System restoration procedure guide

Assignment Help Basic Computer Science
Reference no: EM132662938

Scenario

One of the security improvements at Always Fresh is setting up a system recovery procedure for each type of computer. These procedures will guide administrators in recovering a failed computer to a condition as near to the point of failure as possible. The goal is to minimize both downtime and data loss.

You have already implemented the following backup strategies for workstation computers:

- All desktop workstations were originally installed from a single image for Always Fresh standard workstations. The base image is updated with all patches and new software installed on live workstations.

- Desktop workstation computers execute a cloud backup every night at 1:00 a.m.

Consider the following for a computer that encounters a disk drive failure or some other error that requires restoration:

1. How much data has been modified between the last backup and the time of failure?

2. What images are necessary to recover the workstation?

3. What are the steps necessary to fix the problem that cause the data loss?

4. What steps should Always Fresh take to avoid a reoccurrence of this issue in the future?

Tasks

Create a procedure guide that describes the necessary steps for recovering a desktop workstation computer. Fill in details for each of the following steps:

1. Describe the processes of:

a. Fixing the problem that caused the failure in the first place. Keep the description of this process general. Just address the problem and ensure the recovery process starts with a functional computer.

b. Restoring the newly repaired computer to a base workstation.

c. Restoring local data for the specific workstation that failed.

Provide the steps to follow for each of the restore operations. Assume you will be using the Windows Backup and Restore utility.

Reference no: EM132662938

Questions Cloud

Unfortunate experience-life journey about more difficult : We all had the unfortunate experience of seeing how computers can, at times, make life's journey about more difficult.
Why would you recommend the use of job families : A "career path" in a given occupation can be defined as a series of increasingly responsible and demanding "jobs," where at least some of those jobs.
Organization cloud computing implementation : Describe the organization's Cloud Computing implementation and the benefits they realized from the implementation.
What unique value does blockchain technology : What unique value does blockchain technology provide in Alibaba's remittance offering?
System restoration procedure guide : One of the security improvements at Always Fresh is setting up a system recovery procedure for each type of computer.
Impact the remote access domain of its infrastructure : Describe how HIPPA (compliance requirements) can impact the "Remote Access" domain of its infrastructure. How can such requirements be met?
Evaluate history of cryptography from its origins : In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins.
Complexity of information systems research : This journal article was focused on the Complexity of Information Systems Research in the Digital World.
Designing your network security strategy : Describe the CIA triad and the defense in depth principle? Why are those concepts important when designing your network security strategy?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Most popular countries for it outsourcing

According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing.

  Display the content below

Write the code to display the content below The program Name is Full_XmasTree.

  Focus on social and organizational issue

We focus on the social and organizational issues that exist with better understanding why changes occurs.

  Elastic and inelastic traffic

Outline a plan for the development of an addressing and naming model in an environment of the following scenario:

  Find a speech or a writing topic

What methods do you generally use to find a speech or a writing topic? Do you have trouble deciding on a topic?

  Describe the integrative functions

Describe the integrative functions and activities within the information systems area, including the role of CIO and technologies managed within organization

  Develop policy for optimizing bus and local train schedules

Describe how these tools could be used to develop policy for optimizing bus and local train schedules to minimize energy use and passenger wait times.

  How do issues and reality factor into your definition

Part A: Please define Risk in your own words. How do Issues and Reality factor into your definition?

  Ethical for government to agree to grant terrorist immunity

In a hostage crises, is it ethical for a government to agree to grant a terrorist immunity if he releases the hostages,

  Write a description of the project

Select an IT project that you like to work on. Write a description of the project. Based on the scenario of the project,  complete Research Objectives worksheet to reflect the required questions, sources of information, and more.

  Ladybug extends class critter

Ladybug extends class Critter. It changes to the color of another critter (and only critters) that it approaches. When encountering a flower, it will change all of the flower colors to the ladybug's current colo

  Annotated bibliography

The ability to identify other research that pertains to your own. An annotated bibliography helps you develop and hone these research skills.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd