...NT1330-Unit 2 Exercise 1 DNS Scenario Dear junior IT, Thank you for contacting me regarding your questions, and trust that I will do my best to help you. From what I understand, you work at two branch offices, and have been given the responsibility of discovering where to place an Active-Directory Integrated DNS server. You also have some question of what type DNS server would best meet your company’s needs. First let’s begin with the smaller branch supporting perhaps five user/workstations, with an unusually slow network. The question with such a small branch isn’t really about what kind of DNS server you need, but do you need a DNS server at all. If there is a very high level of file/data sharing, then yes perhaps you could benefit from a server, but configured in a secondary zone, such as an ADI. However, if there is not enough file/data sharing to really warrant the presence of the server, an ADI server could potentially slow down an already sluggish system. Now let’s move on to the second, much larger branch supporting around thirty users. You stated that this branch has a much better network connectivity than its smaller counterpart. In this case, I would recommend a DNS server set up in the primary zone. The primary zone is the primary source of information within this zone. I would also further suggest moving your servers from the smaller branch to your larger branch. All files from the smaller branch could be accessed via a “VPN” remote link. This would allow...
Words: 287 - Pages: 2
... iv. Mitigation factors: - Do not install apps from unknown sources. This opens the backdoor for malware to enter the apps camouflaged as secure applications. Also, jail broken phones are of huge risk if the user continues using the default password and an even higher risk if not used in their respective marketplaces. Instances of malware exist on all of the phones and are even more relevant on ones using untrusted app sources. - Enable whitelisting which is a software control that permits only known safe applications to execute commands. v. Dependencies: Earlier we discussed about Belkin WeMo device and its vulnerabilities. These devices operate using WeMo App which can be downloaded to our smart phone. In this case, to ensure security, we must determine vulnerabilities in both the gadget and the smart phone carrying the WeMo app. For example, vulnerability in the gadget can automatically make the smartphone to be in danger. Similarly, security hole in the app can take control of the WeMo device itself. III. Does this device have a storage space? What are stored in it? Smart devices has a storage space and we store PII (Personally identifiable information) or sensitive information like passwords in it. This by default becomes our concern. What if the device is lost or stolen? Once we understand, there are data stored in the device; the first thing we have to determine is which data is sensitive enough to require additional protection. For example: passwords, personally...
Words: 917 - Pages: 4
...Aaron Battaglia NT1330 UNIT 2. EXERCISE 1. DNS SCENARIO It is not required to put a DNS server in such a small location for only five users and snail like network connectivity doesn’t justify the amount of money it would cost to install a server(s) in that area. One exception would be if there is a great amount of file sharing, or other information that would need to be accessed daily by other spots on the network. This sometimes but rarely happens but we could have a situation where we put it in the in the server but we set it up as a secondary or Active Directory Integrated zone type. I recommend installing the servers in the location where you have 30 users and fast internet connection. You could do this also, try storing all the files from either location in the bigger office, and in the smaller location you could remote connect through Virtual Private Network. When we do this all the information from the smaller sight is stored off site. The sight with five users can be run with a cheap router and the server that has thirty users at the office will be set up as the primary zone; since this is utilizing the fast internet connection and has more users this is our MAIN BASE which you can call home. =) If you were to run Domain Name System on domain controllers there are Active Directory Integrated zones and Active Directory Integrated zones. In classical Domain Name Systems the zone data is stored in text files which sit on the Hard Drive; which of course is protected...
Words: 428 - Pages: 2
...important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master * Domain Master Domain Controller #2 Place the domain roles on this server. * RID Master * Infrastructure Master * PDC Emulator If more domains exist in the forest, place the domain roles on a server in theese domains like Domain Controller #2 Global Catalog configuration. In Windows 2008 Active Directory all Domain Controllers are by default Global Catalog servers, personally...
Words: 10360 - Pages: 42
...NT1330 Unit 7. Exercise 1. AD OU Planning Scenario Review the following scenario: As an IT Administrator, you have been tasked with designing an Active Directory Domain Organizational Unit Structure for a new AD implementation at an existing organization. You are scheduled to meet with the management team and need to formulate a list of questions you will need answered in order to recommend an OU Structure appropriate to the organization. Develop a list of 5-10 questions to guide your design plan. 1.) How is the existing structure of the organization? 2.) How many departments will there be? 3.) How many sub-departments will be needed? These questions will help in documenting the existing structure of the organization so as to divide the administrative tasks into categories and document the administrators who are responsible for each category. Also, these will define the hierarchy of authority in the directory as well as what departments the company will have. 4.) What are the company’s physical/geographical sites? This will address the issue of different geographical divisions which will probably have different computer management needs. The design will be based on management of resources, users and geographical boundaries. This will make the administration easier. 5.) How many OUs will be needed within each Parent OU? 6.) Will departments need to share resources? 7.) What resources are required by each department? 8.) What group policies to be implemented and who’s...
Words: 331 - Pages: 2
...aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...
Words: 1834 - Pages: 8
...NT1330 M1 March 18, 2014 Unit 1 Exercise 1 TASK You are setting up a new network for your company. You have a single location with approximately 145 hosts. Plans IT plans should accommodate 50% growth within the next 2 years. Growth 70 – 75 more hosts. What subnet range/s should be used? I would use a Classless addressing and start with a 172.16.0.0 Network address with a Subnet Mask of 255.255.255.0. This gives you 254 hosts per subnet which accommodates for your 50% growth over the next 2 years. For the time being you could use this one subnet and add another down the road if needed. If we add a second subnet down the road, and we are using DHCP, we would also setup a DHCP Relay Agent to relay the DHCP Broadcast messages across both subnets. Should IP addresses be dynamically or statically assigned? While you are setting this up, you can statically assign IP addresses for your servers, routers, firewalls, and printers. The rest of the computers and laptops should be setup to use dynamic IP addresses from DHCP. It should be standard security to have a firewall installed for your network to protect company information. You would have a router setup at access the internet for business purposes. If DHCP is used, should a router, firewall, or Windows Server be utilized and why? I would definitely setup a DHCP server to centrally manage your IP address pool. DHCP gives you a centralized administration point for dynamic IP...
Words: 260 - Pages: 2
...explores network design and implementation by applying the TCP/IP protocols to provide connectivity and associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile...
Words: 2573 - Pages: 11
...Student Name: | Tiffany Walker | Student Name: | Tiffany Walker | Week 1 – Unit 1 NT1330 – Client-Server Networking II Windows Server 2008 Network Services PUBLISHED: June, 2014 Instructor: Scott McCombs | Phone: 440-376-8836 | Email: smccombs.itt.tech@gmail.com | Office Hours: By appointment only | Student Name: ____________________________ PUBLISHED: June, 2014 Instructor: Scott McCombs | Phone: 440-376-8836 | Email: smccombs.itt.tech@gmail.com | Office Hours: By appointment only | Student Name: ____________________________ Build the OSI Model by providing the following information: Layer # | Layer Name | Function | | | | | | | | | | | | | | | | | | | | | | Internet Protocol The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses contained in the packet. IP defines packet structures that encapsulate the data to be delivered and defines the addressing used to identify the source and destination information. IP is a service in the connection-oriented Transmission Control Protocol (TCP) – thus it is often referred to as the TCP/IP Suite. Two versions of IP: IP Version...
Words: 1730 - Pages: 7
...responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580 | | | NT2670 | NT2640 | | PT2520 | | Introduction to | | | | | | | | | | | Email and Web | | | | | Information | | | | IP Networking | | Database Concepts | | | | | Services | | | | | Security | | | | | | | | | | | | | | | | NT1330 | | | NT1230 | NT1430 | | PT1420 | | Client-Server | | | Client-Server...
Words: 10839 - Pages: 44
...hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could be (but are not limited to): Install/maintain/upgrade site LAN cabling/wiring Survey, inventory and document networking layout and assets Install, configure and/or support Windows 7 desktop as network clients Install, configure and/or support Windows Server 2008 for a network Install, configure and/or support a site LAN (local area network, wired or wireless) General network user...
Words: 6762 - Pages: 28