IT-center our network instructor disappear -answer of some questions needed
Project details
dear all,
I have a serious problem , I have IT learning center , unfortunately the network teacher can not continue his course , today I have his exam and I have not the answer of this exam so I need anyone for answer it as student for getting the ideal exam answer .
the most important thing is to take screen shots for every step and please send me each step before doing the next one
it is better to review each step because each step rely on the previous one
“my Example” full mane is Monirah Alsubaei >>>that is used for creating the VMs
“my example student is ” living in Ireland >>>>this helps in some settings
you should include every single resource (website resources) that helps in each task
you should use oracle VM
you must take screen shots for every single step (min 3 shots in for a step) for example for downloading the VM , it is fine to use just 3 shots
for task A.5 the folder is called backup should be created on C drive
for task A.8 we should not use third party software or internet Exp
task A. 7 >>>group policies ……….for creating a folder structure that will be in the server and the debian
finally do not forget to follow the style of naming the folders and VMs
and please ask me about any other info you need
thank u
## Deliverables
Introduction
The purpose of this assignment is to give you a thorough understanding of Network and
Operating Environment Security by deepening your practical knowledge and skills in relation
to same.
Please note that it is upon this documentation that you will be marked. Marks will be awarded
based on the explanations and the instructions for performing said tasks. Please note that all
references should be in APA style.
At the end of the assignment you will be required to produce two documents as follows:
? Section A :A user’s manual documenting the steps you used to complete each tasks
outlined below. The documentation should be provided in soft copy format.
For each of the tasks, all technical issues with regard to hardware and software
requirements which must be met should be detailed.
Naming Convention : If your name is John Smith, this document should be named as
follows:
[url removed, login to view]
? Section B: An Essay pertaining to section B.
Naming Convention : If your name is John Smith, this document should be named as
follows:
[url removed, login to view]
The document formats accepted are Microsoft Word or Adobe Acrobat Format.
In this assignment you will be asked to create three virtual machines. The specifications for
each of the machines are given below in Sections A. On each of these machines you will be
asked to carry out a number of practical tasks outlined accordingly.
Section A
? Using Virtual Box by Oracle Software, ([url removed, login to view]) You will be
asked to carry out a series of practical tasks on virtual machines.
? Important: an essential part of the assignment will be to document the procedures by
which you completed each task from beginning to end. Each task should be described
in a series of numbered steps. In addition, for each task, you should provide at
minimum two or three legible screen shots as would be required for such
documentation and as evidence that you have actually worked through the task.
(Screen shots are normally placed at the most important stages/steps in any task).
This documentation should be laid out like a professional user’s manual,
Task A.1
Create Virtual Machines (VM’s) and upon these VM’s install the following Operating
systems
? Microsoft Windows 7
? Microsoft Windows Server 2008
? Debian Linux
Microsoft Windows 7
Install Windows 7 with the following installation options.
Specify the Machine name as ‘fxWin7’, where :
f is your first initial
x is the first three characters of your last name
Assign the machine to workgroup X (where X is your initial-surname)
Microsoft Windows Server 2008
Install Windows Server 2008 with the following installation options.
The machine is again to have 2 partitions one for the Operating system and the other is for the
users directories. Please choose adequate sizes accordingly.
Specify the Machine name as ‘fxSrv08’, where :
f is your first initial
x is the first three characters of your last name
Assign the machine to workgroup X (where X is your initial-surname)
Debian Linux
Install Debian Linux
Set up two partitions one for the Operating System and the other for the user’s directories.
Please choose adequate sizes accordingly.
Task A.2
On Each of the three machines, install all relevant Updates and Service Packs, outline the
importance of keeping Operating Systems up to date with the latest Service Packs and any
administration tasks which should be performed prior to same.
On Windows 7 and Windows Server 2008, after Installing updates, change the settings so that
the service packs will no longer be downloaded and installed automatically.
Task A.3
On the Windows 7 machine install Microsoft Security Essentials, update the virus definitions
and schedule scans for 0300 hours every Monday, Wednesday and Friday.
Make sure that the firewall is enabled on both Windows 7 and Windows server 2008.
On the Debian VM install a open source Anti-Virus application and a firewall.
Task A.4
Networking: Explain what is meant by the address 192.168.0.1/28.
Set up each of the VM’s with a valid address from the address space above.
Task A.5
System Restore setup and testing
Using Windows 7, a system restore point is to be created.
After creating the system restore point, perform the following:
Change the name of the machine to ‘mc1’.
Create a new folder on the data partition called backup.
Disable the floppy diskette within the machine
Restore the pc to the restore point created earlier. Outline what changes the system restore
process has performed.
Task A.6
Set up an Active directory Domain using the Windows server 2008 VM, install any required
services for same.
Set up the Windows 7 machine to join the above Domain.
Task A.7
Users, Groups & Security
In accordance with best practice implement company security in relation to passwords,
logons, set up the Active Directory Domain to enforce these requirements.
The following users are staff members who will require logon access to this machine. For
each of the users, create accounts and groups on both the Active Directory Domain and the
Debian Linux machine.
Name: Samantha Grace Department: IS
Name: Rachael Mathews Department: IS
Name: Sam Smith Department: Finance
Name: Paul Daniels Department: Finance
Name: Stephanie Brown Department: HR
Name: Francis Brennan Department: HR
[Note: The username follows the structure: [url removed, login to view]
Samantha Grace is also to be given membership to an administrators group.]
Using the second partition, create a folder structure to meet the following requirements:
Each department should have its own folder with each user within the department having a
private folder accordingly.
Share out each department folder and restrict same to only allow members of each
department access to the folders – this access is to be restricted both from remote and local
access.
Grant the administrators group full access to all of the folders.
Task A.8
With the Windows 7 VM, in accordance with best practice and company policy block access
to three common social media sites.
Task A.9
Remote connectivity: Set up remote desktop on the Windows Server 2008 machine to enable
Rachael Mathews to remotely log in and carry out administrative tasks.
To increase security the default port is to be changed to an appropriate non-default port and
modify any system settings accordingly.
Demonstrate how Rachael would connect to the Windows Server 2008 machine from the
Windows 7 machine via remote desktop
Task [url removed, login to view]
System registry: On the Windows 7 machine, create a backup of the registry and save it to a
location of your choice.
Backup: On Windows server 2008, Setup Microsoft Backup, set up a backup of the user
directories and explain the difference between incremental, differential and full backups.
Task [url removed, login to view]
Driver compatibility on Windows 7, in order to maintain the stability of the operating system
environment in the future it is required that you prevent any unsigned drivers from being
installed.
Section B
A vulnerability assessment is a process in which the IT systems such as computers and
networks, and software such as operating systems and application software are scanned in
order to identify the presence of known and unknown vulnerabilities.
Discuss this comment in the context of networks, outlining the vulnerabilities and the
countermeasures which can be applied to reduce the risks accordingly.
Please use the APA style for the return of this section. (Minimum 1500 words excluding
references)
Awarded to:

Jabedmorshed C.
(4.9)
Awarded to:

Jabedmorshed C.
(4.9)
Project details
I have a serious problem , I have IT learning center , unfortunately the network teacher can not continue his course , today I have his exam and I have not the answer of this exam so I need anyone for answer it as student for getting the ideal exam answer .
the most important thing is to take screen shots for every step and please send me each step before doing the next one
it is better to review each step because each step rely on the previous one
“my Example” full mane is Monirah Alsubaei >>>that is used for creating the VMs
“my example student is ” living in Ireland >>>>this helps in some settings
you should include every single resource (website resources) that helps in each task
you should use oracle VM
you must take screen shots for every single step (min 3 shots in for a step) for example for downloading the VM , it is fine to use just 3 shots
for task A.5 the folder is called backup should be created on C drive
for task A.8 we should not use third party software or internet Exp
task A. 7 >>>group policies ……….for creating a folder structure that will be in the server and the debian
finally do not forget to follow the style of naming the folders and VMs
and please ask me about any other info you need
thank u
## Deliverables
Introduction
The purpose of this assignment is to give you a thorough understanding of Network and
Operating Environment Security by deepening your practical knowledge and skills in relation
to same.
Please note that it is upon this documentation that you will be marked. Marks will be awarded
based on the explanations and the instructions for performing said tasks. Please note that all
references should be in APA style.
At the end of the assignment you will be required to produce two documents as follows:
? Section A :A user’s manual documenting the steps you used to complete each tasks
outlined below. The documentation should be provided in soft copy format.
For each of the tasks, all technical issues with regard to hardware and software
requirements which must be met should be detailed.
Naming Convention : If your name is John Smith, this document should be named as
follows:
[url removed, login to view]
? Section B: An Essay pertaining to section B.
Naming Convention : If your name is John Smith, this document should be named as
follows:
[url removed, login to view]
The document formats accepted are Microsoft Word or Adobe Acrobat Format.
