Basics of Active Directory and Domain Models
VerifiedAdded on 2023/04/05
|8
|1390
|112
AI Summary
This document provides an overview of the basics of Active Directory, including domains, trees, and forests. It explains the different domain models and provides recommendations for organizations. The document also covers DNS related to Windows Server 2016, Group Policy objects, and a proposed solution for enabling web developers to save files on Windows systems.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: COMPUTER INFORMATION SYSTEM
Computer Information System
Name of the Student
Name of the University
Author Note:
Computer Information System
Name of the Student
Name of the University
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1COMPUTER INFORMATION SYSTEM
Table of Contents
Q1........................................................................................................................................2
Q2........................................................................................................................................3
Q3........................................................................................................................................4
Q4........................................................................................................................................5
References............................................................................................................................7
Table of Contents
Q1........................................................................................................................................2
Q2........................................................................................................................................3
Q3........................................................................................................................................4
Q4........................................................................................................................................5
References............................................................................................................................7
2COMPUTER INFORMATION SYSTEM
Q1. Describe the basics of Active Directory including domain, tree, and forest. What domain
model would you recommend to an organization?
Ans: Domain is known to be core unit which is seen the logical structure of Active Directory.
Different type of objects aims to share common directory of database which is needed for
building trust relationship with other kind of domain and security policies. Tree is defined as
collection of one or more domains which will help in sharing of global resources (Stiawan et al.,
2016). At the time of adding domain to a tree then it becomes a child of tree root domain. Forest
is known to be collection of various trees which share a common kind of catalog that is directory
schema, directory configuration and lastly logical structure. There are large number of factors
behind the selection of design model like
Understand the overall capacity of the network which helps in allocating to active
directory based domain service (Sequeira, 2017). The main focus is to provide a proper
kind of replication of information that comes up with minimum effect on the overall
network bandwidth.
The second factor is number of users in the organization. If the organization has large
number of users, the deployment of more than one domain will result in partition of data
(Vernotte et al., 2017). This ultimately results in gaining an essay control over the
replication traffic which can pass through the network connection.
There are only two kind of model available and based on the requirement the proper can be
chosen that is
Single Model domain
Regional Model domain.
Q1. Describe the basics of Active Directory including domain, tree, and forest. What domain
model would you recommend to an organization?
Ans: Domain is known to be core unit which is seen the logical structure of Active Directory.
Different type of objects aims to share common directory of database which is needed for
building trust relationship with other kind of domain and security policies. Tree is defined as
collection of one or more domains which will help in sharing of global resources (Stiawan et al.,
2016). At the time of adding domain to a tree then it becomes a child of tree root domain. Forest
is known to be collection of various trees which share a common kind of catalog that is directory
schema, directory configuration and lastly logical structure. There are large number of factors
behind the selection of design model like
Understand the overall capacity of the network which helps in allocating to active
directory based domain service (Sequeira, 2017). The main focus is to provide a proper
kind of replication of information that comes up with minimum effect on the overall
network bandwidth.
The second factor is number of users in the organization. If the organization has large
number of users, the deployment of more than one domain will result in partition of data
(Vernotte et al., 2017). This ultimately results in gaining an essay control over the
replication traffic which can pass through the network connection.
There are only two kind of model available and based on the requirement the proper can be
chosen that is
Single Model domain
Regional Model domain.
3COMPUTER INFORMATION SYSTEM
Q2. Describe in detail some of the aspects of DNS related to Windows Server 2016 including
zones, records, commands, etc. Explain how DNS is installed and configured on Windows
Server 2016.
Ans: DNS stands for Domain Name Server is a well-known service which is used in active
directory. DNS aims to resolve both hostnames, URL and Qualified domain names into proper IP
address. At the time of installing DNS, it is used in database for storing active directory which
comes up with list of domain name and IP address (Dix, 2017). A client can make request for a
website by typing a domain URL that is making use of chrome or Firefox. The main task is all
about resolving the domain to a particular IP address. The issues can be overcome so that they
can resolve browser checks at various places (Shafiee & Finkelstein, 2015). The first is all about
understanding the local cache of the system. If there are is no kind of entry in this domain then
the user needs to check the local host file.
Domain Name Server is considered to be as one of the important services for Active
directory. At the time of installing on windows server, DNS makes use of database which is
stored in active directory or in file (Mangul et al., 2017). It mainly comprises of domain names
and related IP address. A DNS server can be configured on Windows Server Operating System
which can be used for
Resolving host names to corresponding IP address
Resolving IP address that can correspond to the hostname.
Locating Global catalog servers and domain controllers
Locating Mail Server.
Q2. Describe in detail some of the aspects of DNS related to Windows Server 2016 including
zones, records, commands, etc. Explain how DNS is installed and configured on Windows
Server 2016.
Ans: DNS stands for Domain Name Server is a well-known service which is used in active
directory. DNS aims to resolve both hostnames, URL and Qualified domain names into proper IP
address. At the time of installing DNS, it is used in database for storing active directory which
comes up with list of domain name and IP address (Dix, 2017). A client can make request for a
website by typing a domain URL that is making use of chrome or Firefox. The main task is all
about resolving the domain to a particular IP address. The issues can be overcome so that they
can resolve browser checks at various places (Shafiee & Finkelstein, 2015). The first is all about
understanding the local cache of the system. If there are is no kind of entry in this domain then
the user needs to check the local host file.
Domain Name Server is considered to be as one of the important services for Active
directory. At the time of installing on windows server, DNS makes use of database which is
stored in active directory or in file (Mangul et al., 2017). It mainly comprises of domain names
and related IP address. A DNS server can be configured on Windows Server Operating System
which can be used for
Resolving host names to corresponding IP address
Resolving IP address that can correspond to the hostname.
Locating Global catalog servers and domain controllers
Locating Mail Server.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4COMPUTER INFORMATION SYSTEM
Q3. Describe Group Policy object and why would an organization choose to deploy Group
Policy? Explain some of the settings within Group Policy that organizations might choose to
keep their desktops and servers secure.
Ans: Group Policy Object is considered to be a part of Group Policy which can be used as a
resource in various Microsoft system. It is required for gaining control over the user account and
its activities (Stiawan et al., 2016). It is mainly implemented in active directory system which is
as per the group policy setting like local and site-wide setting. It is mainly applied to various
organizational units. It is inclusive of setting of password which requires user to set it up on
constantly basis. It gets delivered through a system policy refreshes which is relevant to both
computer and system (Sequeira, 2017). Group Policy management aims to provide a proper kind
of control by which an individual can gain proper control and changes in group policies.
Organization aims to deploy group policies for a list of factors like
Ease of Management
Security
Cost and Time
Roaming Profiles
Some of the settings within Group Policy that organizations might choose to keep their
desktops and servers secure are
Moderating the overall to the control panel.
Preventing Windows operating system from storing any kind of LAN manager hash
Providing complete control access over command prompt
Disabling the forced system to restart
Q3. Describe Group Policy object and why would an organization choose to deploy Group
Policy? Explain some of the settings within Group Policy that organizations might choose to
keep their desktops and servers secure.
Ans: Group Policy Object is considered to be a part of Group Policy which can be used as a
resource in various Microsoft system. It is required for gaining control over the user account and
its activities (Stiawan et al., 2016). It is mainly implemented in active directory system which is
as per the group policy setting like local and site-wide setting. It is mainly applied to various
organizational units. It is inclusive of setting of password which requires user to set it up on
constantly basis. It gets delivered through a system policy refreshes which is relevant to both
computer and system (Sequeira, 2017). Group Policy management aims to provide a proper kind
of control by which an individual can gain proper control and changes in group policies.
Organization aims to deploy group policies for a list of factors like
Ease of Management
Security
Cost and Time
Roaming Profiles
Some of the settings within Group Policy that organizations might choose to keep their
desktops and servers secure are
Moderating the overall to the control panel.
Preventing Windows operating system from storing any kind of LAN manager hash
Providing complete control access over command prompt
Disabling the forced system to restart
5COMPUTER INFORMATION SYSTEM
Disallow of list of removable media devices like DVDs, CDs and another kind of floppy
disk.
Restricting any kind of software installation.
Disabling of guest account.
Creating minimum password length that comes up with higher limits.
Q4. You are an administrator for a large organization with a group of web developers that
works on UNIX machines. You need to come with a solution that enables the web developers
to save their files on the Windows system so that those files can be backed up with all of your
other data. Because the web servers are critical to the company, you must ensure that the data
is available and backed up regularly. Describe your proposed solution.
Ans: There is large number of methods which can be used for moving files between Unix and
Windows (Mangul et al., 2017). There are mainly three ways like secure copy, shared drivers
and lastly file synchronization.
Secure Copy: There are mainly two commands in it like SCP and sftp. Native to various
Unix system, the commands are also made available in windows. User needs to make sure of the
fact the folder is there in windows search path (Vernotte et al., 2017). It will help them to access
it from any directory after that there are commands which work like SCP in Unix.
Samba: It is the second option available for moving files between the two systems that is
Unix and Windows. It is achieved by the help of driver or folder by the help of easy sharing.
There are commands available in both the operating system that is windows and Linux (Dix,
2017). Samba is all about implementing SMB and CIFS based networking based protocol. It
generally runs on Unix system allow the directories to be accessed by network protocols.
Disallow of list of removable media devices like DVDs, CDs and another kind of floppy
disk.
Restricting any kind of software installation.
Disabling of guest account.
Creating minimum password length that comes up with higher limits.
Q4. You are an administrator for a large organization with a group of web developers that
works on UNIX machines. You need to come with a solution that enables the web developers
to save their files on the Windows system so that those files can be backed up with all of your
other data. Because the web servers are critical to the company, you must ensure that the data
is available and backed up regularly. Describe your proposed solution.
Ans: There is large number of methods which can be used for moving files between Unix and
Windows (Mangul et al., 2017). There are mainly three ways like secure copy, shared drivers
and lastly file synchronization.
Secure Copy: There are mainly two commands in it like SCP and sftp. Native to various
Unix system, the commands are also made available in windows. User needs to make sure of the
fact the folder is there in windows search path (Vernotte et al., 2017). It will help them to access
it from any directory after that there are commands which work like SCP in Unix.
Samba: It is the second option available for moving files between the two systems that is
Unix and Windows. It is achieved by the help of driver or folder by the help of easy sharing.
There are commands available in both the operating system that is windows and Linux (Dix,
2017). Samba is all about implementing SMB and CIFS based networking based protocol. It
generally runs on Unix system allow the directories to be accessed by network protocols.
6COMPUTER INFORMATION SYSTEM
Rsync: The files can be copied with the help of rsync which comes up with distinct
advantage along with great performance. It smartly makes changes in the file rather completing
the files which are an option (Shafiee & Finkelstein, 2015). This merely highlights the fact that if
a single byte is added to source file then single byte will be transferred to destination. It can
make use of system to copy files from one system to another but it merely highlights the fact that
user needs to use proper version of rsync to transfer files between the given Unix system.
Rsync: The files can be copied with the help of rsync which comes up with distinct
advantage along with great performance. It smartly makes changes in the file rather completing
the files which are an option (Shafiee & Finkelstein, 2015). This merely highlights the fact that if
a single byte is added to source file then single byte will be transferred to destination. It can
make use of system to copy files from one system to another but it merely highlights the fact that
user needs to use proper version of rsync to transfer files between the given Unix system.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7COMPUTER INFORMATION SYSTEM
References
Dix, A. (2017). UNIX Network Programming with TCP/IP Short Course Notes.
Mangul, S., Martin, L. S., Hoffmann, A., Pellegrini, M., & Eskin, E. (2017). Addressing the
digital divide in contemporary biology: lessons from teaching UNIX. Trends in
biotechnology, 35(10), 901-903.
Sequeira, A. (2017). MCSA 70-740 Cert Guide: Installation, Storage, and Compute with
Windows Server 2016. Pearson IT Certification.
Shafiee, M., & Finkelstein, M. (2015). An optimal age-based group maintenance policy for
multi-unit degrading systems. Reliability Engineering & System Safety, 134, 230-238.
Stiawan, D., Idris, M. Y. B., Abdullah, A. H., AlQurashi, M., & Budiarto, R. (2016). Penetration
Testing and Mitigation of Vulnerabilities Windows Server. IJ Network Security, 18(3),
501-513.
Vernotte, A., Johnson, P., Ekstedt, M., & Lagerström, R. (2017, October). In-depth modeling of
the UNIX operating system for architectural cyber security analysis. In 2017 IEEE 21st
International Enterprise Distributed Object Computing Workshop (EDOCW) (pp. 127-
136). IEEE.
References
Dix, A. (2017). UNIX Network Programming with TCP/IP Short Course Notes.
Mangul, S., Martin, L. S., Hoffmann, A., Pellegrini, M., & Eskin, E. (2017). Addressing the
digital divide in contemporary biology: lessons from teaching UNIX. Trends in
biotechnology, 35(10), 901-903.
Sequeira, A. (2017). MCSA 70-740 Cert Guide: Installation, Storage, and Compute with
Windows Server 2016. Pearson IT Certification.
Shafiee, M., & Finkelstein, M. (2015). An optimal age-based group maintenance policy for
multi-unit degrading systems. Reliability Engineering & System Safety, 134, 230-238.
Stiawan, D., Idris, M. Y. B., Abdullah, A. H., AlQurashi, M., & Budiarto, R. (2016). Penetration
Testing and Mitigation of Vulnerabilities Windows Server. IJ Network Security, 18(3),
501-513.
Vernotte, A., Johnson, P., Ekstedt, M., & Lagerström, R. (2017, October). In-depth modeling of
the UNIX operating system for architectural cyber security analysis. In 2017 IEEE 21st
International Enterprise Distributed Object Computing Workshop (EDOCW) (pp. 127-
136). IEEE.
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.