Preview

UNIT 2

Satisfactory Essays
Open Document
Open Document
423 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
UNIT 2
NT1330
UNIT 2. EXERCISE 1. DNS SCENARIO
It is not required to put a DNS server in such a small location for only five users and snail like network connectivity doesn’t justify the amount of money it would cost to install a server(s) in that area. One exception would be if there is a great amount of file sharing, or other information that would need to be accessed daily by other spots on the network. This sometimes but rarely happens but we could have a situation where we put it in the in the server but we set it up as a secondary or Active Directory Integrated zone type. I recommend installing the servers in the location where you have 30 users and fast internet connection. You could do this also, try storing all the files from either location in the bigger office, and in the smaller location you could remote connect through Virtual Private Network. When we do this all the information from the smaller sight is stored off site. The sight with five users can be run with a cheap router and the server that has thirty users at the office will be set up as the primary zone; since this is utilizing the fast internet connection and has more users this is our MAIN BASE which you can call home. =)
If you were to run Domain Name System on domain controllers there are Active Directory Integrated zones and Active Directory Integrated zones. In classical Domain Name Systems the zone data is stored in text files which sit on the Hard Drive; which of course is protected by New Technology File System. You shouldn’t have the ability to impose per-record security.
You might want to create an Active Directory Integrated zone also; the zone information and the affiliated resource records are imported onto the Active Directory Data Base, NTDS.DIT file. Zones and zone records become objects in Active Directory, which has its ups and it’s down sides, in terms of positive and negative effects. Looking at this from a security perspective, you have the ability to protect the Domain Name

You May Also Find These Documents Helpful

  • Better Essays

    This domain is the fastest way for the system to be compromised. I would implement an AUP (acceptable use policy) that will be understood and signed by all employees with access to the network. The employees will also have to go through initial information security training before gaining access to the network. This training will also be required annually in order to maintain their access to the network. The AUP will dictate the requirements for passwords. The requirements will include an eight character alphanumeric password, two uppercase letters, two lowercase letters, two special characters, and two numbers. This will make it more difficult for the password to be breached. The AUP will also state that the company systems will only be used for work related purposes. All social networking sites and many other miscellaneous sites will be blocked. The user will also have to consent to monitoring when signing the…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    NT1330 DNS Scenario

    • 286 Words
    • 2 Pages

    Thank you for contacting me regarding your questions, and trust that I will do my best to help you. From what I understand, you work at two branch offices, and have been given the responsibility of discovering where to place an Active-Directory Integrated DNS server. You also have some question of what type DNS server would best meet your company’s needs.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    All access control requirements are commensurate with the user’s duties at a particular incident. For DNS, access control is implemented in accordance with the following principles:…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    The final infrastructure domain that is greatly affected is the LAN domain. The reason that this domain infrastructure is affected by internal use only data is because this domain is the open domain available companywide, to anybody in the building or even near the building via a wireless device.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The first domain would be Users, which are the most threatening thing in the IT infrastructure. Here is a personal interaction with your domain; protection usually is from issuing ID logins and Passwords. As you biggest threat, taking precaution to monitor your users lands with your domain Admins. Since your users can access everything in your domain, you must limit them to what they can do and monitor when they logon.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For the LAN domain, Make sure wiring closets, data centers, and computer room are secure. Use a WLAN network keys that require a password for wireless access. And implement encryption between workstation and WAP to maintain confidentiality.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    If you run DNS on domain controllers, you have the opportunity to use something called Active Directory Integrated zones, or ADI zones. In classical DNS, the zone information is stored in text files that sit on the hard drive. Yes, they’re protected by NTFS, but you don’t have the ability to impose per-record security.…

    • 319 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1330 unit 7 assinment1

    • 350 Words
    • 2 Pages

    I can understand how you concerned with your company’s security after all information on competitors can be invaluable or very harmful to a company and this is why it must be protected from prying eyes. This does not have to mean that you have to lose production over trying to secure your networks information. An easy measure like user names and passwords can be used to protect less sensitive information but how strong you make those usernames and passwords can have a significant effect on how well your information is protected. I will give you some tips on how to better secure your network with the tools that you already have at hand, keep in mind that you can also buy better security items to better protect you network things like; smart card, finger print scanners, retinal scanners, etc. but I only recommend these for really sensitive information and only for certain users in your company. On the server that is the DC log in to the administrator account and in the Active Directory Users and Computers in the Domain icon in the left pane click on the users icon, you’ll be able to see all of the users in that domain. From here you can click on any user and make changes as necessary, for user names I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “CCbattle1234@Domain*%#.Local” if someone hack the account and all that they knew the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. As for passwords I recommend that they be alpha numeric and what this means is that they should be at least eight characters long, be composed of upper and lower case letters, should contain at least one number and one special character.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Win 210 Lab

    • 678 Words
    • 3 Pages

    5. The college you work for has a main campus location and three large branch sites. Each branch site has three or more Dns servers that continually need to send DNS queries to the DNS servers on the main compus. You want to designate one DNS server at each branch site to send DNS queries to the main campus. Which of the…

    • 678 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    UNIT 2

    • 470 Words
    • 3 Pages

    5.) Write the pseudocode for a program that will determine the average miles per gallon a car gets. (Inputs should be miles driven and gallons of gas used)…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Creating a Domain Model

    • 482 Words
    • 2 Pages

    A Windows domain model is an organized collaboration of Windows servers whose database contain user information, organizational, functional, and security policies amongst other things. By the nature of the class, the use of Windows Server 2008 R2 is established. Depending on the business and hierarchical topology of the organization that is served by the model, it can be a single domain or made up of multiple domains. If there are multiple domains, they could be organized into a tree or trees that make up a forest or forests.…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 3

    • 2650 Words
    • 31 Pages

    On food labelling nutritional information must be showing the amount of each of the following in 100g or 100ml;…

    • 2650 Words
    • 31 Pages
    Good Essays
  • Satisfactory Essays

    One security options that can be used is the Privacy or confidentiality. Using this will help keep information confidently from others or outsiders unless you are authorized. This will keep employees from finding things such as SSN (social security numbers), personal home address, and/or documents that may be considered sensitive. Having this as a security option is an all-around good idea. I would implement this on all of the networks/domains that I would manage.…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Quick Check

    • 747 Words
    • 3 Pages

    8. Computers that belong to the same domain can access a common security database of user and computer account information. This type of database on Windows 2003 domain controller servers is also known as a(n) ___ database.…

    • 747 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Global Names

    • 391 Words
    • 2 Pages

    1. What is the purpose if the Global Names Zone in Windows Server 2008 DNS servers?…

    • 391 Words
    • 2 Pages
    Satisfactory Essays