In this assignment you will be asked to create three virtual machines. The specifications for
each of the machines are given below in Sections A. On each of these machines you will be
asked to carry out a number of practical tasks outlined accordingly.
Section A
? Using Virtual Box by Oracle Software, ([url removed, login to view]) You will be
asked to carry out a series of practical tasks on virtual machines.
? Important: an essential part of the assignment will be to document the procedures by
which you completed each task from beginning to end. Each task should be described
in a series of numbered steps. In addition, for each task, you should provide at
minimum two or three legible screen shots as would be required for such
documentation and as evidence that you have actually worked through the task.
(Screen shots are normally placed at the most important stages/steps in any task).
This documentation should be laid out like a professional user’s manual,
Task A.1
Create Virtual Machines (VM’s) and upon these VM’s install the following Operating
systems
? Microsoft Windows 7
? Microsoft Windows Server 2008
? Debian Linux
Microsoft Windows 7
Install Windows 7 with the following installation options.
Specify the Machine name as ‘fxWin7’, where :
f is your first initial
x is the first three characters of your last name
Assign the machine to workgroup X (where X is your initial-surname)
Microsoft Windows Server 2008
Install Windows Server 2008 with the following installation options.
The machine is again to have 2 partitions one for the Operating system and the other is for the
users directories. Please choose adequate sizes accordingly.
Specify the Machine name as ‘fxSrv08’, where :
f is your first initial
x is the first three characters of your last name
Assign the machine to workgroup X (where X is your initial-surname)
Debian Linux
Install Debian Linux
Set up two partitions one for the Operating System and the other for the user’s directories.
Please choose adequate sizes accordingly.
Task A.2
On Each of the three machines, install all relevant Updates and Service Packs, outline the
importance of keeping Operating Systems up to date with the latest Service Packs and any
administration tasks which should be performed prior to same.
On Windows 7 and Windows Server 2008, after Installing updates, change the settings so that
the service packs will no longer be downloaded and installed automatically.
Task A.3
On the Windows 7 machine install Microsoft Security Essentials, update the virus definitions
and schedule scans for 0300 hours every Monday, Wednesday and Friday.
Make sure that the firewall is enabled on both Windows 7 and Windows server 2008.
On the Debian VM install a open source Anti-Virus application and a firewall.
Task A.4
Networking: Explain what is meant by the address 192.168.0.1/28.
Set up each of the VM’s with a valid address from the address space above.
Task A.5
System Restore setup and testing
Using Windows 7, a system restore point is to be created.
After creating the system restore point, perform the following:
Change the name of the machine to ‘mc1’.
Create a new folder on the data partition called backup.
Disable the floppy diskette within the machine
Restore the pc to the restore point created earlier. Outline what changes the system restore
process has performed.
Task A.6
Set up an Active directory Domain using the Windows server 2008 VM, install any required
services for same.
Set up the Windows 7 machine to join the above Domain.
Task A.7
Users, Groups & Security
In accordance with best practice implement company security in relation to passwords,
logons, set up the Active Directory Domain to enforce these requirements.
The following users are staff members who will require logon access to this machine. For
each of the users, create accounts and groups on both the Active Directory Domain and the
Debian Linux machine.
Name: Samantha Grace Department: IS
Name: Rachael Mathews Department: IS
Name: Sam Smith Department: Finance
Name: Paul Daniels Department: Finance
Name: Stephanie Brown Department: HR
Name: Francis Brennan Department: HR
[Note: The username follows the structure: [url removed, login to view]
Samantha Grace is also to be given membership to an administrators group.]
Using the second partition, create a folder structure to meet the following requirements:
Each department should have its own folder with each user within the department having a
private folder accordingly.
Share out each department folder and restrict same to only allow members of each
department access to the folders – this access is to be restricted both from remote and local
access.
Grant the administrators group full access to all of the folders.
Task A.8
With the Windows 7 VM, in accordance with best practice and company policy block access
to three common social media sites.
Task A.9
Remote connectivity: Set up remote desktop on the Windows Server 2008 machine to enable
Rachael Mathews to remotely log in and carry out administrative tasks.
To increase security the default port is to be changed to an appropriate non-default port and
modify any system settings accordingly.
Demonstrate how Rachael would connect to the Windows Server 2008 machine from the
Windows 7 machine via remote desktop
Task [url removed, login to view]
System registry: On the Windows 7 machine, create a backup of the registry and save it to a
location of your choice.
Backup: On Windows server 2008, Setup Microsoft Backup, set up a backup of the user
directories and explain the difference between incremental, differential and full backups.
Task [url removed, login to view]
Driver compatibility on Windows 7, in order to maintain the stability of the operating system
environment in the future it is required that you prevent any unsigned drivers from being
installed.
Section B
A vulnerability assessment is a process in which the IT systems such as computers and
networks, and software such as operating systems and application software are scanned in
order to identify the presence of known and unknown vulnerabilities.
Discuss this comment in the context of networks, outlining the vulnerabilities and the
countermeasures which can be applied to reduce the risks accordingly.
Please use the APA style for the return of this section. (Minimum 1500 words excluding
references)
skills of Jabedmorshed C.
skill ? | level ? | projects ? | ||
---|---|---|---|---|
Cisco |
41%
|
22 | ||
Electronics |
39%
|
22 | ||
Microsoft |
37%
|
22 | ||
Windows Desktop |
37%
|
22 | ||
Amazon Web Services |
37%
|
22 | ||
ASP |
37%
|
22 | ||
.NET |
36%
|
22 | ||
Project Management |
36%
|
22 | ||
Investment Management |
35%
|
1 | ||
Inventory Management |
35%
|
1 | ||
CSS3 |
35%
|
1 | ||
Management Consulting |
35%
|
1 | ||
Management |
35%
|
1 | ||
Project Scheduling |
35%
|
1 | ||
Test Automation |
35%
|
1 | ||
Project Management Office |
35%
|
1 | ||
Product Management |
35%
|
1 | ||
Test |
35%
|
1 | ||
Software Architecture |
35%
|
22 | ||
Chef Configuration Management |
35%
|
1 | ||
Asset Management |
35%
|
1 | ||
Software Testing |
35%
|
22 | ||
Organizational Change Management |
35%
|
1 | ||
Agile Project Management |
35%
|
1 | ||
MySQL |
35%
|
22 | ||
Engineering |
35%
|
22 | ||
CSS |
35%
|
22 | ||
Technical Writing |
35%
|
22 | ||
System Admin |
35%
|
22 | ||
Portfolio Management |
35%
|
1 | ||
Computer Graphics |
34%
|
1 | ||
Quality and Reliability Testing |
34%
|
1 | ||
Website Management |
34%
|
1 | ||
Software Development |
34%
|
1 | ||
A/B Testing |
34%
|
1 | ||
Game Testing |
34%
|
1 | ||
Business Cards |
34%
|
1 | ||
Testing / QA |
34%
|
1 | ||
Usability Testing |
34%
|
1 | ||
Website Testing |
34%
|
1 | ||
Troubleshooting |
34%
|
1 | ||
Color Grading |
34%
|
1 | ||
Poster Design |
34%
|
1 | ||
Brochure Design |
34%
|
1 | ||
Flyer Design |
34%
|
1 | ||
Logo Design |
34%
|
22 | ||
PHP |
34%
|
22 | ||
Academic Writing |
34%
|
1 | ||
Research Writing |
34%
|
1 | ||
Scientific Writing |
34%
|
1 | ||
Writing Tutoring |
34%
|
1 | ||
Writing |
34%
|
1 | ||
Creative Design |
34%
|
1 | ||
Design |
34%
|
1 | ||
Digital Design |
34%
|
1 | ||
eBook Design |
34%
|
1 | ||
Graphic Design |
34%
|
1 | ||
Book Cover Design |
34%
|
1 | ||
Icon Design |
34%
|
1 | ||
Infographic and Powerpoint Slide Designing |
34%
|
1 | ||
Invitation Design |
34%
|
1 | ||
Label Design |
34%
|
1 | ||
Package Design |
34%
|
1 | ||
Packaging Design |
34%
|
1 | ||
Sign Design |
34%
|
1 | ||
Sticker Design |
34%
|
1 | ||
Textile Design |
34%
|
1 | ||
Advertisement Design |
34%
|
1 | ||
Banner Design |
34%
|
1 | ||
Debugging |
34%
|
1 |
Some Jabedmorshed C. projects
Project Title | Skills required in the project |
---|---|
Server Maintenance 2012 | .NET ASP Microsoft Windows Desktop |
IT-center our network instructor disappear -answer of some questions needed | Cisco Electronics System Admin |
IT-center our network instructor disappear -answer of some questions needed#3 | Technical Writing |
Move Website from HTML to Joomla | Amazon Web Services CSS Engineering Logo Design MySQL PHP Project Management Software Architecture Software Testing |