Skip to content

IT-center our network instructor disappear -answer of some questions needed

Project details

dear all,

I have a serious problem , I have IT learning center , unfortunately the network teacher can not continue his course , today I have his exam and I have not the answer of this exam so I need anyone for answer it as student for getting the ideal exam answer .

the most important thing is to take screen shots for every step and please send me each step before doing the next one

it is better to review each step because each step rely on the previous one

“my Example” full mane is Monirah Alsubaei >>>that is used for creating the VMs
“my example student is ” living in Ireland >>>>this helps in some settings

you should include every single resource (website resources) that helps in each task

you should use oracle VM

you must take screen shots for every single step (min 3 shots in for a step) for example for downloading the VM , it is fine to use just 3 shots

for task A.5 the folder is called backup should be created on C drive
for task A.8 we should not use third party software or internet Exp
task A. 7 >>>group policies ……….for creating a folder structure that will be in the server and the debian

finally do not forget to follow the style of naming the folders and VMs

and please ask me about any other info you need

thank u

## Deliverables

Introduction

The purpose of this assignment is to give you a thorough understanding of Network and

Operating Environment Security by deepening your practical knowledge and skills in relation

to same.

Please note that it is upon this documentation that you will be marked. Marks will be awarded

based on the explanations and the instructions for performing said tasks. Please note that all

references should be in APA style.

At the end of the assignment you will be required to produce two documents as follows:

? Section A :A user’s manual documenting the steps you used to complete each tasks

outlined below. The documentation should be provided in soft copy format.

For each of the tasks, all technical issues with regard to hardware and software

requirements which must be met should be detailed.

Naming Convention : If your name is John Smith, this document should be named as

follows:

[url removed, login to view]

? Section B: An Essay pertaining to section B.

Naming Convention : If your name is John Smith, this document should be named as

follows:

[url removed, login to view]

The document formats accepted are Microsoft Word or Adobe Acrobat Format.

In this assignment you will be asked to create three virtual machines. The specifications for

each of the machines are given below in Sections A. On each of these machines you will be

asked to carry out a number of practical tasks outlined accordingly.

Section A

? Using Virtual Box by Oracle Software, ([url removed, login to view]) You will be

asked to carry out a series of practical tasks on virtual machines.

? Important: an essential part of the assignment will be to document the procedures by

which you completed each task from beginning to end. Each task should be described

in a series of numbered steps. In addition, for each task, you should provide at

minimum two or three legible screen shots as would be required for such

documentation and as evidence that you have actually worked through the task.

(Screen shots are normally placed at the most important stages/steps in any task).

This documentation should be laid out like a professional user’s manual,

Task A.1

Create Virtual Machines (VM’s) and upon these VM’s install the following Operating

systems

? Microsoft Windows 7

? Microsoft Windows Server 2008

? Debian Linux

Microsoft Windows 7

Install Windows 7 with the following installation options.

Specify the Machine name as ‘fxWin7’, where :

f is your first initial

x is the first three characters of your last name

Assign the machine to workgroup X (where X is your initial-surname)

Microsoft Windows Server 2008

Install Windows Server 2008 with the following installation options.

The machine is again to have 2 partitions one for the Operating system and the other is for the

users directories. Please choose adequate sizes accordingly.

Specify the Machine name as ‘fxSrv08’, where :

f is your first initial

x is the first three characters of your last name

Assign the machine to workgroup X (where X is your initial-surname)

Debian Linux

Install Debian Linux

Set up two partitions one for the Operating System and the other for the user’s directories.

Please choose adequate sizes accordingly.

Task A.2

On Each of the three machines, install all relevant Updates and Service Packs, outline the

importance of keeping Operating Systems up to date with the latest Service Packs and any

administration tasks which should be performed prior to same.

On Windows 7 and Windows Server 2008, after Installing updates, change the settings so that

the service packs will no longer be downloaded and installed automatically.

Task A.3

On the Windows 7 machine install Microsoft Security Essentials, update the virus definitions

and schedule scans for 0300 hours every Monday, Wednesday and Friday.

Make sure that the firewall is enabled on both Windows 7 and Windows server 2008.

On the Debian VM install a open source Anti-Virus application and a firewall.

Task A.4

Networking: Explain what is meant by the address 192.168.0.1/28.

Set up each of the VM’s with a valid address from the address space above.

Task A.5

System Restore setup and testing

Using Windows 7, a system restore point is to be created.

After creating the system restore point, perform the following:

Change the name of the machine to ‘mc1’.

Create a new folder on the data partition called backup.

Disable the floppy diskette within the machine

Restore the pc to the restore point created earlier. Outline what changes the system restore

process has performed.

Task A.6

Set up an Active directory Domain using the Windows server 2008 VM, install any required

services for same.

Set up the Windows 7 machine to join the above Domain.

Task A.7

Users, Groups & Security

In accordance with best practice implement company security in relation to passwords,

logons, set up the Active Directory Domain to enforce these requirements.

The following users are staff members who will require logon access to this machine. For

each of the users, create accounts and groups on both the Active Directory Domain and the

Debian Linux machine.

Name: Samantha Grace Department: IS

Name: Rachael Mathews Department: IS

Name: Sam Smith Department: Finance

Name: Paul Daniels Department: Finance

Name: Stephanie Brown Department: HR

Name: Francis Brennan Department: HR

[Note: The username follows the structure: [url removed, login to view]

Samantha Grace is also to be given membership to an administrators group.]

Using the second partition, create a folder structure to meet the following requirements:

Each department should have its own folder with each user within the department having a

private folder accordingly.

Share out each department folder and restrict same to only allow members of each

department access to the folders – this access is to be restricted both from remote and local

access.

Grant the administrators group full access to all of the folders.

Task A.8

With the Windows 7 VM, in accordance with best practice and company policy block access

to three common social media sites.

Task A.9

Remote connectivity: Set up remote desktop on the Windows Server 2008 machine to enable

Rachael Mathews to remotely log in and carry out administrative tasks.

To increase security the default port is to be changed to an appropriate non-default port and

modify any system settings accordingly.

Demonstrate how Rachael would connect to the Windows Server 2008 machine from the

Windows 7 machine via remote desktop

Task [url removed, login to view]

System registry: On the Windows 7 machine, create a backup of the registry and save it to a

location of your choice.

Backup: On Windows server 2008, Setup Microsoft Backup, set up a backup of the user

directories and explain the difference between incremental, differential and full backups.

Task [url removed, login to view]

Driver compatibility on Windows 7, in order to maintain the stability of the operating system

environment in the future it is required that you prevent any unsigned drivers from being

installed.

Section B

A vulnerability assessment is a process in which the IT systems such as computers and

networks, and software such as operating systems and application software are scanned in

order to identify the presence of known and unknown vulnerabilities.

Discuss this comment in the context of networks, outlining the vulnerabilities and the

countermeasures which can be applied to reduce the risks accordingly.

Please use the APA style for the return of this section. (Minimum 1500 words excluding

references)

Awarded to:

Project budget: $50.15 USD
budget limits: $30-5000 USD
number of bids:
average bids:

Do you have a similar project. Contact us now to help you get it done

Email
Project Type*

Awarded to:

Project budget: $50.15 USD
budget limits: $30-5000 USD
number of bids:
average bids:

Project details

dear all,

I have a serious problem , I have IT learning center , unfortunately the network teacher can not continue his course , today I have his exam and I have not the answer of this exam so I need anyone for answer it as student for getting the ideal exam answer .



the most important thing is to take screen shots for every step and please send me each step before doing the next one

it is better to review each step because each step rely on the previous one



“my Example” full mane is Monirah Alsubaei >>>that is used for creating the VMs
“my example student is ” living in Ireland >>>>this helps in some settings

you should include every single resource (website resources) that helps in each task

you should use oracle VM

you must take screen shots for every single step (min 3 shots in for a step) for example for downloading the VM , it is fine to use just 3 shots

for task A.5 the folder is called backup should be created on C drive
for task A.8 we should not use third party software or internet Exp
task A. 7 >>>group policies ……….for creating a folder structure that will be in the server and the debian

finally do not forget to follow the style of naming the folders and VMs

and please ask me about any other info you need



thank u


## Deliverables

Introduction

The purpose of this assignment is to give you a thorough understanding of Network and

Operating Environment Security by deepening your practical knowledge and skills in relation

to same.

Please note that it is upon this documentation that you will be marked. Marks will be awarded

based on the explanations and the instructions for performing said tasks. Please note that all

references should be in APA style.

At the end of the assignment you will be required to produce two documents as follows:

? Section A :A user’s manual documenting the steps you used to complete each tasks

outlined below. The documentation should be provided in soft copy format.

For each of the tasks, all technical issues with regard to hardware and software

requirements which must be met should be detailed.

Naming Convention : If your name is John Smith, this document should be named as

follows:

[url removed, login to view]

? Section B: An Essay pertaining to section B.

Naming Convention : If your name is John Smith, this document should be named as

follows:

[url removed, login to view]

The document formats accepted are Microsoft Word or Adobe Acrobat Format.

In this assignment you will be asked to create three virtual machines. The specifications for

each of the machines are given below in Sections A. On each of these machines you will be

asked to carry out a number of practical tasks outlined accordingly.

Section A

? Using Virtual Box by Oracle Software, ([url removed, login to view]) You will be

asked to carry out a series of practical tasks on virtual machines.

? Important: an essential part of the assignment will be to document the procedures by

which you completed each task from beginning to end. Each task should be described

in a series of numbered steps. In addition, for each task, you should provide at

minimum two or three legible screen shots as would be required for such

documentation and as evidence that you have actually worked through the task.

(Screen shots are normally placed at the most important stages/steps in any task).

This documentation should be laid out like a professional user’s manual,

Task A.1

Create Virtual Machines (VM’s) and upon these VM’s install the following Operating

systems

? Microsoft Windows 7

? Microsoft Windows Server 2008

? Debian Linux

Microsoft Windows 7

Install Windows 7 with the following installation options.

Specify the Machine name as ‘fxWin7’, where :

f is your first initial

x is the first three characters of your last name

Assign the machine to workgroup X (where X is your initial-surname)

Microsoft Windows Server 2008

Install Windows Server 2008 with the following installation options.

The machine is again to have 2 partitions one for the Operating system and the other is for the

users directories. Please choose adequate sizes accordingly.

Specify the Machine name as ‘fxSrv08’, where :

f is your first initial

x is the first three characters of your last name

Assign the machine to workgroup X (where X is your initial-surname)

Debian Linux

Install Debian Linux

Set up two partitions one for the Operating System and the other for the user’s directories.

Please choose adequate sizes accordingly.

Task A.2

On Each of the three machines, install all relevant Updates and Service Packs, outline the

importance of keeping Operating Systems up to date with the latest Service Packs and any

administration tasks which should be performed prior to same.

On Windows 7 and Windows Server 2008, after Installing updates, change the settings so that

the service packs will no longer be downloaded and installed automatically.

Task A.3

On the Windows 7 machine install Microsoft Security Essentials, update the virus definitions

and schedule scans for 0300 hours every Monday, Wednesday and Friday.

Make sure that the firewall is enabled on both Windows 7 and Windows server 2008.

On the Debian VM install a open source Anti-Virus application and a firewall.

Task A.4

Networking: Explain what is meant by the address 192.168.0.1/28.

Set up each of the VM’s with a valid address from the address space above.

Task A.5

System Restore setup and testing

Using Windows 7, a system restore point is to be created.

After creating the system restore point, perform the following:

Change the name of the machine to ‘mc1’.

Create a new folder on the data partition called backup.

Disable the floppy diskette within the machine

Restore the pc to the restore point created earlier. Outline what changes the system restore

process has performed.

Task A.6

Set up an Active directory Domain using the Windows server 2008 VM, install any required

services for same.

Set up the Windows 7 machine to join the above Domain.

Task A.7

Users, Groups & Security

In accordance with best practice implement company security in relation to passwords,

logons, set up the Active Directory Domain to enforce these requirements.

The following users are staff members who will require logon access to this machine. For

each of the users, create accounts and groups on both the Active Directory Domain and the

Debian Linux machine.

Name: Samantha Grace Department: IS

Name: Rachael Mathews Department: IS

Name: Sam Smith Department: Finance

Name: Paul Daniels Department: Finance

Name: Stephanie Brown Department: HR

Name: Francis Brennan Department: HR

[Note: The username follows the structure: [url removed, login to view]

Samantha Grace is also to be given membership to an administrators group.]

Using the second partition, create a folder structure to meet the following requirements:

Each department should have its own folder with each user within the department having a

private folder accordingly.

Share out each department folder and restrict same to only allow members of each

department access to the folders – this access is to be restricted both from remote and local

access.

Grant the administrators group full access to all of the folders.

Task A.8

With the Windows 7 VM, in accordance with best practice and company policy block access

to three common social media sites.

Task A.9

Remote connectivity: Set up remote desktop on the Windows Server 2008 machine to enable

Rachael Mathews to remotely log in and carry out administrative tasks.

To increase security the default port is to be changed to an appropriate non-default port and

modify any system settings accordingly.

Demonstrate how Rachael would connect to the Windows Server 2008 machine from the

Windows 7 machine via remote desktop

Task [url removed, login to view]

System registry: On the Windows 7 machine, create a backup of the registry and save it to a

location of your choice.

Backup: On Windows server 2008, Setup Microsoft Backup, set up a backup of the user

directories and explain the difference between incremental, differential and full backups.

Task [url removed, login to view]

Driver compatibility on Windows 7, in order to maintain the stability of the operating system

environment in the future it is required that you prevent any unsigned drivers from being

installed.

Section B

A vulnerability assessment is a process in which the IT systems such as computers and

networks, and software such as operating systems and application software are scanned in

order to identify the presence of known and unknown vulnerabilities.

Discuss this comment in the context of networks, outlining the vulnerabilities and the

countermeasures which can be applied to reduce the risks accordingly.

Please use the APA style for the return of this section. (Minimum 1500 words excluding

references)

Skills: CiscoElectronicsSystem Admin

Do you have a similar project. Contact us now to help you get it done

Email
Project Type*

skills of Jabedmorshed C.

skill ? level ? projects ?
Cisco
41%
22
Electronics
39%
22
Microsoft
37%
22
Windows Desktop
37%
22
Amazon Web Services
37%
22
ASP
37%
22
.NET
36%
22
Project Management
36%
22
Investment Management
35%
1
Inventory Management
35%
1
CSS3
35%
1
Management Consulting
35%
1
Management
35%
1
Project Scheduling
35%
1
Test Automation
35%
1
Project Management Office
35%
1
Product Management
35%
1
Test
35%
1
Software Architecture
35%
22
Chef Configuration Management
35%
1
Asset Management
35%
1
Software Testing
35%
22
Organizational Change Management
35%
1
Agile Project Management
35%
1
MySQL
35%
22
Engineering
35%
22
CSS
35%
22
Technical Writing
35%
22
System Admin
35%
22
Portfolio Management
35%
1
Computer Graphics
34%
1
Quality and Reliability Testing
34%
1
Website Management
34%
1
Software Development
34%
1
A/B Testing
34%
1
Game Testing
34%
1
Business Cards
34%
1
Testing / QA
34%
1
Usability Testing
34%
1
Website Testing
34%
1
Troubleshooting
34%
1
Color Grading
34%
1
Poster Design
34%
1
Brochure Design
34%
1
Flyer Design
34%
1
Logo Design
34%
22
PHP
34%
22
Academic Writing
34%
1
Research Writing
34%
1
Scientific Writing
34%
1
Writing Tutoring
34%
1
Writing
34%
1
Creative Design
34%
1
Design
34%
1
Digital Design
34%
1
eBook Design
34%
1
Graphic Design
34%
1
Book Cover Design
34%
1
Icon Design
34%
1
Infographic and Powerpoint Slide Designing
34%
1
Invitation Design
34%
1
Label Design
34%
1
Package Design
34%
1
Packaging Design
34%
1
Sign Design
34%
1
Sticker Design
34%
1
Textile Design
34%
1
Advertisement Design
34%
1
Banner Design
34%
1
Debugging
34%
1

Some Jabedmorshed C. projects

Project Title Skills required in the project
Server Maintenance 2012 .NET  ASP  Microsoft  Windows Desktop 
IT-center our network instructor disappear -answer of some questions needed Cisco  Electronics  System Admin 
IT-center our network instructor disappear -answer of some questions needed#3 Technical Writing 
Move Website from HTML to Joomla Amazon Web Services  CSS  Engineering  Logo Design  MySQL  PHP  Project Management  Software Architecture  Software Testing 

Other freelancers

Responsive image

Bhavya Sai D.

FPGA and Machine Learning Engineer

5.0 (5 reviews)

Responsive image

Sajjad T.

PhD in Mechanical Engineering AI/simulink

4.8 (129 reviews)

Responsive image

Abdelwaheb B.

Electro-Mechanical Engineer ✓ᵛᵉʳᶦᶠᶦᵉᵈ

4.6 (40 reviews)

Responsive image

RezaalizadehCo

Team of mobile, web & game Developers & Designers

4.6 (157 reviews)

×

Hello!

Do you have an idea or project. Contact us and we'll get it done for you

× Do you have an idea or project?