ALL >> System-Network-Administration >> View Article
Case Scenarioexercise

You are a network administrator for City MCITP: Server Administrator as described in Chapters 5, 6, and 7. The company has a single domain with eight OUs directly subordinate to the domain. The company has five locations: Main, North, South, East, and West. All of the computer and user accounts for each location are in their respective OUs. All locations are connected to the Main site using Tl lines (previously many of these connections were 56 Kbps dial-up). The North, South, East, and West locations are all configured as Active Directory sites named North_Site, South_Site, East_Site, and West_Site, respectively. Each site has between 100 and 150 network users and computers, as shown in Figure 9-16.
Each site also has one domain controller. Each site's domain controller is also config-ured as a DNS server and global catalog server.
Your manager, Dragan Tomic, was promoted from Network Operations Manager to Chief Information Officer (CIO). You are now the Network Operations Manager. This means you are in charge of the network administration team, which includes ccna boot camp ...
... seven other administrators. Wei Yu and Zheng Mu are administrators for the Operations OU. Ben Smith manages the Human Resources, Accounting, and Contractors OUs. The other administrators are Jim Kim (North_Site), Vamsi Kuppa (West_Site), Michael Hummer (South_Site), and Don Funk (East_Site).
When you assign a permission to a security principal for access to an object and that security principal is a member of a group to which you assigned a different permission, the security principal's permissions are the combination of the assigned security principal and group permissions.
The Delegation Of Control Wizard is provided to automate and simplify the process of setting administrative permissions for a domain, OU, or container.
An assignment of administrative responsibility that allows users without administrative credentials to complete specific administrative tasks or to manage specific directory objects. Responsibility is assigned through membership in a security group, the Delegation Of Control Wizard, or Group Policy settings.
On domain controllers running Windows Server 2003, a method of determining the scope of authentication between two forests joined by a forest trust or two domains joined by an external trust 70-685. With these selective taists, you can make flexible forest- or domain-wide access control decisions.
Add Comment
System/Network Administration Articles
1. Fiber Optic Polishing Machines: Types, Applications, And When They Are NeededAuthor: Ryan
2. Fiber Optic Pigtails: Types, Specifications, And Applications Explained
Author: Ryan
3. Fiber Curing Oven: Working Principles, Features, And Applications
Author: Ryan
4. From Struggling Pipelines To Sustainable Growth: The Real Benefits Of Outsourcing Lead Generation
Author: Sophia
5. Smart Print Automation: Transforming The Way Print Shops Work
Author: Printstore
6. Reasons To Try Aura Scanning For Inner Healing
Author: vidhi vidhanya
7. Fiber Polishing Machines: Precision Technology For High-performance Optical Networks
Author: Ryan
8. Mtp Cables Are Meant For High-performance Fibre Optic Communication
Author: Ryan
9. The Rising Importance Of Email Security In A Digital-first World
Author: Impaakt Magazine
10. Arbeitszeit Berechnen Mit Arbeitszeitrechner-24.de
Author: Steffen Stahl
11. Can Your Cloud Voip Provider Troubleshoot The Common Problems Associated With This Service?
Author: Julian Serle
12. An Optical Cable Production Line For Powering Global Connectivity
Author: Ryan
13. Why Does Your Business Need Optical Booster Amplifier?
Author: Ryan
14. The Latest In Cloud Technology And What It Means For Your Business
Author: TechFacto Global Services
15. Achieve Nis2 Compliance With Confidence
Author: Tushar Pansare