four (4) child domains named north.transnatrail.com, south.transnatrail.com, east.transnatrail.com, and west.transnatrail.com.
Active Directory is configured for each domain. The forest root domain is named HQ_Site, and the remaining four (4) are named North_Site, South_Site, East_Site, and West_Site.
Write a five to eight (5-8) page paper in which you analyze and solve the following issues:
1. TR has several Supervisory Conductors (SCs) stationed in different networked geographic regions who need access to a transport control module and other resources. The following info details placement of the SCs:
                                         ·  Two (2) SCs have been placed in a global group in the forest root domain named SC_HQ_.
                                         ·  Three SCs are in global groups in each of the child domains. These groups are named SC_North, SC_South, SC_East, and SC_West.
                     Propose a plan that will allow all the SCs access to the networked transport control module and other resources in the HQ domain while preventing them from accessing other resources in all the other domains besides their own.
                     Explain why Microsoft‟s AGUDLP approach is either advantageous or disadvantageous in this situation.
2. TR has gone on a hiring spree and needs to immediately create hundreds of new user accounts. The new employees will all be working at the company‟s headquarters in various departments. These employees must be added as quickly and efficiently as possible.
                     Explain at least two (2) tools that Windows 2008 provides that can help you efficiently create multiple users and groups.
                     Explain why you would choose these tools for this situation.
3. TR‟s Network Administrator has tasked you with ensuring the security of the company‟s highly sensitive transportation infrastructure data. She knows that a secure network starts with ensuring the highest level of user account security. She has asked you to develop a plan to educate users on the importance of network security.
                     Create a three (3) slide presentation that can be used as part of a campaign to communicate the importance of network security to the corporation‟s broad range of employees using Microsoft PowerPoint or a similar presentation software tool.
                     Explain how the approach you have taken to educate broad users will differ from the specialized education needed for higher-level security (i.e., securing the use of an administrative account).
4. You have been asked to create new Organizational Units (OU) for many of the newly hired employees. Many of these newly hired employees are expected to shift to different departments within the next few months.
a. Describe two (2) benefits of creating OUs to represent different functional departments.
b. Propose a way you can easily move users between OUs to help support the expected shift of employees to different departments.
5. You have created OUs to group users and computers by department. The Network Administrator has decided to use Group Policy Objects (GPOs) to help strengthen the security of the network. She has asked you to contribute to strengthening the network‟s security. She is especially concerned about user account security and event auditing.
                     Choose and discuss two (2) domain-wide account policies that you believe would be effective to implement.
                     Explain at least (2) implications to planning an auditing strategy.
6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
                            ·  Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
                            ·  Include a cover page containing the title of the assignment, the student‟s name, the professor‟s name, the course title, and the date. The cover page and the reference page are not included in the required page length. The specific course learning outcomes associated with this assignment are:
                            ·  Demonstrate the ability to describe, configure, and administer Active Directory services.
                            ·  Create security plans for use in the Active Directory environment.
                            ·  Demonstrate the ability to describe, configure, and administer Group Policy in the Active Directory environment.
                            ·  Create and configure User and Computer environments using Group Policy in the Active Directory environment.
                            ·  Use technology and information resources to research issues in directory service infrastructure environments.

                            ·  Write clearly and concisely about directory service infrastructure topics using proper writing mechanics and technical style conventions. 

No comments:

Post a Comment