Choosing the Appropriate Windows Server 2012 Edition and Windows Server 2012 Fe

“Choosing the Appropriate Windows Server 2012 Edition and Windows Server 2012 Features to Install”  Please respond to the following:
From the e-Activity, identify your chosen organization’s significant IT challenges, the Windows Server 2012 edition it chose to meet these challenges, and the most significant operational benefits it derived from this choice. Compare and contrast at least two (2) feature sets between the edition the organization chose and a different Windows Server 2012 Edition. Then determine at least two (2) advantages and two (2) disadvantages of choosing this alternate edition, given the organization’s IT needs based on its intended roles for the servers and the organization’s virtualization and licensing strategies. Justify your response.
List and define any three (3) Windows Server 2012 features that you would install to help provide enhanced system security. Using the three (3) features you have chosen, formulate a real-world business networking scenario that demonstrates the degree to which installing these features would increase system security and two (2) potential consequences if these features are not installed. Provide support for your rationale.
(E-Activity: Go to Microsoft’s Case Studies Website https://customers.microsoft.com/en-us/home?sq=&ff=&p=0. Search for case studies related to Windows Server 2012 R2. Select and review one (1) case study of your choosing. Be prepared to discuss.)
“Realizing the Benefits of Using Windows Server 2012 Disk Storage Technologies and Avoiding Resource Sharing Issues When Permissions Overlap ”  Please respond to the following:
•             Give examples of at least two (2) limitations of using standard workstation hard disks in a server environment. Examine at least two (2) specific Windows Server 2012 disk storage technologies for their capability to overcome these deficits. Provide support for your response.
•             From the e-Activity, compose an alternate share permission scenario similar to the one in the article by using an example where NTFS and share permissions overlap causing sharing issues. Provide an example of a strategy that helps solve the sharing issues outlined in your scenario.
(E-Activity: Go to the TechRepublic’s Website  http://www.techrepublic.com/blog/data-center/windows-server-2012-tips-for-setting-share-vs-ntfs-permissions/ to read the article titled “Windows Server 2012: Tips for Setting Share vs. NTFS Permissions”, dated November 27, 2012. Be prepared to discuss. Note: This article is applicable to both Windows Server 2012 and Windows Server 2012 R2.)
“Solving Windows Server 2012 Printing Problems and Understanding Windows Server 2012 Network Security Implications”  Please respond to the following:
•             From the e-Activity, devise a scenario where a user in a business environment is unable to print a document to a printer connected to a Windows Server 2012 print server. Determine at least two (2) troubleshooting steps an IT support technician should follow to find a solution to a general network printing issue. Support your response with the main reasons each step would or would not be responsible for directly correcting the issue.
•             Examine at least two (2) Windows Server 2012 remote management tools by relating them to at least one (1) specific network security issue. Specify at least two (2) advantages and two (2) disadvantages of using each to minimize the security issue(s).  Provide support for your rationale.
(E-Activity: Go to the Microsoft TechNet’s Website https://social.technet.microsoft.com/wiki/contents/articles/13308.troubleshooting-windows-server-2012-printing.aspx to read the article titled “Troubleshooting Windows Server 2012 Printing”, dated August 28, 2013. Be prepared to discuss. Note: This article is applicable to both Windows Server 2012 and Windows Server 2012 R2.
“Type I and Type II Virtualization Choices and Differentiating  Between Virtual Disk Formats and Applicable Environments” Please respond to the following:
Compare and contrast at least two (2) similarities and two (2) differences between Type I and Type II virtualizations. Using your comparison, choose either a Type I or Type II virtualization and determine a specific networking scenario in which your virtualization choice would be more viable than using the other. Provide an explanation to support your rationale.
From the eActivity and the textbook, give an example of a business scenario for which a dynamic disk image type would be most appropriate. Determine one (1) advantage and one (1) disadvantage of using a dynamic image type and one (1) advantage and one (1) disadvantage to using a fixed hard disk image type. Then, give an example of a business networking scenario for which a differencing hard disk image type would be best. Provide justifications to support your rationale.
“Benefits of HyperV” Please respond to the following:
Imagine you are a network administrator and you are proposing the implementation of Windows Server 2012 with HyperV to replace the existing VMware vSphere infrastructure utilized by the organization. Examine at least two (2) characteristics of HyperV that you would consider highlighting in order to convince the business decision makers and entice them to approve the proposed change. Specify the key reasons why you believe these characteristics are important in making your case to achieve the approval needed.
Explain what you believe are the top three (3) improvements and / or enhancements to HyperV in Windows Server 2012 from its Server 2008 predecessor and indicate the key reasons why you feel these improvements and / or enhancements can benefit organizations by realizing the full potential of HyperV.
“Ensuring Consistent Availability of DHCP and Internal Domain Creation Best Practices” Please respond to the following:
Provide one (1) example of a business networking scenario that would demand consistent availability of the DHCP service. From the textbook, choose at least two (2) of the overall objectives Microsoft used when designing DHCP and demonstrate the extent to which each contributes to the need for consistent DHCP availability in your scenario. Next, provide one (1) example of a business networking scenario where DHCP availability would not be as critical by contrasting it to one (1) of the objectives Microsoft used when designing DHCP.
Examine at least two (2) best practices you should follow when creating internal domains. Provide one (1) example for each to demonstrate the degree to which each practice can help increase network efficiency and help cut costs for an organization.
“Most Beneficial New Features of Active Directory from a Security Standpoint” Please respond to the following:
From the eActivity, recommend two (2) new features of Windows Server 2012 Active Directory that you believe to be most beneficial to users from a network security standpoint. Provide one (1) example for each feature that demonstrates a security problem that could occur if a user does not implement that feature.
From the eActivity, compare and contrast two (2) improved features of Windows Server 2012 Active Directory to the previous version of each feature. Examine your chosen features with a focus on the ability of each improved version to increase network efficiency and / or cost effectiveness compared to their previous versions. Provide support for your response.
“Choosing the Best Active Directory User Creation Tool and Organizational Unit Design Best Practices” Please respond to the following:
Determine at least two (2) Windows Server 2012 Active Directory user creation scenarios and specify one (1) Active Directory user object creation tool that you believe is the most efficient for each scenario. Include the main reasons why you believe each tool is the most efficient one to use for your specified scenarios based on the time it takes to create users and the complexity of using the tool.
From the eActivity, choose the two (2) best practices you consider to be the most important when designing Organizational Units (OUs). Provide one (1) specific network configuration example for each best practice that demonstrates the application of the best practice. Provide justification as to why each best practice should be followed.
“Bolstering Network Security by Using Group Policy and Configuring GPO Security Settings” Please respond to the following:
Determine one (1) situation that can cause a breach of network security. Provide two (2) examples to demonstrate the manner in which GPOs can be used to bolster network security to prevent the situation from occurring.
Choose at least two (2) Computer Configuration node security settings and, for each, specify a scenario whereby configuring the setting would provide security benefits. In each of your scenario descriptions, compare a presecurity configuration scenario with a postsecurity configuration scenario to demonstrate the potential security improvements.
“Windows Firewall” Please respond to the following: Overall Rating:
From the eActivity, take a position that the benefits of using the builtin Windows Firewall are or are not superior to those offered by thirdparty software products that boast similar features and integration with the Windows Server 2012 operating system. Provide justification for your response.
Describe, in your own words, the two (2) features of the Windows Firewall in Windows Server 2012 that you believe are most useful to users. Provide one (1) specific example for each feature to demonstrate the manner in which each can work towards the goal of greater security on the server, the network, and in the organization, as a whole.
“Transfer It” Please respond to the following:
Discuss two (2) ways you plan to apply what you learned in this course in your current or future position.
Describe the most important piece of knowledge that you gained during this course.
I need these answers on a week to week basis. The e-activity for each week is different, so I would rather have you submit the assignment week by week or two weekly discussions a week. That way I can provide the exact e-activity and you can read it and submit the assignment.
Discussion 1: 4/7
Discussion 2: 4/11
Discussion 3: 4/18
Discussion 4: 4/25
Discussion 5: 5/2
Discussion 6: 5/9
Discussion 7: 5/16
Discussion 8: 5/23
Discussion 9: 5/30
Discussion 10: 6/6
Discussion 11: 6/13

Published

Leave a comment

Your email address will not be published. Required fields are marked *