Deploy and configure a domain controller and a server in


Activity 1:

Research the required commands to configure Windows Server 2012 R2 using Powershell.

Deploy and configure a domain controller and a server in that domain using only the Server Core mode of Server 2012 R2 using your researched commands.

Write a brief report based on the above task. Use the following headings.

- Objective

- Method

- Observations

- Discussion

When writing observations, include a comparison to the graphical user interface (GUI) mode of performing the same tasks, as well as any difficulties you had.

Under the discussion heading, pick two topics from the previous semester and research the process of configuring them using Server Core and powershell.

Compare the powershell process to using the Graphical User Interface to perform the same configurations.

2 Pages maximum for whole report.

Activity 2

Discussion Questions:

1. Research two different certificate authorities and compare the certificates and services they provide.

2. Explain the different methods of certificate enrollment, with an example of where you might use each.

Activity 3

AD CS Lab Report with the following headings.

Refer to Orin Thomas, Chapter 4 for lab steps.

Headings:

- Objective

- Method

- Observations

Activity 4

Discussion Questions:

1. Your IT firm wants to implement an NFS system for their UNIX and Linux clients to access shared files on the predominantly windows network.

Research and explain how you would do this.

2. The firm is having issues with employees in a branch office having delays in accessing their shared files due to high network load.

What windows feature could help alleviate this network load? How would you configure this feature both in an office with a primary server and without one?

Activity 5

Complete practice exercises 1-12 in chapter 9 of the Orin Thomas reading (page 649).

Write a lab report based on the lab.

Activity 6

1. Briefly describe each type of trust and an give example of a situation where it would be appropriate to use. (Transitive, Forest, External, Realm, Shortcut)

2. Explain the difference between selective authentication, domain-wide authentication and forest-wide authentication.

3. Give an example of a situation where SID filtering might need to be disabled.

Activity 7

Multi-Domain Forests Lab Report

Refer to Orin Thomas Chapter 1, Exercises 1-13 for Lab steps.

Prepare a lab report

Headings:

- Objective

- Method

- Observations

Activity 8

Complete practice exercises 8-11 in chapter 6 of the Orin Thomas reading (page 448).

Write a lab report based on the lab. Prepare a lab report

Headings:

- Objective

- Method

- Observations

Activity 9

Discussion Questions:

1. Research and discuss three major differences between Failover Cluster and Network Load Balancing.

2. What are Failover Cluster and Network Load Balancing best used for? Research and explain for each technology.

3. Research and describe two methods of ensuring that any sort of storage attached to a Failover Cluster or an NLB system remains highly available.

need a summary of the work (No Lab work) for less than 2 pages.

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: Deploy and configure a domain controller and a server in
Reference No:- TGS01672770

Expected delivery within 24 Hours