ALL >> Computers >> View Article
Case Scenario Exercise On Mcsa
You are a network administrator for Humongous Insurance. Humongous Insurance has a multi-domain forest. The forest root is humongousinsurance.com. There are also two child domains named west.humongousinsurance.com and east.humongousinsurance.com. The company has approximately 7,000 users, 7,000 client workstations, 7000 free practice exam questions(http://www.examshots.com) and 100 servers. The company's network configuration is shown in Figure 8-8.
10 Windows Server 2003 domain controllers 5,000 users 5,000 client computers
3 Windows Server 2003
domain controllers
1,000 users
1,000 Windows XP computers
2 Windows Server 2003
domain controllers
3 Windows NT 4.0 BDCs
1,000 users
1,000 computers
Figure 8-8 Humongous Insurance's forest structure
All domains are Windows Server 2003 domains. The forest root domain has 10 domain controllers. Five of those domain controllers are configured as DNS servers and two are configured as global catalog servers. The West domain has three domain controllers. Two of those domain controllers ...
... are configured as DNS servers. One of those domain controllers is configured as a global catalog server. The East domain has two Windows Server 2003 domain controllers and three Windows NT 4.0 backup domain controllers (BDCs).
The forest root domain is located in College Station, Texas. The East domain is located in Gainesville, Florida. The West domain is located in San Diego, California. There is also an Active Directory site configured for each of these IT certification(http://www.buyitexam.com) and locations. The site for College Station is named Main_Site. The Gainesville site is named East_Site. The San Diego site is named West Site.
You should avoid running your computer while logged on as an administrator because running Windows Server 2003 as an administrator makes the system vul¬nerable to Trojan horse attacks and other security risks. If you frequently need to log on as an administrator, use the Run As program, which allows you to am spe¬cific tools and programs with permissions other than those provided by the account with which you are currently logged on.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this chapter. You need to know this information.
Key Points
Global security groups are most often used to organize users who share similar network access requirements. Domain local security groups are most often used to assign permissions to MCSA Certification(http://www.mcsa-70-290.com) resources. Universal security groups are most often used to assign permissions to related resources in multiple domains.
You should avoid running your computer while logged on as an administrator because running Windows Server 2003 as an administrator makes the system vul¬nerable to Trojan horse attacks and other security risks. If you frequently need to log on as an administrator, use the Run As program, which allows you to am spe¬cific tools and programs with permissions other than those provided by the account with which you are currently logged on.
Add Comment
Computers Articles
1. Few Good Insights To Follow With Pc Gaming In Australia!Author: Jack Williams
2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy
3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders
4. The Rise Of User Centered Web Design
Author: goodcoders
5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders
6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech
7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech
8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech
9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech
10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech
11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech
12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech
13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech
14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech
15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech