123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Case Scenario Exercise On Mcsa

Profile Picture
By Author: Alyssa
Total Articles: 128
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

You are a network administrator for Humongous Insurance. Humongous Insurance has a multi-domain forest. The forest root is humongousinsurance.com. There are also two child domains named west.humongousinsurance.com and east.humongousinsurance.com. The company has approximately 7,000 users, 7,000 client workstations, 7000 free practice exam questions(http://www.examshots.com) and 100 servers. The company's network configuration is shown in Figure 8-8.

10 Windows Server 2003 domain controllers 5,000 users 5,000 client computers

3 Windows Server 2003
domain controllers
1,000 users
1,000 Windows XP computers

2 Windows Server 2003
domain controllers
3 Windows NT 4.0 BDCs
1,000 users
1,000 computers

Figure 8-8 Humongous Insurance's forest structure
All domains are Windows Server 2003 domains. The forest root domain has 10 domain controllers. Five of those domain controllers are configured as DNS servers and two are configured as global catalog servers. The West domain has three domain controllers. Two of those domain controllers ...
... are configured as DNS servers. One of those domain controllers is configured as a global catalog server. The East domain has two Windows Server 2003 domain controllers and three Windows NT 4.0 backup domain controllers (BDCs).
The forest root domain is located in College Station, Texas. The East domain is located in Gainesville, Florida. The West domain is located in San Diego, California. There is also an Active Directory site configured for each of these IT certification(http://www.buyitexam.com) and locations. The site for College Station is named Main_Site. The Gainesville site is named East_Site. The San Diego site is named West Site.

You should avoid running your computer while logged on as an administrator because running Windows Server 2003 as an administrator makes the system vul¬nerable to Trojan horse attacks and other security risks. If you frequently need to log on as an administrator, use the Run As program, which allows you to am spe¬cific tools and programs with permissions other than those provided by the account with which you are currently logged on.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this chapter. You need to know this information.
Key Points
Global security groups are most often used to organize users who share similar network access requirements. Domain local security groups are most often used to assign permissions to MCSA Certification(http://www.mcsa-70-290.com) resources. Universal security groups are most often used to assign permissions to related resources in multiple domains.

You should avoid running your computer while logged on as an administrator because running Windows Server 2003 as an administrator makes the system vul¬nerable to Trojan horse attacks and other security risks. If you frequently need to log on as an administrator, use the Run As program, which allows you to am spe¬cific tools and programs with permissions other than those provided by the account with which you are currently logged on.

Total Views: 847Word Count: 451See All articles From Author

Add Comment

Computers Articles

1. How To Use Travel Web Scraping Service To Scrape Hotel Data And Travel Data?
Author: #ScrapeHotelDataandTravelData

2. 15 Best Tools To Manage Remote Teams And Stay Connected
Author: goodcoders

3. 12 Types Of Software Developers
Author: goodcoders

4. 12 Reasons Why Startup Needs Mobile App
Author: goodcoders

5. Why It Is Necessary To Have Pc Gaming Updates
Author: Jack Williams

6. Navigating Phone Repair Myths In Las Vegas: The Truth Behind Third-party Services
Author: Fones Gone Wild

7. The Truth About Microsoft Support And Visual Foxpro Migration
Author: John Mathew

8. Laptop Repair - Hardware And Software Troubleshooting
Author: Joshua Kirby

9. Salesforce Security Best Practices | Yantra Inc
Author: Yantra Inc

10. Foxpro And End Of Life Migrations
Author: John Mathew

11. Effortless Outreach: Kingasterisk Voice Broadcasting Solution In Action
Author: Kingasterisk Technology

12. The Impact Of Ai On Voip Cost Savings: A Case Study
Author: Sandip Patel

13. 12 Effective Mobile App Testing Types
Author: goodcoders

14. 12 Best Practices To Improve Your Qa Testing Skills
Author: goodcoders

15. 12 Best Apps For Small Businesses
Author: goodcoders

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: