Analyze a method for consolidating core network services

Assignment Help Computer Network Security
Reference no: EM131754384

Assignment

Imagine you work for Quality Corporation (Quality.ad) who has just recently bought Crescent Inc. (Crescent.ad) in a recent merger. Quality and Crescent have separate offices in St. Louis (Quality HQ), Little Rock, and Austin (Crescent HQ). Crescent also has offices in Oklahoma City, Tulsa, and Santa Fe. The desire is to establish trusts between the two AD forests and consolidate core services (DNS, DHCP, etc.) as soon as possible. Both companies are running Server 2012 as Domain Controllers. Their primary DNS, DHCP, and Domain Controller servers are in the two corporate headquarters with secondary servers located in the other cities to reduce latency.

For the Quality.ad domain, the Flexible Single Master Operation (FMSO) roles are located on Server01, which is located at the Quality HQ. For the Crescent.ad domain, the FSMO roles are located on RWDC01, which is located at the Crescent HQ. In addition, the Quality.ad domain has several servers configured as a Certificate Authority, and the Crescent.ad domain has a single Certificate Authority.

During this acquisition, you will need to consider the following:

• The Crescent Inc. has developed several enhancements for the widgets that your company produces. The engineering documents are installed on the ServerDocs located at the Austin office. You will need to configure the necessary systems so that the engineers from Quality Corporation can access these documents. Since these documents are considered proprietary and highly confidential, you must ensure that no other users except the two engineering teams can access these documents and that the documents stay within the company.

• For both organizations, all user IDs and digital certificates from the other organization must be recognized.

Write a six to eight page paper in which you:

1. Explain the key considerations behind establishing trust relationships between the two domains.

2. Suggest a method for consolidating Core Network services.

3. Provide a plan for integrating both AD forests eliminating duplication of service wherever possible.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Describe, manage, and install Active Directory replication, federation services, and certificate services.
• Demonstrate the ability to plan an advanced AD, DHCP, and DNS solution.
• Describe and plan for configuring a domain and forest as well as configuring trusts.
• Use technology and information resources to research issues in advanced network infrastructure environments.
• Write clearly and concisely about advanced network infrastructure topics using proper writing mechanics and technical style conventions.

Reference no: EM131754384

Questions Cloud

The monty hall problem : Suppose there are three doors, labeled A, B, and C. A new car is behind one of the three doors, but you don't know which. You select one of the doors
Number of support systems to carry on business operations : Company strategies can’t be implemented or executed well without a number of support systems to carry on business operations
Compute the unit product cost for one gamelan : Compute the unit product cost for one gamelan, Assume that the company uses variable costing. Compute the unit product cost for one gamelan
An approach for balancing the issues of individual rights : Determine a philosophy and approach for balancing the use of reward and punishment in criminal justice.
Analyze a method for consolidating core network services : Explain the key considerations behind establishing trust relationships between the two domains. Analyze a method for consolidating Core Network services.
Evaluate probability distribution of errors for batch of ten : An auditor is checking invoices that have been paid to see if they contain any errors. Historically around 7 per cent of all invoices are expected to contain.
Suppose two people each flip a fair coin simultaneously : Suppose two people each flip a fair coin simultaneously. Will the results of the two flips usually be independent?
Suppose you are able to repeat an experiment many times : Suppose you are able to repeat an experiment many times, and you wish to check whether or not two events are independent. How might you go about this?
Discuss what adjusting entry should the company make : If the company prepares monthly financial statements, what adjusting entry should the company make at November

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd