123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Case Scenario Exercise On Mcsa

Profile Picture
By Author: Alyssa
Total Articles: 128
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

You are a network administrator for Humongous Insurance. Humongous Insurance has a multi-domain forest. The forest root is humongousinsurance.com. There are also two child domains named west.humongousinsurance.com and east.humongousinsurance.com. The company has approximately 7,000 users, 7,000 client workstations, 7000 free practice exam questions(http://www.examshots.com) and 100 servers. The company's network configuration is shown in Figure 8-8.

10 Windows Server 2003 domain controllers 5,000 users 5,000 client computers

3 Windows Server 2003
domain controllers
1,000 users
1,000 Windows XP computers

2 Windows Server 2003
domain controllers
3 Windows NT 4.0 BDCs
1,000 users
1,000 computers

Figure 8-8 Humongous Insurance's forest structure
All domains are Windows Server 2003 domains. The forest root domain has 10 domain controllers. Five of those domain controllers are configured as DNS servers and two are configured as global catalog servers. The West domain has three domain controllers. Two of those domain controllers ...
... are configured as DNS servers. One of those domain controllers is configured as a global catalog server. The East domain has two Windows Server 2003 domain controllers and three Windows NT 4.0 backup domain controllers (BDCs).
The forest root domain is located in College Station, Texas. The East domain is located in Gainesville, Florida. The West domain is located in San Diego, California. There is also an Active Directory site configured for each of these IT certification(http://www.buyitexam.com) and locations. The site for College Station is named Main_Site. The Gainesville site is named East_Site. The San Diego site is named West Site.

You should avoid running your computer while logged on as an administrator because running Windows Server 2003 as an administrator makes the system vul¬nerable to Trojan horse attacks and other security risks. If you frequently need to log on as an administrator, use the Run As program, which allows you to am spe¬cific tools and programs with permissions other than those provided by the account with which you are currently logged on.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this chapter. You need to know this information.
Key Points
Global security groups are most often used to organize users who share similar network access requirements. Domain local security groups are most often used to assign permissions to MCSA Certification(http://www.mcsa-70-290.com) resources. Universal security groups are most often used to assign permissions to related resources in multiple domains.

You should avoid running your computer while logged on as an administrator because running Windows Server 2003 as an administrator makes the system vul¬nerable to Trojan horse attacks and other security risks. If you frequently need to log on as an administrator, use the Run As program, which allows you to am spe¬cific tools and programs with permissions other than those provided by the account with which you are currently logged on.

Total Views: 684Word Count: 451See All articles From Author

Add Comment

Computers Articles

1. 5 Must-have Features For Your Support Portal Solution
Author: Maulik Shah

2. What Are Apis And How To Protect Api Vulnerabilities?
Author: sowmya

3. How Fraud Detection System (fds) Works With Ai Technology
Author: sowmya

4. What Are Cyber-physical Attacks And How Dangerous Are They?
Author: sowmya

5. What Is Ransomware Forensics
Author: sowmya

6. How Does A Penetration Testing Service Work?
Author: sowmya

7. The Most Effective Method To Secure An Ecommerce Website
Author: sowmya

8. How To Make Your Computer Run Like New
Author: Vikas

9. Hubbroker : Championing Agility: Leading The Industry Through Ecosystem Integration
Author: Jenna Shah

10. What One Needs To Figure Out About Laptops
Author: subhan basha

11. Ip For High Performance Computing-socs For Artificial Intelligence-high Speed Chip-to-chip Interface Protocol
Author: Guru

12. 3 Major Challenges That An It Helpdesk Agent Faces And How To Resolve Them
Author: Maulik Shah

13. How To Keep Your Important Files Safe
Author: Isabella Whitmore

14. Ransomware Detection Through Threat Hunting
Author: sowmya

15. Advantages Of Cloud Infrastructure Security
Author: sowmya

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: