Discussion Replies Chapter 14 Bitlocker File Encryption, writing homework help

User Generated

Ubbg1991

Writing

Description

Must be 150 words each and contain relevant content. Do not just critique the others writing.


1) Chapter 14 Bitlocker File Encryption


Let explore this scenario, you travel extensively for business and travel with a laptop and you are worried that you confidential data on your computer will be compromised. In this thread let talk about BitLocker Encryption. What is a BitLocker Drive Encryption? What are the pro and cons of using this technology? If you've used BitLocker, what has your experience been with it?

Answer the questions and respond or comment to any of your classmates responses.


2) Chapter 14 FAT

Class,

This is a discussion on FAT (file allocation table) and how it relates to storage. Let's list and define them to make certain everyone understand what is it. There are FAT16 and FAT32. What are the difference between those two. There is technology called NTFS. What is NTFS and how does it relate to FAT32 or FAT 16?

Answer the questions and respond or comment to any of your classmates responses


3) Chapter 14 Direct Access vs VPN

lass,

Here's another scenario. You are working at your home but you forgot an important document on your work server and need to finish your work. That's where the innovation of VPN or virtual private network comes in. I'd like to discuss that in this thread and also discuss DirectAccess. What is DirectAccess? What is VPN? What are the similiarities or differnces of each.


4) Chapter 14 MCSA Windows Server 2012

Everything I've read to this point, and including this point, tells me not to put a bunch of different servers on one machine. And, if you have different locations - especially like our Wadley Inc. example - we have the ability to set up a server network and implement a BCP/DRP at the same time.

Active Directory appears to work, reference making things easier.

I was aware that I needed to publish shared folders. Not sure if it's in my Lab Sim notes, Plural Sight notes, class book notes, or where - but I remember reading about it before this.

Off line folders and synchronization sounds like a really good thing to me. I've been wondering what I could do for my network, should I choose not to allow access to my network during off work hours. This seems ideal as an alternative.

I understand the benefits of NTFS. Ah, good tip reference encryption, after a person leaves the company.

I wondered about the security of individual folders - excellent! Oh, NOW I understand the need for Deny! I saw this on one of our simulations and thought, if I am handing out the permissions why would I need to deny anyone? Now I get it. We use deny if the person has multiple permissions, and we want them in another group, but we want them to have no permissions in that specific group. Makes sense.

This was a good tip - shared permissions can only be placed on the folder - not on individual files.

I thought how NTFS Security and Shared Permissions work together was an interesting section.

I have the feeling, based on what I'm reading, FSRM is going to be one of my favorite tools.

I like the idea of bit locker, although I'm not so sure I like that every User has the ability to reset passwords and stuff. I've not had a personal experience though, so, I'm thinking - particularly in a large company - that's probably a plus in the long run.

Oddly enough, I have heard of direct access before this. I was kind of curious about alternatives to VPN's - although I love the idea of VPN's, they do use a lot of resources - anyways, up popped direct access via IPsec. (I also sort of chewed on APIPA).

Now this is the part I've been waiting all morning for - disk quotas. Wow, it reads like it's simple to implement, I like that!

I found a really good article reference DFS Replication - not sharing yet though. As I understand DFS Replication, it's not only good for load balancing and fault tolerance, but it's an excellent avenue when exploring BCP/DRPs also.

Publishing printers (or anything really) to AD is new for me, but I'm keen to learn how. I think it's an immensely useful tool in a network!

This was an excellent read!


5) Chapter 17

Chapter 17 covers file and storage systems which includes basic and dynamic disks, RAID sets, some material on virtual disks, and configuring firewalls. A lot of the material falls right in line with the information needed for this weeks writing assignment on protecting files and folders. Protecting data starts with ensuring the integrity of it, through RAID (redundant array of independent disks). There are a couple different types of RAID, each with their own pros and cons. RAID-5 seems to be a common and popular one, it uses a minimum of 3 disks and a maximum of 32. Data is striped (like RAID-0) across all the available disks with built in error correction blocks called "parity". In the event of a failure, parity is used to reconstruct lost data using pieces stored on other disks.

This weeks LabSim exercises really helped me get a working knowledge of how RAID actually works by giving me a visual of the different disks and how the data gets distributed when using different styles.


6) Supporting Activity Printer Options

Many factors that'll help improve scalability and performance of print servers; some involve the number of clients, client-side rendering, and printer hardware. According to TechNet (2014), the number of clients can cause some problems for the print server, when a large number of clients connect to the server it'll cause a significant drain on system resources. Another thing to note about these amount of clients is that if one leaves an application activated for an extended amount of time, then the connection with the print server might remain open and constrain it, a large number of clients connected when printing while connected. Client-side rendering allows the print system on that client to translate the document to a printer specific PDL before data gets sent to print server, the client-side rendering sometimes gets used instead of server-side rendering so it can maximize server capacity. Printer hardware may vary depending on what printer gets utilized for a print server, printers that support OpenXPS require minimal server support and printers that support PCL6 or PostScript are less efficient than XPS because they are vector formats (TechNet, 2014).


7) Supporting Activity Securing the Network

think rights delegation and file access, particularly reference security, are all steeped in least privilege. I've not encountered a situation/scenario where least privilege was called rights delegation or file access though, so I'm going to research a bit before I make up my mind. However, I think it might be least privilege on a higher plane than just Users or Groups. I mean, if I think about it, who has security or permission rights? IT Admin. So perhaps rights delegation is the hierarchy of IT Admin? Not sure about file access though.

Okay, as I complete my research (because now I HAVE to know!), I'll post more.


8) Chapter 17 MSCA Windows Server

In this chapter, it mentions how to work with volume sets, created from volumes that span multiple drives by using the free space from the said drives to construct something that looks like a single drive. There are many types of volume sets, and they are simple volume, spanned volume, striped volume, mirrored volume, and RAID-5 volume, these included work in various ways. According to Panek (2015), simple volume uses either one disk or a portion, spanned volume spans multiple disks with a maximum of 32 and used when volume needs are too high for one. Striped Volume stores the data in stripes across two or more disks if the set of stripes fall the entire volume will fail. Mirrored volume duplicates the data across two disks, its fault tolerant because if one of the drives fails, then data on the other isn't affected. RAID-5 volume stores its data in stripes like striped volume, but across three or more disks, the thing is the OS files and boot files can't reside on the RAID-5 disks (Panek, 2015).



User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: DISCUSSION REPLIES

1

Discussion replies
Name of the student
University affiliation
Date of submission

Running head: DISCUSSION REPLIES

2

1) Chapter 14 Bitlocker File Encryption
Bitlocker Drive Encryption is information ensuring highlight that is accessible windows server
2008 R2 and is utilized as a part of some proofreader's windows 7. The primary motivation
behind the Bitlocker drive encryption is that with the coordination of working framework, it
addresses the dangers of information robbery and introduction from the lost or rather the stolen
and notwithstanding when improperly decommissioned PCs. The primary masters of this drive
encryption incorporate offering the vast majority of security of the information by utilize trusted
stage module adaptation 1.2. The essential point of using this is to limit the shot that valuable
information can be recouped from lost stockpiling gadgets by the outsider. Restricting the
recuperation of information so that particular approved people can be encoded information
restrains the cost to the association of value or stolen portable PC phone (Momoh, O., 2010).
The cons of utilizing this innovation are the point at which the recuperation key is lost then the
information can't be recouped. It might likewise not shield the information from system or
nearby assaults when the PC is working ordinarily/the experience I have had on utilizing this
innovation is that my information have been recouped when there is upset the PC. The posting
by the student was very useful and to the point.
2) Chapter 14 FAT
FAT32 allows finer allocation granularity which is approximation of 4 million allocation units
per volume while on the other FAT16 holds that a maximum of 512 entries and has the limit of
that can be even lower because to the use of long file in the root folder. There are many tools in
available that can be used in addressing problems and recovery of data is much faster as
compared to the FAT32. The FAT32 hold that there are very few...


Anonymous
Just what I needed…Fantastic!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags