Critical thinking - Outfitting a Branch Office with Server Core

Question # 00652603
Subject: Computer Science
Due on: 03/06/2024
Posted On: 03/06/2024 03:03 AM
Tutorials: 1
Rating:
4.9/5
Question Dot Image

Critical thinking: Outfitting a Branch Office with Server Core

The following activities give you critical thinking challenges. Case Projects offer a scenario with a problem to solve for which you supply a written solution.

make it all in two pages, try to make it simple.

 

3-1

Outfitting a Branch Office with Server Core

You have been supporting CSM Tech Publishing’s Windows Server 2016 server network for over a year. The office has two Windows Server 2016 servers running Active Directory and a number of other roles. Management has informed you that a small sales office is opening in the same building three floors up. The sales manager wants to install a sales application on a server located in the sales office. This server will have limited physical security because there’s no special room dedicated for it, which means it will be accessible to non-IT personnel and visitors. You’re considering installing Windows Server 2016 Server Core on the new server because accessing its console regularly probably won’t be necessary, and this server will be managed from one of the other CSM Tech Publishing servers. What are the benefits and drawbacks of using Server Core for this branch office? What are some things you should do to set up this server management environment?

3-2

Dealing with Server Core Angst

The owner of CSM Tech Publishing was at the sales office last week and out of curiosity wanted to sign in to the server there. The owner is somewhat tech savvy and has even worked a little with Active Directory in Windows Server 2012. He was shocked when he signed in and didn’t see a familiar user interface—only a command prompt. He asked you about this and accepted your explanation of Server Core and why you chose this installation option. However, he was wondering what would happen if you stopped providing support or were unavailable for an extended period, and your replacement wasn’t familiar with Server Core. Write a memo explaining how this situation could be handled easily.

 

3-3

Case Project 3-3

Ensuring Proper Server Configuration

You are called to consult with an organization that has well over 100 servers including virtual servers. The manager you spoke with told you that the organization is having problems keeping the servers properly configured. Different administrators make changes to the configuration or add and remove services to keep up with user demand. However, the manager finds that changes are not well documented and often cause problems. The manager would like to know if there is a way to automate control of changes to server roles, features, services, and so forth. What Windows Server 2016 feature can you suggest and why?

 

4-1

Case Project 4-1

Dealing with a Disk Crash

Last week, a disk containing CSM Tech Publishing’s current project manuscripts crashed. Fortunately, there was a backup, but all files that had been added or changed that day were lost. A new disk had to be purchased for overnight delivery, and the data had to be restored. Several days of work time were lost. The owner of CSM Tech wants to know what can be done to prevent the loss of data and time if a disk crashes in the future. The server currently has two disks installed: one for the Windows boot and system volumes and one for manuscript files. The disk used for manuscript files is about one-third full. There’s enough money in the budget to purchase up to two new drives if needed. What solution do you recommend, and why?

 

4-2

Case Project 4-2

Creating a Shared Folder Structure

CSM Tech Publishing has asked you to develop a file-sharing system for the company’s departments, which include Management, Marketing, Sales, Development, and Editorial. The following are some requirements for the file-sharing solution:

  • Management must be able to access all files in all the shares unless stated otherwise and must be able to create, delete, and change files.
  • The Management Department must have a share that only it can access, and each member of the department must be able to create, delete, and change files in the share.
  • Marketing and Sales should have one common folder that both departments’ users have access to. Members of both departments should be able to create new files, have full control over files they create, and view and change files created by other group members. They should not be able to delete files created by other members.
  • Sales should have its own share that only Sales and Management have access to. The Sales users must have full control over all files in the share.
  • Development and Editorial have their own shares that only these departments and Management have access to. The users from these two departments must have full control over all files in their department shares.
  • There should be a public share in which users in the Management Department can create, change, and delete documents, and all other users have the ability only to read the documents.
  • There should be a share available to management that no other users can see in a browse list. It contains confidential documents that only selected users in the Management Department have access to.
  • Users must be able to restore files they accidentally delete or restore an earlier version of a file without having to use a backup program.
  • Sales users must be able to access the files in the Sales share when they’re traveling whether they have an Internet connection or not. When Sales users are back in the office, any changed files should synchronize with their mobile devices automatically. All Sales users have a Windows 8.1 laptop or tablet computer running Windows RT 8.1.
  • All users except Management users should be limited to 10 GB of space on the volume housing shares. Management users should be limited to 50 GB.

Given these requirements, perform the following tasks and answer the following questions:

  1. Design the folder structure and include information about the permissions (sharing and NTFS) you plan to assign to each share and group of users. Name each share appropriately.
  2. What tool will you use to create the shares? Why?
  3. What protocols and technologies (including file system) will be used to set up these shared folders? Explain the reason for using each protocol or technology.
Dot Image
Getsolution Posted By :
Questions: 15503 Tutorials: 15502
Tutorials for this Question

Critical thinking - Outfitting a Branch Office with Server Core

Tutorial # 00651502
Posted On: 03/06/2024 03:04 AM
Feedback Score: Not rated yet!
Purchased By: 2
Getsolution
Posted By:
Questions:
15503
Tutorials:
15502
Report this Tutorial as Inappropriate
Tutorial Preview
The solution of Critical thinking - Outfitting a Branch Office with Server Core...
Attachments
Critical_thinking_-_Outfitting_a_Branch_Office_with_Server_Core.ZIP (18.96 KB)

Great! We have found the solution of this question!

Related Questions
Examine the several different types of data insights that occur
Question Examine the several different types of data insights that occur in big data analytics:  ? Offer novel knowledge  ? Provide causation relationships  ? Add a competit …
Computer science - Is virtualisation cost effective
Computer science question Is virtualisation cost effective and does it support green IT? Contents Introduction Is Virtualisation cost effective? Running out of space? Needing Virtualisa …
Studying Computing involves developing both subject
Studying Computing involves developing both subject-specific and transferable skills. Describe the skills you have used prior to university, and discuss how you would expect those skills to develop wh …
Computer Science - Discuss the critical characteristics
Computer Science Question Assignment 1 - Question 1: Discuss the critical characteristics of communication channels in data communications. Explain how bandwidth and communication medium affe …
List and explain two browser add-ons(plug-ins)that improve the security
1- List and explain two browser add-ons(plug-ins)that improve the security of a user’s browser. Why are these features not built-into the browser? 2- What are two security risks associated wi …
How are browsers being used to mine crypto currency
Part A: How are browsers being used to mine crypto currency? (1 pt) Find an example of malvertising. Provide a screen shot of the malvertising. (2 pts) Provide the details on how and where you …
What are the seven categories of cybersecurity functions in the NICE
security awareness What are the seven categories of cybersecurity functions in the NICE Cybersecurity Workforce Framework (https://www.nist.gov/itl/applied-cybersecurity/nice/resources/nice-cybe …
The Computer Mouse - Once a nondescript box perched on a large
The Computer Mouse Once a nondescript box perched on a large ball bearing, today the computer mouse comes in a wide range of shapes with a variety of capabilities. There are cordless mice, ergonomi …
CMSC350 Program that accepts an arithmetic expression
CMSC350 Program that accepts an arithmetic expression The second programming project involves writing a program that accepts an arithmetic expression of unsigned integers in postfix notation and bu …
Week 6 Discussions - Local Security Good Practices
Week 6 Discussions Please respond to at least two main topics  1. Local Security Good Practices Discuss in detail several effective local security practices to harden your Linux distribu …
Recent Questions
Walden HLTH6475 Complete Course Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 1 Discussion INDIVIDUAL RESPONSIBILITY VERSUS VICTIM BLAMING IN HEALTH PROMOTION Part of what makes a discussion a discussion and not a lectur …
Walden HLTH6475 All Quizzes Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 1 Quiz Question 1 Which factors have been found to influence behavior? Socioeconomic Status Skills Culture Attitude Gender A …
Walden HLTH6475 Module 6 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 6 Quiz Question 1 Which method allows study participants to tell their stories?  Observations In-depth individual interview &nbs …
Walden HLTH6475 Module 5 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 5 Quiz Question 1 What alternative term has been suggested recently for hard-to-reach? Marginalized Inaccessible Hard to access Ha …
Walden HLTH6475 Module 4 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 4 Quiz Question 1 Outreach workers from the CeaseFire program spent a total of 500 combined hours with program participants during the first y …
Walden HLTH6475 Module 3 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 3 Quiz Question 1 Which of the following is the construct of the Theory of Reasoned Action that explains behavior based on what we think other …
Walden HLTH6475 Module 2 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 2 Quiz Question 1 If the program is aimed at a true population, the term is called ______________. Intended population Intended audience …
Walden HLTH6475 All Assignments Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 2 Assignment LANNING MODELS ARTICLE REVIEW The published literature is rich with examples of health promotion programs that have utilized the …
Walden HLTH6475 Module 6 Assignment Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 6 Assignment EVALUATION PLAN Once the program has been designed, it is time to consider how the program will be evaluated. To design an evalu …
Walden HLTH6475 Module 5 Assignment Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 5 Assignment  DEVELOPING EVALUATION QUESTIONS Evaluation takes place at various points within a program's life cycle. It requires di …