Premium Essay

Nt1330 Unit 2 Assignment 1

Submitted By
Words 2994
Pages 12
Introduction
System administrators, also known as chief information officer (CIO) are people who are responsible of setting up and maintaining systems. The duties of one ranges from installing, supporting, and maintaining servers or computer systems, user accounts management, ensure the availability of peripherals and services, performance tuning and monitoring, managing file systems, software installation and updates, preparing contingency, backup and recovery plans, policy enforcements, as well as security measurements implementation. (cyberciti.biz, 2008)
Problems Identification
As a software house, program scripts and codes, and documentations are core business assets. Storing them in a publically assessable server jeopardizes the resources by putting them at risk of being cyber-attack victims, hence the integrity and confidentiality are questionable. The company also lacks proper management and administration of their systems and resources in place, some are underutilized, such as the disk space utilization of their services like databases, mail services, active directory, and so on, the administrative account is known by most of their …show more content…
In order to maximize the performance, I would suggest to run all the services in a main server and implement a backup server to minimize the downtime of the server. Therefore, if there are any incident happen, the backup server will operate immediately to swap with the main server. Beside this, the system administrator should keep the password and not share with other employees in order to ensure the security of all the sensitivity data that stored on the server. The system administrator also need to maintain and upgrade the software and hardware when it reach certain limitation to make sure all the servers are running in top

Similar Documents

Premium Essay

Nt1330 Unit 2 Assignment 1

...Unit 2 Assignment 1 DHCP troubleshooting Hello Junior Administrator, Let me clarify your parameters and intent… You have stated that you were tasked with changing the DHCP scope to match you IP addressing scheme. The IP address range you are using is 192.168.0.200 through 192.168.0.225. I have come up with a couple solutions and approaches to help you with your problem. First of all make sure you have typed all your numbers correctly. At times, a simple number incorrectly typed can throw the entire scheme off. Perform the same check for your subnet inputs as any slight number mistype will negate everything that you are trying to achieve. Make sure the scope is under the established DHCP local role IP address range on your assigned server. My next approach would be to see if there is connectivity between your user machines and the network. Make sure your network interface cards are all up to date and functioning. The other approach I will suggest can be involved if you’re not used to working with your command prompt however it’s doable with a detailed memo to your employees. I would have them release their IP addresses and renew them to through the console command input. I understand that most users may not have the required know how to do these tasks but for those I would actually go and input the commands manually and hopefully this will finally fix your problems. If you still encounter issues, please feel free to contact me and we can walk through...

Words: 265 - Pages: 2

Premium Essay

Nt1330 Unit 2 Assignment 1

...Assignment 2 Ebtesam Falah Alhajri, 2120007594, G:1 Write down detailed answers to following questions. At least write 250 words for each question. All assignments will be evaluated with plagiarism software and submissions having a similarity rate of more than 35% will be awarded 0 marks. While answering the questions use the rules of scientific writing such as in-text citations, paraphrasing etc. Maximum Marks=5 Due Date: 23 November 2016 1. The web services model involves managing and performing all types of business processes and activities through accessing web-based services rather than running a traditional executable application on the processor of your local computer. Debate on this statement by discussing...

Words: 1271 - Pages: 6

Premium Essay

Nt1330 Unit 2 Assignment 1

...Dear Junior Admin A, Sounds like the other workstations are still trying to use their old IP addresses. Go to the workstations and perform an ipconfig /release and then ipconfig /renew in the command prompt. Default IP lease is set to renew every 8 days and if the affected workstations are not due to renew their IP address yet they’re not picking up on the new scope. I hope this works and if you have any problems or questions feel free to contact me. Thanks, IT Admin Dear Junior Admin B, For the small office, I would use a DNS server with a stub zone. This will really help conserve bandwidth. Without an onsite DNS each time a workstation attempts to find a website it will have to query Internet DNS servers taking up bandwidth. Using an onsite DNS decreases a lot of broadcast chatter. Of course a stub zone DNS will have to be directed to a primary DNS to maintain a current authoritative list of name servers. For the larger office, I would also use a DNS server but with an active directory-integrated zone. This is a primary zone configuration. Even though this location has higher bandwidth, domain members still rely heavily on DNS services to locate domain resources. This DNS should be configured as a DC (domain controller)/DNS server. This will greatly improve the overall user experience within the network. I hope this works and if you have any problems or questions feel free to contact me. Thanks, IT...

