Windows Server 2012 with groups and policy

 Project 11-1: Configuring Zones

You have an Active Directory forest named csmtech.local and two Active Directory domains in the forest named csmpub.local and csmsales.local. You want the DNS servers in each domain to be able to handle DNS queries from client computers for any of the other domains. DNS servers in the csmtech.local and csmpub.local domains should be authoritative for their own domains and the csmsales.local domain. However, DNS servers in csmsales.local should be authoritative only for csmsales.local.

1. How should you set up the DNS servers and zones to handle this situation?

2. Explain how the DNS servers in each domain should be configured with zones. Be sure to include information about replication scope and zone types.

Writing Requirements

3-5 pages in length  (excluding cover page, abstract, and reference list)

2-3 Scholarly references

APA 6th edition,

Discussion(Disaster recovery & business continuity planning) 13

 QUESTION:

Each student will locate and review an article relevant to the topic of the class (student’s choice). The review is between 2 pages and should summarize the article contents with proper citations. Students will then include how it applies to the topic selected for this assignment, and why the student found it interesting.  The article should not be older than 2 years and students will provide the link to the article used for the research paper.

Example:  Article on a natural disaster and how a company responded to that event.

**Standard for all discussion posts:

A substantive post will do at least two of the following: 

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

**** NO PLAGIRSAM****

***REFERENCES

Data Collection and Analysis

Details:  you will perform a rudimentary analysis of an existing system (more specifically, the system you plan to redesign) using the System Usability Scale (SUS). This blog will challenge you to recruit participants for your analysis, implement the SUS and interpret the data results.

Requirements:

1. Clearly identify (i.e. explain and discuss) the system you are analyzing. The system should be the system you plan to redesign, or a similar system. 

2. Recruit a minimum of five individuals to participate in a simple user experience questionnaire using the SUS instrument found here: SUS-Instrument.pdf

. While individuals need not be familiar with the exact system you are redesigning, they should be familar with the general category of system. Include all results in your write-up.

3. Perform a rudimentary analysis of the data. Review the instructions on how to interpret SUS here: SUS-Details.pdf

4. Interpret the results. What are the strengths and weaknesses of the system. How might this analysis contribute to the redesign of your own system.

Discussion Cybersecurity

 

Chapter 2 discussed the three dimensions of the cybersecurity sorcery cube. The central responsibility of a cybersecurity specialist is to protect an organization’s systems and data. In your initial post, explain how each of the three dimensions discussed in this chapter contributes to that effort. Provide an example (from your personal or work experience or from further reading) to illustrate your point.

Initial posts are due by Wednesday at 11:59 PM CT. Your two peer responses are due by Sunday at 11:59 PM CT.

In 200 words

DATA BASE DESIGN project

  

Project

Can be any business other than a bicycle shop (sales/repair)

1 Person 20 Tables

(Average 5 Columns per table) Important note: I need 100 attributes in total in 20 20 tables(it may be either 5-6 attributes 1 table or 3-4 attributes in another table)

Should be normalized to 3rd Normal Form

1 (per person) instance where 1st, 2nd, or 3rd normal form is violated, give a detailed explanation as to why you designed this violation (you can have more than one, but it must be explained)

Create Select/Insert/Update/Delete statements for each table (other than  many-to-many tables)

Create at least 12 business rules, 10 should be built into the design (Per person)

Naming convention – explain the naming convention you used.

Data Dictionary(need in excel)

10 rows of dummy data in each table (where possible)(neeed in excel)

DDL Scripts for each table, PK, and FK

Using https://app.diagrams.net/ create the ERD using Crow’s Foot Notation (No other Notation will be accepted)

If you are working as a team, make sure it is obvious who created which pieces. Color code the ERD, showing who did what.

One person should submit the project for the team.

Lab

Lab # 7 part 2 – DATABASE AUDITING (lab)

This lab has been tested in Oracle 10g express.  You may copy and paste directly from this file. Note that if you need to edit this file, it is better to do so in NOTEPAD (copy & paste it to notepad),  word sometimes puts in characters that Oracle will not recognize it.  Also, note that as you copy & paste the stored procedures and triggers, you may need to copy & paste everything except for the slash and then paste the slash. Your job is to create an audit table in MS-SQL Server. Then create a trigger that puts data into the table. Then issue the command that will activate the trigger. You can translate some of the triggers in this assignment, copy and paste triggers from the web-site or create your own trigger. Regardless, your deliverable should be: a small text in English explaining what the trigger is doing and why is it useful, the Audit table, the Trigger, the command that execute the trigger.

Part  0 – only if you are doing it on a newly installed version

— Open an SQL window. Create a user & grant the user dba privileges. Example:

CREATE  USER  cit540 IDENTIFIED BY  c; 

GRANT  DBA   TO  cit540;  — In SQL Server, you grant all privileges to this user through login/security

— Create another user and grant this user create session privileges. Example:

CREATE  USER   smith  IDENTIFIED  BY  s;

GRANT    CREATE  SESSION   TO  smith;

Part  1 – audit login and logout

— Login as the user CIT540 with dba privileges 

CONNECT  cit540/c;

— Create a table to keep track of user login and logoff  

CREATE TABLE  login_logoff

(

      USERIDVARCHAR2(30),

      SESSIONIDNUMBER(8),

      HOSTVARCHAR2(30),

      LOGIN_DAYDATE,

      LOGIN_TIME            VARCHAR2(10),

      LOGOUT_DAYDATE,

     LOGOUT_TIME         VARCHAR2(10)

);

/

— Create a trigger that will insert a row in the login_logoff table every time user logs in

CREATE OR REPLACE TRIGGER

     audit_login

AFTER  LOGON  ON  DATABASE

BEGIN

INSERT  INTO  login_logoff  values (

         USER,

         sys_context (‘USERENV’,’SESSIONID’),          

​  sys_context (‘USERENV’,’HOST’),

                          sysdate,

                          to_char(sysdate, ‘hh24:mi:ss’),

                          null,

                          null  );

                 COMMIT;

                 END;          

/

— Create a trigger that will insert data in a row in the login_logoff table every time user logs out

CREATE OR REPLACE TRIGGER

    audit_logoff

BEFORE  LOGOFF ON DATABASE

BEGIN

  UPDATE  login_logoff

  SET

    logout_day = sysdate, logout_time=to_char(sysdate,’hh24:mi:ss’)

WHERE

  sys_context(‘USERENV’,’SESSIONID’)=sessionid;

END;

/

–Do not close your  SQL session. Open another SQL window and login as the user that does — not have dba privilege.

connect  smith/s; 

— leave the SQL session

Exit;

— connect as administrator (in this example, cit540

Connect  cit540/c;

— From the user CIT540 session that does have DBA privileges, verify the login

SELECT USERID, SESSIONID, HOST, LOGIN_DAY, LOGIN_TIME FROM LOGIN_LOGOFF;

Display. Your results.  Howe many rows did you see ?

You should see something like (but with CIT540 and Smith) :

Logout and type in:

SELECT  *  FROM  LOGIN_LOGOFF;

—————————————–

Creating Audit table and Audit Trigger

You will copy and paste everything that is in green. Deliverable: Screenshots of query with results.

1) get current date and current user

select  getDate();

select  suser_sname();

2) Create an audit table

CREATE TABLE UpdateProductAudit (date_updated  date,  who  varchar(50));

3) Create a trigger that inserts a row into the AuditProductChanges every time the Products table is updated

create trigger AuditProductChanges on Products

after update

as

begin

insert into dbo.UpdateProductAudit values(getDate(), suser_sname()); 

end

go

4) udate the Products table

UPDATE Products set quantity = quantity * 1.1;

5) view the update in the audit table

SELECT * from dbo.UdateProductAudit;

6) Do the exercises in the link below. Your professor will discuss the link in class.

https://www.mssqltips.com/sqlservertip/4055/create-a-simple-sql-server-trigger-to-build-an-audit-trail/

Submit the screenshots of the results. Create the table inside your own database. Alter each table name and trigger name to have your initials.  Consequently , you also need to order each reference to the table to have your initials also.

7) Go to https://docs.microsoft.com/en-us/sql/relational-databases/security/auditing/create-a-server-audit-and-database-audit-specification?view=sql-server-2017

And create a server audit specification (either in SSMS or SQL)

Information technology

Networks have changed drastically over the last 30 years.  With the  first introduction of the 56k modem, which was about 3 typewriter pages  per second, to speeds well over 1Gbps these days, the ability to use  networks globally, has changed the way we do business.  Using research,  determine where networks will go in the next 5-10 years and how that  might impact the global economy.

225 WORDS

PLAGIARISM REPORT

APA7 REFERENCES – 2

Problem 4- Initiating Project

Please see attached file for question

Text

Title: Contemporary Project Management 

ISBN: 9781337406451 

Authors: Timothy Kloppenborg, Vittal S. Anantatmula, Kathryn Wells 

Publisher: Cengage Learning 

Publication Date: 2018-02-08 

Edition: 4th

A Guide to the Project Management Body of Knowledge (PMBOK(R) Guide-Sixth Edition / Agile Practice Guide Bundle (HINDI) 

ISBN: 9781628255393 

Authors: Project Management Institute 

Publisher: Project Management Institute 

Publication Date: 2019-08-05

Assignment READ CAREFULLLY !!!

 
        Complete the questions 1, 2, 3, below, working with personality types.  

Learn more about these personality types at ( YOU MUST OPEN AND READ THIS LINK IN ORDER TO ANSWER QUESTIONS) LINK:http://www.personalitypage.com/high-level.html (Links to an external site.)  (Links to an external site.) and complete the following: 

Question 1. WHICH TYPE ARE YOU? Briefly explain (total 5 paragraphs; 1 paragraph is = to 8 sentences)

Question 2. Briefly describe the ISTJ and ENFP personality types in the Myers-Briggs categories (1 paragraph of 8 full sentences (phrases are not sentences (a couple of you wrote phrases instead of sentences in last assignment) .

Question 3. Critical Thinking Question: There are 2 peer employees that you simply cannot get along with or you are in arguments often at meetings. Let’s call them Albert and Jennifer. Albert is a ISTJ and nothing ever bothers him. Unfortunately, he agrees to everything, even if it’s apparent that doing his method will lose your company thousands of dollars ($240,000).
List 2 sentences stating HOW YOU can get Albert to give his true feelings – communicate with the group if he believes the group plans will succeed or fail and why. (How can you make him talk?)

Jennifer is YOUR OPPOSITE personality type. What personality type is opposite you? (answer this)

Other peers have noticed that neither you or Jennifer stand down/compromise.  List 2 sentences stating HOW YOU can improve this communicate. (I know, I said “YOU” and not her. Work conflicts are difficult.)