+1(803)7554847

IT3318 All Assignments (October 2019)

IT3318 All Assignments (October 2019)

[ad_1]

IT 3318 Systems Administration

Unit 1 Assignment

Configuring Mobile Devices

Preparation

By now you should have completed the labs in the Hands-On Labs for this unit and saved the lab report PDF for submission with this assignment.

Instructions

Complete the following in a Word document titled “Unit 1 Assignment.”

Labs-Related Assignment

In one of the labs, you used the bind method to configure the order of network interfaces. This method is deprecated in newer versions of Windows (Windows 10, and Windows Server 2016). A new method (interface metric) is now the preferred method. Explain how the interface metric method is configured to achieve the same benefit as the bind method.

In one of the labs, you configured POP3 and IMAP4 settings. Explain both types of setup and the benefits and disadvantages of using one over the other. Include an explanation of the connections and ports involved.

Non-Lab Assignment

Mobile devices, especially smartphones, use Exchange ActiveSync (EAS) protocol to synchronize data with Microsoft Exchange network server (such as emails, calendar, and contact information).

Explain two common ActiveSync features used by system administrators. What are they used for?

Explain how to configure ActiveSync on your mobile Android, Apple, Windows or other smart device to connect to an email account.

Submission Requirements

Submit the following documents:

IT 3318 Systems Administration

Unit 2 Assignment

Active Directory Concepts

Preparation

By now you should have completed the labs in the Hands-On Labs for this unit and saved the lab report PDF for submission with this assignment.

Instructions

Complete the following in a Word document titled “Unit 2 Assignment.”

Labs-Related Assignment:

One of the most powerful features of Active Directory (AD) is the Group Policy setting tool. The AD Group Policy setting tool is an essential tool for system administrators to have when managing Windows systems. This tool provides centralized management and configuration of AD objects. There are countless policies that systems administrators can configure with this tool. For example, a system administrator can disable the USB ports of certain workstations from accepting thumb drives to prevent virus introduction into the system.

Explain the steps to configure a group policy that enable users to click a button (such as a printer icon) to receive instructions on how to install a network printer on their workstation.

Systems Administrators often work in a client-server environment. One of the many tasks that you would have to perform is the configuration of IP settings for servers and workstations that you manage.

Identify what type of network device you would assign a dynamic IP address and another that you would assign a static IP address and explain why it is appropriate.

Pick a device and explain how to configure its IP address.

Non-Lab Assignment

The Remote Server Administration Tools (RSAT) can be a very useful set of tools for sysadmins. Windows domain controllers are often in remote locations so system administrators often use RSAT to access and manage domains.

Explain how to access RSAT.

Assume you need to recover an encrypted password on a remote laptop. Explain which RSAT tool(s) you would enable. Why?

Explain why RSAT features are not enabled by default.

IT 3318 Systems Administration

Unit 3 Assignment

Configuring Security Policies and Windows Firewall

Preparation

By now you should have completed the labs in the Hands-On Labs for this unit and saved the lab report PDF for submission with this assignment.

Instructions

Complete the following in a Word document titled “Unit 3 Assignment.”

Labs-Related Assignment:

The Microsoft Management Console (MMC) contains several snap-in consoles to assist systems administrators to enforce IT policies on a network. Systems administrators can configure settings such as enforcing secure password policy. Often the configurations are carried-out via Group Policy at the domain level, and the policy flows down to users and nodes on the network. There are times when local group policy and local security policy can be used on workstations.

Explain how to enable a local group policy not to display the most recent logon credentials on a workstation. Why might this be desirable?

As a systems administrator, you are already aware that you must protect your network resources from intruders. The Windows Firewall is a security tool in most Windows systems that defends our computers and servers from unauthorized users.

Describe the process Windows firewall uses to filter incoming and outgoing traffic.

Describe how to deny access to a specific website through the Windows Firewall settings.

Non-Lab Assignment:

Describe two group policies that a sysadmin should deploy to client computers on the network to address malware issues.

Recommend a hardware or software solution to combat malware attacks. Explain its effectiveness.

IT 3318 Systems Administration

Unit 4 Assignment

Threats, Vulnerabilities and Maintenance

Preparation

By now you should have completed the labs in the Hands-On Labs for this unit and saved the lab report PDF for submission with this assignment.

Instructions

Complete the following in a Word document titled “Unit 4 Assignment.”

Labs-Related Assignment

​The Windows disk defragmenter is an important tool for keeping hard drives running efficiently.

Explain in detail how this tool helps optimize hard drives.

Is the optimizing tool recommended for use with solid state (SSD) drives? Why or why not?

Windows update is a method used by Windows systems to deploy security reinforcements, software updates, and hotfixes. Often this process is performed automatically.

Explain the pros and cons of automatic updates.

Explain how to prevent automatic updates on your network. Why might you do this?

Non-Lab Assignment:

Systems administrators aim to keep their computer systems up-to-date. Windows systems have built-in tools that systems administrators can use to fine-tune the system. A popular tool in Windows systems is the performance monitor.

Explain what the performance monitor does and how the information it provides helps the sysadmin maintain the network.

IT 3318 Systems Administration

Unit 5 Assignment

Troubleshooting

Preparation

By now you should have completed the labs in the Hands-On Labs for this unit and pasted the screenshots into a word document called “Unit 5 Screenshots” for submission with this assignment.

Instructions

Complete the following in a Word document titled “Unit 5 Assignment.”

Lab-Related Assignment

You can troubleshoot a failed Windows startup/boot-up by pressing the F8 key to take you to the Advanced Boots Option Screen for more options as the system reboots. After exhausting most of the options there without success in resolving the boot issue, you decide to revert to a previously good working system configuration by choosing the Last Known Good Configuration (Advanced) option. Described the implications of doing so.

Explain why it is sometimes necessary to open the command prompt with administrative privileges.

Non-Lab Assignment

The event viewer is a built-in tool in Windows systems for diagnosing system issues. Identify one of the errors shown on the Event Viewer Log (view the example file in the Resources) and suggest a possible reason for it.

Assume the source of the error that you identified is correct, suggest a series of steps that you would undertake to further investigate and address the problem. State any assumptions you need to make as you step through your troubleshooting process.

[Button id=”1″]

[ad_2]

Source link

Looking for a Similar Assignment? Our ENL Writers can help. Get your first order at 15% off!

Hi there! Click one of our representatives below and we will get back to you as soon as possible.

Chat with us on WhatsApp