Words: 255 - Pages: 2

Premium Essay

Nt1330 Unit 2 Assignment 1

...Unit 2 Assignment 2: The Best Solution Task 1 The purpose of anti-virus protection is to detect malicious software; it does this by scanning files and software though the database, this is known as definition files. Anti-virus protection will protect the computer from malicious software and viruses. Malicious software is self-replicating so that anti-virus protection is used to stop this kind of software replicating. A virus will make the computer shut down, so anti-virus protection is put in place to prevent this from happening. There are different forms of viruses which anti-virus software prevents; these include adwok, malware and worms. Adwok are advertisements which users may see on websites they visit, for example you may visit a website like eBay, and then when you go on to...

Words: 1817 - Pages: 8

Premium Essay

Fsmo Role Ayer Nate Method

...some of theese roles on to more servers. It is also important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master * Domain Master Domain Controller #2 Place the domain roles on this server. * RID Master * Infrastructure Master * PDC Emulator If more domains exist in the forest, place the domain roles on a server in theese domains like Domain Controller #2 Global Catalog configuration. In Windows 2008 Active Directory all Domain Controllers are by default Global Catalog servers, personally...

Words: 10360 - Pages: 42

Premium Essay

Client Server 2

...North Las Vegas, Nevada 89032 NT1330 Client-Server networking II Name: ____________________________________________________ Date: _______________________ NT1330 Week 1 Unit 1 Assignment 1 Instructions: 1. Complete this assignment and submit it prior to the beginning of the next class meeting. 2. Completely fill in the bubble for the correct answer(s), any other mark such as an X or just a line through it will be marked as incorrect. True/False Indicate whether the statement is true or false. 1. IPv6 uses 128 bits, or 16 bytes, for addressing, thus providing 2128 (about 340 billion) unique addresses. A True B False 2. Dynamic IP addresses can be assigned when administering TCP/IP hosts. These addresses must be configured and maintained manually. A B True False 3. Using DHCP relay agents eliminates the need to have a DHCP server on every subnet. A True B False 4. One benefit of the hierarchical structure of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy. A B True False 5. ICS turns your computer into a router so that other computers on the local network can access its Internet connection. A B True False 6. If you inappropriately allowed network discovery in a public network environment (for example, an Internet café), you would allow total strangers to see and access any file shares on your system. A B True False Steve Todd Page 1 of 9 7. Because the software...

Words: 1872 - Pages: 8

Premium Essay

Test

...Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...

Words: 2305 - Pages: 10

Premium Essay

Help

...Anna Monreal NT1330 WEEK 2 ASSIGNMENTS Unit 2 Assignment 1 DHCP Trouble Shooting Dear Jr. Admin, One of the first reason that some of the computers may not have not picked up the new leases could be that those computers were not rebooted. This would be the first thing I would do. If for some reason this does not work try disabling and enabling the NIC. Once the computer comes back up it should ask for the new DHCP. One other step to try is to force the address to renew. Go to your command prompt and type in ipconfig or iprelease. Once you have tried these steps and the work station still do not pick up the new leases there obviously would be some other issues. It is possible that there are more workstations than ip addresses. You may want to take a count of how many actual computers that you have in your office. If they exceed the number of IP address that you were given you will need to contact the main office to request a larger range of addresses. One of the last reasons could be is that the DHCP does not cross the router. If those computers that did not renew their leases are separated by a router you will make sure that you have a DHCP for each network. If this is the case then once you have DHCP on each network as an extra step I would make sure that each computer on the network that did not renew is rebooted. Good Luck Anna...

Words: 262 - Pages: 2

Premium Essay

Nt1230 Syllabus

...aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...

Words: 1834 - Pages: 8

Free Essay

Dhcp Troubleshooting

...Ashley Petry NT1330 Wednesday Evening Unit 2. Assignment 1. DHCP Troubleshooting Dear Junior Administrator, I would start by rechecking your initial configurations to make sure the setting were saved. Once that is done, check to see if the workstations have picked up a new lease or not. If that doesn’t resolve the issue, did you check to make sure the server is up and operational? Have any Error messages or pop up’s appear with any type of warning, if so what did it say? Once the server has been checked, if it is working properly we will check these three common problems; 1. “The client might be configured to use an IP address not provided by the server. 2. The server sends a negative response back to the client, and the client displays an error message or popup indicating that a DHCP server could not be found. 3. The server leases the client an address but the client appears to have other network configuration–based problems, such as the inability to register or resolve DNS or NetBIOS names, or to perceive computers beyond its same subnet.”(Troubleshooting DHCP) On the chance that the DHCP server is off I would like you to follow these steps to try to restart the DHCP server. 1. “Start Windows Server, and log on under an account with Administrator rights. 2. At the command prompt, type net start dhcpserver , and then press ENTER. As a helpful tool Use Event Viewer in Administrative Tools to find the possible source of problems with DHCP...

Words: 311 - Pages: 2

Premium Essay

Unit 2 Assignment Nt1330

...NT1330 Client Server Networking II Mr. Pham Unit 2 Assignment 1 Dear Junior Admin, Regarding your task with changing out the DHCP You can start by checking the workstations and seeing if they have an static IP setup on the network adapter. There are 2 ways to check this. The first way is to click on the run command in the start menu and type cmd and hit enter. Next type in ipconfig /all, depending on how many Network Interface Card or NIC cards are installed (both logically and virtually.) you might get a long list . Look for your main NIC card that you are configuring. Once you find your NIC card that you are looking for, you should see a line that says DHCP Enabled. If there is no static IP address set up then it should say yes. The second way to check is to open the control panel. Find and open the Network and Sharing Center. On the right hand side you should see an option for change adapter settings. Select you main NIC card and right click and select properties. Select and double click on Internet Protocol Version 4 (IPv4). Once the window pops up, make sure that both the radio buttons for obtain IP Address automatically are selected. You should also check to see if each workstation has renewed its DHCP lease. To do this you can repeat the steps in the first way to change the DHCP setup. Once again you want to look for your main NIC card that you are configuring. Once you find your NIC card that you are configuring you should see 2 lines that say Lease Obtained...

Words: 357 - Pages: 2

Free Essay

Unit 2 Assignment 1

...Eric Satchell NT1330 Service Provider Types Unit 2 Assignment 1 July 3, 2014 Comparing Service Providers There are a lot of companies providing services, but AT&T provided telephone communication to the public. AT&T monopolized the telecommunication industry until the United States took them to court for antitrust and won. AT&T was broken up into eleven smaller companies, call Baby Bells. One of the companies that derived from this law suit was the Regional Bell Operating Company or RBOC. RBOC was a term that described one of the US telephone companies that provided telephone, telegraph, and long distance to the consumers. RBOC is part of a local exchange carrier allowed to compete for business. RBOC services internet service which in turn dealt with digital data. The merging companies provided different types of service based on the Telecommunication Act of 1996. ILEC or incumbent local exchange carrier is a telephone company that provided local telephone communications before the ruling to break up the Ma Bell Company. The FCC ruled that the ILECs must provide other telecommunications service providers access to their equipment to be able to provide a better rate to the consumer. This ruling...

Words: 480 - Pages: 2

Free Essay

Nt1330 Unit 4 Assignment 1

...NT1330 Unit 4 Assignment 1. AD Design Replication Scenario AD Design Replication Scenario To whom it may concern: I am the IT Administrator for the company and I have been asked to give my recommendations for the Active Directory Replication Design of the two new Branches. The first I can recommend for you is that all the information that is needed for each new site is correctly documented and added to the Root Active Directory through the Active Directory sites and services. This is done because the Root AD automatically builds the inter-site replication topology based on the information provided about the new site connections. Each new site’s AD will have one each domain controller that is known as the inter-site topology generator and they are assigned to build the topology at their sites. To add two new branch offices we will need to find a strategy to design a replication process. To implement this we will need to use inter-site replication. Inter-site replication is needed when adding domain controllers located in different sites. We will also need a site link (Site link is a logical, transitive connection between two sites that allows replication to occur) protocol of Remote Procedure Call (RPC) over Internet Protocol (IP) which is the preferred choice for the replication process. This allows you to communicate with network services on various computers and also keep data secure when being transmitted by using both encryption and authentication...

Words: 580 - Pages: 3

Premium Essay

Nt2640

...Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile Wireless Communication I MC2660 Mobile Wireless Communication II MC2665 Mobile...

Words: 2573 - Pages: 11

Premium Essay

Nt 1210

...capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18