Explain a method for consolidating core network services

Assignment Help Computer Network Security
Reference no: EM131650811

Assignment: Managing a Merger

Imagine you work for Quality Corporation (Quality.ad) who has just recently bought Crescent Inc. (Crescent.ad) in a recent merger. Quality and Crescent have separate offices in St. Louis (Quality HQ), Little Rock, and Austin (Crescent HQ). Crescent also has offices in Oklahoma City, Tulsa, and Santa Fe. The desire is to establish trusts between the two (2) AD forests and consolidate core services (DNS, DHCP, etc.) as soon as possible. Both companies are running Server 2012 as Domain Controllers. Their primary DNS, DHCP, and Domain Controller servers are in the two corporate headquarters with secondary servers located in the other cities to reduce latency.

For the Quality.ad domain, the Flexible Single Master Operation (FMSO) roles are located on Server01, which is located at the Quality HQ. For the Crescent.ad domain, the FSMO roles are located on RWDC01, which is located at the Crescent HQ. In addition, the Quality.ad domain has several servers configured as a Certificate Authority, and the Crescent.ad domain has a single Certificate Authority.
During this acquisition, you will need to consider the following:

• The Crescent Inc. has developed several enhancements for the widgets that your company produces. The engineering documents are installed on the ServerDocs located at the Austin office. You will need to configure the necessary systems so that the engineers from Quality Corporation can access these documents. Since these documents are considered proprietary and highly confidential, you must ensure that no other users except the two engineering teams can access these documents and that the documents stay within the company.

• For both organizations, all user IDs and digital certificates from the other organization must be recognized.

Write a six to eight page paper in which you:

1. Explain the key considerations behind establishing trust relationships between the two domains.
2. Suggest a method for consolidating Core Network services.
3. Provide a plan for integrating both AD forests eliminating duplication of service wherever possible.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Describe, manage, and install Active Directory replication, federation services, and certificate services.
• Demonstrate the ability to plan an advanced AD, DHCP, and DNS solution.
• Describe and plan for configuring a domain and forest as well as configuring trusts.
• Use technology and information resources to research issues in advanced network infrastructure environments.
• Write clearly and concisely about advanced network infrastructure topics using proper writing mechanics and technical style conventions.

Reference no: EM131650811

Questions Cloud

The rise of children diagnosed with a mental illness : Describe the subject as if you were analyzing it from a human service discipline, and then adopt the disciplinary perspective
What are the features of cassandra : What are features of the Cassandra? How it is different from Key-Value DB, Big Table? How data consistency is maintained? How data transaction is maintained?
Discuss about the genetic theory : Genetics. Two human traits controlled by a single gene are the ability to roll one's tongue and whether one's ear lobes are free or attached to the neck.
Discuss in perfume: the story of a murderer : He was not really interested in any of the women he killed, rather he was intrigued by their scent and sought to preserve it
Explain a method for consolidating core network services : Explain a method for consolidating Core Network services. Provide a plan for integrating both AD forests eliminating duplication of service wherever possible
Discuss society display contradictory attitudes : The nice guy stereotype asserts that women in todays society display contradictory attitudes and behaviors regarding whom they choose as dating partners
How many different products were included in given analysis : Tableware. Nambe Mills manufactures plates, bowls, and other tableware made from an alloy of several metals. Each item must go through several steps.
Find the probabilities that forgotten digits form sequence : Find the probabilities that a) forgotten digits form the sequence 7, 4, 0 (in the mentioned order); b) forgotten digits may repeat but all of them from the set.
What are the benefits of consulting with other professional : As such, based on your research, what additional information would you need to ensure that you are making the correct diagnosis?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Summarize two key information security practices

Summarize two key information security practices you recommend the company implement. Provide supporting examples/research/justification for your two recommended information security practices. Use appropriate terminology learned from the informa..

  Decrypt the ciphertext message lfdph lvdzl frqtx huhg which

decrypt the ciphertext message lfdph lvdzl frqtx huhg which has been encryptedusing the caesar cipher. encrypt the

  Analyse and evaluate risks and security concerns

Analyse and evaluate risks and security concerns with cloud computing discuss strategies for addressing them

  Ethics or values within the hacking subculture.

Write a 1-2 page essay defining and showing examples of hacking and its subculture. Do hackers have ethics or values? If so, give examples of ethics or values within the hacking subculture.

  Privacy and security of information

Privacy and security of information- Pat, a billing associate at a local hospital, was issued a laptop for work purposes. Her friend, however, has asked to borrow it for school to complete an online assignment

  What are the benefits of virtualization of servers

What are the benefits of virtualization of servers? Short answer - Need at least 4 benefits. Also define a virtual server.

  Identify hardware and software needed to secure network

Identify hardware and software needed to secure your choice of networks against all electronic threats. Distinguish between local area networks (LANs), wide area networks (WANs), and wireless technologies

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  Context of a systems development project

Outline the issues that Susan should consider which would support the purchase of a software package. Within the context of a systems development project, when should the decision of "make-versus-buy" be made? How should Susan proceed? Explain your..

  Screen element of ms word

A screen element of MS Word that is usually located below the title bar that provides categorized options is known as ?

  Termination of a project

As a assignment manager, you are asked to facilitate a lessons learned session as part of the assignment termination process.

  Analyze the necessity for different protocols

Identify common frequency bands used in current RF communications. Analyze the necessity for different protocols in wireless communications. Compare the challenges of using satellites in end-to-end communications links

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd