ALL >> Computers >> View Article
Designing An Ou Infrastructure For Client Computers

In this practice, you will design an 70-680 Exam infrastructure for client computers at a fictitious organization. Read the scenario and then answer the questions that follow to create your design. If you are unable to answer a question, review the lesson materials and try the question again. You can find answers to the questions in the "Questions and Answers" section at the end of the chapter.
Scenario
You are a security designer for Humongous Insurance. Your boss has asked you to adjust the current OU infrastructure to improve security for client computers. Top-level OUs already exist for each geographic area that Humongous Insurance serves. Client computer accounts are assigned to OUs based on their geographic location. OUs are New York, Paris, Sydney, San Diego, and Johannesburg. Each location has a data center and manages its own computers and users. Your boss wants to improve client computer security by applying security by computer role. The New York and Paris locations have 100 percent of their computers running Windows XP Professional. Sydney and San Diego have 100 ...
... percent of their computers running Windows 2000 Professional. Johannesburg has a mixture of Windows 2000 and MCSE study guides free download Professional-based computers. At each data center, administrative computers are on a separate subnet and are accessible only to administrators.
To use OUs as user role containers, determine user roles and create an OU for each role. For example, use an OU for administrators, one for users, one for managers, and one for the help desk. The deciding factor in whether or not to create another OU is whether the users need to be treated differently. Users who work the help desk, for example, might require more access to their computers than most other users. Administrators require the most control; clerical workers require the least control. Figure 11-6 shows an example of such an OU infrastructure.
CTO "Can't we do something about the people who connect with computers that are not kept up to date with patches? I've some proposals here by some companies who say they can provide a filter to keep those connections out."
IT Administrator "I want to ensure that any carrier equipment authenticates to our network."
Auditor "We just got a solid password policy implemented. I understand some mobile devices can't meet our policy. I would not advise
MCSE exams weakening our policy.
Add Comment
Computers Articles
1. Extract Real Estate And Lender Data From Zillow And AngiAuthor: iweb Data Scraping
2. Web Scraping Weekly Grocery Prices From Blinkit India
Author: FoodDataScrape
3. Extract Cuisine Types Data From Multiple U.s. Food Apps
Author: iweb Data Scraping
4. Scrape Top-selling Grocery Product Data From Kroger
Author: FoodDataScrape
5. Redmart & Fairprice: Quick Commerce Price Intelligence
Author: iweb Data Scraping
6. Top Remote Patient Monitoring Software Solutions Transforming Healthcare In 2025
Author: kaniz vijapura
7. Extract Flavors & Ingredient Insights From Ubereats To Stay Ahead
Author: i web data scraping
8. Unlocking Data Potential With Snowflake Solutions Providers
Author: Trinity Diaz
9. Solution To Extract Weekly Food Menu Data From Deliveroo Uae
Author: FoodDataScrape
10. Is Your Edc A “one-size-fits-all” Platform?
Author: Giselle Bates
11. Epson Thermal Printers: Dealer Guide & Expert Tips
Author: prime poskart
12. How Workforce Management Companies Help Businesses Boost Efficiency And Productivity
Author: Sooreedu7
13. Choosing The Right Time Clock System For Your Business: Features, Benefits & Solutions
Author: Sooreedu7
14. Why Hiring A Local Web Developer In Kuala Lumpur Gives You An Edge
Author: SAnvesh511
15. How Professional Security Services Strengthen Business And Residential Protection
Author: SAnnie511