Find Jobs
Hire Freelancers

IT-center our network instructor disappear -answer of some questions needed

$30-5000 USD

Concluído
Publicado há quase 12 anos

$30-5000 USD

Pago na entrega
dear all, I have a serious problem , I have IT learning center , unfortunately the network teacher can not continue his course , today I have his exam and I have not the answer of this exam so I need anyone for answer it as student for getting the ideal exam answer . the most important thing is to take screen shots for every step and please send me each step before doing the next one it is better to review each step because each step rely on the previous one "my Example" full mane is Monirah Alsubaei >>>that is used for creating the VMs "my example student is " living in Ireland >>>>this helps in some settings you should include every single resource (website resources) that helps in each task you should use oracle VM you must take screen shots for every single step (min 3 shots in for a step) for example for downloading the VM , it is fine to use just 3 shots for task A.5 the folder is called backup should be created on C drive for task A.8 we should not use third party software or internet Exp task A. 7 >>>group policies ..........for creating a folder structure that will be in the server and the debian finally do not forget to follow the style of naming the folders and VMs and please ask me about any other info you need thank u ## Deliverables Introduction The purpose of this assignment is to give you a thorough understanding of Network and Operating Environment Security by deepening your practical knowledge and skills in relation to same. Please note that it is upon this documentation that you will be marked. Marks will be awarded based on the explanations and the instructions for performing said tasks. Please note that all references should be in APA style. At the end of the assignment you will be required to produce two documents as follows: ? Section A :A user's manual documenting the steps you used to complete each tasks outlined below. The documentation should be provided in soft copy format. For each of the tasks, all technical issues with regard to hardware and software requirements which must be met should be detailed. Naming Convention : If your name is John Smith, this document should be named as follows: [login to view URL] ? Section B: An Essay pertaining to section B. Naming Convention : If your name is John Smith, this document should be named as follows: [login to view URL] The document formats accepted are Microsoft Word or Adobe Acrobat Format. In this assignment you will be asked to create three virtual machines. The specifications for each of the machines are given below in Sections A. On each of these machines you will be asked to carry out a number of practical tasks outlined accordingly. Section A ? Using Virtual Box by Oracle Software, ([login to view URL]) You will be asked to carry out a series of practical tasks on virtual machines. ? Important: an essential part of the assignment will be to document the procedures by which you completed each task from beginning to end. Each task should be described in a series of numbered steps. In addition, for each task, you should provide at minimum two or three legible screen shots as would be required for such documentation and as evidence that you have actually worked through the task. (Screen shots are normally placed at the most important stages/steps in any task). This documentation should be laid out like a professional user's manual, Task A.1 Create Virtual Machines (VM's) and upon these VM's install the following Operating systems ? Microsoft Windows 7 ? Microsoft Windows Server 2008 ? Debian Linux Microsoft Windows 7 Install Windows 7 with the following installation options. Specify the Machine name as 'fxWin7', where : f is your first initial x is the first three characters of your last name Assign the machine to workgroup X (where X is your initial-surname) Microsoft Windows Server 2008 Install Windows Server 2008 with the following installation options. The machine is again to have 2 partitions one for the Operating system and the other is for the users directories. Please choose adequate sizes accordingly. Specify the Machine name as 'fxSrv08', where : f is your first initial x is the first three characters of your last name Assign the machine to workgroup X (where X is your initial-surname) Debian Linux Install Debian Linux Set up two partitions one for the Operating System and the other for the user's directories. Please choose adequate sizes accordingly. Task A.2 On Each of the three machines, install all relevant Updates and Service Packs, outline the importance of keeping Operating Systems up to date with the latest Service Packs and any administration tasks which should be performed prior to same. On Windows 7 and Windows Server 2008, after Installing updates, change the settings so that the service packs will no longer be downloaded and installed automatically. Task A.3 On the Windows 7 machine install Microsoft Security Essentials, update the virus definitions and schedule scans for 0300 hours every Monday, Wednesday and Friday. Make sure that the firewall is enabled on both Windows 7 and Windows server 2008. On the Debian VM install a open source Anti-Virus application and a firewall. Task A.4 Networking: Explain what is meant by the address [login to view URL] Set up each of the VM's with a valid address from the address space above. Task A.5 System Restore setup and testing Using Windows 7, a system restore point is to be created. After creating the system restore point, perform the following: Change the name of the machine to 'mc1'. Create a new folder on the data partition called backup. Disable the floppy diskette within the machine Restore the pc to the restore point created earlier. Outline what changes the system restore process has performed. Task A.6 Set up an Active directory Domain using the Windows server 2008 VM, install any required services for same. Set up the Windows 7 machine to join the above Domain. Task A.7 Users, Groups & Security In accordance with best practice implement company security in relation to passwords, logons, set up the Active Directory Domain to enforce these requirements. The following users are staff members who will require logon access to this machine. For each of the users, create accounts and groups on both the Active Directory Domain and the Debian Linux machine. Name: Samantha Grace Department: IS Name: Rachael Mathews Department: IS Name: Sam Smith Department: Finance Name: Paul Daniels Department: Finance Name: Stephanie Brown Department: HR Name: Francis Brennan Department: HR [Note: The username follows the structure: [login to view URL] Samantha Grace is also to be given membership to an administrators group.] Using the second partition, create a folder structure to meet the following requirements: Each department should have its own folder with each user within the department having a private folder accordingly. Share out each department folder and restrict same to only allow members of each department access to the folders - this access is to be restricted both from remote and local access. Grant the administrators group full access to all of the folders. Task A.8 With the Windows 7 VM, in accordance with best practice and company policy block access to three common social media sites. Task A.9 Remote connectivity: Set up remote desktop on the Windows Server 2008 machine to enable Rachael Mathews to remotely log in and carry out administrative tasks. To increase security the default port is to be changed to an appropriate non-default port and modify any system settings accordingly. Demonstrate how Rachael would connect to the Windows Server 2008 machine from the Windows 7 machine via remote desktop Task A.10 System registry: On the Windows 7 machine, create a backup of the registry and save it to a location of your choice. Backup: On Windows server 2008, Setup Microsoft Backup, set up a backup of the user directories and explain the difference between incremental, differential and full backups. Task A.11 Driver compatibility on Windows 7, in order to maintain the stability of the operating system environment in the future it is required that you prevent any unsigned drivers from being installed. Section B A vulnerability assessment is a process in which the IT systems such as computers and networks, and software such as operating systems and application software are scanned in order to identify the presence of known and unknown vulnerabilities. Discuss this comment in the context of networks, outlining the vulnerabilities and the countermeasures which can be applied to reduce the risks accordingly. Please use the APA style for the return of this section. (Minimum 1500 words excluding references)
ID do Projeto: 2753699

Sobre o projeto

1 proposta
Projeto remoto
Ativo há 12 anos

Quer ganhar algum dinheiro?

Benefícios de ofertar no Freelancer

Defina seu orçamento e seu prazo
Seja pago pelo seu trabalho
Descreva sua proposta
É grátis para se inscrever e fazer ofertas em trabalhos
Concedido a:
Avatar do Usuário
See private message.
$50,15 USD em 4 dias
5,0 (2 avaliações)
1,8
1,8

Sobre o cliente

Bandeira do(a) EGYPT
El-rehab, Egypt
4,7
13
Método de pagamento verificado
Membro desde set. 12, 2006

Verificação do Cliente

Obrigado! Te enviamos um link por e-mail para que você possa reivindicar seu crédito gratuito.
Algo deu errado ao enviar seu e-mail. Por favor, tente novamente.
Usuários Registrados Total de Trabalhos Publicados
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Carregando pré-visualização
Permissão concedida para Geolocalização.
Sua sessão expirou e você foi desconectado. Por favor, faça login novamente.