Imagine you have been hired as a network technology consultant for a small business. The owner of the business, Sally…

Why-is-the-hospital-considering-this-additional-service-management-homework-help
February 25, 2021
How to Prelaunch Decisions
February 25, 2021

Imagine you have been hired as a network technology consultant for a small business. The owner of the business, Sally…

Imagine you have been hired as a network technology consultant for a small business. The owner of the business, Sally Chu, has asked you to provide assistance in setting up local users on a Windows 7 workgroup network. She also wants you to provide the highest level of security for her network.

Write a two to three (2-3) page paper in which you analyze and solve the following issues:
Sally wants all six (6) of her administrative staff members to have the same computer-access privileges. She wants them to be able to run applications and use network printers, but not be able to make any accidental changes that can adversely affect their computers.

  • List and explain the steps you would take to provide the most-efficient method of creating user accounts for these employees.

Sally wants to be able to provide a high level of authentication for her network’s users, so she is asking for a dual authentication process. She has asked you to perform research in this manner by providing two (2) dual authentication methods.

  • Explain two (2) different forms of authentication methods that Windows 7 supports that can be combined with requiring a password for network access. 
  • Discuss the advantages and disadvantages of using both the methods you’ve chosen.

Sally has asked you to make security modification to Internet Explorer. You need to ensure all Web-based applications run in protected mode except those that exist on the local intranet since these applications need to write to specific disk space that protected mode prohibits writing to.

  • Develop a strategy to ensure this compatibility by using Microsoft Visio or an open-source alternative to create a process diagram or similar visual depiction to represent the troubleshooting steps you would take. Note: The graphically depicted solution is not included in the required page length.
  • Explain how the firm’s employees can remain safe from Internet predators by describing at least two (2) Internet threats and how Internet Explorer 8 can help safeguard them against these threats.

In keeping with the need for strong security on the network, you need to ensure all the clients’ computers are provided with the latest updates. Sally has asked you to provide these updates in the most-efficient and cost-effective manner possible and there should be little drag on the network. Remember, your network does not have Active Directory installed.

  • Describe the update distribution method you would choose and why.
  • Explain how you would plan the distribution of updates on the network.

Users are reporting that their clients are running sluggishly. You have decided to monitor the performance of all the clients.

  • List and describe at least three (3) steps you can take using Windows 7 to try to determine what has been slowing down the computers.
  • Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Describe the properties of user accounts and configure its components.
  • Demonstrate authentication and authorization in configuring secure user accounts.
  • Use technology and information resources to research issues in desktop administration and operating system environments.
  • Write clearly and concisely about desktop administration and operating system environments using proper writing mechanics and technical style conventions.
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.